Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
Analysis ID:1467948
MD5:d24b89cd8ed0bf45794f5f6a1324cd64
SHA1:4218126f5f9f455af47a3c44552837357328d045
SHA256:13b11fea340a9312543a3f33cf271bdc340daec08a03d591aa9179eb95066dcd
Tags:exe
Infos:

Detection

Score:24
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Delayed program exit found
Writes many files with high entropy
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe (PID: 7664 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe" MD5: D24B89CD8ED0BF45794F5F6A1324CD64)
    • evony_install.exe (PID: 7472 cmdline: "C:\Users\user\AppData\Local\Temp\evony_install.exe" MD5: 1E5D15442BC7EF8000317CD820C15FEC)
      • evony_install.tmp (PID: 7720 cmdline: "C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp" /SL5="$B029A,142255846,116736,C:\Users\user\AppData\Local\Temp\evony_install.exe" MD5: A7FCD2C71C42B045367F56DF9C1EA82D)
        • taskkill.exe (PID: 1696 cmdline: "C:\Windows\System32\taskkill.exe" /f /im evony.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
          • conhost.exe (PID: 2828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • evony.exe (PID: 6620 cmdline: "C:\Program Files (x86)\Evony\evony.exe" MD5: B78BC21D6DEEE736214C8A9B48532663)
          • UnityCrashHandler64.exe (PID: 7024 cmdline: "C:\Program Files (x86)\Evony\UnityCrashHandler64.exe" --attach 6620 1500517896192 MD5: 9E1BD55580B0F983A43493DF89AE77FC)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C9160 CryptAcquireContextW,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_008C9160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C9380 CryptAcquireContextW,CryptCreateHash,0_2_008C9380
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C93C0 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_008C93C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CA360 CryptAcquireContextW,CryptCreateHash,0_2_008CA360
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008A7620 BCryptGenRandom,0_2_008A7620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C7AC0 CryptAcquireContextW,CryptCreateHash,CryptReleaseContext,0_2_008C7AC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C7B10 CryptHashData,0_2_008C7B10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C7B30 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_008C7B30
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BB17C0 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptDestroyHash,CryptReleaseContext,10_2_00007FF674BB17C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: mov dword ptr [ebx+04h], 424D53FFh0_2_008B3120
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\license.txtJump to behavior
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\buildslave\unity\build\artifacts\UnityCrashHandler\release_win64\UnityCrashHandler64_x64.pdbE source: UnityCrashHandler64.exe, 0000000A.00000000.3354628301.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp, UnityCrashHandler64.exe, 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp
Source: Binary string: G:\Evony\Src\trunk\client\TopLoader\Release\Evony_AABBCCDDEEF.pdb source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
Source: Binary string: C:\buildslave\unity\build\artifacts\UnityCrashHandler\release_win64\UnityCrashHandler64_x64.pdb source: UnityCrashHandler64.exe, 0000000A.00000000.3354628301.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp, UnityCrashHandler64.exe, 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp
Source: Binary string: C:\buildslave\unity\build\artifacts\WindowsPlayer\Win64_nondev_i_r\WindowsPlayer_Master_il2cpp_x64.pdb source: evony.exe, 00000009.00000000.3353467976.00007FF71C20B000.00000002.00000001.01000000.0000000D.sdmp
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BD3270 FindFirstFileW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,10_2_00007FF674BD3270
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BFEDE8 FindFirstFileExW,10_2_00007FF674BFEDE8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008A6C80 socket,socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,WSAGetLastError,closesocket,closesocket,closesocket,closesocket,closesocket,0_2_008A6C80
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/Evony.The.Kings.Return equals www.facebook.com (Facebook)
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/Evony.The.Kings.Return" equals www.facebook.com (Facebook)
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/groups/466250153910003 equals www.facebook.com (Facebook)
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: 0https://www.facebook.com/Evony.The.Kings.Return/4284 equals www.facebook.com (Facebook)
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ="Facebook:\n https://www.facebook.com/Evony.The.Kings.Return" equals www.facebook.com (Facebook)
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Follow our Facebook page: <a href=https://www.facebook.com/Evony.The.Kings.Return>click here</a> to get the latest game updates, submit suggestions, and ask questions. We are here to serve you!can get."; equals www.facebook.com (Facebook)
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ["bulletin_connection_foreign04"="Group:\n https://www.facebook.com/groups/466250153910003";ghijk equals www.facebook.com (Facebook)
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ^"bulletin_connection_foreign02"="Facebook:\n https://www.facebook.com/Evony.The.Kings.Return"; equals www.facebook.com (Facebook)
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://changyoufun.com/wmby/index.htmlRSTU
Source: is-SG16N.tmp.6.drString found in binary or memory: http://code.google.com/p/chromium/issues/detail?id=125863)
Source: is-SG16N.tmp.6.drString found in binary or memory: http://code.google.com/p/chromium/issues/entry
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/112091
Source: is-LS9UJ.tmp.6.drString found in binary or memory: http://crbug.com/122474.
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/235689.
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/258526.
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/263077).
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/275944
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/312900.
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/319444.
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/320723
Source: is-SG16N.tmp.6.drString found in binary or memory: http://crbug.com/360567
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/371562.
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/378067
Source: is-LS9UJ.tmp.6.drString found in binary or memory: http://crbug.com/415315
Source: is-LS9UJ.tmp.6.drString found in binary or memory: http://crbug.com/415315.
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/437891.
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/456214
Source: is-SG16N.tmp.6.drString found in binary or memory: http://crbug.com/469522
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/470411
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/473845
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/478929
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/510270
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/514696
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/516527
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/541769
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/642141
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/672186).
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/819404
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/908458
Source: is-D6J18.tmp.6.drString found in binary or memory: http://crbug.com/932466
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: is-D6J18.tmp.6.drString found in binary or memory: http://developer.chrome.com/apps/usb.html#method-listInterfaces
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://em.evony.com/
Source: evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://em.evony.com/PrivacyPolicy.html
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://em.evony.com/down.php?type=windows&print=1
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://em.evony.com/down.php?type=windows&print=15360000
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796696665.00000000009DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://em.evony.com/down.php?type=windows&print=1R_ARCHIfv
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796928866.0000000000A15000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1697001253.0000000000A23000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A15000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1698208503.0000000000A16000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1698267866.0000000000A23000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2796180011.00000000009FE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1697001253.0000000000A16000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796696665.00000000009FE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736012055.0000000000A15000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=AABBCCDDEEF
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A15000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1698208503.0000000000A16000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1697001253.0000000000A16000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736012055.0000000000A15000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=AABBCCDDEEFn=0.4.0&compileType=release&n
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796928866.0000000000A15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=AABBCCDDEEFn=0.4.0&compileType=release&nH
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=http://em.evony.com/down.php?type=windows&pri
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://em.evony.com/p
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://emcl.evony.com
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emcl.evony.com/pixel.jpg
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&.sdb
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&ve
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&ve%
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&veR
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A15000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796696665.00000000009DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&version=0.4.0&compileType=release&newbi
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emcl.evony.com/pixel.jpg_
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn.ucimg.co
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_2024
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exe
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exe.
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exen
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exet
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C1DF000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/anim-npc-threedogs_3844115629.brotlie
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/anim-puzzle_3445143400.brotlip
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/anim-star_2533218360.brotli
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/anim-technology_366139163.brotli
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim1_147738136.brotli
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim2_1335172117.brotli;;
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim2_1335172117.brotlin
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim3_1034175375.brotli=)
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim3_1034175375.brotliia.
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim4_2461290424.brotlimp
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim6_3347160378.brotli
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/army-ui-art_4269022620.brotlis).I
Source: evony.exe, 00000009.00000003.3628065439.0000015D7C1DF000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-building-evony5_603251547.brotli
Source: evony.exe, 00000009.00000003.3986438187.0000015D05FFD000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-ui-others_2453432180.brotli
Source: evony.exe, 00000009.00000003.3986438187.0000015D060B2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-ui-others_2453432180.brotlip
Source: evony.exe, 00000009.00000003.3986438187.0000015D06154000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-world_3386343179.brotli
Source: evony.exe, 00000009.00000003.3986438187.0000015D06154000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/puzzle-bullhead_3362899041.brotli
Source: evony.exe, 00000009.00000003.3986438187.0000015D06154000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/UploadBundles/puzzle-door_2747818999.brotli
Source: evony.exe, 00000009.00000003.3986438187.0000015D060B2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://emggcdn1.ucimg.co/windows/uploadbundles/prefab-ui-others_2453432180.brotli
Source: is-D6J18.tmp.6.drString found in binary or memory: http://foo.com/bar#NAMEDDEST.
Source: is-D6J18.tmp.6.dr, is-SG16N.tmp.6.drString found in binary or memory: http://goo.gl/Y1OdAq
Source: evony_install.exe, 00000005.00000003.3354424021.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736249006.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736165346.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766148289.00000000021F8000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766166714.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2765936915.00000000021F4000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738581379.000000000219D000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766026427.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766055813.00000000021F4000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766006630.00000000021F8000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766040694.0000000002204000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://m.evony.com/Terms.html
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://ocsp.digicert.com0
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: evony_install.exe, 00000005.00000003.2737230729.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736979042.0000000002550000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000000.2737800950.0000000000401000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://restools.hanzify.org/
Source: evony_install.exe, 00000005.00000003.2737230729.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736979042.0000000002550000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000000.2737800950.0000000000401000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://restools.hanzify.org/U
Source: is-SG16N.tmp.6.drString found in binary or memory: http://surveys.google.com/unit?site=z4cctguzopq5x2ftal6vdgjrui
Source: is-D6J18.tmp.6.drString found in binary or memory: http://wiki.greasespot.net/Greasemonkey_Manual:APIs
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: is-D6J18.tmp.6.drString found in binary or memory: http://www.foo.com
Source: is-D6J18.tmp.6.drString found in binary or memory: http://www.foo.com/bar
Source: evony_install.exe, 00000005.00000003.2737230729.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736979042.0000000002550000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000000.2737800950.0000000000401000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.innosetup.com/
Source: is-D6J18.tmp.6.drString found in binary or memory: http://www.json.com/json-schema-proposal/
Source: evony_install.exe, 00000005.00000003.2737230729.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736979042.0000000002550000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000000.2737800950.0000000000401000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.remobjects.com/ps
Source: evony_install.exe, 00000005.00000003.3354370596.0000000001F98000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.wldna.com/?PreDefines.
Source: evony_install.exe, 00000005.00000003.3354370596.0000000001F98000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736249006.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736165346.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738581379.000000000219D000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.wldna.com/?PreDefines.ish
Source: is-D6J18.tmp.6.dr, is-SG16N.tmp.6.drString found in binary or memory: https://accounts.google.com/
Source: is-SG16N.tmp.6.drString found in binary or memory: https://chrome.google.com/webstore
Source: is-D6J18.tmp.6.drString found in binary or memory: https://code.google.com/p/chromium/issues/detail?id=162042
Source: is-D6J18.tmp.6.drString found in binary or memory: https://code.google.com/p/chromium/issues/detail?id=162044
Source: is-D6J18.tmp.6.drString found in binary or memory: https://commondatastorage.googleapis.com/chromium-boringssl-docs/bytestring.h.html
Source: is-D6J18.tmp.6.drString found in binary or memory: https://crbug.com/5448190).
Source: is-LS9UJ.tmp.6.drString found in binary or memory: https://crbug.com/593166
Source: is-D6J18.tmp.6.drString found in binary or memory: https://crbug.com/701034
Source: is-D6J18.tmp.6.drString found in binary or memory: https://crbug.com/740629)
Source: is-LS9UJ.tmp.6.drString found in binary or memory: https://crbug.com/787427.
Source: is-SG16N.tmp.6.drString found in binary or memory: https://crbug.com/837107):
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: https://curl.se/docs/alt-svc.html#
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: https://curl.se/docs/http-cookies.html#
Source: is-SG16N.tmp.6.drString found in binary or memory: https://developer.chrome.com/devtools/docs/remote-debugging#reverse-port-forwarding
Source: is-D6J18.tmp.6.drString found in binary or memory: https://developer.mozilla.org/en/DOM/document.
Source: is-SG16N.tmp.6.drString found in binary or memory: https://developers.google.com/chrome-developer-tools/docs/remote-debugging
Source: evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://em.evony.com/index.php?r=shorturl/getRealUrl&k=
Source: output_log.txt.9.drString found in binary or memory: https://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&isAmazon=0&hd=0&version=4.76.1.298013&
Source: evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&type=0&user_id=1020291&isAmazon=0&hd=0
Source: is-D6J18.tmp.6.drString found in binary or memory: https://github.com/google/closure-compiler/issues/544
Source: is-D6J18.tmp.6.drString found in binary or memory: https://github.com/v8/v8/wiki/Stack%20Trace%20API.
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n1.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n10.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n11.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n12.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n13.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n14.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n15.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n16.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n17.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n18.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n2.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n3.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n4.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n5.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n6.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n7.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n8.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://m.evony.com/n9.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=
Source: ShareConfig.bytes.9.drString found in binary or memory: https://pc.evony.com/
Source: UnityCrashHandler64.exe, 0000000A.00000000.3354628301.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp, UnityCrashHandler64.exe, 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: https://perf-events.cloud.unity3d.com
Source: UnityCrashHandler64.exe, 0000000A.00000000.3354628301.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp, UnityCrashHandler64.exe, 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: https://perf-events.cloud.unity3d.com--console--wait-for-debugger
Source: is-D6J18.tmp.6.drString found in binary or memory: https://policies.google.com/privacy
Source: is-D6J18.tmp.6.drString found in binary or memory: https://policies.google.com/terms
Source: is-SG16N.tmp.6.drString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
Source: is-SG16N.tmp.6.drString found in binary or memory: https://support.google.com/chrome/answer/6258784
Source: is-D6J18.tmp.6.drString found in binary or memory: https://support.google.com/chrome/go/feedback_confirmation
Source: is-D6J18.tmp.6.drString found in binary or memory: https://support.google.com/legal/answer/3110420
Source: is-D6J18.tmp.6.drString found in binary or memory: https://support.google.com/pixelbook/answer/7659411
Source: evony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/evony_s
Source: evony_install.exe, 00000005.00000003.3354424021.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736249006.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736165346.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738581379.000000000219D000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.evony.com
Source: evony_install.exe, 00000005.00000003.3354424021.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736249006.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738581379.000000000219D000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.evony.com&
Source: is-SG16N.tmp.6.drString found in binary or memory: https://www.google.com/
Source: is-D6J18.tmp.6.drString found in binary or memory: https://www.google.com/chrome/cleanup-tool/
Source: is-SG16N.tmp.6.drString found in binary or memory: https://www.google.com/cloudprint
Source: is-SG16N.tmp.6.drString found in binary or memory: https://www.google.com/cloudprint/enable_chrome_connector
Source: is-D6J18.tmp.6.drString found in binary or memory: https://www.google.com/speech-api/v2/synthesize?
Source: is-D6J18.tmp.6.drString found in binary or memory: https://www.gstatic.com/securitykey/a/google.com/origins.json

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeFile created: C:\Users\user\AppData\Local\Temp\evony_install.exe entropy: 7.99999435832Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\bg_welcome.png entropy: 7.9967350912Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\bg_welcome_expand.png entropy: 7.99715471715Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\bg_installing.png entropy: 7.99793861649Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\btn_setup.png entropy: 7.99016722065Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\bg_finished.png entropy: 7.99643205246Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony3-model_777875519.brotli entropy: 7.99736564882Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony1-anim_2029691946.brotli entropy: 7.99159246048Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony2-anim_2011285480.brotli entropy: 7.99123295093Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony3-anim_1520481958.brotli entropy: 7.99339972145Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony4-model_3487144469.brotli entropy: 7.99688012602Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony5-model_3315917671.brotli entropy: 7.9975866846Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony5-anim_603136724.brotli entropy: 7.99117284394Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony6-model_1593441291.brotli entropy: 7.99682253023Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony6-anim_2687762604.brotli entropy: 7.99141312028Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony7-model_2811439933.brotli entropy: 7.99708884617Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony7-anim_1650297496.brotli entropy: 7.99045869647Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\shooting_sprite_puzzle_1147677540.brotli entropy: 7.99917518298Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\building-model-out-evony5_2854177203.brotli entropy: 7.99908748088Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\building-model-in-evony5_2568264251.brotli entropy: 7.99779759976Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony3-general_2835875096.brotli entropy: 7.9976743681Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony4-general_3803691962.brotli entropy: 7.99811379625Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony5-age1_147666316.brotli entropy: 7.99817605095Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony4-age1_4004955229.brotli entropy: 7.99764390366Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\LocalLow\topgamesinc\Evony_ The King's Return\Loading\Temp\dynamic-pc-loading-l_9296308.brotli entropy: 7.99279895804Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\abtest_9501_wosmarchqueueoptimization_3505500930.brotli entropy: 7.99125074753Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\abtest_9501_marchingqueue_896672413.brotli entropy: 7.99396308252Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\e596f913526978b3de874d1d4e9fcb93.zip entropy: 7.99506256247Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-common-age1_1377571287.brotli entropy: 7.99742467009Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony1-age1_2648517498.brotli entropy: 7.99784559231Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\abtest_9351_snowstorm_1058262842.brotli entropy: 7.9994034423Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony1-general_1320653600.brotli entropy: 7.99753468295Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony1-age2_905865394.brotli entropy: 7.99830206772Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony2-general_932571768.brotli entropy: 7.99739872434Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony3-age1_252493909.brotli entropy: 7.99756830386Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony5-general_2031309966.brotli entropy: 7.99729485545Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony6-age1_2499610442.brotli entropy: 7.99701979734Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony7-age1_2880652014.brotli entropy: 7.99786421385Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\en-US_dfbb5179cc57dd362efb6df431b2da0c.zip entropy: 7.99863982903Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-boss-bimeng_1265000540.brotli entropy: 7.99902843762Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\maincity-map-evony5_3462011455.brotli entropy: 7.99946630687Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-door_2747818999.brotli entropy: 7.9944157147Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-egypt_4055153623.brotli entropy: 7.99746498618Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-bullhead_3362899041.brotli entropy: 7.99759931069Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-ad_49824091.brotli entropy: 7.99246468495Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-map-frame_2291977699.brotli entropy: 7.99643127067Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-nu_1965725141.brotli entropy: 7.99382960559Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-maya_3478796074.brotli entropy: 7.99663227667Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-original_3128651657.brotli entropy: 7.99800439671Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-lava_754326057.brotli entropy: 7.99801090442Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-ui_3658943333.brotli entropy: 7.99771186006Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-map_2337640541.brotli entropy: 7.99850525469Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-viking_1594703064.brotli entropy: 7.99736894324Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony1-model_3161167982.brotli entropy: 7.99746159625Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\puzzle-role_179201213.brotli entropy: 7.99860199097Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\role-evony2-model_3125278016.brotli entropy: 7.99773397711Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\anim-army-evony2-age1_1360540446.brotli entropy: 7.99802333627Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\prefab-anim-evony5_2974154043.brotli entropy: 7.9908846864Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\prefab-building-evony5_603251547.brotli entropy: 7.99596716253Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\city-wall-crash-evony5_3209756256.brotli entropy: 7.99784421923Jump to dropped file
Source: C:\Program Files (x86)\Evony\evony.exeFile created: C:\Users\user\AppData\Local\Temp\topgamesinc\Evony_ The King's Return\DownloadTemp\army-ui-art-evony5_3653675160.brotli entropy: 7.99625712691Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C9160 CryptAcquireContextW,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_008C9160
Source: C:\Program Files (x86)\Evony\evony.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_0040941C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,5_2_0040941C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_0089F3300_2_0089F330
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_0088B8C00_2_0088B8C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008A58F00_2_008A58F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C50F00_2_008C50F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008D104E0_2_008D104E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CD1500_2_008CD150
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CA2C00_2_008CA2C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008EB4B70_2_008EB4B7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008B94200_2_008B9420
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008A65000_2_008A6500
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C05200_2_008C0520
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008E891D0_2_008E891D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008AF9100_2_008AF910
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008DC9130_2_008DC913
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C0AC00_2_008C0AC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008E8A410_2_008E8A41
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008D0BE60_2_008D0BE6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008D4B0F0_2_008D4B0F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008D6B100_2_008D6B10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C4B700_2_008C4B70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008BEC800_2_008BEC80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008C9CC00_2_008C9CC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008B4D300_2_008B4D30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008E6EC30_2_008E6EC3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008D0E1A0_2_008D0E1A
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_004083E05_2_004083E0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BCB61010_2_00007FF674BCB610
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BFC5E410_2_00007FF674BFC5E4
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BFD57C10_2_00007FF674BFD57C
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BBD56310_2_00007FF674BBD563
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BCC57010_2_00007FF674BCC570
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BFB6E010_2_00007FF674BFB6E0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BDF6E810_2_00007FF674BDF6E8
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674C0080010_2_00007FF674C00800
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BB281010_2_00007FF674BB2810
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BAE92010_2_00007FF674BAE920
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BA58E010_2_00007FF674BA58E0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BF58E010_2_00007FF674BF58E0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BD723010_2_00007FF674BD7230
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BD219010_2_00007FF674BD2190
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BEE1A410_2_00007FF674BEE1A4
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BAA29010_2_00007FF674BAA290
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BF83B010_2_00007FF674BF83B0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BA450010_2_00007FF674BA4500
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BBD50C10_2_00007FF674BBD50C
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BB153010_2_00007FF674BB1530
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BBD53410_2_00007FF674BBD534
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674C014E010_2_00007FF674C014E0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BAB49010_2_00007FF674BAB490
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BE7D6010_2_00007FF674BE7D60
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674C00E9010_2_00007FF674C00E90
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BE7FCC10_2_00007FF674BE7FCC
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BEEFB010_2_00007FF674BEEFB0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BB3F6010_2_00007FF674BB3F60
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BF010C10_2_00007FF674BF010C
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BAE12010_2_00007FF674BAE120
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BDC04410_2_00007FF674BDC044
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BF105010_2_00007FF674BF1050
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BDD06410_2_00007FF674BDD064
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BFB06810_2_00007FF674BFB068
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674C009F010_2_00007FF674C009F0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BD29F010_2_00007FF674BD29F0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BA298010_2_00007FF674BA2980
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BF097C10_2_00007FF674BF097C
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BF797C10_2_00007FF674BF797C
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BBF99010_2_00007FF674BBF990
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BE19A410_2_00007FF674BE19A4
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BAD95010_2_00007FF674BAD950
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BE7AD010_2_00007FF674BE7AD0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BF9A8410_2_00007FF674BF9A84
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BA4AA010_2_00007FF674BA4AA0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BEABBC10_2_00007FF674BEABBC
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BA9BF010_2_00007FF674BA9BF0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BBBB7010_2_00007FF674BBBB70
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BEECC410_2_00007FF674BEECC4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: String function: 008A27B0 appears 32 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: String function: 0089A540 appears 45 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: String function: 0089BC50 appears 41 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: String function: 00896CA0 appears 273 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: String function: 008CB8C0 appears 55 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: String function: 0088125B appears 43 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: String function: 00896D60 appears 214 times
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: String function: 00007FF674BA1F50 appears 85 times
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: String function: 00007FF674BACBA0 appears 59 times
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: String function: 00007FF674BDA530 appears 68 times
Source: evony_install.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: evony_install.tmp.5.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: evony_install.tmp.5.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: evony_install.tmp.5.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: evony_install.tmp.5.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: is-HULB5.tmp.6.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-HULB5.tmp.6.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: is-HULB5.tmp.6.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-HULB5.tmp.6.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: is-H800J.tmp.6.drStatic PE information: Number of sections : 14 > 10
Source: is-D23EU.tmp.6.drStatic PE information: Number of sections : 12 > 10
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: _RegDLL.tmp.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: sus24.rans.evad.winEXE@12/1034@0/8
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_0040941C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,5_2_0040941C
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_00409BC0 FindResourceA,SizeofResource,LoadResource,LockResource,5_2_00409BC0
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\EvonyJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\Public\Desktop\Evony.lnkJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2828:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeFile created: C:\Users\user\AppData\Local\Temp\evony_task.txtJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCommand line argument: TopLoader0_2_00884270
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCommand line argument: TOPLOADER0_2_00884270
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;evony.exe&quot;)
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExW\/AddDllDirectoryh1h2h3%10s %512s %u %10s %512s %u "%64[^"]" %u %urt%s %s %u %s %s %u "%d%02d%02d %02d:%02d:%02d" %u %d
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeProcess created: C:\Users\user\AppData\Local\Temp\evony_install.exe "C:\Users\user\AppData\Local\Temp\evony_install.exe"
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeProcess created: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp "C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp" /SL5="$B029A,142255846,116736,C:\Users\user\AppData\Local\Temp\evony_install.exe"
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe "C:\Windows\System32\taskkill.exe" /f /im evony.exe
Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess created: C:\Program Files (x86)\Evony\evony.exe "C:\Program Files (x86)\Evony\evony.exe"
Source: C:\Program Files (x86)\Evony\evony.exeProcess created: C:\Program Files (x86)\Evony\UnityCrashHandler64.exe "C:\Program Files (x86)\Evony\UnityCrashHandler64.exe" --attach 6620 1500517896192
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeProcess created: C:\Users\user\AppData\Local\Temp\evony_install.exe "C:\Users\user\AppData\Local\Temp\evony_install.exe"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeProcess created: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp "C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp" /SL5="$B029A,142255846,116736,C:\Users\user\AppData\Local\Temp\evony_install.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe "C:\Windows\System32\taskkill.exe" /f /im evony.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess created: C:\Program Files (x86)\Evony\evony.exe "C:\Program Files (x86)\Evony\evony.exe"Jump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeProcess created: C:\Program Files (x86)\Evony\UnityCrashHandler64.exe "C:\Program Files (x86)\Evony\UnityCrashHandler64.exe" --attach 6620 1500517896192Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: winhttpcom.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: webio.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: unityplayer.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: opengl32.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: hid.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: glu32.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: gameassembly.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: amsi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: devobj.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: xinput1_3.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: xinput9_1_0.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: mscms.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: icm32.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeSection loaded: dbghelp.dll
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeSection loaded: wininet.dll
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeSection loaded: version.dll
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpWindow found: window name: TMainFormJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic file information: File size 1129320 > 1048576
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\buildslave\unity\build\artifacts\UnityCrashHandler\release_win64\UnityCrashHandler64_x64.pdbE source: UnityCrashHandler64.exe, 0000000A.00000000.3354628301.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp, UnityCrashHandler64.exe, 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp
Source: Binary string: G:\Evony\Src\trunk\client\TopLoader\Release\Evony_AABBCCDDEEF.pdb source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
Source: Binary string: C:\buildslave\unity\build\artifacts\UnityCrashHandler\release_win64\UnityCrashHandler64_x64.pdb source: UnityCrashHandler64.exe, 0000000A.00000000.3354628301.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp, UnityCrashHandler64.exe, 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmp
Source: Binary string: C:\buildslave\unity\build\artifacts\WindowsPlayer\Win64_nondev_i_r\WindowsPlayer_Master_il2cpp_x64.pdb source: evony.exe, 00000009.00000000.3353467976.00007FF71C20B000.00000002.00000001.01000000.0000000D.sdmp
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_00898900 GetModuleHandleW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryExW,GetSystemDirectoryW,GetSystemDirectoryW,LoadLibraryW,0_2_00898900
Source: is-N3JGT.tmp.6.drStatic PE information: section name: il2cpp
Source: is-HNPT6.tmp.6.drStatic PE information: section name: .rodata
Source: is-HNPT6.tmp.6.drStatic PE information: section name: _RDATA
Source: is-D23EU.tmp.6.drStatic PE information: section name: .00cfg
Source: is-D23EU.tmp.6.drStatic PE information: section name: .crthunk
Source: is-D23EU.tmp.6.drStatic PE information: section name: .oldntma
Source: is-D23EU.tmp.6.drStatic PE information: section name: CPADinfo
Source: is-IOH65.tmp.6.drStatic PE information: section name: .00cfg
Source: is-3J5PP.tmp.6.drStatic PE information: section name: .00cfg
Source: is-H800J.tmp.6.drStatic PE information: section name: .00cfg
Source: is-H800J.tmp.6.drStatic PE information: section name: .retplne
Source: is-H800J.tmp.6.drStatic PE information: section name: .rodata
Source: is-H800J.tmp.6.drStatic PE information: section name: CPADinfo
Source: is-H800J.tmp.6.drStatic PE information: section name: prot
Source: is-H800J.tmp.6.drStatic PE information: section name: /4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008EB223 push ecx; ret 0_2_008EB236
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008A0369 push 8B008F05h; ret 0_2_008A0374
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CB906 push ecx; ret 0_2_008CB919
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_0040658C push 004065C9h; ret 5_2_004065C1
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_004080D8 push ecx; mov dword ptr [esp], eax5_2_004080DD
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_00404089 push eax; ret 5_2_004040C5
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_00404159 push 00404365h; ret 5_2_0040435D
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_004041DA push 00404365h; ret 5_2_0040435D
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_00404257 push 00404365h; ret 5_2_0040435D
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_0040C218 push eax; ret 5_2_0040C219
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_004042BC push 00404365h; ret 5_2_0040435D
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_00408F0C push 00408F3Fh; ret 5_2_00408F37
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BED196 push 770004CFh; iretd 10_2_00007FF674BED19D
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\ZFGameBrowser.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\UnityPlayer.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\d3dcompiler_47.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-3J5PP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeFile created: C:\Users\user\AppData\Local\Temp\evony_install.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\is-VAOIO.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-D23EU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\is-EH7O7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\is-MUC3P.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\botva2.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-IH2UL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\is-PGGNK.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\GameAssembly.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-INKGN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\zf_cef.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\libGLESv2.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeFile created: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\ZFProxyWeb.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\is-HNPT6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\libEGL.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-H800J.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-IOH65.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\chrome_elf.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\is-N3JGT.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-NARLR.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\UnityCrashHandler64.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\is-HULB5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\innocallback.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Program Files (x86)\Evony\WinPixEventRuntime.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\license.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\(Default)Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\(Default)\Evony.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\(Default)\ Evony.lnkJump to behavior
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BB2E90 GetModuleFileNameA,GetFileAttributesA,GetEnvironmentVariableA,GetFileAttributesA,LoadLibraryA,GetEnvironmentVariableA,GetFileAttributesA,LoadLibraryA,GetEnvironmentVariableA,GetFileAttributesA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetLastError,GetLastError,GetUserNameA,FreeLibrary,10_2_00007FF674BB2E90
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeProcess information set: NOGPFAULTERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008834F7 Sleep,ExitProcess,0_2_008834F7
Source: C:\Program Files (x86)\Evony\evony.exeWindow / User API: threadDelayed 5001Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\ZFGameBrowser.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\d3dcompiler_47.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-3J5PP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-D23EU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\botva2.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-IH2UL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\is-PGGNK.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-INKGN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\zf_cef.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\libGLESv2.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\ZFProxyWeb.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\is-HNPT6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\libEGL.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-H800J.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\chrome_elf.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-IOH65.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\evony_Data\Plugins\is-NARLR.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\is-N3JGT.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\WinPixEventRuntime.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\innocallback.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpDropped PE file which has not been started: C:\Program Files (x86)\Evony\is-HULB5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_5-5714
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeAPI coverage: 2.5 %
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp TID: 7432Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exe TID: 1848Thread sleep time: -50010s >= -30000sJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Program Files (x86)\Evony\evony.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Program Files (x86)\Evony\evony.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Program Files (x86)\Evony\evony.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BD3270 FindFirstFileW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,10_2_00007FF674BD3270
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BFEDE8 FindFirstFileExW,10_2_00007FF674BFEDE8
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_00409B04 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,5_2_00409B04
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CB6D6 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008CB6D6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_00898900 GetModuleHandleW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryExW,GetSystemDirectoryW,GetSystemDirectoryW,LoadLibraryW,0_2_00898900
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008E2F9A mov eax, dword ptr fs:[00000030h]0_2_008E2F9A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008DB588 mov eax, dword ptr fs:[00000030h]0_2_008DB588
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008E2FE0 mov eax, dword ptr fs:[00000030h]0_2_008E2FE0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BF96A8 GetProcessHeap,10_2_00007FF674BF96A8
Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CB6D6 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008CB6D6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CB869 SetUnhandledExceptionFilter,0_2_008CB869
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CE9EE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008CE9EE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CAC9A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_008CAC9A
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BDF8C0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00007FF674BDF8C0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674C002A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FF674C002A0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BE994C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00007FF674BE994C
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BDFA9C SetUnhandledExceptionFilter,10_2_00007FF674BDFA9C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_00883339 ShellExecuteW,ShellExecuteW,Sleep,ShellExecuteW,Sleep,ShellExecuteW,0_2_00883339
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe "C:\Windows\System32\taskkill.exe" /f /im evony.exeJump to behavior
Source: C:\Program Files (x86)\Evony\evony.exeProcess created: C:\Program Files (x86)\Evony\UnityCrashHandler64.exe "C:\Program Files (x86)\Evony\UnityCrashHandler64.exe" --attach 6620 1500517896192Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe "C:\Windows\System32\taskkill.exe" /f /im evony.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008CB52F cpuid 0_2_008CB52F
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: GetLocaleInfoA,5_2_004051D0
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: GetLocaleInfoA,5_2_0040521C
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,wcschr,wcschr,GetLocaleInfoW,10_2_00007FF674BFB6E0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: try_get_function,GetLocaleInfoW,10_2_00007FF674BF375C
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: EnumSystemLocalesW,10_2_00007FF674BF32CC
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: GetLocaleInfoW,10_2_00007FF674BFBDF0
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: GetLocaleInfoW,10_2_00007FF674BFBFF8
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_00007FF674BFBF48
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,10_2_00007FF674BFC124
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: EnumSystemLocalesW,10_2_00007FF674BFBB10
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: EnumSystemLocalesW,10_2_00007FF674BFBA40
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,10_2_00007FF674BFBBA8
Source: C:\Program Files (x86)\Evony\evony.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\btn_setup.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\btn_customize.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\btn_browser.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\bg_welcome.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\checkbox.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\label_read.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\label_license.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\label_privacy.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\bg_installing.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\loading.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\btn_complete.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\bg_finished.png VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmpQueries volume information: C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\label_autorun.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008E1265 GetSystemTimeAsFileTime,0_2_008E1265
Source: C:\Program Files (x86)\Evony\UnityCrashHandler64.exeCode function: 10_2_00007FF674BB2E90 GetModuleFileNameA,GetFileAttributesA,GetEnvironmentVariableA,GetFileAttributesA,LoadLibraryA,GetEnvironmentVariableA,GetFileAttributesA,LoadLibraryA,GetEnvironmentVariableA,GetFileAttributesA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetLastError,GetLastError,GetUserNameA,FreeLibrary,10_2_00007FF674BB2E90
Source: C:\Users\user\AppData\Local\Temp\evony_install.exeCode function: 5_2_00405CB8 GetVersionExA,5_2_00405CB8
Source: C:\Program Files (x86)\Evony\evony.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008A6C80 socket,socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,WSAGetLastError,closesocket,closesocket,closesocket,closesocket,closesocket,0_2_008A6C80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008BD4B0 ___from_strstr_to_strchr,htons,htons,htons,htons,bind,htons,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_008BD4B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008B6730 bind,WSAGetLastError,0_2_008B6730
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exeCode function: 0_2_008AF910 ___from_strstr_to_strchr,_strncpy,___from_strstr_to_strchr,_strncpy,___from_strstr_to_strchr,___from_strstr_to_strchr,getsockname,WSAGetLastError,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,htons,___swprintf_l,___swprintf_l,___swprintf_l,0_2_008AF910
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
Windows Management Instrumentation
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
11
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Native API
1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop ProtocolData from Removable Media2
Encrypted Channel
Exfiltration Over Bluetooth1
System Shutdown/Reboot
Email AddressesDNS ServerDomain Accounts3
Command and Scripting Interpreter
Logon Script (Windows)1
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
Process Injection
1
Software Packing
NTDS66
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
LSA Secrets3
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Masquerading
Cached Domain Credentials2
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Virtualization/Sandbox Evasion
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
Process Injection
/etc/passwd and /etc/shadow3
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467948 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 05/07/2024 Architecture: WINDOWS Score: 24 63 Writes many files with high entropy 2->63 9 SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe 4 5 2->9         started        process3 dnsIp4 57 34.110.215.133 GOOGLEUS United States 9->57 59 38.45.227.13 COGENT-174US United States 9->59 61 2 other IPs or domains 9->61 47 C:\Users\user\AppData\...\evony_install.exe, PE32 9->47 dropped 67 Writes many files with high entropy 9->67 69 Delayed program exit found 9->69 14 evony_install.exe 2 9->14         started        file5 signatures6 process7 file8 49 C:\Users\user\AppData\...\evony_install.tmp, PE32 14->49 dropped 17 evony_install.tmp 28 202 14->17         started        process9 file10 31 C:\Program Files (x86)\...\evony.exe (copy), PE32+ 17->31 dropped 33 C:\Users\user\AppData\Local\...\btn_setup.png, PNG 17->33 dropped 35 C:\Users\user\...\bg_welcome_expand.png, PNG 17->35 dropped 37 34 other files (3 malicious) 17->37 dropped 65 Writes many files with high entropy 17->65 21 evony.exe 28 693 17->21         started        25 taskkill.exe 1 17->25         started        signatures11 process12 dnsIp13 51 34.107.172.168 GOOGLEUS United States 21->51 53 34.111.113.40 GOOGLEUS United States 21->53 55 2 other IPs or domains 21->55 39 shooting_sprite_puzzle_1147677540.brotli, data 21->39 dropped 41 C:\...\role-evony7-model_2811439933.brotli, data 21->41 dropped 43 C:\...\role-evony7-anim_1650297496.brotli, data 21->43 dropped 45 52 other malicious files 21->45 dropped 27 UnityCrashHandler64.exe 21->27         started        29 conhost.exe 25->29         started        file14 process15

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe5%ReversingLabs
SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe2%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Evony\UnityCrashHandler64.exe (copy)2%ReversingLabs
C:\Program Files (x86)\Evony\UnityPlayer.dll (copy)2%ReversingLabs
C:\Program Files (x86)\Evony\WinPixEventRuntime.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Evony\evony.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\ZFGameBrowser.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\ZFProxyWeb.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\chrome_elf.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\d3dcompiler_47.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\is-3J5PP.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\is-D23EU.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\is-H800J.tmp2%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\is-IH2UL.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\is-INKGN.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\is-IOH65.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\is-NARLR.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\libEGL.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\libGLESv2.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Evony\evony_Data\Plugins\zf_cef.dll (copy)2%ReversingLabs
C:\Program Files (x86)\Evony\is-EH7O7.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\is-HNPT6.tmp2%ReversingLabs
C:\Program Files (x86)\Evony\is-HULB5.tmp3%ReversingLabs
C:\Program Files (x86)\Evony\is-MUC3P.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\is-PGGNK.tmp0%ReversingLabs
C:\Program Files (x86)\Evony\is-VAOIO.tmp2%ReversingLabs
C:\Program Files (x86)\Evony\unins000.exe (copy)3%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\_isetup\_shfoldr.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\botva2.dll3%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-5ET6D.tmp\innocallback.dll5%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://policies.google.com/terms0%URL Reputationsafe
http://www.innosetup.com/0%URL Reputationsafe
https://policies.google.com/privacy0%URL Reputationsafe
http://em.evony.com/down.php?type=windows&print=1R_ARCHIfv0%Avira URL Cloudsafe
http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=http://em.evony.com/down.php?type=windows&pri0%Avira URL Cloudsafe
http://crbug.com/4738450%Avira URL Cloudsafe
http://crbug.com/371562.0%Avira URL Cloudsafe
https://crbug.com/5931660%Avira URL Cloudsafe
http://surveys.google.com/unit?site=z4cctguzopq5x2ftal6vdgjrui0%Avira URL Cloudsafe
https://m.evony.com/n8.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
https://m.evony.com/n4.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
http://em.evony.com/down.php?type=windows&print=10%Avira URL Cloudsafe
https://crbug.com/5931660%VirustotalBrowse
http://em.evony.com/down.php?type=windows&print=10%VirustotalBrowse
http://crbug.com/4738450%VirustotalBrowse
http://surveys.google.com/unit?site=z4cctguzopq5x2ftal6vdgjrui0%VirustotalBrowse
http://crbug.com/371562.0%VirustotalBrowse
http://em.evony.com/p0%Avira URL Cloudsafe
http://crbug.com/5102700%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/anim-star_2533218360.brotli0%Avira URL Cloudsafe
http://em.evony.com/down.php?type=windows&print=153600000%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim6_3347160378.brotli0%Avira URL Cloudsafe
https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
http://crbug.com/3780670%Avira URL Cloudsafe
http://www.foo.com/bar0%Avira URL Cloudsafe
http://crbug.com/5102700%VirustotalBrowse
https://curl.se/docs/alt-svc.html#0%Avira URL Cloudsafe
http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&0%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/anim-star_2533218360.brotli0%VirustotalBrowse
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim6_3347160378.brotli0%VirustotalBrowse
https://crbug.com/837107):0%Avira URL Cloudsafe
https://www.google.com/speech-api/v2/synthesize?0%Avira URL Cloudsafe
http://crbug.com/3780670%VirustotalBrowse
https://curl.se/docs/alt-svc.html#0%VirustotalBrowse
https://m.evony.com/n10.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
https://curl.se/docs/hsts.html0%VirustotalBrowse
https://m.evony.com/n18.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-world_3386343179.brotli0%Avira URL Cloudsafe
http://www.foo.com/bar1%VirustotalBrowse
https://curl.se/docs/hsts.html#0%Avira URL Cloudsafe
https://support.google.com/legal/answer/31104200%Avira URL Cloudsafe
https://www.google.com/cloudprint0%Avira URL Cloudsafe
https://crbug.com/837107):0%VirustotalBrowse
https://www.google.com/speech-api/v2/synthesize?1%VirustotalBrowse
http://crbug.com/4153150%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-world_3386343179.brotli0%VirustotalBrowse
https://curl.se/docs/hsts.html#0%VirustotalBrowse
https://developers.google.com/chrome-developer-tools/docs/remote-debugging0%Avira URL Cloudsafe
https://m.evony.com/n1.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
https://support.google.com/legal/answer/31104200%VirustotalBrowse
http://emcl.evony.com/pixel.jpg0%Avira URL Cloudsafe
https://www.google.com/cloudprint1%VirustotalBrowse
https://crbug.com/7010340%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exet0%Avira URL Cloudsafe
http://crbug.com/122474.0%Avira URL Cloudsafe
http://crbug.com/4153150%VirustotalBrowse
http://crbug.com/6421410%Avira URL Cloudsafe
https://www.evony.com&0%Avira URL Cloudsafe
https://crbug.com/7010340%VirustotalBrowse
http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exen0%Avira URL Cloudsafe
http://foo.com/bar#NAMEDDEST.0%Avira URL Cloudsafe
http://emcl.evony.com/pixel.jpg0%VirustotalBrowse
http://crbug.com/122474.0%VirustotalBrowse
https://m.evony.com/n15.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
http://crbug.com/6421410%VirustotalBrowse
http://emggcdn1.ucimg.co/windows/UploadBundles/puzzle-door_2747818999.brotli0%Avira URL Cloudsafe
https://chrome.google.com/webstore0%Avira URL Cloudsafe
http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=AABBCCDDEEFn=0.4.0&compileType=release&nH0%Avira URL Cloudsafe
https://crbug.com/787427.0%Avira URL Cloudsafe
https://em.evony.com/index.php?r=shorturl/getRealUrl&k=0%Avira URL Cloudsafe
http://emggcdn.ucimg.co0%Avira URL Cloudsafe
http://foo.com/bar#NAMEDDEST.0%VirustotalBrowse
https://developers.google.com/chrome-developer-tools/docs/remote-debugging0%VirustotalBrowse
http://crbug.com/3207230%Avira URL Cloudsafe
https://m.evony.com/n17.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/puzzle-door_2747818999.brotli0%VirustotalBrowse
http://crbug.com/5417690%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim4_2461290424.brotlimp0%Avira URL Cloudsafe
http://code.google.com/p/chromium/issues/detail?id=125863)0%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim2_1335172117.brotlin0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
http://crbug.com/8194040%Avira URL Cloudsafe
http://crbug.com/5146960%Avira URL Cloudsafe
http://crbug.com/9084580%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/army-ui-art_4269022620.brotlis).I0%Avira URL Cloudsafe
https://m.evony.com/n11.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&ve0%Avira URL Cloudsafe
http://crbug.com/5165270%Avira URL Cloudsafe
http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=0%Avira URL Cloudsafe
https://m.evony.com/n13.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
http://www.wldna.com/?PreDefines.ish0%Avira URL Cloudsafe
https://crbug.com/5448190).0%Avira URL Cloudsafe
https://www.google.com/0%Avira URL Cloudsafe
http://www.wldna.com/?PreDefines.0%Avira URL Cloudsafe
https://m.evony.com/n6.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=0%Avira URL Cloudsafe
http://crbug.com/415315.0%Avira URL Cloudsafe
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim2_1335172117.brotli;;0%Avira URL Cloudsafe
http://restools.hanzify.org/U0%Avira URL Cloudsafe
http://changyoufun.com/wmby/index.htmlRSTU0%Avira URL Cloudsafe
http://crbug.com/235689.0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://em.evony.com/down.php?type=windows&print=1R_ARCHIfvSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796696665.00000000009DE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/371562.is-D6J18.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crbug.com/473845is-D6J18.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://crbug.com/593166is-LS9UJ.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=http://em.evony.com/down.php?type=windows&priSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exefalse
  • Avira URL Cloud: safe
unknown
http://surveys.google.com/unit?site=z4cctguzopq5x2ftal6vdgjruiis-SG16N.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n8.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n4.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
http://em.evony.com/down.php?type=windows&print=1SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://em.evony.com/pevony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://em.evony.com/down.php?type=windows&print=15360000SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/510270is-D6J18.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/anim-star_2533218360.brotlievony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim6_3347160378.brotlievony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://policies.google.com/termsis-D6J18.tmp.6.drfalse
  • URL Reputation: safe
unknown
https://curl.se/docs/hsts.htmlSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crbug.com/378067is-D6J18.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.foo.com/baris-D6J18.tmp.6.drfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://curl.se/docs/alt-svc.html#SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://crbug.com/837107):is-SG16N.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.google.com/speech-api/v2/synthesize?is-D6J18.tmp.6.drfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n10.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n18.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-world_3386343179.brotlievony.exe, 00000009.00000003.3986438187.0000015D06154000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://curl.se/docs/hsts.html#SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://support.google.com/legal/answer/3110420is-D6J18.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.google.com/cloudprintis-SG16N.tmp.6.drfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crbug.com/415315is-LS9UJ.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n1.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
https://developers.google.com/chrome-developer-tools/docs/remote-debuggingis-SG16N.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://emcl.evony.com/pixel.jpgSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://crbug.com/701034is-D6J18.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exetSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/122474.is-LS9UJ.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crbug.com/642141is-D6J18.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.evony.com&evony_install.exe, 00000005.00000003.3354424021.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736249006.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738581379.000000000219D000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exenSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A28000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.innosetup.com/evony_install.exe, 00000005.00000003.2737230729.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736979042.0000000002550000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000000.2737800950.0000000000401000.00000020.00000001.01000000.00000007.sdmpfalse
  • URL Reputation: safe
unknown
http://foo.com/bar#NAMEDDEST.is-D6J18.tmp.6.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n15.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/puzzle-door_2747818999.brotlievony.exe, 00000009.00000003.3986438187.0000015D06154000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://chrome.google.com/webstoreis-SG16N.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=AABBCCDDEEFn=0.4.0&compileType=release&nHSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796928866.0000000000A15000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://crbug.com/787427.is-LS9UJ.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
https://em.evony.com/index.php?r=shorturl/getRealUrl&k=evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn.ucimg.coevony.exe, 00000009.00000003.3628065439.0000015D7C512000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/320723is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n17.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/541769is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim4_2461290424.brotlimpevony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://code.google.com/p/chromium/issues/detail?id=125863)is-SG16N.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim2_1335172117.brotlinevony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://curl.se/docs/alt-svc.htmlSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exefalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/819404is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/514696is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/908458is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/army-ui-art_4269022620.brotlis).Ievony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n11.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&veSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/516527is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://em.evony.com/index.php?r=shorturl/getRealUrl&&k=SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exefalse
  • Avira URL Cloud: safe
unknown
https://policies.google.com/privacyis-D6J18.tmp.6.drfalse
  • URL Reputation: safe
unknown
https://m.evony.com/n13.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
http://www.wldna.com/?PreDefines.ishevony_install.exe, 00000005.00000003.3354370596.0000000001F98000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736249006.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736165346.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738581379.000000000219D000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://crbug.com/5448190).is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
https://www.google.com/is-SG16N.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://www.wldna.com/?PreDefines.evony_install.exe, 00000005.00000003.3354370596.0000000001F98000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n6.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/415315.is-LS9UJ.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim2_1335172117.brotli;;evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://restools.hanzify.org/Uevony_install.exe, 00000005.00000003.2737230729.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736979042.0000000002550000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000000.2737800950.0000000000401000.00000020.00000001.01000000.00000007.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://changyoufun.com/wmby/index.htmlRSTUevony.exe, 00000009.00000003.3631074767.0000015D009FB000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/235689.is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/360567is-SG16N.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/470411is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://em.evony.com/PrivacyPolicy.htmlevony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://support.google.com/chrome/answer/6258784is-SG16N.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n16.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-ui-others_2453432180.brotlievony.exe, 00000009.00000003.3986438187.0000015D05FFD000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://support.google.com/chrome/?p=plugin_flashis-SG16N.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim1_147738136.brotlievony.exe, 00000009.00000003.3628065439.0000015D7C512000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exeSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-ui-others_2453432180.brotlipevony.exe, 00000009.00000003.3986438187.0000015D060B2000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/319444.is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
https://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&type=0&user_id=1020291&isAmazon=0&hd=0evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/army-anim3_1034175375.brotli=)evony.exe, 00000009.00000003.3628065439.0000015D7C416000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/258526.is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&ve%SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.2736061878.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709596983.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1703354579.0000000000A3C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000003.1709765092.0000000000A3C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://code.google.com/p/chromium/issues/detail?id=162044is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
https://code.google.com/p/chromium/issues/detail?id=162042is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
https://m.evony.com/n2.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=ShareConfig.bytes.9.drfalse
  • Avira URL Cloud: safe
unknown
https://developer.mozilla.org/en/DOM/document.is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/275944is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://emcl.evony.com/pixel.jpg_SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.google.com/chrome/cleanup-tool/is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://emggcdn1.ucimg.co/windows/UploadBundles/prefab-building-evony5_603251547.brotlievony.exe, 00000009.00000003.3628065439.0000015D7C1DF000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crbug.com/478929is-D6J18.tmp.6.drfalse
  • Avira URL Cloud: safe
unknown
http://m.evony.com/Terms.htmlevony_install.exe, 00000005.00000003.3354424021.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736249006.0000000001F91000.00000004.00001000.00020000.00000000.sdmp, evony_install.exe, 00000005.00000003.2736165346.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766148289.00000000021F8000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766166714.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2765936915.00000000021F4000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738581379.000000000219D000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766026427.0000000002200000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766055813.00000000021F4000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766006630.00000000021F8000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2766040694.0000000002204000.00000004.00001000.00020000.00000000.sdmp, evony_install.tmp, 00000006.00000003.2738512897.0000000003140000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://emcl.evony.com/pixel.jpg?project=EM&client=u3d&os=120&.sdbSecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe, 00000000.00000002.2796970628.0000000000A28000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
38.45.227.13
unknownUnited States
174COGENT-174USfalse
38.45.227.5
unknownUnited States
174COGENT-174USfalse
38.45.227.6
unknownUnited States
174COGENT-174USfalse
34.107.172.168
unknownUnited States
15169GOOGLEUSfalse
34.110.215.133
unknownUnited States
15169GOOGLEUSfalse
76.9.213.8
unknownCanada
21949BEANFIELDCAfalse
34.111.113.40
unknownUnited States
15169GOOGLEUSfalse
IP
127.0.0.1
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467948
Start date and time:2024-07-05 06:19:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 11m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
Detection:SUS
Classification:sus24.rans.evad.winEXE@12/1034@0/8
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 119
  • Number of non-executed functions: 274
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
  • Report size getting too big, too many NtReadFile calls found.
  • Report size getting too big, too many NtSetInformationFile calls found.
  • Skipping network analysis since amount of network traffic is too extensive
TimeTypeDescription
00:21:44API Interceptor1x Sleep call for process: evony_install.tmp modified
00:23:17API Interceptor57174x Sleep call for process: evony.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
COGENT-174USPTT Group project - Quotation.exeGet hashmaliciousFormBookBrowse
  • 38.47.232.224
adobe_scanner12.exeGet hashmaliciousFormBookBrowse
  • 38.47.232.185
ScanPDF_102.exeGet hashmaliciousFormBookBrowse
  • 38.55.194.30
https://nmg.evlink21.net/Get hashmaliciousUnknownBrowse
  • 154.59.122.79
205.185.124.50-arm-2024-07-03T23_47_53.elfGet hashmaliciousMirai, MoobotBrowse
  • 154.39.121.31
205.185.124.50-x86-2024-07-03T23_47_55.elfGet hashmaliciousMirai, MoobotBrowse
  • 154.42.40.250
CMgd5ZVG2N.elfGet hashmaliciousUnknownBrowse
  • 38.245.242.130
qS7rA9kvqg.elfGet hashmaliciousUnknownBrowse
  • 160.238.102.21
PMcyGpR57k.elfGet hashmaliciousUnknownBrowse
  • 38.210.131.180
buPdHWwrzF.elfGet hashmaliciousUnknownBrowse
  • 38.14.1.248
BEANFIELDCARequirement reference for quotation.exeGet hashmaliciousRemcosBrowse
  • 157.254.236.96
bot.x86.elfGet hashmaliciousMirai, MoobotBrowse
  • 157.254.251.233
yzKJORP7Q4.elfGet hashmaliciousMirai, MoobotBrowse
  • 157.254.86.122
4rg5Y5MHO8.elfGet hashmaliciousMirai, MoobotBrowse
  • 157.254.86.122
m2PQz5E1Zv.elfGet hashmaliciousMiraiBrowse
  • 157.254.231.3
v5GNrLZP9g.elfGet hashmaliciousMiraiBrowse
  • 157.254.251.219
shared.exeGet hashmaliciousXWormBrowse
  • 157.254.165.243
shared.vbsGet hashmaliciousXWormBrowse
  • 157.254.165.243
password.txt.download.lnkGet hashmaliciousXWormBrowse
  • 157.254.165.243
siGMVX2KKD.elfGet hashmaliciousMiraiBrowse
  • 157.254.251.211
COGENT-174USPTT Group project - Quotation.exeGet hashmaliciousFormBookBrowse
  • 38.47.232.224
adobe_scanner12.exeGet hashmaliciousFormBookBrowse
  • 38.47.232.185
ScanPDF_102.exeGet hashmaliciousFormBookBrowse
  • 38.55.194.30
https://nmg.evlink21.net/Get hashmaliciousUnknownBrowse
  • 154.59.122.79
205.185.124.50-arm-2024-07-03T23_47_53.elfGet hashmaliciousMirai, MoobotBrowse
  • 154.39.121.31
205.185.124.50-x86-2024-07-03T23_47_55.elfGet hashmaliciousMirai, MoobotBrowse
  • 154.42.40.250
CMgd5ZVG2N.elfGet hashmaliciousUnknownBrowse
  • 38.245.242.130
qS7rA9kvqg.elfGet hashmaliciousUnknownBrowse
  • 160.238.102.21
PMcyGpR57k.elfGet hashmaliciousUnknownBrowse
  • 38.210.131.180
buPdHWwrzF.elfGet hashmaliciousUnknownBrowse
  • 38.14.1.248
COGENT-174USPTT Group project - Quotation.exeGet hashmaliciousFormBookBrowse
  • 38.47.232.224
adobe_scanner12.exeGet hashmaliciousFormBookBrowse
  • 38.47.232.185
ScanPDF_102.exeGet hashmaliciousFormBookBrowse
  • 38.55.194.30
https://nmg.evlink21.net/Get hashmaliciousUnknownBrowse
  • 154.59.122.79
205.185.124.50-arm-2024-07-03T23_47_53.elfGet hashmaliciousMirai, MoobotBrowse
  • 154.39.121.31
205.185.124.50-x86-2024-07-03T23_47_55.elfGet hashmaliciousMirai, MoobotBrowse
  • 154.42.40.250
CMgd5ZVG2N.elfGet hashmaliciousUnknownBrowse
  • 38.245.242.130
qS7rA9kvqg.elfGet hashmaliciousUnknownBrowse
  • 160.238.102.21
PMcyGpR57k.elfGet hashmaliciousUnknownBrowse
  • 38.210.131.180
buPdHWwrzF.elfGet hashmaliciousUnknownBrowse
  • 38.14.1.248
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Program Files (x86)\Evony\evony_Data\Plugins\d3dcompiler_47.dll (copy)http://www.torproject.orgGet hashmaliciousUnknownBrowse
    tor-browser-windows-x86_64-portable-13.0.13.exeGet hashmaliciousUnknownBrowse
      https://www.fileeagle.com/software/download/16212/ee9930Get hashmaliciousUnknownBrowse
        torbrowser-install-win64-12.5_ALL.exeGet hashmaliciousUnknownBrowse
          Firefox Setup 102.9.0esr.msiGet hashmaliciousUnknownBrowse
            Firefox Setup 91.1.0esr.msiGet hashmaliciousUnknownBrowse
              cc.exeGet hashmaliciousUnknownBrowse
                mixsix_20211018-121016.exeGet hashmaliciousFicker Stealer VidarBrowse
                  mixsix_20211008-150045.exeGet hashmaliciousFicker Stealer VidarBrowse
                    EpicInstaller-12.2.17-unrealEngine.msiGet hashmaliciousUnknownBrowse
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):85824512
                      Entropy (8bit):6.35847424139208
                      Encrypted:false
                      SSDEEP:786432:tvIM9ypSgQTkvfvIwzkFfUV70VLDULnNZa:CM5LTYfv5zkFMV7u
                      MD5:77B351C541B9FE71E7C4EEC08264BB30
                      SHA1:09C58F99FE56BE9EAA7046C4B37A26CF8207398A
                      SHA-256:6DEE972CFF5DDA68AD4D59310C94B02AD1B501A0BF2B72329C02A16B693B20FC
                      SHA-512:8CF73DFD3885ECD85CAFA4A2608DB4910813588BE8692361A25CC9B4CBF4E6A5F693676D2BEA37CD243524E7D521B3678B9E1BEB3301A2F243C76B7DA4650350
                      Malicious:false
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........K.g...g...g.......g.......g......Yg..h.c..g.......g.......g.......g.......g.......g...g...g..^....g..^....c..^....g..^....g..Rich.g..................PE..d...!.}f.........." ................D.D.......................................Z...........`.........................................p,......dJ............... ..x.&...........>.T7..0.u.T.....................u.(.....u..............0..8............................text.....G.......G................. ..`il2cpp..VD~...G..F~...G............. ..`.rdata..r-...0......................@..@.data.....t..`....8..>..............@....pdata..x.&.. ....&.................@..@.reloc..T7....>..8...\..............@..B........................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1458120
                      Entropy (8bit):4.704411747703894
                      Encrypted:false
                      SSDEEP:12288:ZJbn/jN4mQRMTu6UjeF/oYFhLt7m7vTvMoz94eS:bbnrKvRMTulk/oYFhLBEvTvMieeS
                      MD5:9E1BD55580B0F983A43493DF89AE77FC
                      SHA1:A4F12787640B93B6F532F0A55345694D813E344D
                      SHA-256:723467A702315734BC9F8A990EB6B4B270CC9AE910C8743FDFED4FE0557DBEE7
                      SHA-512:813A6C8DA77CF07137CB9781C288826137AC6BF3056857C075D78E15B6040ED98BB9D8DCA204FD3D3F30F823FB0CA8B974F335A023CA319F2284ED0B68700260
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&.[~H.[~H.[~H.4.L.L~H.4.K.W~H.4.M..~H....Z~H...K.Q~H...M.n~H...L.}~H.4.N.Z~H.4.I.L~H.[~I.~H.K.L.S~H.K.M.C~H.K...Z~H.K.J.Z~H.Rich[~H.................PE..d..._..\.........."..........R.................@..........................................`..................................................F..........@Z.......\...(.......p..........T.......................(.................... ...............................text...l........................... ..`.rdata...;... ...<..................@..@.data....K...`.......N..............@....pdata...\.......^...^..............@..@.rsrc...@Z.......\..................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):22972872
                      Entropy (8bit):6.651971657474417
                      Encrypted:false
                      SSDEEP:393216:x2gThrVO/B39gq3Yv/IfbK18NICMhoRQR/VR6ki8UMFXn:x0640Uki8UI
                      MD5:BF3C5660895A3F0A031466379C295982
                      SHA1:CF58FE47EB498CFB252C084E56636AB12356B537
                      SHA-256:D47B18340529E10FD51357FF0E1A821D76EC26E719995A3D648F58FE3813D499
                      SHA-512:8797D706847B313E35037DA8C982BCD4BF3E61A4CB785F10DB6F9F3D7672EEBB7386F43AEF4D8D4B12B3EAF9CC3545BB4A5C66B5AADF014986933F6B0C16F5F7
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Reputation:low
                      Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$..........$...w...w...w..v...w..v...w..v...w.u.w...w..v...w..v..w..7w...w?.v..w..'w...w...w...w_.v...w..vv..w..v...w..v...w..v...w...w...w3.sw...w..v...w..v...w...w...w..vO..w..v...w..Kw...w..v...wRich...w................PE..d...W..\.........." .....N...TR.....H.........................................l......._...`.........................................P.I.L.....I......pk...... \.l....r^.......k.h^..@9:.T....................::.(....9:..............`...............................text...DL.......N.................. ..`.rdata...e/..`...f/..R..............@..@.data....C....I.......I.............@....pdata..l.... \.......M.............@..@.rodata.......j......N\.............@..@_RDATA..0.....j......Z\.............@..@.rsrc........pk.......].............@..@.reloc..h^....k..`....].............@..B........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):42704
                      Entropy (8bit):6.562678677892789
                      Encrypted:false
                      SSDEEP:384:6/30skuKCMqwvuULtj+K9tX2jBcZaXB5wGlq47zvQHVsrHJWZvkA80aq0GftpBj3:iECMEULtj+RaI0GlqYSusQiC6bcy1oY
                      MD5:AE4D6C34422B85BFA2E99A456FC4C733
                      SHA1:BBFB4B08C694FF7DF134939A19F05EAC0C84A816
                      SHA-256:2F84A7583F08064F55AC9EA3426F898E1BEF6F408FECEE22C1F5567601E70123
                      SHA-512:E49D71B062B935445FDC172CD401A3CCC890225147D19D477E9353EA408D8DF5590C93176D420E619CAAD5A9BFE2BF1B95941195B1F3866ABA6D1876C36ACD8A
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... ...d..d..d..m.u.l.._..`.._..f.._..n..a..a..d..4.._..u....c....e......e..d.q.e....e..Richd..........PE..d..../.X.........." .....8...:.......7.............................e................5.....`A.........................................a.......c.......................h...>......h...@W..8....................X..(....W...............P...............................text....6.......8.................. ..`.rdata.......P.......<..............@..@.data........p.......X..............@....pdata...............Z..............@..@.tls....)............^..............@....rsrc................`..............@..@.reloc..h............f..............@..B........................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):650752
                      Entropy (8bit):6.454781590856132
                      Encrypted:false
                      SSDEEP:12288:WLkNt4p6cG2Xq8FrHJUVEuXIWqp8VzLo:GQ2N9KEuXIQVLo
                      MD5:B78BC21D6DEEE736214C8A9B48532663
                      SHA1:0AFD9709075EBDDD1CDA5BB580CAB974DEE7CC9B
                      SHA-256:A7BA9BBEAA5704E12F6D2432A797921DA6B7F78B42FDAB390B03AE595F5AE671
                      SHA-512:C2E21540ED3C706B1D1CCDB976AB44F725A2D0F2F3A0B339EE02BA45D74F62A88C7FD7D907C592BA31B8CC4D579785CAD249F001EFD34EC148BA0C32A60C4507
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?..@^.[@^.[@^.[/:.ZJ^.[/:.ZE^.[/:.Z.^.[/:.ZB^.[.;.ZI^.[.;.Zb^.[.;.ZS^.[P8.ZC^.[@^.[.^.[P8.ZB^.[P8.ZA^.[P8.[A^.[P8.ZA^.[Rich@^.[................PE..d......\.........."..........\......h..........@.............................0............`..........................................0.......0..<....p......`..0............ ......P!..T............................!.................. ............................text............................... ..`.rdata.............................@..@.data........@.......,..............@....pdata..0....`.......6..............@..@.rsrc.......p.......D..............@..@.reloc....... ......................@..B................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1061376
                      Entropy (8bit):6.137404524669105
                      Encrypted:false
                      SSDEEP:12288:Dv87xgt2jh+ShUmh8TFaNsC2A9MdYsiSL9BQ:DvuxgtGh3hUmKTFafPWYnyu
                      MD5:E520467C8175A7D347929B315FBEF507
                      SHA1:783ADA05FF1B80B425717EE8F31BB043FD941644
                      SHA-256:B8756FA3EC2195108DF17EF8074C2DECEB06E114AD1B0580445E98F74BA26EE8
                      SHA-512:12062757B7F8C006CECDE2CB4E20CBE6E9346203395DE3787EDB1261780E55C8FB8409A486976589E1333091C16AAA7C0EC87FA4DF0D5D592CCB041C9B32A609
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........t...'...'...'.ZV'...'.N'...'.p'...'.q'u..'N.Z'...'&dp'...'...'...'...'...'&dt'...'&dM'...'..J'...'&dO'...'Rich...'........................PE..d...~l]]..........".................`A.........@..........................................`.....................................................d................................%......8...........................@...p............................................text...,........................... ..`.rdata..............................@..@.data...`........p..................@....pdata...............\..............@..@.rsrc...............................@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):562688
                      Entropy (8bit):6.178648733694534
                      Encrypted:false
                      SSDEEP:6144:HqcUrmPQeEWBVpbilSYsFKpzewO5hPDtIiWS48OTU6trM6Lx1f6TPaujVPqDVCe3:HabeEWBVWzPW2r76fVCQTL/yo42Q
                      MD5:6E04C1DB509E2B45817E16CE14CEFA8D
                      SHA1:BC4AE59D3DFD55B56B45C0EC7EF181D90E580C04
                      SHA-256:2C45764D445BBEACDA091F214EAAF4FAF6A43FEBF352D9657F7032E80AED01CF
                      SHA-512:7A64FBB36CE6A2BE7E5D8B2F136EAE8A316BCB00BA2DA4EDA52BB761EB78B309A3FEFF61802676C3B219164AD548B168AD639B339BA76DC7A08C3910A7408BA3
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........lj..lj..lj..=...lj..=..>lj..=..Xlj.e....lj..lk.1lj....lj....lj..>...lj....lj.Rich.lj.........PE..d...sl]].........." .........N.......?.......................................@............`...................................................<...............hX........... ..P.......8...............................p...............(............................text............................... ..`.rdata..D...........................@..@.data............p..................@....pdata..hX.......Z...&..............@..@.rsrc...............................@..@.reloc..P.... ......................@..B........................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):3676692
                      Entropy (8bit):7.0652728214131955
                      Encrypted:false
                      SSDEEP:49152:gFasXngmPl7MRJYlI4h3u2uFLw/beubUoSWPWolWaPa56lwEwmhRJRkx92xWN/MW:IP3uEw8q96hw3KcuYrJ/
                      MD5:C2C9A44E8B4A9D3F2DB354DD75DA3489
                      SHA1:F6F90142FBCA3771E75EB4ABA22C7ED10A6BFAF3
                      SHA-256:72F2C0832DE62085CE4C98C11D0101B4547B7FF1C4564435CA4517DC23E8C6F0
                      SHA-512:29098930674398D764EF114E0C3537946CA30B60F4650CD648F55448EBADEDDE19099A2BCBC64EC200E2C5DDFAE8CC154B27D2B821BFA65684BEB0C89AA7F7E4
                      Malicious:false
                      Preview:............x.L...y..%.....-....`/....42.....;.. .t>...*tI...*.J...*.P...*.\...*"_...*.`...*.g...*!u...+x....+.....+q....+.....+.....+.....+|....+<....+.....+,....+-....+.....+.....+.....+.....+.....+.....+ ....+k....+Z....+V....+.....+.....+J....+.....+Q....+J....+.....+.....+.....+$%...+.2.. +.3..!+.<.."+.B..#+.E..$+VO..%+1V..&+VY..'+.]..(+.e..)+ n..*+hq..++-v..,+....-+,....+D.../+...0+....1+...2+....7+....8+....9+U...:+....;+w...<+....=+....>+....?+>...@+r...A+....B+K...C+O...D+-...E+>...F+...G+....H+.=..[+h...p+L...q+....r+d...t+....u+....v+....w+8...x+.e..y+....z+....{+]...|+3...}+....~+.....+....+.....+.....+.....+.....+.....+-....+.....+.....+.....+R....+.....+.....+l....+.....+h ...+@#...+S,...+.9...+.?...+.F...+\N...+s_...+.d...+.i...+!k...+qx...+ ....+"....+_....+[....+.....+....+.....+N....+u....+.....+.....+k....+@....+.....+.....+1....+"....+}....+@....+*....+.....+.U...+E....+.a...+oh...+.l...+{y...+.....+.....+.....+.....+.....+.....+0....+m....,O....,.....,.....,..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):742152
                      Entropy (8bit):6.289645010191945
                      Encrypted:false
                      SSDEEP:6144:KbvBDe7NxHcSgEalEJxd0NvmdXWq1jxzwAj6TAVu1KTbkW/HQax5c1YC7x1+fSry:KDBDe7NzVNbkWHLgf1T2/tb
                      MD5:277A53A3922D71CC99626AB835CC8677
                      SHA1:E711062E5FEF4F8C2E6FA2A0E93C0A6ACA3A8056
                      SHA-256:DAE17C53566D83E24B8DBEB4329FF9A11999B05D30C2FC1D8D6A585535F6D3F8
                      SHA-512:33D8A7843ADF6C32CF6940806A0D934D67B8F6236ECBF560D226FE45180EEFDE35BDDE97079A3F85F58188BE199905255C51BC0028E4222F1440EBE51C224BA8
                      Malicious:false
                      Preview:...................5\....5d....5.....5.Q...5.\...5vl...5Hv...5.....5X....5.c...5.i...5.o...5.r...5zv...5*y...5t....53....5....5.....5.....56....5.....5.....5.....5.....5.....5.....5.....5.....5.!...5u3...5.7...5.<...5.J...5.N...5.X...5.`...5.i...52o...5.u...5.x...5.....5.....5.....58....5c....5.....5.O...5._...5Yr...5.z...5.....5....5....5....5.E...6@g...6.g...C.h...C.j...C.m...Czp...C.r...C.r...C.u...Ckx...Dez...D.}...D.....D.....DD....D.....D.....D.....D.....D.....D.....D8....D....._....._*(..._.5..._.5..8c 6..9cA7..:c.9..;c.;..<c.>..=cy@..>c.B...d.E...dcJ...d,K...d.L...d.N...d.O...d.O..ddIP..ed...fd....gd....xi....yi....zi#...{i ...|i[...}i....~i.....i.....i.....i.!...ig'...iO....i.0...i.4...iz8...i.;...i.?...i.I...i.N...i.O...i.X...iOa...i7b...i.c...i.e...i.h...ibi...i.k...i9m...i.o...i.q...i1r...i.s...iCu...i.v...iRx...i.{...iS}...i(....i....i....i....i.....i.....i.....i.....i....i{....iQ....i&....i.....i....i....iL....i.....i+....i....i....i.....i.....iZ....i/....i..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):872802
                      Entropy (8bit):6.696988822750324
                      Encrypted:false
                      SSDEEP:12288:0BDe7NzYfqj0o+Lgs4jTokWHzg5u/oFwFMT:0BDe7Nf0o+LbaDWHz0qoFgo
                      MD5:1822748DCB06D101954426FE75A62EB3
                      SHA1:8FD06AB468B681CB2818AC729594357535FBF5EC
                      SHA-256:FADED3D34E58C4DD61557F1F4C14C2DC83685A2259FDFA641F5D09EEF5BBFBD5
                      SHA-512:1315D155BCE36B542D5B65DEF911E8E6FBB215BB11826BBE2E3F2B34F9E6163D25BBF880A59D8735AA02CD701D16D64D3AC61BB93A63234DA0C4BDF22F9D08C8
                      Malicious:false
                      Preview:...................5]....5e....5.....5.R...5.]...5wm...5Iw...5.....5Y....5.d...5.j...5.p...5.s...5{w...5+z...5u....54....5....5.....5 ....57....5.....5.....5.....5.....5.....5.....5.....5.....5."...5v4...5.8...5.=...5.K...5.O...5.Y...5.a...5.j...53p...5.v...5.y...5.....5.....5.....59....5d....5.....5.P...5.`...5Zs...5.{...5.....5....5....5....5.F...6Ah...6.h...C=j...CLn...C0v...C.{...C3....C.....C....C(....D8....D.....D....D.....D....DZ....D.....Dm....D.....D.....D.....Dy....D....._'...._./..._.J..._IK..8c4L..9c)P..:cSS..;cGV..<cLY..=c.Z..>c.\...di`...d.d...d.e...dKg...d.h...d.i...d5j..dd.j..edc...fdM...gd....xiv...yi....zi[...{id...|i."..}i.'..~i]1...i.3...i.:...i.?...i.D...i.K...i.M...iWR...iBV...inY...ib]...i.g...i.l...i.m...i.v...ik....i>....i^....i.....i.....i.....i.....i.....i....i.....i.....i.....i....i....i.....i.....i!....iR....iI....i0....i.....iF....i`....id....i.....i.....i.....iH....i.....i;....i.....i.....i.....i.....i.....i.....i.....i.....i?....i.....i.....iY.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1833343
                      Entropy (8bit):6.933984460029461
                      Encrypted:false
                      SSDEEP:49152:eiBMyOelfi23G97Zgl6mHSG1hdAKp6YlWXe/+ll:N1hmMwe/Ml
                      MD5:597E878419411CC2CE35029B9C44CB72
                      SHA1:7D2D43B1C87679FCB9F6818ED14BBA2D0E330775
                      SHA-256:EB3BFC21FA8561AFBB5CE1298797B6B832B02D2B09DFF878725A035E19B31DA3
                      SHA-512:0B6F29FE03181458F335B440115B8B364B8CE3DA554682AFFA7C2832530D61EC42447A9A7CC85F709ECF93209981133D2C98B150E49486F3227C165F3CE4057B
                      Malicious:false
                      Preview:........z...D/....G/-0..H/ 4..K/s4..L/.5..M/.;..N/``..O/.w..P/tz..Q/.~..R/....S/v...T/....U/....V/.!..W/+%..X/.7..Y/c8..Z/.@..[/-...\/e...]/....^/...../..../..../...../..../}q.../...../...../...../...../>6.../.X.../\i.../\..../|..../}..../...../@..../$..../Z..../...../!".../.#.../.$.../O(.../.*.../...../.4.../5<.../BD.../.I.../.M.../.q.../C..../1..../D..../y..../...../...../...../...../...../h..../...../...../Z .../.%.../(f.../L..../...../H:.../.O.../=Y.../jc.../Qh.../4..../...../...../..../...../.*.../.i.../...../t..../...../...../...../y..../...../...../w..../.,.../L2.../.<.../o>.../.C.../"G.../.J.../.N.../8R.../#f.../.l.../hx.../.z.../...../....._....._]...._....._....._....._....._.K...`.N...`.V...`.Z...`A_...`.a...`.f...``}...`U....`....`.....`....`.....`....`$....`....`m....`.....`H....`.....`.....`.....`.P...`.[...`.....`.....`M....`.....`:....`!....`.....`'....`[... `4...!`...."`....#`$...$`....%`.(..&`.V..'`da..(`...)`....*`$...+`O...,`C...-`.....`..../`[-..0`.~..1`..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):814592
                      Entropy (8bit):5.902912966473018
                      Encrypted:false
                      SSDEEP:12288:OKTGByXYxAMNArU4VYBvG6SZyr7pL0EJPAdNnYoryaQu0:t+yXearUOOgyr790EJYdOObQu
                      MD5:62B678BAC7CD380B2126E3519D693B5F
                      SHA1:A93824F19C0F1DD0CCD8DB921F96F86983FBD448
                      SHA-256:7741330FFA9F17009A5489BF3E44A1DE0F28DA3835562F62FE6E1A9F3B6EC8A0
                      SHA-512:0DB4198928CA2904417415D13EA7B9993059B6B6A7CF805BB89DE4A43E3059645AC8058769764104A6146C6F1B65319EC26E30002DD6ADD450866CED401B1682
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......\.........." .........N......p........................................P............`.............................................8.......(.... .......`...T...........0..................................(....!......................(........................text...u........................... ..`.rdata..$....0....... ..............@..@.data........P.......<..............@....pdata...T...`...V..................@..@.00cfg...............@..............@..@.crthunk@............B..............@..@.gfids...............D..............@..@.oldntma.............H..............@....tls.................J..............@...CPADinfo8............L..............@....rsrc........ .......N..............@..@.reloc.......0.......V..............@..B........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):4346120
                      Entropy (8bit):6.383235359931208
                      Encrypted:false
                      SSDEEP:49152:D5EfJYiVk9w6hAPqzag2At6i5K/8Ub6Lg3MEq/NHiQTtVr+5kb62QgdD6zoodr7P:l7iNPWHYE+Bnm8
                      MD5:222D020BD33C90170A8296ADC1B7036A
                      SHA1:612E6F443D927330B9B8AC13CC4A2A6B959CEE48
                      SHA-256:4432BBD1A390874F3F0A503D45CC48D346ABC3A8C0213C289F4B615BF0EE84F3
                      SHA-512:AD8C7CE7F6F353DA5E2CF816E1A69F1EC14011612E8041E4F9BB6EBED3E0FA4E4EBC069155A0C66E23811467012C201893B9B3B7A947D089CE2C749D5E8910C6
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: , Detection: malicious, Browse
                      • Filename: tor-browser-windows-x86_64-portable-13.0.13.exe, Detection: malicious, Browse
                      • Filename: , Detection: malicious, Browse
                      • Filename: torbrowser-install-win64-12.5_ALL.exe, Detection: malicious, Browse
                      • Filename: Firefox Setup 102.9.0esr.msi, Detection: malicious, Browse
                      • Filename: Firefox Setup 91.1.0esr.msi, Detection: malicious, Browse
                      • Filename: cc.exe, Detection: malicious, Browse
                      • Filename: mixsix_20211018-121016.exe, Detection: malicious, Browse
                      • Filename: mixsix_20211008-150045.exe, Detection: malicious, Browse
                      • Filename: EpicInstaller-12.2.17-unrealEngine.msi, Detection: malicious, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Zn..Zn..Zn..S.E.^n....7.mn....6.[n..5...^n..Zn...n..5..._n..5...Rn..5...Kn..5...[n..5....n..5.).[n..5...[n..RichZn..................PE..d.../g.Q.........." .....l1..0........%.......................................B.......B...`A........................................p.>.x.....>.d....@B.@....@@.......B..=...PB.h...@w<.T.............................5...............5.P............................text....k1......l1................. ..`.rdata.......1......p1.............@..@.data...8"....?.......?.............@....pdata.......@@.......?.............@..@.rsrc...@....@B.......A.............@..@.reloc..h....PB.......A.............@..B........................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):6014631
                      Entropy (8bit):5.472861823442485
                      Encrypted:false
                      SSDEEP:49152:Ik06LFPZAnkA/koZdvvVqckTZdvvVqQ3FLyWzmiUTWUHbHTR2Cs1y3J2kkDJMuXr:IkWkw6
                      MD5:766EBA8610853EB8C8985A3BBE44F6F3
                      SHA1:41E12E3783B5210735CC8A9F8E4BCF8DA43C8E36
                      SHA-256:7E9091666D5253441FE0639D01867450623A4ADD8FA375A31D09E9D1B0F67026
                      SHA-512:688E5174C931FE0E3661D4A45139B5FAEA5460EFCD30491DD9258AD5F36872CE51646EB638C837E8784785FE1806A63E5F68E796E68EAB8A5ECC98B22CFD44E6
                      Malicious:false
                      Preview:........~....p.....pj....ps/...pS2...p.m...p.+...p./...p.3...pu....pI....p.....p^....p.....p..$..p..$..p..$..p..$..p..%..p.\&..p..(..p.,)..p.s)..p..)..p(%...p../..p.[1..pS.1..pI.2..p..2..p.I3..p..3..p..7..p[.8..p./8..pkd8..p.r8..p..8..p..9..pYg;..pYg;..p.k<..py.<..p._@..pQ.A..p.,C..p-jC..p_.F..q].F..q..I..q..I..q.nJ..q^.J..q..J..qW.K..q.oP..q..R..q..S..q0.X..q.$X..qZ.X..q..Y..q .Y..q..Z..q..Z..q..Z..q..Z..q..Z..qQ.Z..q@3Z..q.3Z..q.4Z..q.5Z..q.7Z..q.7Z..q.8Z..q.8Z..q.9Z..q.:Z..q$;Z. q.;Z.!q.{Z."q.|Z.#q.Z.$qr.Z.%q.Z.&qT.Z.'q..Z.(q..Z.)q.Z.*q..Z.+q..Z.,q<.Z.-q#.[..q.![./q.'[.0qw.[.1q./[.2qN5[.3q.:[.4q.;[.5q.<[.6q.=[.7q.>[.8q|?[.9qM@[.:q.@[.;q`A[.<qME[.=q.I[.>q.I[.?q.L[.@q.M[.Aq=N[.Bq.S[.Cq.T[.DqsT[.Eq,W[.Fq.\[.Gq'l[.Hqw.[.Iq..[.Jq^.[.Kqm.[.Lqs.[.Mq..[.Nq).[.....[..p&.W.(L.........F.....:.=..........%$.h..|8.RW......C...y5r'.S.5S6..3e......N...u...Df...X8.d...gW....\...;...PP-..bk..h."P.L.Cr..p.Ox...j.O.|=...*.q.%....mB..N._.....r*t.j./{/../)"}...!.......&..[-.).B!........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):10326064
                      Entropy (8bit):6.268903621175405
                      Encrypted:false
                      SSDEEP:196608:P7UPty2ACXAE4liXUxR0jHz93Whl96pqWJg:o12CXAbliXUxR0jHz93Whl96pqWJg
                      MD5:9705FF0FA594BB28520963DB19F5471F
                      SHA1:0ECBB9512795E2617CF48618DD050DC0F044DF3F
                      SHA-256:66F13A0329F46E2D26FB483CB497DBDF7BB6B84D85C2E7C5BC8EA096A8BB8B1A
                      SHA-512:A06DC6B04556692C5FD363D15590D485CE2A8BF4EB7A6A55068AADE31C7DB0C7B6C15249E2FC037A1B94D6ACE3ECD962AD2C9CFF21D50C205134189FA928788E
                      Malicious:false
                      Preview:...'........CmnD........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .-...l)......|).......)..P....)..0....).......).......).. ....).. ....).......*.......*....../*......B*..`...U*......h*..P...{*.......*.......*.......*.......*..P....*.......*.......+.......+......&+..P...9+......L+......_+......r+.......+.......+..0....+.......+..P!...+...!...+..."...+..`"...,..."...,...#..#,..0V..:,..px..J,......Z,..P...{,..@....,..P....,...u&..,....&..,....&..,....&..-....&.&-....&.=-....&.T-..P.&.k-....&..-....(..-..0.(..-....)..-...Y*.....@#+.!.....+.D.....,.[... .,.y....,.......,......,......E-.......-......./../....0.//..`.0.F/....0.b/....0.r/....0../....0../....0../..@.1../..P.1../...e1../...h1../.. .1..0....1.'0....2.<0...{2.Q0..p.2.g0....2..0..p.2..0....2..0....2..0..p.2..0....2..0...Z3..1...Z3..1..p[3.C1..P.3.X1..P.3.m1..P)4..1...I4..1...I4..1...J4..1..0e4..1..@.4..1....4..2...4..2....5.12...P5.F2..0Q5.^2...Q5.s2..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):5516288
                      Entropy (8bit):6.382652436438846
                      Encrypted:false
                      SSDEEP:49152:I0JUo/SnPAxPl91ozi9anp4u+C2QWg14V4G/Es1L1/0euQeivZsq+DFtq2k9T97Q:IA6nwPm+84u+C2Q2X5OcdUEkUPpE
                      MD5:5CE97EDB5475A85709C2FCA206561070
                      SHA1:61F95A1756045EBF64310E473CB9E7875E11E488
                      SHA-256:37A8366E9A1524C5DB89E6611F919D70473C5F4D1FBB8B54ED615F13AB0AA41F
                      SHA-512:87D0B1A16CCB11476A6580DE6F8B37805D2EBD0CFA99481CF3283F711D12F106B2C3C9FAFA76C1DD9FD2415E96B5EE7A45D4D36FD81C18E2A5C63E43783025B0
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......\.........." ......:..B......`.7..................................................`......................................... .L.$...D.N......0..8........A...........@......|.L.....................X.L.(.....K...............N..............................text.....:.......:................. ..`.rdata..TV....;..X....:.............@..@.data....@k..`O......BO.............@....pdata...A.......B...4Q.............@..@.00cfg...............vS.............@..@.gfids...............xS.............@..@.tls......... ........S.............@....rsrc...8....0........S.............@..@.reloc.......@........S.............@..B................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):872802
                      Entropy (8bit):6.696988822750324
                      Encrypted:false
                      SSDEEP:12288:0BDe7NzYfqj0o+Lgs4jTokWHzg5u/oFwFMT:0BDe7Nf0o+LbaDWHz0qoFgo
                      MD5:1822748DCB06D101954426FE75A62EB3
                      SHA1:8FD06AB468B681CB2818AC729594357535FBF5EC
                      SHA-256:FADED3D34E58C4DD61557F1F4C14C2DC83685A2259FDFA641F5D09EEF5BBFBD5
                      SHA-512:1315D155BCE36B542D5B65DEF911E8E6FBB215BB11826BBE2E3F2B34F9E6163D25BBF880A59D8735AA02CD701D16D64D3AC61BB93A63234DA0C4BDF22F9D08C8
                      Malicious:false
                      Preview:...................5]....5e....5.....5.R...5.]...5wm...5Iw...5.....5Y....5.d...5.j...5.p...5.s...5{w...5+z...5u....54....5....5.....5 ....57....5.....5.....5.....5.....5.....5.....5.....5.....5."...5v4...5.8...5.=...5.K...5.O...5.Y...5.a...5.j...53p...5.v...5.y...5.....5.....5.....59....5d....5.....5.P...5.`...5Zs...5.{...5.....5....5....5....5.F...6Ah...6.h...C=j...CLn...C0v...C.{...C3....C.....C....C(....D8....D.....D....D.....D....DZ....D.....Dm....D.....D.....D.....Dy....D....._'...._./..._.J..._IK..8c4L..9c)P..:cSS..;cGV..<cLY..=c.Z..>c.\...di`...d.d...d.e...dKg...d.h...d.i...d5j..dd.j..edc...fdM...gd....xiv...yi....zi[...{id...|i."..}i.'..~i]1...i.3...i.:...i.?...i.D...i.K...i.M...iWR...iBV...inY...ib]...i.g...i.l...i.m...i.v...ik....i>....i^....i.....i.....i.....i.....i.....i....i.....i.....i.....i....i....i.....i.....i!....iR....iI....i0....i.....iF....i`....id....i.....i.....i.....iH....i.....i;....i.....i.....i.....i.....i.....i.....i.....i.....i?....i.....i.....iY.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):292784
                      Entropy (8bit):4.531901938261794
                      Encrypted:false
                      SSDEEP:3072:5OsaRxRPygaUS/splQzbvfrgqtbfEPxYkCtJuo:8Lx9aUanzzgqV+YkCtJ9
                      MD5:EA4AD096FD3526228D2563EC81A886E4
                      SHA1:08D0E8FCCE743E5C7247A374DDD93C0CE87F12F5
                      SHA-256:E3E58C856B785A3A1C15207F45A90CF2F275D8C8AD6F5CCF8D015CDEB55E62EB
                      SHA-512:836990C20CF20900718D496575E68874C19A735A7A24215E4CB8A1A17EAA33E2563FBFF7A12E44E7A043C3D411C7ADAF2A9E6DA4F77A0C844C871B9AA3AAFEC9
                      Malicious:false
                      Preview:.........:!.AZ[.7.4.288.28...................................................... /...............................B..............`........`........`........`........`........`........`....5...`........`.......... ....U.`....$...D..X!a...X!%...X!%.D. ..-.`....$...D..X!Q...X!)...X!).D. ..`....$...D..X!a...X!-...X!-.D. ..a.`....$...D..X!a...X!1...X!1.D. ..E.`....D...D..X!U...X!5...X!5.D. ....`....$...D..X!a...X!9...X!9.D. ....`....$...D..X!a...X!=...X!=.D. ..`....$...D..X!a...X!A...X!A.D. ..`....$...D..X!a...X!E...X!E.D. ....`....$...D..X!Y...X!I...X!I.D. ..`....$...D..X!a...X!M...X!M.D.(Ja....!..... ......F`........^`.........M...V`.........(Ja....1..... ......F`........^`...........A..@...IDa................D`........D`........D`.........`.........D]....D....D...V`..........W`........I`...........V`..........W`........I`...........W`........I`...........W`........I`...........W`........I`...........V`..........W`........I`...........W`........I`...........W`........I`...........V`.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):83217
                      Entropy (8bit):5.040887283408914
                      Encrypted:false
                      SSDEEP:1536:+bz4Oif2sMnL8gDpKD0rrr/4or06mGsY3csV3/EBSee0fHVvJ4TGD3zT+2/ei7g5:+bz4Oif2sMHEBSx0fHVvOT6jTVeikwV8
                      MD5:D2414B8AE71F3F827B984167054E21A1
                      SHA1:A1768D8F11596C7E24F702E6B7FCF6B0C45D0506
                      SHA-256:66A747124929695FDF5B74812E15518EE7ED4E1406E53FEBE064C39931948449
                      SHA-512:E575FC3673D278F7B80625D99C840CDA059661B977A37ED738F36C4A260850D92EFA2EE567584F58FD57D82D31FCFBF5DF4B0769BDF03D796DF6326476B4ABAC
                      Malicious:false
                      Preview: @CommonOperationsU..(function(global, binding, v8) {.'use strict';.const _queue = v8.createPrivateSymbol('[[queue]]');.const _queueTotalSize = v8.createPrivateSymbol('[[queueTotalSize]]');.const _isSettled = v8.createPrivateSymbol('isSettled');.const Boolean = global.Boolean;.const Number = global.Number;.const Number_isFinite = Number.isFinite;.const Number_isNaN = Number.isNaN;.const RangeError = global.RangeError;.const TypeError = global.TypeError;.const TypeError_prototype = TypeError.prototype;.const hasOwnProperty = v8.uncurryThis(global.Object.hasOwnProperty);.const getPrototypeOf = global.Object.getPrototypeOf.bind(global.Object);.const getOwnPropertyDescriptor =.global.Object.getOwnPropertyDescriptor.bind(global.Object);.const thenPromise = v8.uncurryThis(Promise.prototype.then);.const JSON_parse = global.JSON.parse.bind(global.JSON);.const JSON_stringify = global.JSON.stringify.bind(global.JSON);.function hasOwnPropertyNoThrow(x, property) {.return Boolean(x) && hasOwnPrope
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):814592
                      Entropy (8bit):5.902912966473018
                      Encrypted:false
                      SSDEEP:12288:OKTGByXYxAMNArU4VYBvG6SZyr7pL0EJPAdNnYoryaQu0:t+yXearUOOgyr790EJYdOObQu
                      MD5:62B678BAC7CD380B2126E3519D693B5F
                      SHA1:A93824F19C0F1DD0CCD8DB921F96F86983FBD448
                      SHA-256:7741330FFA9F17009A5489BF3E44A1DE0F28DA3835562F62FE6E1A9F3B6EC8A0
                      SHA-512:0DB4198928CA2904417415D13EA7B9993059B6B6A7CF805BB89DE4A43E3059645AC8058769764104A6146C6F1B65319EC26E30002DD6ADD450866CED401B1682
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......\.........." .........N......p........................................P............`.............................................8.......(.... .......`...T...........0..................................(....!......................(........................text...u........................... ..`.rdata..$....0....... ..............@..@.data........P.......<..............@....pdata...T...`...V..................@..@.00cfg...............@..............@..@.crthunk@............B..............@..@.gfids...............D..............@..@.oldntma.............H..............@....tls.................J..............@...CPADinfo8............L..............@....rsrc........ .......N..............@..@.reloc.......0.......V..............@..B........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1833343
                      Entropy (8bit):6.933984460029461
                      Encrypted:false
                      SSDEEP:49152:eiBMyOelfi23G97Zgl6mHSG1hdAKp6YlWXe/+ll:N1hmMwe/Ml
                      MD5:597E878419411CC2CE35029B9C44CB72
                      SHA1:7D2D43B1C87679FCB9F6818ED14BBA2D0E330775
                      SHA-256:EB3BFC21FA8561AFBB5CE1298797B6B832B02D2B09DFF878725A035E19B31DA3
                      SHA-512:0B6F29FE03181458F335B440115B8B364B8CE3DA554682AFFA7C2832530D61EC42447A9A7CC85F709ECF93209981133D2C98B150E49486F3227C165F3CE4057B
                      Malicious:false
                      Preview:........z...D/....G/-0..H/ 4..K/s4..L/.5..M/.;..N/``..O/.w..P/tz..Q/.~..R/....S/v...T/....U/....V/.!..W/+%..X/.7..Y/c8..Z/.@..[/-...\/e...]/....^/...../..../..../...../..../}q.../...../...../...../...../>6.../.X.../\i.../\..../|..../}..../...../@..../$..../Z..../...../!".../.#.../.$.../O(.../.*.../...../.4.../5<.../BD.../.I.../.M.../.q.../C..../1..../D..../y..../...../...../...../...../...../h..../...../...../Z .../.%.../(f.../L..../...../H:.../.O.../=Y.../jc.../Qh.../4..../...../...../..../...../.*.../.i.../...../t..../...../...../...../y..../...../...../w..../.,.../L2.../.<.../o>.../.C.../"G.../.J.../.N.../8R.../#f.../.l.../hx.../.z.../...../....._....._]...._....._....._....._....._.K...`.N...`.V...`.Z...`A_...`.a...`.f...``}...`U....`....`.....`....`.....`....`$....`....`m....`.....`H....`.....`.....`.....`.P...`.[...`.....`.....`M....`.....`:....`!....`.....`'....`[... `4...!`...."`....#`$...$`....%`.(..&`.V..'`da..(`...)`....*`$...+`O...,`C...-`.....`..../`[-..0`.~..1`..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):110340608
                      Entropy (8bit):6.650741163317557
                      Encrypted:false
                      SSDEEP:1572864:2rPUJF4vUNiAew4rBj6t/8L9IjBfDP08g6J:2r8bxDf
                      MD5:8811410D160148CDDCE3C50C3365254C
                      SHA1:73CD56D6DB139ED98F6BF8E6942243BCC6A33295
                      SHA-256:1A41359801A10913FDE588F01318205AB9469283DB21F700D0BE3DE24B2AEA68
                      SHA-512:9657B502C47064960F05DF9938B61280A0965C43A8CD292C656C866084648036EA32E7728411DAC8145786B0949DE2C3B59EE300F0E66DA052D15B91F4F13EBF
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......\.........." .....,c..v0.....$.^...................................................`.........................................S.@.....d.@.H....P.. .... a..7..........p..L.....@.......................@.(...p.+...............A..!..0.@.@....................text...R+c......,c................. ..`.rdata..t....@c......0c.............@..@.data........0D.......D.............@....pdata...7.. a...7...H.............@..@.00cfg...............Z..............@..@.gfids..0...........\..............@..@.retplnel............j...................rodata.P............l..............@..@.tls....a.... .......z..............@...CPADinfo8....0.......|..............@...prot.........@.......~..............@..@.rsrc... ....P......................@..@.reloc..L....p......................@..B/4...........p......................@..B........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):4346120
                      Entropy (8bit):6.383235359931208
                      Encrypted:false
                      SSDEEP:49152:D5EfJYiVk9w6hAPqzag2At6i5K/8Ub6Lg3MEq/NHiQTtVr+5kb62QgdD6zoodr7P:l7iNPWHYE+Bnm8
                      MD5:222D020BD33C90170A8296ADC1B7036A
                      SHA1:612E6F443D927330B9B8AC13CC4A2A6B959CEE48
                      SHA-256:4432BBD1A390874F3F0A503D45CC48D346ABC3A8C0213C289F4B615BF0EE84F3
                      SHA-512:AD8C7CE7F6F353DA5E2CF816E1A69F1EC14011612E8041E4F9BB6EBED3E0FA4E4EBC069155A0C66E23811467012C201893B9B3B7A947D089CE2C749D5E8910C6
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Zn..Zn..Zn..S.E.^n....7.mn....6.[n..5...^n..Zn...n..5..._n..5...Rn..5...Kn..5...[n..5....n..5.).[n..5...[n..RichZn..................PE..d.../g.Q.........." .....l1..0........%.......................................B.......B...`A........................................p.>.x.....>.d....@B.@....@@.......B..=...PB.h...@w<.T.............................5...............5.P............................text....k1......l1................. ..`.rdata.......1......p1.............@..@.data...8"....?.......?.............@....pdata.......@@.......?.............@..@.rsrc...@....@B.......A.............@..@.reloc..h....PB.......A.............@..B........................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1061376
                      Entropy (8bit):6.137404524669105
                      Encrypted:false
                      SSDEEP:12288:Dv87xgt2jh+ShUmh8TFaNsC2A9MdYsiSL9BQ:DvuxgtGh3hUmKTFafPWYnyu
                      MD5:E520467C8175A7D347929B315FBEF507
                      SHA1:783ADA05FF1B80B425717EE8F31BB043FD941644
                      SHA-256:B8756FA3EC2195108DF17EF8074C2DECEB06E114AD1B0580445E98F74BA26EE8
                      SHA-512:12062757B7F8C006CECDE2CB4E20CBE6E9346203395DE3787EDB1261780E55C8FB8409A486976589E1333091C16AAA7C0EC87FA4DF0D5D592CCB041C9B32A609
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........t...'...'...'.ZV'...'.N'...'.p'...'.q'u..'N.Z'...'&dp'...'...'...'...'...'&dt'...'&dM'...'..J'...'&dO'...'Rich...'........................PE..d...~l]]..........".................`A.........@..........................................`.....................................................d................................%......8...........................@...p............................................text...,........................... ..`.rdata..............................@..@.data...`........p..................@....pdata...............\..............@..@.rsrc...............................@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):131072
                      Entropy (8bit):6.134241431705178
                      Encrypted:false
                      SSDEEP:3072:cxV52DwYNWQtruIVufB56G+wg6Oj9PjjH:cxVwcYltusoB3ROt
                      MD5:4F8C1C94E5645D15F1FAA55B260C3CB6
                      SHA1:3F8F420F428911F71DD0EF15F501082DF76020BC
                      SHA-256:D07DA0C80CA2C9A96288C94C1FE0DCBDF2EA5D735D75721EEE8DA53B1A7DC8A2
                      SHA-512:F2DA6740070DAC419C951A217D515906DC63F17F6DC07FB9C05FC4C66709B2425258197290571C7534D09C3A7EC8F9E4DC73BFE9666CB3C5684CBD4B0C620928
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......\.........." ................@4.......................................`............`.........................................@...........(....@.. ....................P..4....................................8..............H...0............................text...V........................... ..`.rdata.......0......."..............@..@.data...`...........................@....pdata..............................@..@.00cfg....... ......................@..@.gfids.......0......................@..@.rsrc... ....@......................@..@.reloc..4....P......................@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):703424
                      Entropy (8bit):4.892194033032743
                      Encrypted:false
                      SSDEEP:6144:UX2ufe78HIhGu3fDtr4AYKGIHX7GdfotpiTkTjpC/dMVRi54F:U3Af+AYZIWau/oE6F
                      MD5:ED3E6287B042714B8043EFCB301D42CA
                      SHA1:ABD65B6C946076392249049A5A313369339F503C
                      SHA-256:53F1C56093FE4D9E25A17B873D88F6542AF94AF2F49C10F7262FC20EDA96D87F
                      SHA-512:4916FDDF1B35F68DF4CE97614560B0FF6B0128BB68E9EAC738F690DFAF1ACB25D06777567992EF3315BBDE7BA9ED5DB2E980F7B29272EEA3710F1E1D21AA24BF
                      Malicious:false
                      Preview:.............7.4.288.28.......................................................R...... ....;..........0R...................B..........`........`........`........`........`....:...`........`....5...`........`.......... ....U.`....$...D..X!a...X!%...X!%.D. ..-.`....$...D..X!Q...X!)...X!).D. ..`....$...D..X!a...X!-...X!-.D. ..a.`....$...D..X!a...X!1...X!1.D. ..E.`....D...D..X!U...X!5...X!5.D. ....`....$...D..X!a...X!9...X!9.D. ....`....$...D..X!a...X!=...X!=.D. ..`....$...D..X!a...X!A...X!A.D. ..`....$...D..X!a...X!E...X!E.D. ....`....$...D..X!Y...X!I...X!I.D. ..`....$...D..X!a...X!M...X!M.D.(Ja....!..... ......F`........^`.........M...V`.........(Ja....1..... ......F`........^`...........A..@...IDa................D`........D`........D`.........`.........D]....D....D...V`..........W`........I`...........V`..........W`........I`...........W`........I`...........W`........I`...........W`........I`...........V`..........W`........I`...........W`........I`...........W`........I`...........V
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):742152
                      Entropy (8bit):6.289645010191945
                      Encrypted:false
                      SSDEEP:6144:KbvBDe7NxHcSgEalEJxd0NvmdXWq1jxzwAj6TAVu1KTbkW/HQax5c1YC7x1+fSry:KDBDe7NzVNbkWHLgf1T2/tb
                      MD5:277A53A3922D71CC99626AB835CC8677
                      SHA1:E711062E5FEF4F8C2E6FA2A0E93C0A6ACA3A8056
                      SHA-256:DAE17C53566D83E24B8DBEB4329FF9A11999B05D30C2FC1D8D6A585535F6D3F8
                      SHA-512:33D8A7843ADF6C32CF6940806A0D934D67B8F6236ECBF560D226FE45180EEFDE35BDDE97079A3F85F58188BE199905255C51BC0028E4222F1440EBE51C224BA8
                      Malicious:false
                      Preview:...................5\....5d....5.....5.Q...5.\...5vl...5Hv...5.....5X....5.c...5.i...5.o...5.r...5zv...5*y...5t....53....5....5.....5.....56....5.....5.....5.....5.....5.....5.....5.....5.....5.!...5u3...5.7...5.<...5.J...5.N...5.X...5.`...5.i...52o...5.u...5.x...5.....5.....5.....58....5c....5.....5.O...5._...5Yr...5.z...5.....5....5....5....5.E...6@g...6.g...C.h...C.j...C.m...Czp...C.r...C.r...C.u...Ckx...Dez...D.}...D.....D.....DD....D.....D.....D.....D.....D.....D.....D8....D....._....._*(..._.5..._.5..8c 6..9cA7..:c.9..;c.;..<c.>..=cy@..>c.B...d.E...dcJ...d,K...d.L...d.N...d.O...d.O..ddIP..ed...fd....gd....xi....yi....zi#...{i ...|i[...}i....~i.....i.....i.....i.!...ig'...iO....i.0...i.4...iz8...i.;...i.?...i.I...i.N...i.O...i.X...iOa...i7b...i.c...i.e...i.h...ibi...i.k...i9m...i.o...i.q...i1r...i.s...iCu...i.v...iRx...i.{...iS}...i(....i....i....i....i.....i.....i.....i.....i....i{....iQ....i&....i.....i....i....iL....i.....i+....i....i....i.....i.....iZ....i/....i..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):562688
                      Entropy (8bit):6.178648733694534
                      Encrypted:false
                      SSDEEP:6144:HqcUrmPQeEWBVpbilSYsFKpzewO5hPDtIiWS48OTU6trM6Lx1f6TPaujVPqDVCe3:HabeEWBVWzPW2r76fVCQTL/yo42Q
                      MD5:6E04C1DB509E2B45817E16CE14CEFA8D
                      SHA1:BC4AE59D3DFD55B56B45C0EC7EF181D90E580C04
                      SHA-256:2C45764D445BBEACDA091F214EAAF4FAF6A43FEBF352D9657F7032E80AED01CF
                      SHA-512:7A64FBB36CE6A2BE7E5D8B2F136EAE8A316BCB00BA2DA4EDA52BB761EB78B309A3FEFF61802676C3B219164AD548B168AD639B339BA76DC7A08C3910A7408BA3
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........lj..lj..lj..=...lj..=..>lj..=..Xlj.e....lj..lk.1lj....lj....lj..>...lj....lj.Rich.lj.........PE..d...sl]].........." .........N.......?.......................................@............`...................................................<...............hX........... ..P.......8...............................p...............(............................text............................... ..`.rdata..D...........................@..@.data............p..................@....pdata..hX.......Z...&..............@..@.rsrc...............................@..@.reloc..P.... ......................@..B........................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):6014631
                      Entropy (8bit):5.472861823442485
                      Encrypted:false
                      SSDEEP:49152:Ik06LFPZAnkA/koZdvvVqckTZdvvVqQ3FLyWzmiUTWUHbHTR2Cs1y3J2kkDJMuXr:IkWkw6
                      MD5:766EBA8610853EB8C8985A3BBE44F6F3
                      SHA1:41E12E3783B5210735CC8A9F8E4BCF8DA43C8E36
                      SHA-256:7E9091666D5253441FE0639D01867450623A4ADD8FA375A31D09E9D1B0F67026
                      SHA-512:688E5174C931FE0E3661D4A45139B5FAEA5460EFCD30491DD9258AD5F36872CE51646EB638C837E8784785FE1806A63E5F68E796E68EAB8A5ECC98B22CFD44E6
                      Malicious:false
                      Preview:........~....p.....pj....ps/...pS2...p.m...p.+...p./...p.3...pu....pI....p.....p^....p.....p..$..p..$..p..$..p..$..p..%..p.\&..p..(..p.,)..p.s)..p..)..p(%...p../..p.[1..pS.1..pI.2..p..2..p.I3..p..3..p..7..p[.8..p./8..pkd8..p.r8..p..8..p..9..pYg;..pYg;..p.k<..py.<..p._@..pQ.A..p.,C..p-jC..p_.F..q].F..q..I..q..I..q.nJ..q^.J..q..J..qW.K..q.oP..q..R..q..S..q0.X..q.$X..qZ.X..q..Y..q .Y..q..Z..q..Z..q..Z..q..Z..q..Z..qQ.Z..q@3Z..q.3Z..q.4Z..q.5Z..q.7Z..q.7Z..q.8Z..q.8Z..q.9Z..q.:Z..q$;Z. q.;Z.!q.{Z."q.|Z.#q.Z.$qr.Z.%q.Z.&qT.Z.'q..Z.(q..Z.)q.Z.*q..Z.+q..Z.,q<.Z.-q#.[..q.![./q.'[.0qw.[.1q./[.2qN5[.3q.:[.4q.;[.5q.<[.6q.=[.7q.>[.8q|?[.9qM@[.:q.@[.;q`A[.<qME[.=q.I[.>q.I[.?q.L[.@q.M[.Aq=N[.Bq.S[.Cq.T[.DqsT[.Eq,W[.Fq.\[.Gq'l[.Hqw.[.Iq..[.Jq^.[.Kqm.[.Lqs.[.Mq..[.Nq).[.....[..p&.W.(L.........F.....:.=..........%$.h..|8.RW......C...y5r'.S.5S6..3e......N...u...Df...X8.d...gW....\...;...PP-..bk..h."P.L.Cr..p.Ox...j.O.|=...*.q.%....mB..N._.....r*t.j./{/../)"}...!.......&..[-.).B!........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):10326064
                      Entropy (8bit):6.268903621175405
                      Encrypted:false
                      SSDEEP:196608:P7UPty2ACXAE4liXUxR0jHz93Whl96pqWJg:o12CXAbliXUxR0jHz93Whl96pqWJg
                      MD5:9705FF0FA594BB28520963DB19F5471F
                      SHA1:0ECBB9512795E2617CF48618DD050DC0F044DF3F
                      SHA-256:66F13A0329F46E2D26FB483CB497DBDF7BB6B84D85C2E7C5BC8EA096A8BB8B1A
                      SHA-512:A06DC6B04556692C5FD363D15590D485CE2A8BF4EB7A6A55068AADE31C7DB0C7B6C15249E2FC037A1B94D6ACE3ECD962AD2C9CFF21D50C205134189FA928788E
                      Malicious:false
                      Preview:...'........CmnD........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .-...l)......|).......)..P....)..0....).......).......).. ....).. ....).......*.......*....../*......B*..`...U*......h*..P...{*.......*.......*.......*.......*..P....*.......*.......+.......+......&+..P...9+......L+......_+......r+.......+.......+..0....+.......+..P!...+...!...+..."...+..`"...,..."...,...#..#,..0V..:,..px..J,......Z,..P...{,..@....,..P....,...u&..,....&..,....&..,....&..-....&.&-....&.=-....&.T-..P.&.k-....&..-....(..-..0.(..-....)..-...Y*.....@#+.!.....+.D.....,.[... .,.y....,.......,......,......E-.......-......./../....0.//..`.0.F/....0.b/....0.r/....0../....0../....0../..@.1../..P.1../...e1../...h1../.. .1..0....1.'0....2.<0...{2.Q0..p.2.g0....2..0..p.2..0....2..0....2..0..p.2..0....2..0...Z3..1...Z3..1..p[3.C1..P.3.X1..P.3.m1..P)4..1...I4..1...I4..1...J4..1..0e4..1..@.4..1....4..2...4..2....5.12...P5.F2..0Q5.^2...Q5.s2..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):3676692
                      Entropy (8bit):7.0652728214131955
                      Encrypted:false
                      SSDEEP:49152:gFasXngmPl7MRJYlI4h3u2uFLw/beubUoSWPWolWaPa56lwEwmhRJRkx92xWN/MW:IP3uEw8q96hw3KcuYrJ/
                      MD5:C2C9A44E8B4A9D3F2DB354DD75DA3489
                      SHA1:F6F90142FBCA3771E75EB4ABA22C7ED10A6BFAF3
                      SHA-256:72F2C0832DE62085CE4C98C11D0101B4547B7FF1C4564435CA4517DC23E8C6F0
                      SHA-512:29098930674398D764EF114E0C3537946CA30B60F4650CD648F55448EBADEDDE19099A2BCBC64EC200E2C5DDFAE8CC154B27D2B821BFA65684BEB0C89AA7F7E4
                      Malicious:false
                      Preview:............x.L...y..%.....-....`/....42.....;.. .t>...*tI...*.J...*.P...*.\...*"_...*.`...*.g...*!u...+x....+.....+q....+.....+.....+.....+|....+<....+.....+,....+-....+.....+.....+.....+.....+.....+.....+ ....+k....+Z....+V....+.....+.....+J....+.....+Q....+J....+.....+.....+.....+$%...+.2.. +.3..!+.<.."+.B..#+.E..$+VO..%+1V..&+VY..'+.]..(+.e..)+ n..*+hq..++-v..,+....-+,....+D.../+...0+....1+...2+....7+....8+....9+U...:+....;+w...<+....=+....>+....?+>...@+r...A+....B+K...C+O...D+-...E+>...F+...G+....H+.=..[+h...p+L...q+....r+d...t+....u+....v+....w+8...x+.e..y+....z+....{+]...|+3...}+....~+.....+....+.....+.....+.....+.....+.....+-....+.....+.....+.....+R....+.....+.....+l....+.....+h ...+@#...+S,...+.9...+.?...+.F...+\N...+s_...+.d...+.i...+!k...+qx...+ ....+"....+_....+[....+.....+....+.....+N....+u....+.....+.....+k....+@....+.....+.....+1....+"....+}....+@....+*....+.....+.U...+E....+.a...+oh...+.l...+{y...+.....+.....+.....+.....+.....+.....+0....+m....,O....,.....,.....,..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):131072
                      Entropy (8bit):6.134241431705178
                      Encrypted:false
                      SSDEEP:3072:cxV52DwYNWQtruIVufB56G+wg6Oj9PjjH:cxVwcYltusoB3ROt
                      MD5:4F8C1C94E5645D15F1FAA55B260C3CB6
                      SHA1:3F8F420F428911F71DD0EF15F501082DF76020BC
                      SHA-256:D07DA0C80CA2C9A96288C94C1FE0DCBDF2EA5D735D75721EEE8DA53B1A7DC8A2
                      SHA-512:F2DA6740070DAC419C951A217D515906DC63F17F6DC07FB9C05FC4C66709B2425258197290571C7534D09C3A7EC8F9E4DC73BFE9666CB3C5684CBD4B0C620928
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......\.........." ................@4.......................................`............`.........................................@...........(....@.. ....................P..4....................................8..............H...0............................text...V........................... ..`.rdata.......0......."..............@..@.data...`...........................@....pdata..............................@..@.00cfg....... ......................@..@.gfids.......0......................@..@.rsrc... ....@......................@..@.reloc..4....P......................@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):5516288
                      Entropy (8bit):6.382652436438846
                      Encrypted:false
                      SSDEEP:49152:I0JUo/SnPAxPl91ozi9anp4u+C2QWg14V4G/Es1L1/0euQeivZsq+DFtq2k9T97Q:IA6nwPm+84u+C2Q2X5OcdUEkUPpE
                      MD5:5CE97EDB5475A85709C2FCA206561070
                      SHA1:61F95A1756045EBF64310E473CB9E7875E11E488
                      SHA-256:37A8366E9A1524C5DB89E6611F919D70473C5F4D1FBB8B54ED615F13AB0AA41F
                      SHA-512:87D0B1A16CCB11476A6580DE6F8B37805D2EBD0CFA99481CF3283F711D12F106B2C3C9FAFA76C1DD9FD2415E96B5EE7A45D4D36FD81C18E2A5C63E43783025B0
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......\.........." ......:..B......`.7..................................................`......................................... .L.$...D.N......0..8........A...........@......|.L.....................X.L.(.....K...............N..............................text.....:.......:................. ..`.rdata..TV....;..X....:.............@..@.data....@k..`O......BO.............@....pdata...A.......B...4Q.............@..@.00cfg...............vS.............@..@.gfids...............xS.............@..@.tls......... ........S.............@....rsrc...8....0........S.............@..@.reloc.......@........S.............@..B................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):314448
                      Entropy (8bit):4.991285298549055
                      Encrypted:false
                      SSDEEP:3072:U7Mm7p47Qa9PTdOWZpHuUGHwAIeFfHe/RmowkBEDCSQn6OFD2VxPo9oVA/m4/WPO:U7MPvT5+wezYgxP1jW5yGQauQ
                      MD5:3E292BA6A915EC8B8F2408E71C03425F
                      SHA1:C8F4AE13011061239FBCB837D2E2F84A9E876E3E
                      SHA-256:FF9412B525B65672142841DBEF0F334279B5302CD9712710BDC7143584F8B502
                      SHA-512:8A5F4531FE7AED67CD146FB53772FD5A3FAE9AA24EB4F58DDCDA5AC56FC6FA22FA8FBB824FAF8ABAC992C5C0D24446593DD05FFE106D2C29FBBA0FB5A095C5ED
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..r.....r.....r.....r.... r..../r....@r....Ir....^r....kr....qr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....>s....Fs....Xs.....s.....s.....t....rt.....t.....t.....t.....t.....t.....t.....t.....t.....t.....t.....u....Vu....bu.....u.....v.....v....ev.....v.....v.....v.....v.....w.....w.....w....2w....;w....[w.....w.....w.....w.....x.....x....Jx.....x.....x.....x.....x.....y....(y....5y....]y....yy.....y.....y.....y.....y.....z....Qz....uz.....z.....z.....z.....z.....{....,{....5{....T{....v{.....{.....{.....{.....|.....|.....|...."|....K|....}|.....|.....|.....}....=}....o}.....}.....}.....}.....~....<~....U~.....~.....~..........5.....K.....g...........................!.....".....$.3...%.Y...6.j........................................................K.................*..........V...........)................W.....w................Q.....t..........O..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):315053
                      Entropy (8bit):5.04027414754181
                      Encrypted:false
                      SSDEEP:6144:4iG17Hwc74d3vPk7s27Hk5RN3q80DInjy:4iGFHv4d3Xus27E5RN3q80DInjy
                      MD5:7F1598C653AAA2879ECC1CC20CD9F515
                      SHA1:10A2D8A72E0986962F6AD544EA1C6042FCEEF402
                      SHA-256:A41AB9FC62228F7670EE4671D1B076DB59B07663A60519559207D22C4CDD4A04
                      SHA-512:FDDF3976E8263DF6AC128BE43393F42B3C7C8D114381512752E5845BED0B538717A63CDE33A8FB2649568D34CBDAAD7A7A5049F60D35C1F072936294C07A76F6
                      Malicious:false
                      Preview:........../.e.Zq..f.uq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....,r....9r....?r....Nr....Tr....fr....nr....sr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.... s....0s.....s.....s.....s....)t....[t....et....ot....}t.....t.....t.....t.....t.....t.....t.....u....<u.....u.....u.....u....Uv....uv.....v.....v.....w....8w....Uw....[w....{w.....w.....w.....w.....x.....x....=x....Zx.....x.....x.....x.....x.....y....4y....Ey....Ry....zy.....y.....y.....y.....y.....y.....z....Kz....iz.....z.....z.....z.....z.....z.....z.....{.....{....4{.....{.....{.....{.....{.....{.....{.....|....5|....W|.....|.....|.....|.....}....=}....M}.....}.....}.....}.....~....2~....T~.....~.....~.....~.....~..........3.....E.....b...!.....".....$.....%.....6.............,.....].....s.......................K.....y.................p.....P................U................u.....).....U......................@.................a................`.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):362060
                      Entropy (8bit):4.746047646260602
                      Encrypted:false
                      SSDEEP:6144:KruicIT+sSlYhUiJGh/1KLfnKtAscnR8iJfuRzh151quD2vyCZurvkZN0kN9A5XR:KKicIT+sSlYhUV/QfnKtAtR8iJfuRzrx
                      MD5:60C21DA051795A1CF427D51FF7B8084F
                      SHA1:08F2469E42D76D7CBE03C674FDE9734E46C45F52
                      SHA-256:DE8E1013CFC781D981F2A06ABE714A5A45D76B0E7F55F137EA7785B26E391A8C
                      SHA-512:5100A4721B53795B97C5E7F3E2179335E103A0C32890FFD4EEF2468A9E868DA781B366F9EA3F872F2A96293340135D0F79E55DC84CC8DAC36528FBFE969F13DE
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..r..|..r..}.!r..~.,r....4r....9r....Fr....Lr....[r....lr....ur.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s....+s....Ds....as....is.....s.....s.....t....Mt.....t.....t.....t.....u.....u.....u....Au....Hu....Ku....Lu....]u.....u.....u.....v.....v.....w....0w.....w.....w.... x....kx.....x.....x.....x.....x.....y.....y....Sy.....y.....y.....z....?z....dz.....z.....z.....z....T{.....{.....{.....{.....{.....{....+|....g|....s|.....|.....|.....|.....}....T}....l}.....}.....}.....}....$~....0~....:~....^~.....~.....~.....~..........K.....Q....._.....s.......................K......................@.....V.......................2.....\.....}................7.....T.....j....................!.....".....$.(...%.S...6..................@.....d.................).....R................L...........................0................_.....$.....H...............>.....t.....$................M.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):467103
                      Entropy (8bit):4.348358277034253
                      Encrypted:false
                      SSDEEP:1536:Poo79qRKoeuKZYg51scNNe7PUxpDD2oAoe/XV0mU0usQInWe/uxFhUKkjNh/H9Z2:ZJqUoeZpNNe7PUxpD8AoKkve5mTrHmJP
                      MD5:F4018FB82D1BAEED446F6DA78836C2DB
                      SHA1:4C86394F38F791C98F5C673F245E71A5DA6B13C0
                      SHA-256:47D52469F70D3B2DFCD2833DC76780C7C9FE493FF2A1E3B962A22F1EF6739D73
                      SHA-512:AB3E6F0DB18AB2760D0D673C4E39FF9D173B6DF134188A7E528942B027176D79582215D5F75C3DA63E1555C6832B05D7A9E901668D34C6B05BCE8552696018E2
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..r..|..r..}.*r..~.5r....=r....Cr....Pr....Vr....er....vr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s....@s....hs.....s.....s.....s....yt.....t.....t.....u....ku.....u.....u.....u.....u.....u.....u.....u.....v....#v.....v.....v....Xw.....w.....x.....x.....x.....x....?y....by.....y.....y.....y.....y.....y.....z....fz.....z.....z....D{....{{.....{....)|....,|.....|.....|.....}....)}....6}....^}.....}.....}.....~....;~....d~.....~.....~....#.....Q.......................O.....e.....t.....................d.....................................F......................M.................#.....y.................#.....h.........../.....{............................,.....o...!....$....%.....6.J......................9.....f...........%.....b................p.....,......................P.....5.....C.....P.....~...........K.....w...........L................0.....x...........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):224643
                      Entropy (8bit):5.445680785101466
                      Encrypted:false
                      SSDEEP:6144:qmC+iU+EnqTq5qkANvso2KJcg4bq3c//EXWLuwevLbUL0WTEuei3oqgRBtry2Wm2:qmpiU+EnqTq5qkANvso2Kag4bq3c//Em
                      MD5:77F47CE82E5BFC2200C7ABB88B267123
                      SHA1:088C5D7137E70687F78B3252DB7134A6C219334C
                      SHA-256:B3B2F1AF10CE9290A4C5A6C7A4799643A91B0A020771BA6715BA2B7E90F9B79B
                      SHA-512:61605A0E99D0CB5AAA0E94143A212EFC71AAF7ECC92BA48C6B6B767E2CFBAF0910B9A94B8941D07A6DB14EE41D97AD3A57B3B219FC8D02B75AF8A180ECD3D15A
                      Malicious:false
                      Preview:..........$.e.pq..f.}q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....*r....0r....?r....Er....Wr...._r....dr....lr....tr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....Hs....Qs....ls.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....Nt....Tt.....t.....t.....t.....u....<u...._u.....u.....u.....u.....u.....u.....u.....u.....u....&v....Bv....Wv....sv.....v.....v.....v.....v.....v.....w.....w....)w....5w....]w....uw.....w.....w.....w.....w.....w.....w.....x....'x....7x....Ux....px.....x.....x.....x.....x.....x.....x.....y.....y.....y.....y....2y....Hy....^y.....y.....y.....y.....y.....y.....y.....z....#z....Yz....mz.....z.....z.....z.....z.....z.....{.....{....*{....5{....K{..!.p{..".s{..$..{..%..{..6..{.....|.....|....8|....U|....w|.....|.....|.....|.....}....O}.....}.....}.....~.....~..........C...........W.................................B.....f.................2.....R.................0.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):228150
                      Entropy (8bit):5.852271382383756
                      Encrypted:false
                      SSDEEP:3072:h0u1E+zXA2mvvaAoXqzyYEP2AEJxMcL815JN1iCvXd4S8QdQiT:Pe+zXARFoXqjAEJql15/vXdX8Qn
                      MD5:469E61806B2AB8FFB9155A03896C8302
                      SHA1:0EC06AA7FCFEADB9390E284F06164A12E44451FD
                      SHA-256:111E13702813038D6359A912B2CA544A1F93F0EA141E71BD97A57A968AA3CB72
                      SHA-512:6FE7EDBBA42198F5253CF1DD3CE077C0AC2B8118D3E00727991DBE70C6BE4ABF34DB3D2AA9595876B09F03D4F639BF431FFACF5AE57F4C8167EC59DB979523F0
                      Malicious:false
                      Preview:..........).e.fq..f.vq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....q.....r.....r....%r....4r....:r....Lr....Tr....Yr....ar....ir....qr....xr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....!s.....s....Gs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s..../t....4t.....t.....t.....t.....u....5u....Qu.....u.....u.....u.....u.....u.....u.....u.....u....#v....>v....Pv....kv.....v.....v.....v.....v.....w.....w....3w....=w....Lw....tw.....w.....w.....w.....w.....w.....w.....x....)x....Ex....Ux....nx....}x.....x.....x.....x.....x.....x.....x.....y.....y....'y....-y....7y....>y....Xy....my.....y.....y.....y.....y.....y.....y.....z..../z....Az....}z.....z.....z.....z.....z.....{.....{.....{....'{....7{....?{....P{..!.w{..".z{..$..{..%..{..6..{.....{.....|....4|....V|....}|.....|.....|.....}....J}....w}.....}.....~.....~....".....Q.......................P................P.....x................D......................X.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):204754
                      Entropy (8bit):5.500689134913278
                      Encrypted:false
                      SSDEEP:3072:JvYdEBSgwsdr5cxflnTiwVppfyC1STfkwYt1vq5XomQqXiJ/gIdWiPJt:+dERL95cRlWwVpsxTfkwWvq5JXihg8j
                      MD5:6C623AE0860CCC782FC004667C78EE78
                      SHA1:77B4F676C50758AD040777F608B3D7F26CAD466E
                      SHA-256:EE304BE73B9E06BC2B01AA76266D88BD0B24D8F3ED1FD28E61E165BBCD4C03FE
                      SHA-512:C4EFC7568A8AD9392CA4255745E5EE1603171FD14FA4AE054B6794B3BAE32846F9C3DF8F200F9E8FD62DD72A72D841F9537054A3D079842AE416AF1A644462A1
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r....$r....9r....Fr....Lr....[r....ar....sr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....6s....=s....Ls....|s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....Vt.....t.....t.....t.....t.....u....%u..../u....>u....Cu....Eu....Vu....\u....ju.....u.....u.....u.....u.....u.....u.....v.....v....Tv....cv....vv.....v.....v.....v.....v.....v.....v.....v.....w.....w....<w....Mw....]w....nw.....w.....w.....w.....w.....w.....w.....w.....x....#x....1x....5x....?x....Dx....^x....ux.....x.....x.....x.....x.....x.....y.....y....&y....9y....iy....ry.....y.....y.....y.....y.....y.....z.....z.....z.....z....!z..!.<z..".?z..$.]z..%.sz..6..z.....z.....z.....z.....z.....z....0{....E{....g{.....{.....{.....{....E|.....|....J}....x}.....}.....~.....~..................................6.....R....................../.....k......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):223214
                      Entropy (8bit):5.5135782060956275
                      Encrypted:false
                      SSDEEP:6144:5N/PETPsa2I01Omo19CQDcslwEXw5x/H3tlrH:PMw1bk9CQ9wr5BXtlrH
                      MD5:0E3B31F511B316BFD87C92C5550F1CB7
                      SHA1:4D84CD949704ADAE1B26481C8F8023DE96FF88A6
                      SHA-256:F79F058578BB810C135D34E5B1285299D18CD24F333397997354AD512B6E2667
                      SHA-512:8EF155F67F9D6F2D9A7C7D2293E0F1CDEE7943B3CAD9C39620B5628DECA008D6B86211CDA2132DF68AE9C4615837C9096628A857C0EC9F10E91E35480B14DAE9
                      Malicious:false
                      Preview:..........9.e.Fq..f.Sq..z.aq..{.rq..|.~q..}..q..~..q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r....0r....8r....=r....Er....Mr....Ur....\r....cr....jr....lr....nr....or....pr....rr.....r.....r.....r.....r.....r.....s.....s....&s....Rs....hs....ss.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....Ut.....t.....t.....t.....t....#u....Nu....Wu....iu....ou....tu.....u.....u.....u.....u.....u.....u.....v.....v....0v....Tv....Wv.....v.....v.....v.....v.....v.....v.....w....&w....9w....Nw....Xw....dw.....w.....w.....w.....w.....w.....w.....x.....x.....x..../x....Ax.....x.....x.....x.....x.....x.....x.....x.....y....$y....Ky....ty.....y.....y.....y.....y.....z....&z....\z....mz.....z.....z.....z.....z.....z.....{.....{....1{....5{....B{..!.j{..".m{..$..{..%..{..6..{.....{.....{.....|....'|....F|.....|.....|.....|.....|.....}....[}.....}.....~.....~..........<...........h..................................:.....P.................2.....U...........$.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):396704
                      Entropy (8bit):4.83331055085311
                      Encrypted:false
                      SSDEEP:12288:vtdNk+4kykh2Mtd01s/Ea23D0VhyGHu59tqMnRxOLZi6gai7zhC11l5ICOXFIsD5:fNkItd01ta23oV7u59tTRxOJwC11l5IX
                      MD5:7D54147BD7CE0E3289CD2C68EF3395A9
                      SHA1:A6AD275CECACA42ECF86C9A21404BB32F2CC5B54
                      SHA-256:5384AADD68F14A95260E4364EFE1B46E7D6BA60D47A298B2FE92F71705F754E8
                      SHA-512:657E11B9616CE37A4A8C2E0A9AAE056E9E6CBFE2B42DBB50AD173600FA65EB4F9B419620963CF4B952588BFEFEE24F5FA56DDE67A8A322715F7B321CF27D35CB
                      Malicious:false
                      Preview:..........).e.fq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r.....r....2r....?r....Er....Tr....Zr....lr....tr....yr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....4s....<s....Ps.....s.....t....8t.....t.....t.....t.....u.....u....,u....Au....Hu....Ku....Lu...._u....wu.....v.....v.....v....=w....Mw.....w....#x....]x.....x.....x.....y....5y....Hy....ky....yy.....y.....y....-z....Rz....yz.....z.....z.....{.... {.....{.....{.....|.....|....*|....R|.....|.....|.....|.....|....5}....L}.....}.....}.....}.....~....S~....y~.....~.....~.....~.....~.....~..............................................8.....j................+............................`......................7.....\................'.....F.....W.....s...............!.....".....$.....%.B...6..................?.....a...........(.....S................0............................(.....e.....N.....E.....?.....P.....~................z...........U..........\...........1.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):183659
                      Entropy (8bit):5.561085260059033
                      Encrypted:false
                      SSDEEP:3072:24f2SWHUO0sOYo6R3/kg6+edPvM89emrtrjEu3ygsyQ/TQF5IEpqcWB5DQ5ZgglX:12Smj0PGilvM89emRrjJ3ygx5iQ5mQ
                      MD5:E06BEE2C069738C1761B1F07A5A65C3E
                      SHA1:06A392F1C7B2081CEED5E498DBCE5FA76955350C
                      SHA-256:0969F4A50FAC5F7F6D5040F3F0CA1016DE578151D1633780FE7D8E3DAA8C29EC
                      SHA-512:02FAEE2B47588B27A82B1C98B8096F3F25A219D3E7CAD11C7EEAF3BD3FB20FE51CE8DB37D4148EABD7891C02E7F4F8C6A8612355C9DEE2D0DD117F553EF6CAE3
                      Malicious:false
                      Preview:............e..q..f..q..z..r..{..r..|.#r..}.2r..~.=r....Er....Jr....Wr....]r....lr....}r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s.....s....'s....6s....Fs....Ns....Us.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t.....t.... t....+t....Pt....Tt.....t.....t.....t.....t.....t.....t.....u.....u....*u.....u....3u....=u....Au....Qu....lu.....u.....u.....u.....u.....u.....u.....u.....v....%v....7v....?v....Lv....wv.....v.....v.....v.....v.....v.....v.....v.....v.....w.....w....2w....Ew....Rw....Vw....\w....lw....}w.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....6x....Kx....bx.....x.....x.....x.....x.....x.....x.....y.....y....Cy....dy....my....vy.....y.....y.....y.....y..!..y.."..y..$..y..%..y..6..z.....z....+z....Az....Rz....hz.....z.....z.....z.....z.....{....J{.....{....<|.....|.....|.....|....2}.....}.....}....c~....|~.....~.....~.....~..........O...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):185090
                      Entropy (8bit):5.547293703963103
                      Encrypted:false
                      SSDEEP:3072:YJ7XHY64dXcbh6Y9+KWM89efrstyy/3nHuUQ/TQi5zEphokBZbw5egglBGW4ws:YR3EMBWM89ef4tyQ3nHo5cw524ws
                      MD5:DC99F78630D32819EBCE696DAFD26579
                      SHA1:34E9F3F8BE6FBA7E0C586CEC4AA203422EFE281E
                      SHA-256:3E3D563B035609FB2E0DBC9CCE32C23FCEB4E69DB36B9D49EF355515B425BA93
                      SHA-512:460F6A965534F99BC5C5E294BD7571B0E4291BCD226DA0C808EB4181984F279EDEA0325D1816C3D654B78CBD05FB3A5E233C0FB5BB8DFDBCD010ED17F6B4DE9F
                      Malicious:false
                      Preview:........!...e..r..f."r..z.1r..{.9r..|.Er..}.Tr..~._r....gr....lr....yr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s....#s....*s....1s....3s....5s....6s....7s....<s....Is....Xs....hs....ps....ws.....s.....s.....s.....s.....t.....t.....t.....t....$t....+t....2t....9t....<t....=t....Bt....Mt....rt....vt.....t.....t.....t.....u.....u.....u....5u....;u....Mu....Qu....Vu....`u....du....tu.....u.....u.....u.....u.....u.....u.....v.....v....<v....Gv....Yv....av....nv.....v.....v.....v.....v.....v.....v.....v.....w.....w....(w....7w....Qw....dw....qw....uw....{w.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....%x....>x....Ux....jx.....x.....x.....x.....x.....x.....y.....y....$y....4y....by.....y.....y.....y.....y.....y.....y.....y..!..y.."..y..$..y..%..z..6.!z....<z....Jz....`z....qz.....z.....z.....z.....z.....{....5{....i{.....{....X|.....|.....|.....|....E}.....}.....~....v~.....~.....~.....~................b...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):220764
                      Entropy (8bit):5.407785254450992
                      Encrypted:false
                      SSDEEP:3072:JJNiQtQATI61oJ4Qf2bk5b6ShmHlbt/un:JPO3pJ75MHlbt/W
                      MD5:3B0DBD76F824D646F684A1EB7782BB60
                      SHA1:1446A0F18CEB493CFC6E18AB6A08B51E6D6AA596
                      SHA-256:307994B5E793C569606A14208BCBA658FF5F1FF8FE92E3A16B3F05E2CFBBF3EE
                      SHA-512:CD5062E39EFF21E8A0E15FF2C3D2E531A2BE569FF22ADB3C596044E3B4663C6DF35A9513A8D98B5FE927FBC029EB89D9C3806A32A4C10FDC5DDCBD161D3C55E9
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r....%r....:r....Gr....Mr....\r....br....tr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....Os....]s....ws.....s.....s.....s.....s.....t.....t.....t.....t.....t.....t....&t....7t....qt....wt.....t.....t.....u....Lu....gu.....u.....u.....u.....u.....u.....u.....v.....v....+v....Tv....sv.....v.....v.....v.....v.....v.....v....'w....5w....Ww....bw....ow.....w.....w.....w.....w.....w.....w.....x....6x....Ox...._x....px.....x.....x.....x.....x.....x.....x.....y....Hy....ay....vy....|y.....y.....y.....y.....y.....y.....y.....z....Az....ez....}z.....z.....z.....z.....z.....z.....{.... {....O{....r{....~{.....{.....{.....{.....{.....{..!..{.."..{..$..|..%..|..6.T|....u|.....|.....|.....|.....|.....}....9}....Z}.....}.....}.....}....e~.... .......................I.........._.................D....._.......................J.....{................U.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):224140
                      Entropy (8bit):5.38629246177027
                      Encrypted:false
                      SSDEEP:3072:TisIMkLhkBHBPr/uWC+sCYRhHyN05MwSboIkjq89d22IX:LIklO+sCYB5kk+8PnO
                      MD5:D546D7722A37BA055AB8A33B682B8A19
                      SHA1:9D8939DACFEB9830D46EFBE94E84F476337198D4
                      SHA-256:2FB12F93C3811E8C4F1A01472F1F0B4992F7A11889A3F64ED73E867F30BBA46D
                      SHA-512:1F3D830308FE94CB4FA5FF02F9B83790A723F46024222EA7128AAA7F7D77E0A59F2CB6A7F8888A34810560D46D647EE677EE6668A00328CD9C9F83A31DA6570A
                      Malicious:false
                      Preview:..........(.e.hq..f.vq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....$r....*r....9r....?r....Qr....Yr....^r....fr....nr....vr....}r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....>s....Xs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....gt....mt.....t.....u.....u....Vu....qu.....u.....u.....u.....u.....u.....v.....v.....v....7v....]v....{v.....v.....v.....v.....v.....v.....v....,w....:w....\w....gw....tw.....w.....w.....w.....w.....w.....w.....x....*x....Cx....Sx....cx.....x.....x.....x.....x.....x.....x.....x....(y....>y....Sy....Yy....\y....by....yy.....y.....y.....y.....z....)z....Rz....jz....rz.....z.....z.....z.....z.....{.....{....D{....k{....v{.....{.....{.....{.....{.....{..!..{.."..{..$..|..%..|..6.5|....V|....n|.....|.....|.....|.....}....)}....I}....p}.....}.....}....T~..........j................./...........)......................".....T.....q................@....._.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):199921
                      Entropy (8bit):5.512996301897522
                      Encrypted:false
                      SSDEEP:3072:q+rJbBOAe0l5gXsiXi/1SUjMYn5pB0oYxghNf/NR:3rzOn1XsiXi/1SUjPn5axghNf/b
                      MD5:468578BB57B0616B1FEF43167CEC075C
                      SHA1:6858327C4FBF47B87B14A48CDE7F307BA0BDEF36
                      SHA-256:0244E018424F65654F6181A022AD20D96365C0EB90676DFF01214EEEC24D40F6
                      SHA-512:88B116F7D33CD79916A405E4689BDA2B9D89F803704E8CAFE0475FEE28532D30900B3AA0C5459D1DD79E224682894F6EB70BEFF7B4FCEE68A3D39003180AF803
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r....,r....=r....Fr....[r....hr....nr....}r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s....ps....ys.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t....Vt....\t.....t.....t.....t.....u....1u....Ju....~u.....u.....u.....u.....u.....u.....u.....u.....u.....u.....v.....v.....v....Pv....vv....yv.....v.....v.....v.....v.....v.....w....$w....:w....Fw....Rw....aw....lw.....w.....w.....w.....w.....w.....w.....x.....x.....x.... x..../x....\x....lx....|x.....x.....x.....x.....x.....x.....x.....x.....x.....y.....y....4y....?y....fy....ry.....y.....y.....y.....y.....y.....z....*z....7z....Cz....Qz....[z....nz..!..z.."..z..$..z..%..z..6..z.....{....#{....@{....X{....u{.....{.....{.....|.....|....=|....t|.....|....^}.....}.....}.....~....~~.....~....H.......................'.....`.....~................B.....].............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):317594
                      Entropy (8bit):5.10869358128791
                      Encrypted:false
                      SSDEEP:6144:4P8SoTXyDFZyOrsWgsw+fc7K6PY3B+bL3CSINN2Dl8thiYA39J+eRUZFanoaLe9C:3SoTXyDFZyOrsWgsw+fc7K6PY3B+bL3h
                      MD5:74CB66F8ED8C4E708A687F8B6E018ABC
                      SHA1:0F577813CB11FF371057FD5AA027CEB5D51645D8
                      SHA-256:ABE333527DC0A9FD5F8B4E534DB191EF74F4E9F015A40D49FC36BC71895AF66C
                      SHA-512:DACDC6F395AD395740CE9782253D2E20B2715789833960BA0647F6B4BC005E171B58966F510ED22F1421E32BD46286CCED796D3D150859C64657B340082DDFEE
                      Malicious:false
                      Preview:..........-.e.^q..f.oq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....%r....+r....:r....@r....Rr....Zr...._r....gr....or....wr....~r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....t....0t....At....Rt....`t....ht....yt.....t.....t.....t.....t.....t.....u.....u.....u.....u.....v.....v.....v.....v.....v.....w....-w....5w....Aw....Xw....dw.....w.....w.....w.....x....1x....Fx....ux.....x.....x.....x.....y....Gy....Zy....gy.....y.....y.....y.....y.....y.....z....Fz....zz.....z.....z.....z.....{....+{....H{....P{....c{....z{.....{.....{.....|....+|....1|....@|....F|....t|.....|.....|.....|.....}....I}....y}.....}.....}.....}.....~....V~....s~.....~.....~.....~....+.....G.....V.....p.....................!.....".....$.....%.&...6.J.....z.............................................4.....d..........6.....X...........j...........Z.....+......................w.................0...........9................?..........R.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):206125
                      Entropy (8bit):5.459225724318129
                      Encrypted:false
                      SSDEEP:3072:sv+HSKUSI0OnoIUnk+2phRSxXHGeN4ZgXWYOW9+h3QQ102aJYhZjkjrc9D+QZGtZ:Kfi057mOXgQlkuLU5kgl2B2hXHwji
                      MD5:A86418F62294A4DB2D45B1DD662300AB
                      SHA1:007552B7890AB9AB3AB59C5DE53C4FA6B2C2F757
                      SHA-256:FDA77C3C1A4D658E3D5DB8940F68BAD017DD79FE30E8430A2C1EADA2D7A504B2
                      SHA-512:E1DC0EDD017FD7554A93FE945B687A6BCF96D4D5516A23F85A665093F8B7721B279446738833384735255A4E5E4FF98D2BCA2B5C7008E509372693D20B286B58
                      Malicious:false
                      Preview:..........G.e.*q..f.Bq..z.Pq..{.aq..|.mq..}.|q..~..q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r....'r....,r....4r....<r....Dr....Kr....Rr....Yr....[r....]r....^r...._r....dr....vr.....r.....r.....r.....r.....r.....r.....s....Ks....ds....ms....us....|s.....s.....s.....s.....s.....s.....s.....s.....s.....t....Mt.....t.....t.....t.....t.....u....4u....Cu....Su....Zu....mu....yu....}u.....u.....u.....u.....u.....u.....v....*v....Mv....Pv....zv.....v.....v.....v.....v.....v.....v.....w.....w.....w....)w....5w....Zw....gw....uw.....w.....w.....w.....w.....w.....w.....w.....x....'x....?x....Cx....Mx....Sx....rx.....x.....x.....x.....x.....y....*y....?y....Ey....hy....py.....y.....y.....y.....y.....z....#z....+z....;z....Gz....Xz....cz....vz..!..z.."..z..$..z..%..z..6..{....${....8{....V{....p{.....{.....{.....{.....|....2|....O|.....|.....|.....}.....}....)~....E~.....~....5...........8.....O............................@......................@.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):226979
                      Entropy (8bit):5.244814813431122
                      Encrypted:false
                      SSDEEP:6144:kySkNsQ3zAzDCPxK12q9SQDQFusZ3X5Fj4:FbsTig1Jc5Fc
                      MD5:E9E9B5738DCC5C64C0564EBEE8CB3F48
                      SHA1:B1368226185F02511862F0795ACFCF9070A555C8
                      SHA-256:F74E56617241F9E6DB3ABA7CDF0E2442F9B048437CEEF7BD401F50F9639EB30D
                      SHA-512:E7D8C13C4932BC7CA5DED567DBE19184AB199A556635A1F94F67948AC4E3AD57B4EA0D658074850B00BBC1574609AD486658A753F344C8B16C372FE53BCED47E
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..r..|..r..}.'r..~.2r....:r....?r....Lr....Rr....ar....rr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s....1s....Gs....Os....Vs.....s.....s.....s.....s.....t.....t.....t....$t....)t....3t....=t....Dt....Gt....Ht....Qt....bt.....t.....t.....t....Bu....Ju.....u.....u.....u.....u.....u.....v.....v.....v....#v....)v....Bv....hv.....v.....v.....v.....v.....v.....w.....w....Nw...._w.....w.....w.....w.....w.....w.....w.....x.....x....'x....6x....Zx....ux.....x.....x.....x.....x.....x.....x.....x.....y....(y....>y.....y.....y.....y.....y.....y.....y.....y.....y.....z....(z....Bz....\z....uz.....z.....z.....z.....z....'{....3{....P{....b{.....{.....{.....{.....{.....{.....{.....|.....|..!.C|..".F|..$.d|..%..|..6..|.....|.....|.....|.....}....$}....u}.....}.....}.....}.....}....3~.....~....V.................-...........!...........;.....Z............................U..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):239622
                      Entropy (8bit):5.4245141548157765
                      Encrypted:false
                      SSDEEP:6144:VjAuaI/A2k2u6uwqVU9nY989vKvIxZxRfWqx0VAW9+XP59pPYXQR4I4KdrwLuFuL:RAnI/A2kD6uwqVUdDZXWqxfW9+f59p4Z
                      MD5:2352A2BB3481EEA03C76A67B8677918E
                      SHA1:03644BD352B256980E9045E20964733D969B877A
                      SHA-256:11857A275941715D519CEFAC3105E906FB97777B712D095844C5F8666DC36C6B
                      SHA-512:17F2CBDEC9775E4BB52360E76A1A5AAAC9D9A2E616D115D5B84F42E86E9DB1A9EBB48F02E1E3E9AF8183707B9A7E85595F36A85C0612CFAD9EE4ED280C320E9A
                      Malicious:false
                      Preview:..........$.e.pq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....*r....7r....=r....Lr....Rr....dr....lr....qr....yr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....Js....Ss....js.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....Gt....Mt.....t.....t.....t.....u....+u....@u....uu.....u.....u.....u.....u.....u.....u.....u.....u.....v....'v....Cv....Uv....yv.....v.....v.....v.....v.....w.... w..../w....Ww....jw.....w.....w.....w.....w.....w.....w.....x....#x....5x....Zx....vx.....x.....x.....x.....x.....x.....y.....y....*y....-y....0y....9y....Qy....cy....ty.....y.....y.....y.....z.....z....'z....Rz....bz.....z.....z.....z.....z.....{....={....O{....Y{....f{....u{.....{.....{..!..{.."..{..$..{..%..|..6..|....9|....N|....m|.....|.....|.....|.....}....#}....L}.....}.....}....<~.....~....^.................,..........p...........9.....q.....................F.......................9.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):444053
                      Entropy (8bit):4.408507955539081
                      Encrypted:false
                      SSDEEP:3072:wTh2M/eMLT76lSsHQBKpTU7CWiSK35IZ0PxwXg/VdLJN45vTKDGTu+HaOvy4PGyp:sUPxae59Sxf
                      MD5:79886060308CA116D2E8916E1682B828
                      SHA1:DDDEA4D8E41D1CCCCCBCF47D93AE7327E5F27F81
                      SHA-256:D67B61F99067479B2492AAE7F204EA0B1CE54359A21DBD685202FBF22503FA89
                      SHA-512:41F813711F46800A9DBAA3650AAD99D1E9797AE8A8BF44EB432D47856B0FE3989641A81A799F196D577497B952CD938E667B62FA7C85CC89EF08AB02B705ED80
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..r..|..r..}.+r..~.6r....>r....Cr....Pr....Vr....er....vr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s....;s....fs.....s.....s.....s....]t....st.....t.....u....Eu....^u....wu.....u.....u.....u.....u.....u.....u.....u.....v.....v.....v....5w.....w.....w....hx.....x.....x....]y.....y.....y.....y.....y.....y.....y.....z....fz.....z.....z.....{....5{.....{.....{.....{....8|....[|....}|.....|.....|.....|.....}....I}.....}.....}.....}.....~....7~....m~.....~.....~..........8.....g.....z.............................y................................$.....e......................c.......................g.................,.....o.................t..................................:...!.....".....$.....%.....6.3............................T...........".....e.......................j...............I...........i.....i.....j................W.................U.................'.....Y.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):268510
                      Entropy (8bit):4.785497032257121
                      Encrypted:false
                      SSDEEP:6144:U77RbYzciXNSza7/dprJms+IRj3ESnB5DmeY6VfKliMr5KRszk6P5Z1XTp98BcIG:UfRUzTOcdprJpGeY6VfKliMr5Sm/P5ZJ
                      MD5:64E7FDCD09ABD5E14521F6E49FD2436A
                      SHA1:DB8D47BB41E4DABBD5BF09154A22B4B97D727C60
                      SHA-256:CDD6702FFD3F9F96650E38A29B7F4105D50CABE6EC13C68C276AA85B9C36CF5E
                      SHA-512:E13A96E7B0169258F2E88A93E33BB828BCFF69EF3BD563743C8A7E05A74A541B594B913F33FFA972F4AE8E20338340603D6D381A73867CB9525DE314AA638A70
                      Malicious:false
                      Preview:..........%.e.nq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r....#r....8r....Er....Kr....Zr....`r....rr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....t.....t.....t....!t....)t....Bt....It....Lt....Mt....Vt....dt.....t.....t.....u....|u.....u.....u.....u.....v....Sv....sv.....v.....v.....v.....v.....v.....v.....w....3w....Kw....aw....ww.....w.....w.....w....#x....4x....Rx....]x....jx.....x.....x.....x.....x.....x.....y....%y....gy.....y.....y.....y.....y.....y.....z.....z.....z....4z....Jz....[z.....z.....z.....z.....z.....z.....{..../{....T{....p{.....{.....{.....{....0|....X|....b|.....|.....|.....|.....|.....}....6}.....}.....}.....}.....}.....}.....}.....~.... ~..!.Q~..".T~..$.r~..%..~..6..~.....~.....~.....~..........=.......................&.....b...........@..................................%...........b.......................A.....`...........4.....x............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):456292
                      Entropy (8bit):4.386274822814938
                      Encrypted:false
                      SSDEEP:3072:bpowQ7yue2BXC/Zbf/ELsw3kw3m1sqDYeg3zR6Yo/dvbDGTDxf49jjJm3KH0I0Ux:tnSyue2FA5NQbO
                      MD5:E9A7BC6DFA4016BDA1A4FAADD0A96086
                      SHA1:C8A34F234DDBEF70E289F86E261383D605E44042
                      SHA-256:AF7C37EDD3EAFBCE6698E270070CFA55B3975D0D87D2336AB09626A9FFA458E4
                      SHA-512:DDACF9D5CF2ADBC5A008584816A3FDC77DD824CDF83B65CD002F4E3415BEBC017F3998D80D9743BADAFCFF5950181ED03B5F75D0BFFFFDD949F9812EB961BF19
                      Malicious:false
                      Preview:..........&.e.lq..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r.....r....?r....Hr....]r....jr....pr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.... s....Ks....cs....xs.....t....*t....Lt.....t.....t.....u....&u....Wu....mu.....u.....u.....u.....u.....u.....u....ov....{v....(w.....w.....w.....x.....x.....x....%y....Ey....sy....|y.....y.....y.....y.....z....hz.....z.....z....<{....p{.....{.....|....1|.....|.....|.....|.....}....&}....N}....}}.....}.....}.....~....(~....^~.....~..........(.....X.............................1.....\.................I.....q..................................Q......................h.......................g.................(.....k.................\.....r............................$...!.j...".m...$.....%....6.1................#.....c...........u.................Z...........[.....B...............j..................................+..................................y....._...........D.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):216276
                      Entropy (8bit):5.559630940550901
                      Encrypted:false
                      SSDEEP:3072:3O6D2IsoAzM7DJ2cvLU0kilu5h9dttJctsmfeudqcRfDJN5MKAXtUDeTDE2bKMMI:+vVQJFNpN5Z9JBK7
                      MD5:DBB5A619E31E3958B7EE5DF2E68A44DA
                      SHA1:A4DC7B9C7A6E2B9C7388A9214A31BD474BC85427
                      SHA-256:728FDADF1773DE85598EDCDA70BF7F88A9A46C67DE01433CEC39B2FF77FF5605
                      SHA-512:68141E5EC9263E7E85122B9BE0C1088C23F752E98F5147B59A2BBAD4FDF6936D9A4BF93439A78723A15F0B7C0AE878914C625618FCD2D28A0FE0CFB7F809DA37
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....r.....r.....r..../r....8r....Mr....Zr....`r....or....ur.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....>s....Gs....ds.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....8t....>t....}t.....t.....t.....u....5u....Nu.....u.....u.....u.....u.....u.....u.....u.....u.....v..../v....Dv....\v....qv.....v.....v.....v.....v.....v.....w....#w....2w....Zw....mw.....w.....w.....w.....w.....w.....w.....w.....x.....x....,x....<x....Nx....Tx....\x....jx....yx.....x.....x.....x.....x.....x.....x.....x.....x.....y....!y....6y....Sy....ty.....y.....y.....y.....y.....y....'z....3z....Iz....Wz....}z.....z.....z.....z.....z.....z.....z.....z..!. {..".#{..$.A{..%.S{..6.l{.....{.....{.....{.....{.....{....>|....Q|....r|.....|.....|.....|....G}.....}....b~.....~.....~....3...........3................!.....4.....r................=.....{............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):235681
                      Entropy (8bit):5.683260300897524
                      Encrypted:false
                      SSDEEP:6144:zk+dDn1AjAc4KRNV58f5e1i6r8UAUnmdpEm63ICt:zk4ANX3qf54r8UdJ
                      MD5:83F2BFF36DB68815963734C6F14D2CEA
                      SHA1:F331A6F077191F98E83EB228BDE5DB7F199A028D
                      SHA-256:DB0DD153FABCEC2E31D652807226D5FFBD7C26231ADB0AA5602157500C7E07B8
                      SHA-512:DFA645F7D94EE691BE6BFC4725ACB5E70F8AD14B952C614D2477F23AEEA7BF2BA8B2ED08E202A8CE52D75B1741C98E66A8393E0A3DE83158AD16E879C6BCFFA3
                      Malicious:false
                      Preview:..........0.e.Xq..f.kq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r...."r....(r....7r....=r....Or....Wr....\r....dr....lr....tr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....Js....ds....ys.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t....#t.....t.....t.....t....Vu....\u.....u.....u.....u.....v....+v....Dv....Lv....Tv....iv....ov.....v.....v.....v.....v.....w....'w....Xw.....w.....w.....w.....w.....x.....x.....x....@x...._x....~x.....x.....x.....x.....x.....x.....y.....y....(y....Sy....ky....~y.....y.....y.....y.....y.....y.....z....%z....)z....,z....:z....Tz....qz.....z.....z.....z.....{....5{....N{....X{.....{.....{.....{.....{.....{.....|....6|....]|....l|....||.....|.....|.....|.....|..!..|.."..|..$..}..%.9}..6.J}....v}.....}.....}.....}.....}....B~....W~....y~.....~.....~....B.......................-.....T..........i..................................._.....|..........,.....c................I.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):198224
                      Entropy (8bit):5.410767132695451
                      Encrypted:false
                      SSDEEP:3072:bIHP9d98zL6J5Yov3CDx1NZ/WmtW6dmA8bTbb8CU2HvyaRKrCnD7devsOCj/5BTP:bKP9IWYHzmHbnJn5B1rWt8sEaxW
                      MD5:EFF880916F5F7CA92FEF688128E7B2F2
                      SHA1:A4BD046D14DC5135731E962E9E0FB02D84161BB0
                      SHA-256:F9C3B84BDE54646DB226261E2A97C491A2B29A2DE96EDB7825F05AAFEB9A0894
                      SHA-512:AEABC3B258DD5C47F76707ADC105D19CC1471400099CA2DB29DE491F79EE4729173D5EBCE63EC19604DD2C87CC2A39213D0B39B294D100A98A007B26FADD50F9
                      Malicious:false
                      Preview:............e.zq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....-r....:r....@r....Or....Ur....gr....or....tr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....(s....0s....As....qs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....9t....et....it.....t.....t.....t.....t.....t.....t.....u.....u.....u....#u....8u....Tu....iu....yu.....u.....u.....u.....u.....u.....v.....v....6v....Av....Nv....vv.....v.....v.....v.....v.....v.....v.....v.....w.....w....+w....Fw....Sw....dw....kw....pw.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x..../x....Hx....dx.....x.....x.....x.....x.....x.....x....+y....:y....Wy....fy.....y.....y.....y.....y.....y.....y.....y.....z..!.0z..".3z..$.Qz..%.hz..6.xz.....z.....z.....z.....z.....z....?{....X{....x{.....{.....{.....{....T|.....}.....}.....}.....}....4~.....~..................................$.....9.....|..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):354530
                      Entropy (8bit):4.95318162884041
                      Encrypted:false
                      SSDEEP:6144:HYTgTZ7MQ1rGnUDDRYKgVoiQi4fZNh50IB3IjFaLNiXExCqXMWPqy:FTuVnUDD2KTiQ5h50IB3IjFaLNiXEsqJ
                      MD5:A2B8811EBA5F639F1B3C92680EE0809E
                      SHA1:29AC667EC390DB72EC3A6BF207E9C963DB75A44F
                      SHA-256:0F92BDAD34BAFC6AEFD2AE7D6E6A634F997CA49052F06725938DEADE5A0E6E53
                      SHA-512:AC3E01FB67FEEE1B8154618C39035A4FB0FBAD883F9C349EC941486F6586D23A5078B7BBD39D1109045BD7CB1377BBE4E12B0764B8DA9AFE66BA978011C5A9EA
                      Malicious:false
                      Preview:..........5.e.Nq..f.oq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r.....r..../r....<r....Br....Qr....Wr....ir....qr....vr....~r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s..../s.....s.....s.....s....=t.....t.....t.....t.....t.....t.....t.....t.....t.....t.....t.....u.....u.....u....,v.....v.....v....Kw....|w.....w.....x....#x....Sx....rx.....x.....x.....x.....x.....y....@y....ly.....y.....y.....y....4z....7z.....z.....z.....z.....z.....{..../{....J{.....{.....{.....{.....{.....{.....|....K|....Z|.....|.....|.....|.....|.....}.....}....8}....^}.....}.....}.....}.....}.....}.....~....6~....O~....f~.....~.....~.....~....*.....N.....Z.......................$.....[.....r...........................*.....J.....X.....y...!.....".....$....%.....6.;..................................o......................_................W..........(.....O......................U................."...................................*...........7.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):198224
                      Entropy (8bit):5.410767132695451
                      Encrypted:false
                      SSDEEP:3072:bIHP9d98zL6J5Yov3CDx1NZ/WmtW6dmA8bTbb8CU2HvyaRKrCnD7devsOCj/5BTP:bKP9IWYHzmHbnJn5B1rWt8sEaxW
                      MD5:EFF880916F5F7CA92FEF688128E7B2F2
                      SHA1:A4BD046D14DC5135731E962E9E0FB02D84161BB0
                      SHA-256:F9C3B84BDE54646DB226261E2A97C491A2B29A2DE96EDB7825F05AAFEB9A0894
                      SHA-512:AEABC3B258DD5C47F76707ADC105D19CC1471400099CA2DB29DE491F79EE4729173D5EBCE63EC19604DD2C87CC2A39213D0B39B294D100A98A007B26FADD50F9
                      Malicious:false
                      Preview:............e.zq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....-r....:r....@r....Or....Ur....gr....or....tr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....(s....0s....As....qs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....9t....et....it.....t.....t.....t.....t.....t.....t.....u.....u.....u....#u....8u....Tu....iu....yu.....u.....u.....u.....u.....u.....v.....v....6v....Av....Nv....vv.....v.....v.....v.....v.....v.....v.....v.....w.....w....+w....Fw....Sw....dw....kw....pw.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x..../x....Hx....dx.....x.....x.....x.....x.....x.....x....+y....:y....Wy....fy.....y.....y.....y.....y.....y.....y.....y.....z..!.0z..".3z..$.Qz..%.hz..6.xz.....z.....z.....z.....z.....z....?{....X{....x{.....{.....{.....{....T|.....}.....}.....}.....}....4~.....~..................................$.....9.....|..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):185090
                      Entropy (8bit):5.547293703963103
                      Encrypted:false
                      SSDEEP:3072:YJ7XHY64dXcbh6Y9+KWM89efrstyy/3nHuUQ/TQi5zEphokBZbw5egglBGW4ws:YR3EMBWM89ef4tyQ3nHo5cw524ws
                      MD5:DC99F78630D32819EBCE696DAFD26579
                      SHA1:34E9F3F8BE6FBA7E0C586CEC4AA203422EFE281E
                      SHA-256:3E3D563B035609FB2E0DBC9CCE32C23FCEB4E69DB36B9D49EF355515B425BA93
                      SHA-512:460F6A965534F99BC5C5E294BD7571B0E4291BCD226DA0C808EB4181984F279EDEA0325D1816C3D654B78CBD05FB3A5E233C0FB5BB8DFDBCD010ED17F6B4DE9F
                      Malicious:false
                      Preview:........!...e..r..f."r..z.1r..{.9r..|.Er..}.Tr..~._r....gr....lr....yr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s....#s....*s....1s....3s....5s....6s....7s....<s....Is....Xs....hs....ps....ws.....s.....s.....s.....s.....t.....t.....t.....t....$t....+t....2t....9t....<t....=t....Bt....Mt....rt....vt.....t.....t.....t.....u.....u.....u....5u....;u....Mu....Qu....Vu....`u....du....tu.....u.....u.....u.....u.....u.....u.....v.....v....<v....Gv....Yv....av....nv.....v.....v.....v.....v.....v.....v.....v.....w.....w....(w....7w....Qw....dw....qw....uw....{w.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....%x....>x....Ux....jx.....x.....x.....x.....x.....x.....y.....y....$y....4y....by.....y.....y.....y.....y.....y.....y.....y..!..y.."..y..$..y..%..z..6.!z....<z....Jz....`z....qz.....z.....z.....z.....z.....{....5{....i{.....{....X|.....|.....|.....|....E}.....}.....~....v~.....~.....~.....~................b...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):525312
                      Entropy (8bit):4.1291514010279835
                      Encrypted:false
                      SSDEEP:1536:ZKIoysaCw7420ZGonD/AWpwQrNhJHBK5dzE1mAbj1WnlJ6rwQzAiyiDjjFW/c2sR:ZKIS3f246c50X2Y/s
                      MD5:432E8BBC51DDD478AB5D62299BF2467F
                      SHA1:2A1AF3A9C4D164E878E9D69A200240713D437BDA
                      SHA-256:3997C89E6678F0E3CDB2E016FF6AB9688F9867E328B821EECCEBD1E44EBF6383
                      SHA-512:458E0B74A5C09EC106157EEBBF06F3CFE63D6A880CC64ABED1608004898CD5EA04AE8A1463F8E1E4BA5165A895DBD926159DCD53A19ED0C44551026E708E6F7D
                      Malicious:false
                      Preview:..........-.e.^q..f.}q..z..q..{..q..|..q..}..q..~..q.....q.....q.....r.....r.....r.....r....7r....Lr....Yr...._r....nr....tr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....'s....gs....os.....s....nt....wt.....t....*u.....u.....u.....u.....u.....u.....v.....v.....v.....v....%v....fv....Dw....lw.....x.....x.....y.....y.....y.....z.....z.....z....${....9{....Q{....p{....|{.....{...."|....`|.....|.....|.....}....|}.....}.....}....?~....d~.....~.....~.....~..........I.......................7................F.....k......................B.....].....y.....................|...................................L................+................9.................".....J......................>..........3.....X...........................7...!.....".....$.....%.....6.D...............!.....`....................../.......................e..................................N...........@.....{.....4....._...........F................R...........5.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):517629
                      Entropy (8bit):4.296049476630076
                      Encrypted:false
                      SSDEEP:6144:rXx/1Ymoa0fcT8CfEGE0q2Y6d9H6kUumRvCpQpYRpRziu31wxlkQc7fc5xldyckB:rB/pTO67ol15dnn0
                      MD5:A125F1889817658C5C2687EE8F9F321D
                      SHA1:E35B08389A40DBDE5E03A963F89393D645F8352F
                      SHA-256:BD3A3E1CAD20C2681F3B2E0C3C0425CD023D6C116B4BDE5692EBCB54C64B25CB
                      SHA-512:6B39F061B1611914C59093B090F6139037083F3029545CDBC54AB96B478433E52A7F05FCDE618102FA2E5711BEA6FDBCD6F12A98D98AE70A8179F4068050A78F
                      Malicious:false
                      Preview:............e..q..f..q..z..r..{..r..|.&r..}.5r..~.@r....Hr....Mr....Zr....`r....or.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s.....s....Ts.....s.....s.....s.....s.....t.....t.....u.....u.....u.....v....$v....Bv....Zv....vv....}v.....v.....v.....v.....v...._w....nw.....x.....x.....x....Ly....wy.....y.....y.....z....Az....Ez....Wz.....z.....z.....z....D{.....{.....{.....|....F|.....|.....|.....|....~}.....}.....}.....~....*~....R~.....~.....~.....~....>.....|...........&.....h................4.....q...........................(................1.....@.....C.....a................1................R.................'................./.....\................P......................1.....Q.....f.........!.!...".$...$.B...%.....6......?.....Z................?...........I................3..................................d.....Q.....P.....R.....~..........._...........A...........8...........a...........d.....Z.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):220764
                      Entropy (8bit):5.407785254450992
                      Encrypted:false
                      SSDEEP:3072:JJNiQtQATI61oJ4Qf2bk5b6ShmHlbt/un:JPO3pJ75MHlbt/W
                      MD5:3B0DBD76F824D646F684A1EB7782BB60
                      SHA1:1446A0F18CEB493CFC6E18AB6A08B51E6D6AA596
                      SHA-256:307994B5E793C569606A14208BCBA658FF5F1FF8FE92E3A16B3F05E2CFBBF3EE
                      SHA-512:CD5062E39EFF21E8A0E15FF2C3D2E531A2BE569FF22ADB3C596044E3B4663C6DF35A9513A8D98B5FE927FBC029EB89D9C3806A32A4C10FDC5DDCBD161D3C55E9
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r....%r....:r....Gr....Mr....\r....br....tr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....Os....]s....ws.....s.....s.....s.....s.....t.....t.....t.....t.....t.....t....&t....7t....qt....wt.....t.....t.....u....Lu....gu.....u.....u.....u.....u.....u.....u.....v.....v....+v....Tv....sv.....v.....v.....v.....v.....v.....v....'w....5w....Ww....bw....ow.....w.....w.....w.....w.....w.....w.....x....6x....Ox...._x....px.....x.....x.....x.....x.....x.....x.....y....Hy....ay....vy....|y.....y.....y.....y.....y.....y.....y.....z....Az....ez....}z.....z.....z.....z.....z.....z.....{.... {....O{....r{....~{.....{.....{.....{.....{.....{..!..{.."..{..$..|..%..|..6.T|....u|.....|.....|.....|.....|.....}....9}....Z}.....}.....}.....}....e~.... .......................I.........._.................D....._.......................J.....{................U.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):556723
                      Entropy (8bit):4.332819496156418
                      Encrypted:false
                      SSDEEP:3072:uaq181+cmRmwaaNGlsp1lCnvCOW6xfHcFXaX2Bd2zeaAfDD51zYrJCdJSKcG84:u6mRrNGlsDa8FCHKDD5oKcG84
                      MD5:3EBDFD0AB9999B5AD515EB052DFDC577
                      SHA1:F4573147E170409DFA1551393F87F396D1E02D3B
                      SHA-256:CDFB4B55F697311BA2E81BCE89C9E4F1E1592D54D9BBEED23122013A3FA2F8E3
                      SHA-512:D35B186F0C7E225A27A081DF288EFBCE988C449510613E5955DF7BDA45905B76B97A7864A250C60CA5C5796963DA413194C697CBB074689C7E1F441E1F98C85B
                      Malicious:false
                      Preview:............e..q..f..q..z.!r..{.2r..|.>r..}.Mr..~.Xr....`r....er....rr....xr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s....#s....*s....,s.....s..../s....0s....5s....ls.....s.....s.....s.....t.....t.....u....+u.....u.....u.....v....2v...._v....zv.....v.....v.....v.....v.....v.....v.....w.....w....Ix.....x.....y.....y....$z....}z.....z....3{....a{....j{....y{.....{.....{.....|....~|.....|....?}.....}.....}....C~.....~.....~....^.............................%.....o......................?................/.....].................T..................................M................d.....p.....s................/.....f........../................M.....q...................................................K...........................*...!...."....$.....%.[...6.............G................<...........N.................J............................W.................2.................2..........7..........?................e.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):350023
                      Entropy (8bit):4.933578519410548
                      Encrypted:false
                      SSDEEP:6144:gb+t+mXs/gyXN2hPgThze8tMCSrS6xJxZvNLPuxy9eHUqfimKJ2zaIxaGhP0Lf0h:gb+t+mXs/gyXN2hPgThze8tMCSrS6xJ4
                      MD5:5EF23EE12E24E62AE4FE9E722B689259
                      SHA1:5634DC4402D120A9DC293F2813FC62A9CE86ABE6
                      SHA-256:6F50AD5D217D719994C9501B75CBA3AA86E6970851854232FDB95D9261685371
                      SHA-512:DB59C80278D06358663B8D95D7140E287C20451DB16820BC4DE96B9708DEAE055A7862BC53C0EC90C6D346637B897ADDD16267258F93BBAB1403277612458561
                      Malicious:false
                      Preview:........y.x.e..p..f..p..z..q..{.$q..|.0q..}.?q..~.Jq....Rq....Wq....dq....jq....yq.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r.....r.... r....!r...."r....$r....Ar....^r....vr....~r.....r.....r...."s....Ps.....s.....s.....s.....s.....s.....t.....t...."t....%t....&t....;t....St.....t.....t....du.....u.....u....|v.....v.....v.....w....&w....Yw....xw.....w.....w.....w.....w.....x....Lx....px.....x.....x.....x....Ky....Ny.....y.....y.....y.....y.....z....6z....Mz.....z.....z.....z.....z.....z.....{....A{....m{.....{.....{.....{.....|....!|....D|....h|....z|.....|.....|.....}....-}....0}....>}....n}.....}.....}.....}.....~....<~....j~.....~.....~.....~....H.....X.......................#.....D.....W.....{...............!...."....$.....%.&...6.C.....k.....v......................*.....n................2...........-.......................!.................G...........=.......................-..........[................P...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):217734
                      Entropy (8bit):5.470127645623535
                      Encrypted:false
                      SSDEEP:3072:eOjG7jgb4q5slPdBT31fF+l6EC8OTdkx3xNQ8wr0n50EyStmstWCRMkD3:42AlFnFVk505CRh
                      MD5:F2D645CD25559F8ADE54D1372F864294
                      SHA1:399D0433975CCFDBE1DA399BA1F742163583812D
                      SHA-256:A2ED13735176895507E6600718A7F2A13689C246950D1D807B1B1F16D64AF2D4
                      SHA-512:7A22F3667EE8B4647D0D0478855609A19F485D71718C93E0E709AB58A286974196389D3705C322C44EC8183EE9045C85186288F6E3645A523443BB9FF34FE0E9
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....r.....r.....r....#r....4r....=r....Rr...._r....er....tr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....#s....ks....ts.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....Nt....Tt.....t.....t.....t.....u....+u....Bu....ju....tu.....u.....u.....u.....u.....u.....u.....u.....u.....v.....v....(v....Kv....iv....lv.....v.....v.....v.....v.....v.....w.....w....6w....>w....Mw....\w....jw.....w.....w.....w.....w.....w.....x....%x..../x....7x....Gx....Xx....jx.....x.....x.....x.....x.....x.....x.....x.....x.....y....'y....>y...._y.....y.....y.....y.....y.....z.....z..../z....<z....kz.....z.....z.....z.....z.....z.....z.....z..!..z.."..z..$..{..%.9{..6.J{....k{....{{.....{.....{.....{.....|.... |....D|....g|.....|.....|..../}.....}....L~.....~.....~..........}...........w.....................".....3.....}......................p......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):467103
                      Entropy (8bit):4.348358277034253
                      Encrypted:false
                      SSDEEP:1536:Poo79qRKoeuKZYg51scNNe7PUxpDD2oAoe/XV0mU0usQInWe/uxFhUKkjNh/H9Z2:ZJqUoeZpNNe7PUxpD8AoKkve5mTrHmJP
                      MD5:F4018FB82D1BAEED446F6DA78836C2DB
                      SHA1:4C86394F38F791C98F5C673F245E71A5DA6B13C0
                      SHA-256:47D52469F70D3B2DFCD2833DC76780C7C9FE493FF2A1E3B962A22F1EF6739D73
                      SHA-512:AB3E6F0DB18AB2760D0D673C4E39FF9D173B6DF134188A7E528942B027176D79582215D5F75C3DA63E1555C6832B05D7A9E901668D34C6B05BCE8552696018E2
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..r..|..r..}.*r..~.5r....=r....Cr....Pr....Vr....er....vr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s....@s....hs.....s.....s.....s....yt.....t.....t.....u....ku.....u.....u.....u.....u.....u.....u.....u.....v....#v.....v.....v....Xw.....w.....x.....x.....x.....x....?y....by.....y.....y.....y.....y.....y.....z....fz.....z.....z....D{....{{.....{....)|....,|.....|.....|.....}....)}....6}....^}.....}.....}.....~....;~....d~.....~.....~....#.....Q.......................O.....e.....t.....................d.....................................F......................M.................#.....y.................#.....h.........../.....{............................,.....o...!....$....%.....6.J......................9.....f...........%.....b................p.....,......................P.....5.....C.....P.....~...........K.....w...........L................0.....x...........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):187941
                      Entropy (8bit):6.716558362521756
                      Encrypted:false
                      SSDEEP:3072:XvMOjTW/jF7r8shBTPknR7wYR7zL8TBnP5mKUUnuRtedHXy1xgCuv9XiPbb5GbD3:E0qZbrj085hUS/v9yjbTm
                      MD5:16AFE92B4A89CAA7B72CDFA2C6F84A1C
                      SHA1:B4AB0A08416A0311978AB39C2D249DC58629F763
                      SHA-256:45386106980158E588FCA97C01490DB78DCA23F62BC5A4F97BBF722671091015
                      SHA-512:C03FD252481F17C432DB0F5456FD22AAE9A0BB6AC56FE6BE013E3FA26E214F8508AA3A9A16214F45912B5603A7F42E73E7B33898C8599C45509B39A3A3649BF8
                      Malicious:false
                      Preview:..........f.e..p..f..p..z..q..{..q..|."q..}.1q..~.<q....Dq....Iq....Qq....Wq....fq....wq.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r.....r.....r....!r....0r....8r....>r.....r.....r.....r.....r.....r.....s.....s.....s.....s....&s....-s....0s....2s....<s....Ls....ys.....s.....s.....s.....s.....t....0t....Bt....ct....ot....{t.....t.....t.....t.....t.....t.....t.....t.....t.....u.....u....2u....Qu....Tu.....u.....u.....u.....u.....u.....u.....u.....v.....v.....v....*v....6v....Sv....ev....rv....~v.....v.....v.....v.....v.....v.....v.....v.....v.....w.....w....&w....,w....2w....8w....Pw...._w....nw.....w.....w.....w.....w.....w.....w.....w.....x....2x....>x....Yx....tx.....x.....x.....x.....x.....x.....x.....x.....y..!..y.."..y..$.Oy..%.dy..6.yy.....y.....y.....y.....y.....y....:z....Xz....zz.....z.....z.....z....>{.....{..../|....\|....q|.....|....b}.....}....y~.....~.....~.....~....4.....M.......................:.....n............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):314448
                      Entropy (8bit):4.991285298549055
                      Encrypted:false
                      SSDEEP:3072:U7Mm7p47Qa9PTdOWZpHuUGHwAIeFfHe/RmowkBEDCSQn6OFD2VxPo9oVA/m4/WPO:U7MPvT5+wezYgxP1jW5yGQauQ
                      MD5:3E292BA6A915EC8B8F2408E71C03425F
                      SHA1:C8F4AE13011061239FBCB837D2E2F84A9E876E3E
                      SHA-256:FF9412B525B65672142841DBEF0F334279B5302CD9712710BDC7143584F8B502
                      SHA-512:8A5F4531FE7AED67CD146FB53772FD5A3FAE9AA24EB4F58DDCDA5AC56FC6FA22FA8FBB824FAF8ABAC992C5C0D24446593DD05FFE106D2C29FBBA0FB5A095C5ED
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..r.....r.....r.....r.... r..../r....@r....Ir....^r....kr....qr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....>s....Fs....Xs.....s.....s.....t....rt.....t.....t.....t.....t.....t.....t.....t.....t.....t.....t.....u....Vu....bu.....u.....v.....v....ev.....v.....v.....v.....v.....w.....w.....w....2w....;w....[w.....w.....w.....w.....x.....x....Jx.....x.....x.....x.....x.....y....(y....5y....]y....yy.....y.....y.....y.....y.....z....Qz....uz.....z.....z.....z.....z.....{....,{....5{....T{....v{.....{.....{.....{.....|.....|.....|...."|....K|....}|.....|.....|.....}....=}....o}.....}.....}.....}.....~....<~....U~.....~.....~..........5.....K.....g...........................!.....".....$.3...%.Y...6.j........................................................K.................*..........V...........)................W.....w................Q.....t..........O..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):228150
                      Entropy (8bit):5.852271382383756
                      Encrypted:false
                      SSDEEP:3072:h0u1E+zXA2mvvaAoXqzyYEP2AEJxMcL815JN1iCvXd4S8QdQiT:Pe+zXARFoXqjAEJql15/vXdX8Qn
                      MD5:469E61806B2AB8FFB9155A03896C8302
                      SHA1:0EC06AA7FCFEADB9390E284F06164A12E44451FD
                      SHA-256:111E13702813038D6359A912B2CA544A1F93F0EA141E71BD97A57A968AA3CB72
                      SHA-512:6FE7EDBBA42198F5253CF1DD3CE077C0AC2B8118D3E00727991DBE70C6BE4ABF34DB3D2AA9595876B09F03D4F639BF431FFACF5AE57F4C8167EC59DB979523F0
                      Malicious:false
                      Preview:..........).e.fq..f.vq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....q.....r.....r....%r....4r....:r....Lr....Tr....Yr....ar....ir....qr....xr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....!s.....s....Gs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s..../t....4t.....t.....t.....t.....u....5u....Qu.....u.....u.....u.....u.....u.....u.....u.....u....#v....>v....Pv....kv.....v.....v.....v.....v.....w.....w....3w....=w....Lw....tw.....w.....w.....w.....w.....w.....w.....x....)x....Ex....Ux....nx....}x.....x.....x.....x.....x.....x.....x.....y.....y....'y....-y....7y....>y....Xy....my.....y.....y.....y.....y.....y.....y.....z..../z....Az....}z.....z.....z.....z.....z.....{.....{.....{....'{....7{....?{....P{..!.w{..".z{..$..{..%..{..6..{.....{.....|....4|....V|....}|.....|.....|.....}....J}....w}.....}.....~.....~....".....Q.......................P................P.....x................D......................X.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):223214
                      Entropy (8bit):5.5135782060956275
                      Encrypted:false
                      SSDEEP:6144:5N/PETPsa2I01Omo19CQDcslwEXw5x/H3tlrH:PMw1bk9CQ9wr5BXtlrH
                      MD5:0E3B31F511B316BFD87C92C5550F1CB7
                      SHA1:4D84CD949704ADAE1B26481C8F8023DE96FF88A6
                      SHA-256:F79F058578BB810C135D34E5B1285299D18CD24F333397997354AD512B6E2667
                      SHA-512:8EF155F67F9D6F2D9A7C7D2293E0F1CDEE7943B3CAD9C39620B5628DECA008D6B86211CDA2132DF68AE9C4615837C9096628A857C0EC9F10E91E35480B14DAE9
                      Malicious:false
                      Preview:..........9.e.Fq..f.Sq..z.aq..{.rq..|.~q..}..q..~..q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r....0r....8r....=r....Er....Mr....Ur....\r....cr....jr....lr....nr....or....pr....rr.....r.....r.....r.....r.....r.....s.....s....&s....Rs....hs....ss.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....Ut.....t.....t.....t.....t....#u....Nu....Wu....iu....ou....tu.....u.....u.....u.....u.....u.....u.....v.....v....0v....Tv....Wv.....v.....v.....v.....v.....v.....v.....w....&w....9w....Nw....Xw....dw.....w.....w.....w.....w.....w.....w.....x.....x.....x..../x....Ax.....x.....x.....x.....x.....x.....x.....x.....y....$y....Ky....ty.....y.....y.....y.....y.....z....&z....\z....mz.....z.....z.....z.....z.....z.....{.....{....1{....5{....B{..!.j{..".m{..$..{..%..{..6..{.....{.....{.....|....'|....F|.....|.....|.....|.....|.....}....[}.....}.....~.....~..........<...........h..................................:.....P.................2.....U...........$.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):199921
                      Entropy (8bit):5.512996301897522
                      Encrypted:false
                      SSDEEP:3072:q+rJbBOAe0l5gXsiXi/1SUjMYn5pB0oYxghNf/NR:3rzOn1XsiXi/1SUjPn5axghNf/b
                      MD5:468578BB57B0616B1FEF43167CEC075C
                      SHA1:6858327C4FBF47B87B14A48CDE7F307BA0BDEF36
                      SHA-256:0244E018424F65654F6181A022AD20D96365C0EB90676DFF01214EEEC24D40F6
                      SHA-512:88B116F7D33CD79916A405E4689BDA2B9D89F803704E8CAFE0475FEE28532D30900B3AA0C5459D1DD79E224682894F6EB70BEFF7B4FCEE68A3D39003180AF803
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r....,r....=r....Fr....[r....hr....nr....}r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s....ps....ys.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t....Vt....\t.....t.....t.....t.....u....1u....Ju....~u.....u.....u.....u.....u.....u.....u.....u.....u.....u.....v.....v.....v....Pv....vv....yv.....v.....v.....v.....v.....v.....w....$w....:w....Fw....Rw....aw....lw.....w.....w.....w.....w.....w.....w.....x.....x.....x.... x..../x....\x....lx....|x.....x.....x.....x.....x.....x.....x.....x.....x.....y.....y....4y....?y....fy....ry.....y.....y.....y.....y.....y.....z....*z....7z....Cz....Qz....[z....nz..!..z.."..z..$..z..%..z..6..z.....{....#{....@{....X{....u{.....{.....{.....|.....|....=|....t|.....|....^}.....}.....}.....~....~~.....~....H.......................'.....`.....~................B.....].............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):423628
                      Entropy (8bit):4.410854948298791
                      Encrypted:false
                      SSDEEP:12288:nkUlwsC82/mg7U0VQsD8hz09X2/IcC94urBN5+s+mJXIOwE3HVnw1pTuzOZt6UfI:g5p
                      MD5:E329D78B773CB1CD5656738AB2D42A10
                      SHA1:2D3872AC3316E2BDFD93A1BDE2AA069E00E4C130
                      SHA-256:F6C15BEAE6EEC5C7946976FABDD3495A38A9BA9ADE90050E80266DFBA3E73EFB
                      SHA-512:0878630DBB89BE504AF1BD6075E016DB9D5EF4085D0F1C4B2A7C13429F2B5C4ED4CB9F23154715DE346B48AC82EB3BDB33A40DB5A7FBF8C5E684F3BB967C1ECE
                      Malicious:false
                      Preview:..........`.e..p..f..q..z.@q..{.Hq..|.Sq..}.bq..~.hq....pq....}q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r....#r....(r....0r....7r....>r....Er....Gr....Ir....Kr....Pr....tr.....r.....r.....r.....s.....s.....s.....s....Kt.....t.....t.....t.....t.....t.....t.....t.....t.....u.....u.....u..../v.....v.....v....Mw....ww.....w....Ix....ax.....x.....x.....x.....x.....y....'y.....y.....y.....y.....z....Gz.....z.....z.....z....B{....u{.....{.....{.....{.....|....-|....f|....x|.....|.....|.....|....2}...._}....~}.....}.....}.....~..../~....J~....\~.....~.....~....%.........................................<.....i......................8.....k......................0.......................&...........................%.....g.....p.........!...."....$....%. ...6.P......................C.....r.....R.....y.................n................B.............................*.....B.....w........... .....P...........H.................................\.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):268987
                      Entropy (8bit):5.7681725023396595
                      Encrypted:false
                      SSDEEP:3072:9vd7LautkPXCK880TPkwj4J1YvNH7aQH75RlHa4ywT9+yhIN9VD:9l7L7tIDdHA539UVD
                      MD5:FB94A46C081766F72924C0234FCB53DA
                      SHA1:73FCF750BB3E9603DD7794E5ACE42C82988EB9E7
                      SHA-256:851F8817E1F85EDD320CFAB4B560E8B468CE4C53BB739E8AFA14997C84F58EEC
                      SHA-512:FCFAE2E9AB0732139B2C6A9431AD272E76A3123E0F924DA6E9D29BF0B1A4321CCB83D3B1941D182F755B081C8D1F0037505EA2BBEB91259953A1CBE327B6DB1F
                      Malicious:false
                      Preview:........~.s.e..p..f..p..z..q..{..q..|..q..}.0q..~.9q....Aq....Vq....cq....iq....xq.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r.....r.....r..../r....Mr....nr....vr....|r.....r.....r.....s....Ys....zs.....s.....s.....s.....s.....s.....s.....s.....s.....s....4t....:t.....t.....u.....u.....u.....u.....u.....u.....u.....v...."v....(v.....v....7v....Rv....vv.....v.....v.....v.....v.....v....#w....&w....~w.....w.....w.....w.....w.....w.....x....9x....Ex....Tx....jx.....x.....x.....x.....x.....y...."y....=y....Oy....Uy....dy....sy.....y.....y.....z....3z....9z....<z....Bz....kz.....z.....z.....z.....{....L{....|{.....{.....{.....{....#|....;|....q|.....|.....|.....|.....}.....}....4}....O}....X}....j}..!..}.."..}..$..}..%..}..6..~....>~....S~....q~.....~.....~.....~..........:.....b.................K.....8.................)...........P..................................p.................|................,.......................V.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):206125
                      Entropy (8bit):5.459225724318129
                      Encrypted:false
                      SSDEEP:3072:sv+HSKUSI0OnoIUnk+2phRSxXHGeN4ZgXWYOW9+h3QQ102aJYhZjkjrc9D+QZGtZ:Kfi057mOXgQlkuLU5kgl2B2hXHwji
                      MD5:A86418F62294A4DB2D45B1DD662300AB
                      SHA1:007552B7890AB9AB3AB59C5DE53C4FA6B2C2F757
                      SHA-256:FDA77C3C1A4D658E3D5DB8940F68BAD017DD79FE30E8430A2C1EADA2D7A504B2
                      SHA-512:E1DC0EDD017FD7554A93FE945B687A6BCF96D4D5516A23F85A665093F8B7721B279446738833384735255A4E5E4FF98D2BCA2B5C7008E509372693D20B286B58
                      Malicious:false
                      Preview:..........G.e.*q..f.Bq..z.Pq..{.aq..|.mq..}.|q..~..q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r....'r....,r....4r....<r....Dr....Kr....Rr....Yr....[r....]r....^r...._r....dr....vr.....r.....r.....r.....r.....r.....r.....s....Ks....ds....ms....us....|s.....s.....s.....s.....s.....s.....s.....s.....s.....t....Mt.....t.....t.....t.....t.....u....4u....Cu....Su....Zu....mu....yu....}u.....u.....u.....u.....u.....u.....v....*v....Mv....Pv....zv.....v.....v.....v.....v.....v.....v.....w.....w.....w....)w....5w....Zw....gw....uw.....w.....w.....w.....w.....w.....w.....w.....x....'x....?x....Cx....Mx....Sx....rx.....x.....x.....x.....x.....y....*y....?y....Ey....hy....py.....y.....y.....y.....y.....z....#z....+z....;z....Gz....Xz....cz....vz..!..z.."..z..$..z..%..z..6..{....${....8{....V{....p{.....{.....{.....{.....|....2|....O|.....|.....|.....}.....}....)~....E~.....~....5...........8.....O............................@......................@.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):226979
                      Entropy (8bit):5.244814813431122
                      Encrypted:false
                      SSDEEP:6144:kySkNsQ3zAzDCPxK12q9SQDQFusZ3X5Fj4:FbsTig1Jc5Fc
                      MD5:E9E9B5738DCC5C64C0564EBEE8CB3F48
                      SHA1:B1368226185F02511862F0795ACFCF9070A555C8
                      SHA-256:F74E56617241F9E6DB3ABA7CDF0E2442F9B048437CEEF7BD401F50F9639EB30D
                      SHA-512:E7D8C13C4932BC7CA5DED567DBE19184AB199A556635A1F94F67948AC4E3AD57B4EA0D658074850B00BBC1574609AD486658A753F344C8B16C372FE53BCED47E
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..r..|..r..}.'r..~.2r....:r....?r....Lr....Rr....ar....rr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s....1s....Gs....Os....Vs.....s.....s.....s.....s.....t.....t.....t....$t....)t....3t....=t....Dt....Gt....Ht....Qt....bt.....t.....t.....t....Bu....Ju.....u.....u.....u.....u.....u.....v.....v.....v....#v....)v....Bv....hv.....v.....v.....v.....v.....v.....w.....w....Nw...._w.....w.....w.....w.....w.....w.....w.....x.....x....'x....6x....Zx....ux.....x.....x.....x.....x.....x.....x.....x.....y....(y....>y.....y.....y.....y.....y.....y.....y.....y.....y.....z....(z....Bz....\z....uz.....z.....z.....z.....z....'{....3{....P{....b{.....{.....{.....{.....{.....{.....{.....|.....|..!.C|..".F|..$.d|..%..|..6..|.....|.....|.....|.....}....$}....u}.....}.....}.....}.....}....3~.....~....V.................-...........!...........;.....Z............................U..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):204927
                      Entropy (8bit):5.3056337895134655
                      Encrypted:false
                      SSDEEP:3072:EmzDLN+3SQWzxKMFVA7UjAj9vCMVS2w5yQWzCUPeBkuNHX8uoo:Emz3Rxhi7IA9vtVq5yLMv
                      MD5:C8A712E9CBD091697903A118F8E4AFE3
                      SHA1:C6E46AF7BA006C96C92312228B294066EB800E96
                      SHA-256:4BEA0031A0115923BAC10AEBE42FB0DCF4A49F54E28A8EE30EDADFD1AF1A7262
                      SHA-512:D20D630A5BC217E692F208DD4479C437797249DB4C87711098D4BB97B57B3E1BB816A230F84EBF01FA6FCA2240352DCC28D1173F5D418A94801B3EEF98177051
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....r.....r.... r....)r....>r....Kr....Qr....`r....fr....xr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....Ns....Ws....ds.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....>t....Et....|t.....t.....t.....t.....u.....u....;u....Fu....Xu....cu....ku.....u.....u.....u.....u.....u.....u.....u.....v....!v....9v....<v....nv....}v.....v.....v.....v.....v.....v.....w.....w...."w....3w....Hw....dw....{w.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x....6x....Hx....Ux....Yx....\x....gx....xx.....x.....x.....x.....x.....x.....y....*y....1y....Ty....fy.....y.....y.....y.....y.....y.....z.....z....$z..../z....Ez....Hz....Tz..!..z.."..z..$..z..%..z..6..z.....z.....{....#{....9{....T{.....{.....{.....{.....|....%|....i|.....|.....}.....}....1~....L~.....~....Q...........u...........................:......................(.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):232209
                      Entropy (8bit):5.673013318446104
                      Encrypted:false
                      SSDEEP:3072:N1g4p3dnyJFPdGm45M83f8uyHEf5N8QxJDKNbP2sCiS86SNZ5nr:N1g4xdyVGm4f3f8uyHE5eHbesCR86S1
                      MD5:C2245554244523776ECA368A82983EE6
                      SHA1:90A51F9DDFC39CF46A4BB40163142E87DC27305D
                      SHA-256:E4BC73B72E21433AC030792508B5C035A691D98A54E1EA9DA6374EAF10136674
                      SHA-512:F73A8A5904B7EC450C06341F89938C38EF296EEAF2C19CA50BE84AF3ED36CC35E8573C83C717CE761D9B85DDC824091C4D5C775FE937A2D3050FCC01C874732D
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....r.....r.....r....#r....4r....=r....Rr...._r....er....tr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....[s....ss.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t..../t....wt....|t.....t....!u....+u....{u.....u.....u.....u.....v.....v....<v....@v....Sv....[v....tv.....v.....v.....v.....v.....w....0w....Vw....Yw.....w.....w.....w.....w.....w.....x....4x....Mx....Vx....dx....rx.....x.....x.....x.....x.....x.....y.....y.....y....5y....>y....Ky....Yy....my.....y.....y.....y.....y.....y.....y.....z....-z....Jz....wz.....z.....z.....z.....{.....{....V{....d{.....{.....{.....{.....{.....{.....|.....|....!|....,|....=|....R|....b|..!..|.."..|..$..|..%..|..6..|.....}.....}....=}....W}....v}.....}.....}....!~....I~....v~.....~....#...........H.................8..........d...........).....t......................c......................W.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):362060
                      Entropy (8bit):4.746047646260602
                      Encrypted:false
                      SSDEEP:6144:KruicIT+sSlYhUiJGh/1KLfnKtAscnR8iJfuRzh151quD2vyCZurvkZN0kN9A5XR:KKicIT+sSlYhUV/QfnKtAtR8iJfuRzrx
                      MD5:60C21DA051795A1CF427D51FF7B8084F
                      SHA1:08F2469E42D76D7CBE03C674FDE9734E46C45F52
                      SHA-256:DE8E1013CFC781D981F2A06ABE714A5A45D76B0E7F55F137EA7785B26E391A8C
                      SHA-512:5100A4721B53795B97C5E7F3E2179335E103A0C32890FFD4EEF2468A9E868DA781B366F9EA3F872F2A96293340135D0F79E55DC84CC8DAC36528FBFE969F13DE
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..r..|..r..}.!r..~.,r....4r....9r....Fr....Lr....[r....lr....ur.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s....+s....Ds....as....is.....s.....s.....t....Mt.....t.....t.....t.....u.....u.....u....Au....Hu....Ku....Lu....]u.....u.....u.....v.....v.....w....0w.....w.....w.... x....kx.....x.....x.....x.....x.....y.....y....Sy.....y.....y.....z....?z....dz.....z.....z.....z....T{.....{.....{.....{.....{.....{....+|....g|....s|.....|.....|.....|.....}....T}....l}.....}.....}.....}....$~....0~....:~....^~.....~.....~.....~..........K.....Q....._.....s.......................K......................@.....V.......................2.....\.....}................7.....T.....j....................!.....".....$.(...%.S...6..................@.....d.................).....R................L...........................0................_.....$.....H...............>.....t.....$................M.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):239622
                      Entropy (8bit):5.4245141548157765
                      Encrypted:false
                      SSDEEP:6144:VjAuaI/A2k2u6uwqVU9nY989vKvIxZxRfWqx0VAW9+XP59pPYXQR4I4KdrwLuFuL:RAnI/A2kD6uwqVUdDZXWqxfW9+f59p4Z
                      MD5:2352A2BB3481EEA03C76A67B8677918E
                      SHA1:03644BD352B256980E9045E20964733D969B877A
                      SHA-256:11857A275941715D519CEFAC3105E906FB97777B712D095844C5F8666DC36C6B
                      SHA-512:17F2CBDEC9775E4BB52360E76A1A5AAAC9D9A2E616D115D5B84F42E86E9DB1A9EBB48F02E1E3E9AF8183707B9A7E85595F36A85C0612CFAD9EE4ED280C320E9A
                      Malicious:false
                      Preview:..........$.e.pq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....*r....7r....=r....Lr....Rr....dr....lr....qr....yr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....Js....Ss....js.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....Gt....Mt.....t.....t.....t.....u....+u....@u....uu.....u.....u.....u.....u.....u.....u.....u.....u.....v....'v....Cv....Uv....yv.....v.....v.....v.....v.....w.... w..../w....Ww....jw.....w.....w.....w.....w.....w.....w.....x....#x....5x....Zx....vx.....x.....x.....x.....x.....x.....y.....y....*y....-y....0y....9y....Qy....cy....ty.....y.....y.....y.....z.....z....'z....Rz....bz.....z.....z.....z.....z.....{....={....O{....Y{....f{....u{.....{.....{..!..{.."..{..$..{..%..|..6..|....9|....N|....m|.....|.....|.....|.....}....#}....L}.....}.....}....<~.....~....^.................,..........p...........9.....q.....................F.......................9.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):231395
                      Entropy (8bit):5.824107146961438
                      Encrypted:false
                      SSDEEP:3072:6md4nFCTBAQo6GJhUbme3GmH1auUjyYEWiiFJDlGv7sWe56BTQgaQNdRNwoqcHCp:3WqCQo691ax+iFJDUu54aQNdUGo
                      MD5:4CCD61EA569CD6F9B8EAA0369C2CE65A
                      SHA1:AE5296BDFCE1D4B057A240EA6CC56E8C09F0F73C
                      SHA-256:E059F6FE26DEC24DB0669589DAD5DA8950E70FAE435AF4F0A042E62C676C0B5E
                      SHA-512:666E8DEC81ADBE65143B496369DC9138E00F588E0A1E9DC18E1AA44154EB4B6E8D51953323E036BD6CA95DE04B86D863D3A7E8DC5325F823AD0AB652B0D375E9
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....r.....r.....r....+r....4r....Ir....Vr....\r....kr....qr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....Ws....`s....zs.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t....#t....nt....vt.....t.....u....&u.....u.....u.....u.....u.....v....&v....+v....6v....Jv....Sv....jv.....v.....v.....v.....v.....v.....w....Kw....Nw.....w.....w.....w.....w.....w.....w.....x.....x....4x....Dx....Rx....gx.....x.....x.....x.....x.....x.....x.....y.....y.....y....,y....=y....vy.....y.....y.....y.....y.....y.....y.....y.....y.....z.....z....Gz....cz....zz.....z.....z.....z.....{.....{....0{....A{....i{.....{.....{.....{.....{.....{.....{.....{..!..|.."..|..$.$|..%.E|..6.V|....{|.....|.....|.....|.....|....E}....l}.....}.....}.....}....B~.....~....q.................0...........U............................/.......................k................).......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):203076
                      Entropy (8bit):5.563952705487345
                      Encrypted:false
                      SSDEEP:3072:RKNjqKfDjJ5onSfwePoc5jnxiVACNRb9+AiL6kr:RKNj1Byc5/IbnK
                      MD5:C4F1EB7FB44AF1B85A13E879BF61CD10
                      SHA1:9890FAE1B62CE2E015980FE14257CE4620BA1565
                      SHA-256:474BDA32DF40405ACCE873FACE0F49804F3FF8719FD8D459312A23A5C82C97A5
                      SHA-512:171D2AB10D2E980A0D4CCEED46EE6F985BAEB2EAE127E00882D01AE06B7BAC6A7E9079B71113D19FBBCCE94D0E794DF6C89E80613CF8379A2CC5025E4B8BED0B
                      Malicious:false
                      Preview:..........#.e.rq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....'r....4r....:r....Ir....Or....ar....ir....nr....vr....~r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....-s....6s....Fs....{s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....ft.....t.....t.....t.....u.....u....=u....Hu....Yu....bu....du....lu....ru.....u.....u.....u.....u.....u.....u.....v....@v....Cv....vv.....v.....v.....v.....v.....v.....v.....w.....w.....w....,w....9w....bw....xw.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....@x....Rx....bx....fx....px....wx.....x.....x.....x.....x.....x...."y....Ey....\y....`y.....y.....y.....y.....y.....y.....y....'z....Fz....Nz....[z....fz....qz....vz.....z..!..z.."..z..$..z..%..z..6..z.....{.....{....-{....@{....X{.....{.....{.....{.....{....&|....c|.....|....w}.....}.....~.....~.....~.....~....`.................&.....9.....q................F..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):216353
                      Entropy (8bit):5.342921719988516
                      Encrypted:false
                      SSDEEP:6144:jTD+tS/iDSjqrRls4185OGT9TnIQptO61owlNCRAMkG3jE+e+4pLlCAxQHAhPw4F:jT/ZdCaJ5jrn
                      MD5:B1AF2EE608BCE8B124401F0F1A8E1719
                      SHA1:264658A45C142E9B429D0CC578247DCFFFFDB612
                      SHA-256:33EE8F8134B149AAD248567FE8E5B220704F7422FC05AA1C9DE72B836C74D52E
                      SHA-512:392B3E416812CCB0628FF54488A46152F7F9C4125570A65E967D35EBAC775CDBEA3827B5144837F4CA18ED7872FAEF669848919201921404D9EEDCDD75445A6C
                      Malicious:false
                      Preview:.......... .e.xq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....,r....9r....?r....Nr....Tr....fr....nr....sr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....6s....?s....Ds.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....;t....Ct.....t.....t.....t.....u....0u....Eu....ku....su.....u.....u.....u.....u.....u.....u.....u.....v.....v....,v....;v....\v....wv....zv.....v.....v.....v.....v.....v....%w....8w....Yw....`w....pw....~w.....w.....w.....w.....w.....w.....x.....x.....x....2x....Gx....]x.....x.....x.....x.....x.....x.....x.....x.....x.....y....'y....Ey....jy.....y.....y.....y.....y.....y.....z....)z....Fz....Tz....~z.....z.....z.....z.....z.....z.....z.....z..!..{.."..{..$.){..%.Q{..6.b{....t{.....{.....{.....{.....{....B|....X|....x|.....|.....|.....}.....}....D~.....~.....~.....~....O...........F...............%.....6.....m......................M.....q...........(.....C.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):183659
                      Entropy (8bit):5.561085260059033
                      Encrypted:false
                      SSDEEP:3072:24f2SWHUO0sOYo6R3/kg6+edPvM89emrtrjEu3ygsyQ/TQF5IEpqcWB5DQ5ZgglX:12Smj0PGilvM89emRrjJ3ygx5iQ5mQ
                      MD5:E06BEE2C069738C1761B1F07A5A65C3E
                      SHA1:06A392F1C7B2081CEED5E498DBCE5FA76955350C
                      SHA-256:0969F4A50FAC5F7F6D5040F3F0CA1016DE578151D1633780FE7D8E3DAA8C29EC
                      SHA-512:02FAEE2B47588B27A82B1C98B8096F3F25A219D3E7CAD11C7EEAF3BD3FB20FE51CE8DB37D4148EABD7891C02E7F4F8C6A8612355C9DEE2D0DD117F553EF6CAE3
                      Malicious:false
                      Preview:............e..q..f..q..z..r..{..r..|.#r..}.2r..~.=r....Er....Jr....Wr....]r....lr....}r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s.....s....'s....6s....Fs....Ns....Us.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t.....t.... t....+t....Pt....Tt.....t.....t.....t.....t.....t.....t.....u.....u....*u.....u....3u....=u....Au....Qu....lu.....u.....u.....u.....u.....u.....u.....u.....v....%v....7v....?v....Lv....wv.....v.....v.....v.....v.....v.....v.....v.....v.....w.....w....2w....Ew....Rw....Vw....\w....lw....}w.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....6x....Kx....bx.....x.....x.....x.....x.....x.....x.....y.....y....Cy....dy....my....vy.....y.....y.....y.....y..!..y.."..y..$..y..%..y..6..z.....z....+z....Az....Rz....hz.....z.....z.....z.....z.....{....J{.....{....<|.....|.....|.....|....2}.....}.....}....c~....|~.....~.....~.....~..........O...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):216276
                      Entropy (8bit):5.559630940550901
                      Encrypted:false
                      SSDEEP:3072:3O6D2IsoAzM7DJ2cvLU0kilu5h9dttJctsmfeudqcRfDJN5MKAXtUDeTDE2bKMMI:+vVQJFNpN5Z9JBK7
                      MD5:DBB5A619E31E3958B7EE5DF2E68A44DA
                      SHA1:A4DC7B9C7A6E2B9C7388A9214A31BD474BC85427
                      SHA-256:728FDADF1773DE85598EDCDA70BF7F88A9A46C67DE01433CEC39B2FF77FF5605
                      SHA-512:68141E5EC9263E7E85122B9BE0C1088C23F752E98F5147B59A2BBAD4FDF6936D9A4BF93439A78723A15F0B7C0AE878914C625618FCD2D28A0FE0CFB7F809DA37
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....r.....r.....r..../r....8r....Mr....Zr....`r....or....ur.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....>s....Gs....ds.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....8t....>t....}t.....t.....t.....u....5u....Nu.....u.....u.....u.....u.....u.....u.....u.....u.....v..../v....Dv....\v....qv.....v.....v.....v.....v.....v.....w....#w....2w....Zw....mw.....w.....w.....w.....w.....w.....w.....w.....x.....x....,x....<x....Nx....Tx....\x....jx....yx.....x.....x.....x.....x.....x.....x.....x.....x.....y....!y....6y....Sy....ty.....y.....y.....y.....y.....y....'z....3z....Iz....Wz....}z.....z.....z.....z.....z.....z.....z.....z..!. {..".#{..$.A{..%.S{..6.l{.....{.....{.....{.....{.....{....>|....Q|....r|.....|.....|.....|....G}.....}....b~.....~.....~....3...........3................!.....4.....r................=.....{............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):225389
                      Entropy (8bit):5.505257892074449
                      Encrypted:false
                      SSDEEP:3072:IQcoF6wsGUu0Qb70gjx/x9DygCSCt/15gpI2tGQ4QbJcPMYA/drSm:GoFBLU3ngjx/xrCSq/151ifV/dGm
                      MD5:657288DC93E6AFEEEC4E561EF672CFF8
                      SHA1:FF3E00C80F6436E257DC36074DE88198EC1F2ABE
                      SHA-256:D4FC7478164A2C9CD60305F75BE644B1F7B80EF8B14CD4A1C34FEC2E9434EB81
                      SHA-512:63CAE8FEEBD0F15313542A888D854429A1B97586628DA9BE4997417172EF60AA5ACF64BC24FC5E1CF1EF09734A82F09F0EFE014D5EE05960A4A209CBDC5845E0
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r....+r....<r....Er....Zr....gr....mr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....as....ls.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t....&t....nt....ut.....t.....u.....u....wu.....u.....u.....u.....u.....u.....v.....v.....v....#v....Ev....qv.....v.....v.....v.....v.....v.....w.....w....Vw....mw.....w.....w.....w.....w.....w.....x.....x....,x....<x....Mx....wx.....x.....x.....x.....x.....x.....y.....y...."y....6y....Ky.....y.....y.....y.....y.....y.....y.....y.....z....5z....`z.....z.....z.....z.....z.....z.....{....){....]{....k{.....{.....{.....{.....{.....{.....|.....|....-|....7|....K|..!.n|..".q|..$..|..%..|..6..|.....|.....|.....}....6}....T}.....}.....}.....}.....}.....~....X~.....~................(.....F...........$.........../.....V.............................j.......................f......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):235681
                      Entropy (8bit):5.683260300897524
                      Encrypted:false
                      SSDEEP:6144:zk+dDn1AjAc4KRNV58f5e1i6r8UAUnmdpEm63ICt:zk4ANX3qf54r8UdJ
                      MD5:83F2BFF36DB68815963734C6F14D2CEA
                      SHA1:F331A6F077191F98E83EB228BDE5DB7F199A028D
                      SHA-256:DB0DD153FABCEC2E31D652807226D5FFBD7C26231ADB0AA5602157500C7E07B8
                      SHA-512:DFA645F7D94EE691BE6BFC4725ACB5E70F8AD14B952C614D2477F23AEEA7BF2BA8B2ED08E202A8CE52D75B1741C98E66A8393E0A3DE83158AD16E879C6BCFFA3
                      Malicious:false
                      Preview:..........0.e.Xq..f.kq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r...."r....(r....7r....=r....Or....Wr....\r....dr....lr....tr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....Js....ds....ys.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t....#t.....t.....t.....t....Vu....\u.....u.....u.....u.....v....+v....Dv....Lv....Tv....iv....ov.....v.....v.....v.....v.....w....'w....Xw.....w.....w.....w.....w.....x.....x.....x....@x...._x....~x.....x.....x.....x.....x.....x.....y.....y....(y....Sy....ky....~y.....y.....y.....y.....y.....y.....z....%z....)z....,z....:z....Tz....qz.....z.....z.....z.....{....5{....N{....X{.....{.....{.....{.....{.....{.....|....6|....]|....l|....||.....|.....|.....|.....|..!..|.."..|..$..}..%.9}..6.J}....v}.....}.....}.....}.....}....B~....W~....y~.....~.....~....B.......................-.....T..........i..................................._.....|..........,.....c................I.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):224402
                      Entropy (8bit):5.78274552802386
                      Encrypted:false
                      SSDEEP:3072:SW0vTUgOZNYr0TbLRSVUhNj2B5ywxCoqsWI4qeDiVFUgG:iYw0TbLUUGB5D34rOV5G
                      MD5:92A70E7431A2D76F54070F86F99BCDFD
                      SHA1:E4F4D94A77104902E859B4D0C99CEFB85B29AFB6
                      SHA-256:DA0DD276248E46C375A09A308A266F8708917B5BA6FBB0EE245FBB988EBAB785
                      SHA-512:B595026998417A12579A13E6B1F6B510F364019AD0C84A94FDBE065FBEF07307683F0AD3FF6EAC6DD1C8CD22ECFE4F83C8DB4808A5ECB66A58D4CF782AAA2AD9
                      Malicious:false
                      Preview:............e.~q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r.... r....5r....Br....Hr....Wr....]r....or....wr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....7s....Gs....Ls.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....<t....Bt.....t.....t.....t....1u....Nu....iu.....u.....u.....u.....u.....u.....u.....u.....v....2v....Kv....Zv....tv.....v.....v.....v.....v.....w....#w....=w....Hw....Ww.....w.....w.....w.....w.....w.....w.....w.....x.... x....+x....:x....Sx....dx....zx.....x.....x.....x.....x.....x.....x.....x.....x.....y.....y....!y....6y....Ky....gy.....y.....y.....y.....y.....y.....y.....z....Az....Lz....lz....yz.....z.....z.....z.....z.....z.....z.....{.....{..!.9{..".<{..$.Z{..%.r{..6..{.....{.....{.....{.....{.....|....Z|....y|.....|.....|.....|....3}.....}....<~.....~.....~.....~....^...........K...............J.....a.......................w......................o.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):225809
                      Entropy (8bit):6.151758551187087
                      Encrypted:false
                      SSDEEP:6144:iXQhmsrJJrJg+bpvzJIv7Ocw2WP9mS4+FjbeS5V7I0ktyWS1o:iPGJJrWW11FjiS5V7I0Jfo
                      MD5:A25BCD561EB7DA40B12E4670D751D8E4
                      SHA1:A2D08F3185307D9F589CCD408E97386F213BBE47
                      SHA-256:AE0A82BA25B8DE9CC46576AE22A23D2B42D44D80D885FAD801BE3C86F4A5A23D
                      SHA-512:9C8FA113A1B70D51B41C525CB85FA9449B136C2F685E33EC34B581597A90DFE2C166304F0C66F5C14C8D6A5079584FB19A06F68DFB8C0C5E21B4695AAF5D7122
                      Malicious:false
                      Preview:........q...e..p..f..p..z..p..{..p..|..p..}..q..~..q.....q.....q...."q....(q....7q....Hq....Qq....fq....uq....{q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r...."r....tr.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s.....s.....t....]t....ft.....t.....t.....u....0u....<u....Ou....Ru....Xu....nu....wu.....u.....u.....u.....u.....u.....v.... v....Pv....Sv.....v.....v.....v.....v.....v.....v.....w....9w....Ew....Rw....bw....|w.....w.....w.....w.....w.....w.....w.....x.....x.....x....!x....8x....Ex.....x.....x.....x.....x.....x.....x.....x.....x.....y....(y....Iy....my.....y.....y.....y.....y.....y....8z....Ez....oz.....z.....z.....z.....z.....{.....{....0{....3{....={..!.d{..".g{..$..{..%..{..6..{.....{.....|.....|....4|....Q|.....|.....|.....|....<}....e}.....}.....~............................d..........a................K.....`................7............................t.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):207909
                      Entropy (8bit):5.390864473189282
                      Encrypted:false
                      SSDEEP:3072:82WRm1BTt2BslQbZsdVaSGSZEaxA3AkB5765io9jOTcmvDCj/BxtVPf1VhsEHwU:9BToVbZ1OEaxeAs654DsBlftsEHwU
                      MD5:26E9CF4B3B1F71DAE9FB80A9385788FD
                      SHA1:C69053EB376ACC5B0EF5DA56EE3823E02D43DA8F
                      SHA-256:6A1A13FFA37FD6492E2F0196256DDE55887EF28BA40E76D68CD7EB6BC574E454
                      SHA-512:15A9799FE8FCB74A60BD4F252BDE5FCC8B67DA74A537D857BA1B0FC2A9B4074F080DE2C1E6098DE8442C8158CD6847DA2D432EFB6F08FC95A54D7BEB6FC0191B
                      Malicious:false
                      Preview:..........".e.tq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....(r....5r....;r....Jr....Pr....br....jr....or....wr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....3s....As....\s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....)t....3t....lt.....t.....t.....t.....t.....u....'u....1u....Iu....Ou....Uu....gu....ou.....u.....u.....u.....u.....u.....u.....v....6v....9v....nv.....v.....v.....v.....v.....v.....v.....w...."w.....w....Aw....Vw....yw.....w.....w.....w.....w.....w.....w.....w.....w.....x....*x....7x....bx....vx.....x.....x.....x.....x.....x.....x.....x.....x.....y....Ay....ay.....y.....y.....y.....y.....y.....z....$z....9z....pz.....z.....z.....z.....z.....z.....z.....z..!..{.."..{..$.2{..%.D{..6.d{.....{.....{.....{.....{.....{....2|....F|....n|.....|.....|.....}....`}.....~....s~.....~.....~....L...........1......................'.....k................9.....m.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):444053
                      Entropy (8bit):4.408507955539081
                      Encrypted:false
                      SSDEEP:3072:wTh2M/eMLT76lSsHQBKpTU7CWiSK35IZ0PxwXg/VdLJN45vTKDGTu+HaOvy4PGyp:sUPxae59Sxf
                      MD5:79886060308CA116D2E8916E1682B828
                      SHA1:DDDEA4D8E41D1CCCCCBCF47D93AE7327E5F27F81
                      SHA-256:D67B61F99067479B2492AAE7F204EA0B1CE54359A21DBD685202FBF22503FA89
                      SHA-512:41F813711F46800A9DBAA3650AAD99D1E9797AE8A8BF44EB432D47856B0FE3989641A81A799F196D577497B952CD938E667B62FA7C85CC89EF08AB02B705ED80
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..r..|..r..}.+r..~.6r....>r....Cr....Pr....Vr....er....vr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s....;s....fs.....s.....s.....s....]t....st.....t.....u....Eu....^u....wu.....u.....u.....u.....u.....u.....u.....u.....v.....v.....v....5w.....w.....w....hx.....x.....x....]y.....y.....y.....y.....y.....y.....y.....z....fz.....z.....z.....{....5{.....{.....{.....{....8|....[|....}|.....|.....|.....|.....}....I}.....}.....}.....}.....~....7~....m~.....~.....~..........8.....g.....z.............................y................................$.....e......................c.......................g.................,.....o.................t..................................:...!.....".....$.....%.....6.3............................T...........".....e.......................j...............I...........i.....i.....j................W.................U.................'.....Y.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):219947
                      Entropy (8bit):5.444769650764855
                      Encrypted:false
                      SSDEEP:3072:G/sbWJWCaxECTD27vx69Lew6Fi9MN4AaJak7/Tmzork56EDusYGew1K4AwI6:G/sbTXZmJhl4i5aW9
                      MD5:8B0BD3C98ADD6936EB5739C025A87C5F
                      SHA1:4A8C91DA0A65D097523680A441150238F865CD42
                      SHA-256:369FB57C64066AAC72AB8A5EA44CFE87E83A25A0A9B8C66299D4D372E637C46D
                      SHA-512:75B7461BE36D2976D7BA9EE51D4296F58792232A52CC96974CE6B5F5E27C9FDCBD9FD0FFFEBECD381B722B5B15EFA310D6CD7F0369C50602433182BF8E143A17
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r....-r....>r....Gr....\r....ir....or....~r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....*s....xs.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t....(t....ft....nt.....t.....t.....t....(u....<u....Pu....xu.....u.....u.....u.....u.....u.....u.....u.....u.....v....)v....@v....Pv....sv.....v.....v.....v.....v.....v.....w.....w....=w....Lw....fw....lw....zw.....w.....w.....w.....w.....w.....w.....x....*x....?x....Ix....Qx....bx....tx.....x.....x.....x.....x.....x.....x.....x.....y.....y....(y....Fy....gy.....y.....y.....y.....y.....y.....y....3z....=z....Wz....fz.....z.....z.....z.....z.....z.....z.....z.....{..!.*{..".-{..$.K{..%.b{..6.y{.....{.....{.....{.....{.....|....M|....h|.....|.....|.....|....(}.....}....B~.....~.....~..........x...........d................A.....\......................h..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):251195
                      Entropy (8bit):5.842471403251654
                      Encrypted:false
                      SSDEEP:6144:w6T4OXy7dxS0Dd9vu+k+i9L2Y5QtoHt5QGjklbWEOPqVj:XtiZxS0Dd9vu+kJLf5QKHt5QGjkMEOPU
                      MD5:A826B1FDCA25AA1392E1ADBBA22FEC72
                      SHA1:4565EEA2710E134D23A3069E88A6CA17FECFFC50
                      SHA-256:16E0F57947E9E85DB7EC15B498DA7774BC407695C1787EA9D7D253A257F51772
                      SHA-512:11C3F22E14F5C1DC22241C33DA1887F01DEBCE0740A99E55CF18DE4FD1CFF38AAFD29C5DAAFFFB1AB3454232EF9724DC14F5A1CB91C13B3E16CC598F932ABBBB
                      Malicious:false
                      Preview:..........J.e.$q..f.?q..z.Uq..{.oq..|.{q..}..q..~..q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r....-r....5r....:r....Br....Jr....Rr....Yr....`r....gr....ir....kr....lr....mr....or.....r.....r.....r.....r.....r.....s....&s....Os.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....Et....Ot.....t.....t.....t....#u....>u....Pu.....u.....u.....u.....u.....u.....u.....u.....u....6v....Rv....ev.....v.....v.....v.....v.....v..../w....Ew....dw....ow....|w.....w.....w.....w.....w.....w.....x....7x....gx....~x.....x.....x.....x.....x.....x.....x.....x.....y.....y.....y....Uy....fy.....y.....y.....y.....y.....y.....y.....y.....z...."z....Hz....ez.....z.....z.....z.....z....3{....@{....`{....w{.....{.....{.....|.....|.....|..../|....;|....T|..!.z|..".}|..$..|..%..|..6..|.....|.....}....9}....T}....t}.....}.....}.....~....S~.....~.....~....I.....&............................V...........................6.....}.................d................0.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):338848
                      Entropy (8bit):4.851876545753932
                      Encrypted:false
                      SSDEEP:6144:E9gJs/G+maclHGts1Y3lwwl2aa3oUvoLF54+ldFR22qFdxk1TY2:4gJ0mHbkIo554YF9Qrka2
                      MD5:7DD73ADF36B7079AA327A6BD1EE7B6D1
                      SHA1:C2A021E9F3366E24555CC33F8AC2672866490BD4
                      SHA-256:77D9D4E89A645F9129CCE7DC2A354CF2BC8CF33EA33DB366FC5DD7B687664F98
                      SHA-512:4B462320C2FE748D7D82DDCBA6740BBA4DAB92941629C270680D51154167668E2399D93BB960D0446A519BADACC22650A32BA81088D974F509D9C303B48715A9
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..r..~..r.....r...."r..../r....5r....Dr....Ur....^r....sr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....<s....as....is.....s.....s.....t..../t.....t.....t.....t.....t.....u.....u....%u....,u..../u....0u....?u....Uu.....u.....u.....v.....w.....w.....w.....w.....x....^x....wx.....x.....x.....x.....x.....x.....y....dy.....y.....y.....y.....y.....z...._z....bz.....z.....z.....{.....{....){....Q{....u{.....{.....{.....{.....{.....|....:|....h|.....|.....|.....|.....|.....}.....}....*}....R}....{}.....}.....}.....~....'~....1~....A~....M~....l~.....~.....~.....~..........O.............................,..................................V.....z...............................!.=...".@...$.^...%.|...6.......................=.....`................5.....p...........%...........................................S.....&.....V.................=.....{.......................9.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):456292
                      Entropy (8bit):4.386274822814938
                      Encrypted:false
                      SSDEEP:3072:bpowQ7yue2BXC/Zbf/ELsw3kw3m1sqDYeg3zR6Yo/dvbDGTDxf49jjJm3KH0I0Ux:tnSyue2FA5NQbO
                      MD5:E9A7BC6DFA4016BDA1A4FAADD0A96086
                      SHA1:C8A34F234DDBEF70E289F86E261383D605E44042
                      SHA-256:AF7C37EDD3EAFBCE6698E270070CFA55B3975D0D87D2336AB09626A9FFA458E4
                      SHA-512:DDACF9D5CF2ADBC5A008584816A3FDC77DD824CDF83B65CD002F4E3415BEBC017F3998D80D9743BADAFCFF5950181ED03B5F75D0BFFFFDD949F9812EB961BF19
                      Malicious:false
                      Preview:..........&.e.lq..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r.....r....?r....Hr....]r....jr....pr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.... s....Ks....cs....xs.....t....*t....Lt.....t.....t.....u....&u....Wu....mu.....u.....u.....u.....u.....u.....u....ov....{v....(w.....w.....w.....x.....x.....x....%y....Ey....sy....|y.....y.....y.....y.....z....hz.....z.....z....<{....p{.....{.....|....1|.....|.....|.....|.....}....&}....N}....}}.....}.....}.....~....(~....^~.....~..........(.....X.............................1.....\.................I.....q..................................Q......................h.......................g.................(.....k.................\.....r............................$...!.j...".m...$.....%....6.1................#.....c...........u.................Z...........[.....B...............j..................................+..................................y....._...........D.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):498318
                      Entropy (8bit):4.342452283625557
                      Encrypted:false
                      SSDEEP:12288:zfPZEGTOygsqpSVtBh1PvlPQYtyFybF5eAyL68lyIwpKqO2WQeGDi5kEXwygMWb9:y6B5v
                      MD5:ED0BB1F4E9CB2B0782F06EFA2221CDB1
                      SHA1:5C8478DDC1DC1AA44E1E570EB4AC9B05144766DB
                      SHA-256:2624A61E13FFB04F5A173B6A81CA95B2CC3B6B5C0CB0CE0E3CD1D768AC0E733D
                      SHA-512:6E1437FB355A993BB77011805768EF0362B65839D9F0BD1999BEE61BC78E61BA1B37266E52101EB13525C1D25335DBDB583543D3E4774928E79F371E39A86BB9
                      Malicious:false
                      Preview:............e..q..f..q..z. r..{.:r..|.Fr..}.Ur..~.`r....hr....mr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s....$s....+s....2s....4s....6s....7s....8s....=s....ts.....s.....s.....s.....t.....t.....t.....u.....u.....u.....v....?v....fv....~v.....v.....v.....v.....v.....v.....v.....w.....w.....w....lx....+y....Fy.....z....Pz.....z.....{....:{....l{....x{.....{.....{.....{.....|.....|.....|.....}....[}.....}.....~....^~....a~.....~....;.............................!.....P.....l................*.....................3......................1.....M.....x................]................................\................S.................Z................N......................F.....v...........S..................................F...!.....".....$....%.#...6.Z......................U...........a......................^.................@.....?.......... ...........0.....I.................\...........&.....o.....-...........u.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):396704
                      Entropy (8bit):4.83331055085311
                      Encrypted:false
                      SSDEEP:12288:vtdNk+4kykh2Mtd01s/Ea23D0VhyGHu59tqMnRxOLZi6gai7zhC11l5ICOXFIsD5:fNkItd01ta23oV7u59tTRxOJwC11l5IX
                      MD5:7D54147BD7CE0E3289CD2C68EF3395A9
                      SHA1:A6AD275CECACA42ECF86C9A21404BB32F2CC5B54
                      SHA-256:5384AADD68F14A95260E4364EFE1B46E7D6BA60D47A298B2FE92F71705F754E8
                      SHA-512:657E11B9616CE37A4A8C2E0A9AAE056E9E6CBFE2B42DBB50AD173600FA65EB4F9B419620963CF4B952588BFEFEE24F5FA56DDE67A8A322715F7B321CF27D35CB
                      Malicious:false
                      Preview:..........).e.fq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r.....r....2r....?r....Er....Tr....Zr....lr....tr....yr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....4s....<s....Ps.....s.....t....8t.....t.....t.....t.....u.....u....,u....Au....Hu....Ku....Lu...._u....wu.....v.....v.....v....=w....Mw.....w....#x....]x.....x.....x.....y....5y....Hy....ky....yy.....y.....y....-z....Rz....yz.....z.....z.....{.... {.....{.....{.....|.....|....*|....R|.....|.....|.....|.....|....5}....L}.....}.....}.....}.....~....S~....y~.....~.....~.....~.....~.....~..............................................8.....j................+............................`......................7.....\................'.....F.....W.....s...............!.....".....$.....%.B...6..................?.....a...........(.....S................0............................(.....e.....N.....E.....?.....P.....~................z...........U..........\...........1.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):201815
                      Entropy (8bit):5.46126547477217
                      Encrypted:false
                      SSDEEP:3072:nBp5oFyhlAutrESpOhLDJ1mbm8LkWH9/Mp0QoFIgRIZN9MzabYEqL5uNmK3evFvy:e8hlAeOhLD6y+/Ag6s885Rxgyi
                      MD5:D25FAFBF9671D948C510F4FEDD257703
                      SHA1:695CBF02A8649012CFECE3AA7953A2415792BB05
                      SHA-256:A59966AE8E08A47491D2DCBB35B4FF2E149064D28794496566991DDEDE4D50DE
                      SHA-512:4E8875770975B3E13D255F392A34E709E798CCE5AE6A9FE97898CB980E4246C159CD426A60B67260A160B63951967E77C38AB32A85C649B067BA48543C74FB61
                      Malicious:false
                      Preview:..........&.e.lq..f.zq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....#r....0r....6r....Er....Kr....]r....er....jr....rr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....$s....3s....hs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....At....rt....vt.....t.....t.....t.....u.....u....>u....Pu....Tu...._u....du....uu.....u.....u.....u.....u.....u.....v....*v....-v....|v.....v.....v.....v.....v.....v.....v.....w.....w....#w....4w....@w....lw.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....Jx....Zx....gx....kx....vx....{x.....x.....x.....x.....x.....x.....y....)y....>y....Fy....cy....py.....y.....y.....y.....y.....y.....z.....z....&z....0z....<z....Az....Jz..!.dz..".gz..$..z..%..z..6..z.....z.....z.....z.....{.....{....x{.....{.....{.....{.....{..../|.....|....(}.....}.....}.....}....4~.....~..................................B.....[.................1.....P.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):317594
                      Entropy (8bit):5.10869358128791
                      Encrypted:false
                      SSDEEP:6144:4P8SoTXyDFZyOrsWgsw+fc7K6PY3B+bL3CSINN2Dl8thiYA39J+eRUZFanoaLe9C:3SoTXyDFZyOrsWgsw+fc7K6PY3B+bL3h
                      MD5:74CB66F8ED8C4E708A687F8B6E018ABC
                      SHA1:0F577813CB11FF371057FD5AA027CEB5D51645D8
                      SHA-256:ABE333527DC0A9FD5F8B4E534DB191EF74F4E9F015A40D49FC36BC71895AF66C
                      SHA-512:DACDC6F395AD395740CE9782253D2E20B2715789833960BA0647F6B4BC005E171B58966F510ED22F1421E32BD46286CCED796D3D150859C64657B340082DDFEE
                      Malicious:false
                      Preview:..........-.e.^q..f.oq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....%r....+r....:r....@r....Rr....Zr...._r....gr....or....wr....~r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....t....0t....At....Rt....`t....ht....yt.....t.....t.....t.....t.....t.....u.....u.....u.....u.....v.....v.....v.....v.....v.....w....-w....5w....Aw....Xw....dw.....w.....w.....w.....x....1x....Fx....ux.....x.....x.....x.....y....Gy....Zy....gy.....y.....y.....y.....y.....y.....z....Fz....zz.....z.....z.....z.....{....+{....H{....P{....c{....z{.....{.....{.....|....+|....1|....@|....F|....t|.....|.....|.....|.....}....I}....y}.....}.....}.....}.....~....V~....s~.....~.....~.....~....+.....G.....V.....p.....................!.....".....$.....%.&...6.J.....z.............................................4.....d..........6.....X...........j...........Z.....+......................w.................0...........9................?..........R.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):217133
                      Entropy (8bit):5.652922536901471
                      Encrypted:false
                      SSDEEP:3072:Jh5lLqW6cgLSiK4QpBpwR9vYpYxuTlLBoRzAKRDV2gj7KeY/SoYLmWhyNbCOGuAy:JnlG64xcFiDD0rVUC5N+WwjBaVR
                      MD5:7001302D34D2D8AEB43C8B380C74F089
                      SHA1:DC66D589B57F3014AE6866B3A26BD5232C49F117
                      SHA-256:0B83FE0ED8412905860E4F1B3B0C720E122C4C93DD8B983F52B87F8C69D86316
                      SHA-512:C9B7741CD28C774DC9F383BB7326F960A4A5D5DEDBA2EFB7E308DF51B30FCB2C3478DFD032C1899DE5EA237A3722FB51D6F1EE49B376D7774302D5C55C2C5504
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r....*r....;r....Dr....Yr....fr....lr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.... s....+s.....s.....s.....s.....s.....s.....t.....t.... t....%t..../t....9t....@t....Ct....Dt....Lt....[t.....t.....t.....t....%u....+u....su.....u.....u.....u.....u.....u.....u.....u.....v.....v....*v....Jv....iv....uv.....v.....v.....v.....v.....v....,w....;w....Rw....Xw....ew.....w.....w.....w.....w.....w.....w.....w....)x....Ax....Vx....bx.....x.....x.....x.....x.....x.....x.....x.....x....%y....2y....Gy....Iy....Ly....Sy....jy....~y.....y.....y.....y.....y.....y...."z.....z....ez....sz.....z.....z.....z.....z.....{....4{....C{....O{....Z{....j{....u{.....{..!..{.."..{..$..{..%..{..6..|....$|....6|....V|....m|.....|.....|.....|.....}..../}....T}.....}.....}.....~....$.....q.................z.................................'.....M.................H.....h.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):224140
                      Entropy (8bit):5.38629246177027
                      Encrypted:false
                      SSDEEP:3072:TisIMkLhkBHBPr/uWC+sCYRhHyN05MwSboIkjq89d22IX:LIklO+sCYB5kk+8PnO
                      MD5:D546D7722A37BA055AB8A33B682B8A19
                      SHA1:9D8939DACFEB9830D46EFBE94E84F476337198D4
                      SHA-256:2FB12F93C3811E8C4F1A01472F1F0B4992F7A11889A3F64ED73E867F30BBA46D
                      SHA-512:1F3D830308FE94CB4FA5FF02F9B83790A723F46024222EA7128AAA7F7D77E0A59F2CB6A7F8888A34810560D46D647EE677EE6668A00328CD9C9F83A31DA6570A
                      Malicious:false
                      Preview:..........(.e.hq..f.vq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....$r....*r....9r....?r....Qr....Yr....^r....fr....nr....vr....}r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....>s....Xs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....gt....mt.....t.....u.....u....Vu....qu.....u.....u.....u.....u.....u.....v.....v.....v....7v....]v....{v.....v.....v.....v.....v.....v.....v....,w....:w....\w....gw....tw.....w.....w.....w.....w.....w.....w.....x....*x....Cx....Sx....cx.....x.....x.....x.....x.....x.....x.....x....(y....>y....Sy....Yy....\y....by....yy.....y.....y.....y.....z....)z....Rz....jz....rz.....z.....z.....z.....z.....{.....{....D{....k{....v{.....{.....{.....{.....{.....{..!..{.."..{..$..|..%..|..6.5|....V|....n|.....|.....|.....|.....}....)}....I}....p}.....}.....}....T~..........j................./...........)......................".....T.....q................@....._.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):224643
                      Entropy (8bit):5.445680785101466
                      Encrypted:false
                      SSDEEP:6144:qmC+iU+EnqTq5qkANvso2KJcg4bq3c//EXWLuwevLbUL0WTEuei3oqgRBtry2Wm2:qmpiU+EnqTq5qkANvso2Kag4bq3c//Em
                      MD5:77F47CE82E5BFC2200C7ABB88B267123
                      SHA1:088C5D7137E70687F78B3252DB7134A6C219334C
                      SHA-256:B3B2F1AF10CE9290A4C5A6C7A4799643A91B0A020771BA6715BA2B7E90F9B79B
                      SHA-512:61605A0E99D0CB5AAA0E94143A212EFC71AAF7ECC92BA48C6B6B767E2CFBAF0910B9A94B8941D07A6DB14EE41D97AD3A57B3B219FC8D02B75AF8A180ECD3D15A
                      Malicious:false
                      Preview:..........$.e.pq..f.}q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....*r....0r....?r....Er....Wr...._r....dr....lr....tr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....Hs....Qs....ls.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....Nt....Tt.....t.....t.....t.....u....<u...._u.....u.....u.....u.....u.....u.....u.....u.....u....&v....Bv....Wv....sv.....v.....v.....v.....v.....v.....w.....w....)w....5w....]w....uw.....w.....w.....w.....w.....w.....w.....x....'x....7x....Ux....px.....x.....x.....x.....x.....x.....x.....y.....y.....y.....y....2y....Hy....^y.....y.....y.....y.....y.....y.....y.....z....#z....Yz....mz.....z.....z.....z.....z.....z.....{.....{....*{....5{....K{..!.p{..".s{..$..{..%..{..6..{.....|.....|....8|....U|....w|.....|.....|.....|.....}....O}.....}.....}.....~.....~..........C...........W.................................B.....f.................2.....R.................0.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):187627
                      Entropy (8bit):6.712972688208396
                      Encrypted:false
                      SSDEEP:3072:sWrFe6IpoOJ5ndB4cp5nTYdbQvJYJE2Jv5B/ggdScSVzwUPlg:NrFjKTdB465nTYd82y2Jv5nSwUPlg
                      MD5:07D6A14B26C86D6023D32CD877FAC744
                      SHA1:C5AF1D0B9D21439C1BEE049DABB545713585D245
                      SHA-256:607F193B40D40637CB730F55ED6B30DCF084DBD3597BC14A18A9F778BA2F7A67
                      SHA-512:CA6504C069692516C70305BFEEC764BF4F8478605FD3B3EBA9AACC4504F2BA6E0784C4EB15DD27ADB717CAB02A0CC17CFBF98F3056516159DD99E0443C62E639
                      Malicious:false
                      Preview:..........U.e..q..f..q..z./q..{.7q..|.:q..}.Iq..~.Pq....Xq....^q....cq....iq....xq.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r.....r.....r.....r....$r....-r....9r....Kr....Sr....Yr.....r.....r.....r....$s....6s....?s....Hs....Ns....Ts....is....us....|s.....s.....s.....s.....s.....s.....s.....t....:t....@t.....t.....t.....t.....t.....t.....t.....t.....t.....t.....u.....u....$u....3u....?u....Wu....cu....~u.....u.....u.....u.....u.....v.....v.....v....Dv....Yv....qv....wv.....v.....v.....v.....v.....v.....v.....v.....w...."w.....w....4w....:w....Fw....^w....jw.....w.....w.....w.....w.....w.....w.....w.....w.....x....!x....9x....Qx....ix.....x.....x.....x.....x.....x.....y.....y....;y...._y....}y.....y.....y.....y.....y.....y.....y..!..y.."..y..$..z..%."z..6.7z....Lz....[z....zz.....z.....z.....z.....{....2{....S{....x{.....{.....{.....|.....|....$}....9}.....}.....~.....~..........'.....`.....o.......................J.....o...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):231033
                      Entropy (8bit):5.661877708000655
                      Encrypted:false
                      SSDEEP:3072:NM1yOzb1gUgZJA//5sV7X4evi1IXA2Jp5hGv2ykobcyK/rDbiT:NdYSnLAJsV7X4ewIXA2Jp5w5cyK/HbiT
                      MD5:A95048F767306A131B876DF74CF55348
                      SHA1:3067ED001A6380C65479EF0FECD02D1161A0D5D9
                      SHA-256:1D99DF3B2E361DFF299AF3536EB878407779CE881F6D94079518BF887795D794
                      SHA-512:F1854324B83E74DE089A224E74E5CCFED45ED2ABBA66B0232C5019318F7B56BFFBA14647B7F102BD5052A0DDCEC3259BB9DF67EEAD04BC1811E144EDB305F01C
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....r.....r.....r....)r....2r....Gr....Tr....Zr....ir....or.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t....%t....,t..../t....0t....7t....It.....t.....t.....t....%u....0u.....u.....u.....u.....v.....v.....v....$v....'v....7v....Bv....Xv....}v.....v.....v.....v.....v.....w....5w....8w....nw....~w.....w.....w.....w.....w.....w.....x.....x.....x....-x....?x....gx....yx.....x.....x.....x.....x.....x.....x.....x.....y.....y....1y....hy....yy.....y.....y.....y.....y.....y.....y.....y.....y.....z....'z....<z...._z....kz.....z.....z.....z.....{.....{....){....f{.....{.....{.....{.....{.....{.....{.....{..!..|.."..|..$.4|..%.U|..6.x|.....|.....|.....|.....|.....}....v}.....}.....}.....}.....~....H~.....~....T.................0...........C..........`.....................$.....B.................R.....q.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):268510
                      Entropy (8bit):4.785497032257121
                      Encrypted:false
                      SSDEEP:6144:U77RbYzciXNSza7/dprJms+IRj3ESnB5DmeY6VfKliMr5KRszk6P5Z1XTp98BcIG:UfRUzTOcdprJpGeY6VfKliMr5Sm/P5ZJ
                      MD5:64E7FDCD09ABD5E14521F6E49FD2436A
                      SHA1:DB8D47BB41E4DABBD5BF09154A22B4B97D727C60
                      SHA-256:CDD6702FFD3F9F96650E38A29B7F4105D50CABE6EC13C68C276AA85B9C36CF5E
                      SHA-512:E13A96E7B0169258F2E88A93E33BB828BCFF69EF3BD563743C8A7E05A74A541B594B913F33FFA972F4AE8E20338340603D6D381A73867CB9525DE314AA638A70
                      Malicious:false
                      Preview:..........%.e.nq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r....#r....8r....Er....Kr....Zr....`r....rr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....t.....t.....t....!t....)t....Bt....It....Lt....Mt....Vt....dt.....t.....t.....u....|u.....u.....u.....u.....v....Sv....sv.....v.....v.....v.....v.....v.....v.....w....3w....Kw....aw....ww.....w.....w.....w....#x....4x....Rx....]x....jx.....x.....x.....x.....x.....x.....y....%y....gy.....y.....y.....y.....y.....y.....z.....z.....z....4z....Jz....[z.....z.....z.....z.....z.....z.....{..../{....T{....p{.....{.....{.....{....0|....X|....b|.....|.....|.....|.....|.....}....6}.....}.....}.....}.....}.....}.....}.....~.... ~..!.Q~..".T~..$.r~..%..~..6..~.....~.....~.....~..........=.......................&.....b...........@..................................%...........b.......................A.....`...........4.....x............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):450943
                      Entropy (8bit):4.381637861237146
                      Encrypted:false
                      SSDEEP:3072:M5bangqDb8QUJhfcG+P74L24G1aWQ57ZSZhHJm3qbtfev/DYtY0JsBcu8WWwP95o:morKx5/iWUK95RNZm
                      MD5:F242E8272DB35E1174B498BBB0AA4949
                      SHA1:FE40C221CAFC6C234F7BE145F17261812E260E3E
                      SHA-256:6F863F60AB41B9803333D576300D82790D4F52BE4C6994E56D5733F167310E4C
                      SHA-512:4D5BC907974A5A0DF435AA69BA32A3FFD98634340278194E8A0AF7AC5E1BE0FEFFB6B07A4190C2FA7CB81E9518CDB02A995879D88465FFA0D9547CB98BD84BC3
                      Malicious:false
                      Preview:..........!.e.vq..f..q..z..q..{..q..|..q..}..r..~..r.....r.....r....)r..../r....>r....Or....Xr....mr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....0s....Os....Ws....ls.....s.....t....(t.....t.....t.....u.....u....>u....Qu....gu....nu....qu....su.....u.....u....9v....Hv.....v....{w.....w....7x...._x....{x.....x.....x.....y.....y....'y....Py....Yy.....y.....y.....z....Mz.....z.....z....*{....k{....n{.....{.....|....7|....[|....h|.....|.....|.....|.....}....N}.....}.....}.....}....-~....R~....x~.....~.....~..........9.....O.....n.................3.....U........................................9......................_.......................@....................../......................5.....X.....u...............!.....".....$.-...%.x...6...................W..................................2.....}................8.....L..........9.................3.....s.................C.....................v..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):204754
                      Entropy (8bit):5.500689134913278
                      Encrypted:false
                      SSDEEP:3072:JvYdEBSgwsdr5cxflnTiwVppfyC1STfkwYt1vq5XomQqXiJ/gIdWiPJt:+dERL95cRlWwVpsxTfkwWvq5JXihg8j
                      MD5:6C623AE0860CCC782FC004667C78EE78
                      SHA1:77B4F676C50758AD040777F608B3D7F26CAD466E
                      SHA-256:EE304BE73B9E06BC2B01AA76266D88BD0B24D8F3ED1FD28E61E165BBCD4C03FE
                      SHA-512:C4EFC7568A8AD9392CA4255745E5EE1603171FD14FA4AE054B6794B3BAE32846F9C3DF8F200F9E8FD62DD72A72D841F9537054A3D079842AE416AF1A644462A1
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r....$r....9r....Fr....Lr....[r....ar....sr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....6s....=s....Ls....|s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....Vt.....t.....t.....t.....t.....u....%u..../u....>u....Cu....Eu....Vu....\u....ju.....u.....u.....u.....u.....u.....u.....v.....v....Tv....cv....vv.....v.....v.....v.....v.....v.....v.....v.....w.....w....<w....Mw....]w....nw.....w.....w.....w.....w.....w.....w.....w.....x....#x....1x....5x....?x....Dx....^x....ux.....x.....x.....x.....x.....x.....y.....y....&y....9y....iy....ry.....y.....y.....y.....y.....y.....z.....z.....z.....z....!z..!.<z..".?z..$.]z..%.sz..6..z.....z.....z.....z.....z.....z....0{....E{....g{.....{.....{.....{....E|.....|....J}....x}.....}.....~.....~..................................6.....R....................../.....k......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):210980
                      Entropy (8bit):5.403462777984611
                      Encrypted:false
                      SSDEEP:3072:AqzfhjF+zM2r4zhP+/mg3gfRPj56kZlJhkB0+a+57ErutVnhQ8HuvZSx1EzrQ5Z3:AqjU+tXjV52JVIl5c
                      MD5:34BB7A19B695FC9CD97E3BFE644A6BB0
                      SHA1:7EE6F12579417783F42915BA45DD46C3554C8584
                      SHA-256:93196BE4F6B6B055CF8CDCD715E04DB564644657B5C73A84ACA9BCAA5C89F3BB
                      SHA-512:FFB689D62D79AD0B1FADCD6B0E428A636C0288B939CB6F58405ED366F019D8F5D16032B46F0F9E05A66C3241D4AD71B150A1A99A2AD0C18A6C6DE5C9AE8FFBF9
                      Malicious:false
                      Preview:..........).e.fq..f.vq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....(r.....r....=r....Cr....Ur....]r....br....jr....rr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....(s....:s....cs....ws.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....!t....[t.....t.....t.....t.....t.....u....:u....Gu....Wu...._u....cu....ru....vu.....u.....u.....u.....u.....v.....v..../v....Mv....Pv.....v.....v.....v.....v.....v.....v.....v.....w.....w.....w....@w....Mw....jw.....w.....w.....w.....w.....w.....w.....w.....x.....x....&x....ex....zx.....x.....x.....x.....x.....x.....x.....x.....y....&y....Ey....gy....~y.....y.....y.....y.....y.....z.....z....8z...._z.....z.....z.....z.....z.....z.....z.....z..!..z.."..z..$..{..%./{..6.@{....d{....q{.....{.....{.....{.....{.....|.....|....M|....t|.....|.....}.....}.....~....S~....q~.....~....P...........T.....t............................m......................L.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):217553
                      Entropy (8bit):5.53804443382047
                      Encrypted:false
                      SSDEEP:6144:4/779HdmXitfnovjMuqyusCN75QUkrxGTTXM3qH:4/f9HctrGZN75qrxGTTXM3qH
                      MD5:E63DEBB39B36C53F318BED0F2596C47B
                      SHA1:1DC350C9D19F73B6B8167E5D659975E43309CB01
                      SHA-256:2A758503DF99441DF673212CFBC9CF15F6B5DD459346264DDA98EDB09D609946
                      SHA-512:2455285CB96E883B6D599B55ACE36A53B8AA43ECD731E813598E028B85DDC96C705009284D9343B14D1BCBDA17560F33A2EBF8B5ECE8C90C995303B1FDB5A5CD
                      Malicious:false
                      Preview:..........'.e.jq..f.xq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....'r....-r....<r....Br....Tr....\r....ar....ir....qr....yr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....*s....Bs....xs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....ht.....t.....t.....t.... u....Au....|u.....u.....u.....u.....u.....u.....u.....u.....u.....v....)v....Av....Sv....wv.....v.....v.....v.....v.....w.....w.....w....Dw....bw....zw.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....0x....8x....Ax....Px....dx....sx.....x.....x.....x.....x.....x.....x.....x.....y.....y....7y....Vy....sy.....y.....y.....y.....y.....z..../z....>z....Uz....hz.....z.....z.....z.....z.....z.....z.....z.....{..!.${..".'{..$.E{..%.Y{..6.}{.....{.....{.....{.....{.....{....,|....C|....c|.....|.....|.....|....>}.....}....M~.....~.....~............................................%.....F................5.....S.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):315053
                      Entropy (8bit):5.04027414754181
                      Encrypted:false
                      SSDEEP:6144:4iG17Hwc74d3vPk7s27Hk5RN3q80DInjy:4iGFHv4d3Xus27E5RN3q80DInjy
                      MD5:7F1598C653AAA2879ECC1CC20CD9F515
                      SHA1:10A2D8A72E0986962F6AD544EA1C6042FCEEF402
                      SHA-256:A41AB9FC62228F7670EE4671D1B076DB59B07663A60519559207D22C4CDD4A04
                      SHA-512:FDDF3976E8263DF6AC128BE43393F42B3C7C8D114381512752E5845BED0B538717A63CDE33A8FB2649568D34CBDAAD7A7A5049F60D35C1F072936294C07A76F6
                      Malicious:false
                      Preview:........../.e.Zq..f.uq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....,r....9r....?r....Nr....Tr....fr....nr....sr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.... s....0s.....s.....s.....s....)t....[t....et....ot....}t.....t.....t.....t.....t.....t.....t.....u....<u.....u.....u.....u....Uv....uv.....v.....v.....w....8w....Uw....[w....{w.....w.....w.....w.....x.....x....=x....Zx.....x.....x.....x.....x.....y....4y....Ey....Ry....zy.....y.....y.....y.....y.....y.....z....Kz....iz.....z.....z.....z.....z.....z.....z.....{.....{....4{.....{.....{.....{.....{.....{.....{.....|....5|....W|.....|.....|.....|.....}....=}....M}.....}.....}.....}.....~....2~....T~.....~.....~.....~.....~..........3.....E.....b...!.....".....$.....%.....6.............,.....].....s.......................K.....y.................p.....P................U................u.....).....U......................@.................a................`.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):216353
                      Entropy (8bit):5.342921719988516
                      Encrypted:false
                      SSDEEP:6144:jTD+tS/iDSjqrRls4185OGT9TnIQptO61owlNCRAMkG3jE+e+4pLlCAxQHAhPw4F:jT/ZdCaJ5jrn
                      MD5:B1AF2EE608BCE8B124401F0F1A8E1719
                      SHA1:264658A45C142E9B429D0CC578247DCFFFFDB612
                      SHA-256:33EE8F8134B149AAD248567FE8E5B220704F7422FC05AA1C9DE72B836C74D52E
                      SHA-512:392B3E416812CCB0628FF54488A46152F7F9C4125570A65E967D35EBAC775CDBEA3827B5144837F4CA18ED7872FAEF669848919201921404D9EEDCDD75445A6C
                      Malicious:false
                      Preview:.......... .e.xq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....,r....9r....?r....Nr....Tr....fr....nr....sr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....6s....?s....Ds.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....;t....Ct.....t.....t.....t.....u....0u....Eu....ku....su.....u.....u.....u.....u.....u.....u.....u.....v.....v....,v....;v....\v....wv....zv.....v.....v.....v.....v.....v....%w....8w....Yw....`w....pw....~w.....w.....w.....w.....w.....w.....x.....x.....x....2x....Gx....]x.....x.....x.....x.....x.....x.....x.....x.....x.....y....'y....Ey....jy.....y.....y.....y.....y.....y.....z....)z....Fz....Tz....~z.....z.....z.....z.....z.....z.....z.....z..!..{.."..{..$.){..%.Q{..6.b{....t{.....{.....{.....{.....{....B|....X|....x|.....|.....|.....}.....}....D~.....~.....~.....~....O...........F...............%.....6.....m......................M.....q...........(.....C.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):268987
                      Entropy (8bit):5.7681725023396595
                      Encrypted:false
                      SSDEEP:3072:9vd7LautkPXCK880TPkwj4J1YvNH7aQH75RlHa4ywT9+yhIN9VD:9l7L7tIDdHA539UVD
                      MD5:FB94A46C081766F72924C0234FCB53DA
                      SHA1:73FCF750BB3E9603DD7794E5ACE42C82988EB9E7
                      SHA-256:851F8817E1F85EDD320CFAB4B560E8B468CE4C53BB739E8AFA14997C84F58EEC
                      SHA-512:FCFAE2E9AB0732139B2C6A9431AD272E76A3123E0F924DA6E9D29BF0B1A4321CCB83D3B1941D182F755B081C8D1F0037505EA2BBEB91259953A1CBE327B6DB1F
                      Malicious:false
                      Preview:........~.s.e..p..f..p..z..q..{..q..|..q..}.0q..~.9q....Aq....Vq....cq....iq....xq.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r.....r.....r..../r....Mr....nr....vr....|r.....r.....r.....s....Ys....zs.....s.....s.....s.....s.....s.....s.....s.....s.....s....4t....:t.....t.....u.....u.....u.....u.....u.....u.....u.....v...."v....(v.....v....7v....Rv....vv.....v.....v.....v.....v.....v....#w....&w....~w.....w.....w.....w.....w.....w.....x....9x....Ex....Tx....jx.....x.....x.....x.....x.....y...."y....=y....Oy....Uy....dy....sy.....y.....y.....z....3z....9z....<z....Bz....kz.....z.....z.....z.....{....L{....|{.....{.....{.....{....#|....;|....q|.....|.....|.....|.....}.....}....4}....O}....X}....j}..!..}.."..}..$..}..%..}..6..~....>~....S~....q~.....~.....~.....~..........:.....b.................K.....8.................)...........P..................................p.................|................,.......................V.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):517629
                      Entropy (8bit):4.296049476630076
                      Encrypted:false
                      SSDEEP:6144:rXx/1Ymoa0fcT8CfEGE0q2Y6d9H6kUumRvCpQpYRpRziu31wxlkQc7fc5xldyckB:rB/pTO67ol15dnn0
                      MD5:A125F1889817658C5C2687EE8F9F321D
                      SHA1:E35B08389A40DBDE5E03A963F89393D645F8352F
                      SHA-256:BD3A3E1CAD20C2681F3B2E0C3C0425CD023D6C116B4BDE5692EBCB54C64B25CB
                      SHA-512:6B39F061B1611914C59093B090F6139037083F3029545CDBC54AB96B478433E52A7F05FCDE618102FA2E5711BEA6FDBCD6F12A98D98AE70A8179F4068050A78F
                      Malicious:false
                      Preview:............e..q..f..q..z..r..{..r..|.&r..}.5r..~.@r....Hr....Mr....Zr....`r....or.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s.....s....Ts.....s.....s.....s.....s.....t.....t.....u.....u.....u.....v....$v....Bv....Zv....vv....}v.....v.....v.....v.....v...._w....nw.....x.....x.....x....Ly....wy.....y.....y.....z....Az....Ez....Wz.....z.....z.....z....D{.....{.....{.....|....F|.....|.....|.....|....~}.....}.....}.....~....*~....R~.....~.....~.....~....>.....|...........&.....h................4.....q...........................(................1.....@.....C.....a................1................R.................'................./.....\................P......................1.....Q.....f.........!.!...".$...$.B...%.....6......?.....Z................?...........I................3..................................d.....Q.....P.....R.....~..........._...........A...........8...........a...........d.....Z.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):225809
                      Entropy (8bit):6.151758551187087
                      Encrypted:false
                      SSDEEP:6144:iXQhmsrJJrJg+bpvzJIv7Ocw2WP9mS4+FjbeS5V7I0ktyWS1o:iPGJJrWW11FjiS5V7I0Jfo
                      MD5:A25BCD561EB7DA40B12E4670D751D8E4
                      SHA1:A2D08F3185307D9F589CCD408E97386F213BBE47
                      SHA-256:AE0A82BA25B8DE9CC46576AE22A23D2B42D44D80D885FAD801BE3C86F4A5A23D
                      SHA-512:9C8FA113A1B70D51B41C525CB85FA9449B136C2F685E33EC34B581597A90DFE2C166304F0C66F5C14C8D6A5079584FB19A06F68DFB8C0C5E21B4695AAF5D7122
                      Malicious:false
                      Preview:........q...e..p..f..p..z..p..{..p..|..p..}..q..~..q.....q.....q...."q....(q....7q....Hq....Qq....fq....uq....{q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r...."r....tr.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s.....s.....t....]t....ft.....t.....t.....u....0u....<u....Ou....Ru....Xu....nu....wu.....u.....u.....u.....u.....u.....v.... v....Pv....Sv.....v.....v.....v.....v.....v.....v.....w....9w....Ew....Rw....bw....|w.....w.....w.....w.....w.....w.....w.....x.....x.....x....!x....8x....Ex.....x.....x.....x.....x.....x.....x.....x.....x.....y....(y....Iy....my.....y.....y.....y.....y.....y....8z....Ez....oz.....z.....z.....z.....z.....{.....{....0{....3{....={..!.d{..".g{..$..{..%..{..6..{.....{.....|.....|....4|....Q|.....|.....|.....|....<}....e}.....}.....~............................d..........a................K.....`................7............................t.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):232209
                      Entropy (8bit):5.673013318446104
                      Encrypted:false
                      SSDEEP:3072:N1g4p3dnyJFPdGm45M83f8uyHEf5N8QxJDKNbP2sCiS86SNZ5nr:N1g4xdyVGm4f3f8uyHE5eHbesCR86S1
                      MD5:C2245554244523776ECA368A82983EE6
                      SHA1:90A51F9DDFC39CF46A4BB40163142E87DC27305D
                      SHA-256:E4BC73B72E21433AC030792508B5C035A691D98A54E1EA9DA6374EAF10136674
                      SHA-512:F73A8A5904B7EC450C06341F89938C38EF296EEAF2C19CA50BE84AF3ED36CC35E8573C83C717CE761D9B85DDC824091C4D5C775FE937A2D3050FCC01C874732D
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....r.....r.....r....#r....4r....=r....Rr...._r....er....tr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....[s....ss.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t..../t....wt....|t.....t....!u....+u....{u.....u.....u.....u.....v.....v....<v....@v....Sv....[v....tv.....v.....v.....v.....v.....w....0w....Vw....Yw.....w.....w.....w.....w.....w.....x....4x....Mx....Vx....dx....rx.....x.....x.....x.....x.....x.....y.....y.....y....5y....>y....Ky....Yy....my.....y.....y.....y.....y.....y.....y.....z....-z....Jz....wz.....z.....z.....z.....{.....{....V{....d{.....{.....{.....{.....{.....{.....|.....|....!|....,|....=|....R|....b|..!..|.."..|..$..|..%..|..6..|.....}.....}....=}....W}....v}.....}.....}....!~....I~....v~.....~....#...........H.................8..........d...........).....t......................c......................W.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):231033
                      Entropy (8bit):5.661877708000655
                      Encrypted:false
                      SSDEEP:3072:NM1yOzb1gUgZJA//5sV7X4evi1IXA2Jp5hGv2ykobcyK/rDbiT:NdYSnLAJsV7X4ewIXA2Jp5w5cyK/HbiT
                      MD5:A95048F767306A131B876DF74CF55348
                      SHA1:3067ED001A6380C65479EF0FECD02D1161A0D5D9
                      SHA-256:1D99DF3B2E361DFF299AF3536EB878407779CE881F6D94079518BF887795D794
                      SHA-512:F1854324B83E74DE089A224E74E5CCFED45ED2ABBA66B0232C5019318F7B56BFFBA14647B7F102BD5052A0DDCEC3259BB9DF67EEAD04BC1811E144EDB305F01C
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....r.....r.....r....)r....2r....Gr....Tr....Zr....ir....or.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t....%t....,t..../t....0t....7t....It.....t.....t.....t....%u....0u.....u.....u.....u.....v.....v.....v....$v....'v....7v....Bv....Xv....}v.....v.....v.....v.....v.....w....5w....8w....nw....~w.....w.....w.....w.....w.....w.....x.....x.....x....-x....?x....gx....yx.....x.....x.....x.....x.....x.....x.....x.....y.....y....1y....hy....yy.....y.....y.....y.....y.....y.....y.....y.....y.....z....'z....<z...._z....kz.....z.....z.....z.....{.....{....){....f{.....{.....{.....{.....{.....{.....{.....{..!..|.."..|..$.4|..%.U|..6.x|.....|.....|.....|.....|.....}....v}.....}.....}.....}.....~....H~.....~....T.................0...........C..........`.....................$.....B.................R.....q.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):556723
                      Entropy (8bit):4.332819496156418
                      Encrypted:false
                      SSDEEP:3072:uaq181+cmRmwaaNGlsp1lCnvCOW6xfHcFXaX2Bd2zeaAfDD51zYrJCdJSKcG84:u6mRrNGlsDa8FCHKDD5oKcG84
                      MD5:3EBDFD0AB9999B5AD515EB052DFDC577
                      SHA1:F4573147E170409DFA1551393F87F396D1E02D3B
                      SHA-256:CDFB4B55F697311BA2E81BCE89C9E4F1E1592D54D9BBEED23122013A3FA2F8E3
                      SHA-512:D35B186F0C7E225A27A081DF288EFBCE988C449510613E5955DF7BDA45905B76B97A7864A250C60CA5C5796963DA413194C697CBB074689C7E1F441E1F98C85B
                      Malicious:false
                      Preview:............e..q..f..q..z.!r..{.2r..|.>r..}.Mr..~.Xr....`r....er....rr....xr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s....#s....*s....,s.....s..../s....0s....5s....ls.....s.....s.....s.....t.....t.....u....+u.....u.....u.....v....2v...._v....zv.....v.....v.....v.....v.....v.....v.....w.....w....Ix.....x.....y.....y....$z....}z.....z....3{....a{....j{....y{.....{.....{.....|....~|.....|....?}.....}.....}....C~.....~.....~....^.............................%.....o......................?................/.....].................T..................................M................d.....p.....s................/.....f........../................M.....q...................................................K...........................*...!...."....$.....%.[...6.............G................<...........N.................J............................W.................2.................2..........7..........?................e.............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):450943
                      Entropy (8bit):4.381637861237146
                      Encrypted:false
                      SSDEEP:3072:M5bangqDb8QUJhfcG+P74L24G1aWQ57ZSZhHJm3qbtfev/DYtY0JsBcu8WWwP95o:morKx5/iWUK95RNZm
                      MD5:F242E8272DB35E1174B498BBB0AA4949
                      SHA1:FE40C221CAFC6C234F7BE145F17261812E260E3E
                      SHA-256:6F863F60AB41B9803333D576300D82790D4F52BE4C6994E56D5733F167310E4C
                      SHA-512:4D5BC907974A5A0DF435AA69BA32A3FFD98634340278194E8A0AF7AC5E1BE0FEFFB6B07A4190C2FA7CB81E9518CDB02A995879D88465FFA0D9547CB98BD84BC3
                      Malicious:false
                      Preview:..........!.e.vq..f..q..z..q..{..q..|..q..}..r..~..r.....r.....r....)r..../r....>r....Or....Xr....mr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....0s....Os....Ws....ls.....s.....t....(t.....t.....t.....u.....u....>u....Qu....gu....nu....qu....su.....u.....u....9v....Hv.....v....{w.....w....7x...._x....{x.....x.....x.....y.....y....'y....Py....Yy.....y.....y.....z....Mz.....z.....z....*{....k{....n{.....{.....|....7|....[|....h|.....|.....|.....|.....}....N}.....}.....}.....}....-~....R~....x~.....~.....~..........9.....O.....n.................3.....U........................................9......................_.......................@....................../......................5.....X.....u...............!.....".....$.-...%.x...6...................W..................................2.....}................8.....L..........9.................3.....s.................C.....................v..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):204927
                      Entropy (8bit):5.3056337895134655
                      Encrypted:false
                      SSDEEP:3072:EmzDLN+3SQWzxKMFVA7UjAj9vCMVS2w5yQWzCUPeBkuNHX8uoo:Emz3Rxhi7IA9vtVq5yLMv
                      MD5:C8A712E9CBD091697903A118F8E4AFE3
                      SHA1:C6E46AF7BA006C96C92312228B294066EB800E96
                      SHA-256:4BEA0031A0115923BAC10AEBE42FB0DCF4A49F54E28A8EE30EDADFD1AF1A7262
                      SHA-512:D20D630A5BC217E692F208DD4479C437797249DB4C87711098D4BB97B57B3E1BB816A230F84EBF01FA6FCA2240352DCC28D1173F5D418A94801B3EEF98177051
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....r.....r.... r....)r....>r....Kr....Qr....`r....fr....xr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....Ns....Ws....ds.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....>t....Et....|t.....t.....t.....t.....u.....u....;u....Fu....Xu....cu....ku.....u.....u.....u.....u.....u.....u.....u.....v....!v....9v....<v....nv....}v.....v.....v.....v.....v.....v.....w.....w...."w....3w....Hw....dw....{w.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x....6x....Hx....Ux....Yx....\x....gx....xx.....x.....x.....x.....x.....x.....y....*y....1y....Ty....fy.....y.....y.....y.....y.....y.....z.....z....$z..../z....Ez....Hz....Tz..!..z.."..z..$..z..%..z..6..z.....z.....{....#{....9{....T{.....{.....{.....{.....|....%|....i|.....|.....}.....}....1~....L~.....~....Q...........u...........................:......................(.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):201815
                      Entropy (8bit):5.46126547477217
                      Encrypted:false
                      SSDEEP:3072:nBp5oFyhlAutrESpOhLDJ1mbm8LkWH9/Mp0QoFIgRIZN9MzabYEqL5uNmK3evFvy:e8hlAeOhLD6y+/Ag6s885Rxgyi
                      MD5:D25FAFBF9671D948C510F4FEDD257703
                      SHA1:695CBF02A8649012CFECE3AA7953A2415792BB05
                      SHA-256:A59966AE8E08A47491D2DCBB35B4FF2E149064D28794496566991DDEDE4D50DE
                      SHA-512:4E8875770975B3E13D255F392A34E709E798CCE5AE6A9FE97898CB980E4246C159CD426A60B67260A160B63951967E77C38AB32A85C649B067BA48543C74FB61
                      Malicious:false
                      Preview:..........&.e.lq..f.zq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....#r....0r....6r....Er....Kr....]r....er....jr....rr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....$s....3s....hs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....At....rt....vt.....t.....t.....t.....u.....u....>u....Pu....Tu...._u....du....uu.....u.....u.....u.....u.....u.....v....*v....-v....|v.....v.....v.....v.....v.....v.....v.....w.....w....#w....4w....@w....lw.....w.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....Jx....Zx....gx....kx....vx....{x.....x.....x.....x.....x.....x.....y....)y....>y....Fy....cy....py.....y.....y.....y.....y.....y.....z.....z....&z....0z....<z....Az....Jz..!.dz..".gz..$..z..%..z..6..z.....z.....z.....z.....{.....{....x{.....{.....{.....{.....{..../|.....|....(}.....}.....}.....}....4~.....~..................................B.....[.................1.....P.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):210980
                      Entropy (8bit):5.403462777984611
                      Encrypted:false
                      SSDEEP:3072:AqzfhjF+zM2r4zhP+/mg3gfRPj56kZlJhkB0+a+57ErutVnhQ8HuvZSx1EzrQ5Z3:AqjU+tXjV52JVIl5c
                      MD5:34BB7A19B695FC9CD97E3BFE644A6BB0
                      SHA1:7EE6F12579417783F42915BA45DD46C3554C8584
                      SHA-256:93196BE4F6B6B055CF8CDCD715E04DB564644657B5C73A84ACA9BCAA5C89F3BB
                      SHA-512:FFB689D62D79AD0B1FADCD6B0E428A636C0288B939CB6F58405ED366F019D8F5D16032B46F0F9E05A66C3241D4AD71B150A1A99A2AD0C18A6C6DE5C9AE8FFBF9
                      Malicious:false
                      Preview:..........).e.fq..f.vq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....(r.....r....=r....Cr....Ur....]r....br....jr....rr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....(s....:s....cs....ws.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....!t....[t.....t.....t.....t.....t.....u....:u....Gu....Wu...._u....cu....ru....vu.....u.....u.....u.....u.....v.....v..../v....Mv....Pv.....v.....v.....v.....v.....v.....v.....v.....w.....w.....w....@w....Mw....jw.....w.....w.....w.....w.....w.....w.....w.....x.....x....&x....ex....zx.....x.....x.....x.....x.....x.....x.....x.....y....&y....Ey....gy....~y.....y.....y.....y.....y.....z.....z....8z...._z.....z.....z.....z.....z.....z.....z.....z..!..z.."..z..$..{..%./{..6.@{....d{....q{.....{.....{.....{.....{.....|.....|....M|....t|.....|.....}.....}.....~....S~....q~.....~....P...........T.....t............................m......................L.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):224402
                      Entropy (8bit):5.78274552802386
                      Encrypted:false
                      SSDEEP:3072:SW0vTUgOZNYr0TbLRSVUhNj2B5ywxCoqsWI4qeDiVFUgG:iYw0TbLUUGB5D34rOV5G
                      MD5:92A70E7431A2D76F54070F86F99BCDFD
                      SHA1:E4F4D94A77104902E859B4D0C99CEFB85B29AFB6
                      SHA-256:DA0DD276248E46C375A09A308A266F8708917B5BA6FBB0EE245FBB988EBAB785
                      SHA-512:B595026998417A12579A13E6B1F6B510F364019AD0C84A94FDBE065FBEF07307683F0AD3FF6EAC6DD1C8CD22ECFE4F83C8DB4808A5ECB66A58D4CF782AAA2AD9
                      Malicious:false
                      Preview:............e.~q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r.... r....5r....Br....Hr....Wr....]r....or....wr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....7s....Gs....Ls.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....<t....Bt.....t.....t.....t....1u....Nu....iu.....u.....u.....u.....u.....u.....u.....u.....v....2v....Kv....Zv....tv.....v.....v.....v.....v.....w....#w....=w....Hw....Ww.....w.....w.....w.....w.....w.....w.....w.....x.... x....+x....:x....Sx....dx....zx.....x.....x.....x.....x.....x.....x.....x.....x.....y.....y....!y....6y....Ky....gy.....y.....y.....y.....y.....y.....y.....z....Az....Lz....lz....yz.....z.....z.....z.....z.....z.....z.....{.....{..!.9{..".<{..$.Z{..%.r{..6..{.....{.....{.....{.....{.....|....Z|....y|.....|.....|.....|....3}.....}....<~.....~.....~.....~....^...........K...............J.....a.......................w......................o.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):217734
                      Entropy (8bit):5.470127645623535
                      Encrypted:false
                      SSDEEP:3072:eOjG7jgb4q5slPdBT31fF+l6EC8OTdkx3xNQ8wr0n50EyStmstWCRMkD3:42AlFnFVk505CRh
                      MD5:F2D645CD25559F8ADE54D1372F864294
                      SHA1:399D0433975CCFDBE1DA399BA1F742163583812D
                      SHA-256:A2ED13735176895507E6600718A7F2A13689C246950D1D807B1B1F16D64AF2D4
                      SHA-512:7A22F3667EE8B4647D0D0478855609A19F485D71718C93E0E709AB58A286974196389D3705C322C44EC8183EE9045C85186288F6E3645A523443BB9FF34FE0E9
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....r.....r.....r....#r....4r....=r....Rr...._r....er....tr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....#s....ks....ts.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....Nt....Tt.....t.....t.....t.....u....+u....Bu....ju....tu.....u.....u.....u.....u.....u.....u.....u.....u.....v.....v....(v....Kv....iv....lv.....v.....v.....v.....v.....v.....w.....w....6w....>w....Mw....\w....jw.....w.....w.....w.....w.....w.....x....%x..../x....7x....Gx....Xx....jx.....x.....x.....x.....x.....x.....x.....x.....x.....y....'y....>y...._y.....y.....y.....y.....y.....z.....z..../z....<z....kz.....z.....z.....z.....z.....z.....z.....z..!..z.."..z..$..{..%.9{..6.J{....k{....{{.....{.....{.....{.....|.... |....D|....g|.....|.....|..../}.....}....L~.....~.....~..........}...........w.....................".....3.....}......................p......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):219947
                      Entropy (8bit):5.444769650764855
                      Encrypted:false
                      SSDEEP:3072:G/sbWJWCaxECTD27vx69Lew6Fi9MN4AaJak7/Tmzork56EDusYGew1K4AwI6:G/sbTXZmJhl4i5aW9
                      MD5:8B0BD3C98ADD6936EB5739C025A87C5F
                      SHA1:4A8C91DA0A65D097523680A441150238F865CD42
                      SHA-256:369FB57C64066AAC72AB8A5EA44CFE87E83A25A0A9B8C66299D4D372E637C46D
                      SHA-512:75B7461BE36D2976D7BA9EE51D4296F58792232A52CC96974CE6B5F5E27C9FDCBD9FD0FFFEBECD381B722B5B15EFA310D6CD7F0369C50602433182BF8E143A17
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r....-r....>r....Gr....\r....ir....or....~r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....*s....xs.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t....(t....ft....nt.....t.....t.....t....(u....<u....Pu....xu.....u.....u.....u.....u.....u.....u.....u.....u.....v....)v....@v....Pv....sv.....v.....v.....v.....v.....v.....w.....w....=w....Lw....fw....lw....zw.....w.....w.....w.....w.....w.....w.....x....*x....?x....Ix....Qx....bx....tx.....x.....x.....x.....x.....x.....x.....x.....y.....y....(y....Fy....gy.....y.....y.....y.....y.....y.....y....3z....=z....Wz....fz.....z.....z.....z.....z.....z.....z.....z.....{..!.*{..".-{..$.K{..%.b{..6.y{.....{.....{.....{.....{.....|....M|....h|.....|.....|.....|....(}.....}....B~.....~.....~..........x...........d................A.....\......................h..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):225389
                      Entropy (8bit):5.505257892074449
                      Encrypted:false
                      SSDEEP:3072:IQcoF6wsGUu0Qb70gjx/x9DygCSCt/15gpI2tGQ4QbJcPMYA/drSm:GoFBLU3ngjx/xrCSq/151ifV/dGm
                      MD5:657288DC93E6AFEEEC4E561EF672CFF8
                      SHA1:FF3E00C80F6436E257DC36074DE88198EC1F2ABE
                      SHA-256:D4FC7478164A2C9CD60305F75BE644B1F7B80EF8B14CD4A1C34FEC2E9434EB81
                      SHA-512:63CAE8FEEBD0F15313542A888D854429A1B97586628DA9BE4997417172EF60AA5ACF64BC24FC5E1CF1EF09734A82F09F0EFE014D5EE05960A4A209CBDC5845E0
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r....+r....<r....Er....Zr....gr....mr....|r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s....as....ls.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t.....t....&t....nt....ut.....t.....u.....u....wu.....u.....u.....u.....u.....u.....v.....v.....v....#v....Ev....qv.....v.....v.....v.....v.....v.....w.....w....Vw....mw.....w.....w.....w.....w.....w.....x.....x....,x....<x....Mx....wx.....x.....x.....x.....x.....x.....y.....y...."y....6y....Ky.....y.....y.....y.....y.....y.....y.....y.....z....5z....`z.....z.....z.....z.....z.....z.....{....){....]{....k{.....{.....{.....{.....{.....{.....|.....|....-|....7|....K|..!.n|..".q|..$..|..%..|..6..|.....|.....|.....}....6}....T}.....}.....}.....}.....}.....~....X~.....~................(.....F...........$.........../.....V.............................j.......................f......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):350023
                      Entropy (8bit):4.933578519410548
                      Encrypted:false
                      SSDEEP:6144:gb+t+mXs/gyXN2hPgThze8tMCSrS6xJxZvNLPuxy9eHUqfimKJ2zaIxaGhP0Lf0h:gb+t+mXs/gyXN2hPgThze8tMCSrS6xJ4
                      MD5:5EF23EE12E24E62AE4FE9E722B689259
                      SHA1:5634DC4402D120A9DC293F2813FC62A9CE86ABE6
                      SHA-256:6F50AD5D217D719994C9501B75CBA3AA86E6970851854232FDB95D9261685371
                      SHA-512:DB59C80278D06358663B8D95D7140E287C20451DB16820BC4DE96B9708DEAE055A7862BC53C0EC90C6D346637B897ADDD16267258F93BBAB1403277612458561
                      Malicious:false
                      Preview:........y.x.e..p..f..p..z..q..{.$q..|.0q..}.?q..~.Jq....Rq....Wq....dq....jq....yq.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r.....r.... r....!r...."r....$r....Ar....^r....vr....~r.....r.....r...."s....Ps.....s.....s.....s.....s.....s.....t.....t...."t....%t....&t....;t....St.....t.....t....du.....u.....u....|v.....v.....v.....w....&w....Yw....xw.....w.....w.....w.....w.....x....Lx....px.....x.....x.....x....Ky....Ny.....y.....y.....y.....y.....z....6z....Mz.....z.....z.....z.....z.....z.....{....A{....m{.....{.....{.....{.....|....!|....D|....h|....z|.....|.....|.....}....-}....0}....>}....n}.....}.....}.....}.....~....<~....j~.....~.....~.....~....H.....X.......................#.....D.....W.....{...............!...."....$.....%.&...6.C.....k.....v......................*.....n................2...........-.......................!.................G...........=.......................-..........[................P...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):231395
                      Entropy (8bit):5.824107146961438
                      Encrypted:false
                      SSDEEP:3072:6md4nFCTBAQo6GJhUbme3GmH1auUjyYEWiiFJDlGv7sWe56BTQgaQNdRNwoqcHCp:3WqCQo691ax+iFJDUu54aQNdUGo
                      MD5:4CCD61EA569CD6F9B8EAA0369C2CE65A
                      SHA1:AE5296BDFCE1D4B057A240EA6CC56E8C09F0F73C
                      SHA-256:E059F6FE26DEC24DB0669589DAD5DA8950E70FAE435AF4F0A042E62C676C0B5E
                      SHA-512:666E8DEC81ADBE65143B496369DC9138E00F588E0A1E9DC18E1AA44154EB4B6E8D51953323E036BD6CA95DE04B86D863D3A7E8DC5325F823AD0AB652B0D375E9
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....r.....r.....r....+r....4r....Ir....Vr....\r....kr....qr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....Ws....`s....zs.....s.....s.....s.....s.....s.....s.....s.....t.....t.....t.....t....#t....nt....vt.....t.....u....&u.....u.....u.....u.....u.....v....&v....+v....6v....Jv....Sv....jv.....v.....v.....v.....v.....v.....w....Kw....Nw.....w.....w.....w.....w.....w.....w.....x.....x....4x....Dx....Rx....gx.....x.....x.....x.....x.....x.....x.....y.....y.....y....,y....=y....vy.....y.....y.....y.....y.....y.....y.....y.....y.....z.....z....Gz....cz....zz.....z.....z.....z.....{.....{....0{....A{....i{.....{.....{.....{.....{.....{.....{.....{..!..|.."..|..$.$|..%.E|..6.V|....{|.....|.....|.....|.....|....E}....l}.....}.....}.....}....B~.....~....q.................0...........U............................/.......................k................).......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):217553
                      Entropy (8bit):5.53804443382047
                      Encrypted:false
                      SSDEEP:6144:4/779HdmXitfnovjMuqyusCN75QUkrxGTTXM3qH:4/f9HctrGZN75qrxGTTXM3qH
                      MD5:E63DEBB39B36C53F318BED0F2596C47B
                      SHA1:1DC350C9D19F73B6B8167E5D659975E43309CB01
                      SHA-256:2A758503DF99441DF673212CFBC9CF15F6B5DD459346264DDA98EDB09D609946
                      SHA-512:2455285CB96E883B6D599B55ACE36A53B8AA43ECD731E813598E028B85DDC96C705009284D9343B14D1BCBDA17560F33A2EBF8B5ECE8C90C995303B1FDB5A5CD
                      Malicious:false
                      Preview:..........'.e.jq..f.xq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....q.....r.....r....'r....-r....<r....Br....Tr....\r....ar....ir....qr....yr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....*s....Bs....xs.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....ht.....t.....t.....t.... u....Au....|u.....u.....u.....u.....u.....u.....u.....u.....u.....v....)v....Av....Sv....wv.....v.....v.....v.....v.....w.....w.....w....Dw....bw....zw.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....0x....8x....Ax....Px....dx....sx.....x.....x.....x.....x.....x.....x.....x.....y.....y....7y....Vy....sy.....y.....y.....y.....y.....z..../z....>z....Uz....hz.....z.....z.....z.....z.....z.....z.....z.....{..!.${..".'{..$.E{..%.Y{..6.}{.....{.....{.....{.....{.....{....,|....C|....c|.....|.....|.....|....>}.....}....M~.....~.....~............................................%.....F................5.....S.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):338848
                      Entropy (8bit):4.851876545753932
                      Encrypted:false
                      SSDEEP:6144:E9gJs/G+maclHGts1Y3lwwl2aa3oUvoLF54+ldFR22qFdxk1TY2:4gJ0mHbkIo554YF9Qrka2
                      MD5:7DD73ADF36B7079AA327A6BD1EE7B6D1
                      SHA1:C2A021E9F3366E24555CC33F8AC2672866490BD4
                      SHA-256:77D9D4E89A645F9129CCE7DC2A354CF2BC8CF33EA33DB366FC5DD7B687664F98
                      SHA-512:4B462320C2FE748D7D82DDCBA6740BBA4DAB92941629C270680D51154167668E2399D93BB960D0446A519BADACC22650A32BA81088D974F509D9C303B48715A9
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..r..~..r.....r...."r..../r....5r....Dr....Ur....^r....sr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s....<s....as....is.....s.....s.....t..../t.....t.....t.....t.....t.....u.....u....%u....,u..../u....0u....?u....Uu.....u.....u.....v.....w.....w.....w.....w.....x....^x....wx.....x.....x.....x.....x.....x.....y....dy.....y.....y.....y.....y.....z...._z....bz.....z.....z.....{.....{....){....Q{....u{.....{.....{.....{.....{.....|....:|....h|.....|.....|.....|.....|.....}.....}....*}....R}....{}.....}.....}.....~....'~....1~....A~....M~....l~.....~.....~.....~..........O.............................,..................................V.....z...............................!.=...".@...$.^...%.|...6.......................=.....`................5.....p...........%...........................................S.....&.....V.................=.....{.......................9.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):203076
                      Entropy (8bit):5.563952705487345
                      Encrypted:false
                      SSDEEP:3072:RKNjqKfDjJ5onSfwePoc5jnxiVACNRb9+AiL6kr:RKNj1Byc5/IbnK
                      MD5:C4F1EB7FB44AF1B85A13E879BF61CD10
                      SHA1:9890FAE1B62CE2E015980FE14257CE4620BA1565
                      SHA-256:474BDA32DF40405ACCE873FACE0F49804F3FF8719FD8D459312A23A5C82C97A5
                      SHA-512:171D2AB10D2E980A0D4CCEED46EE6F985BAEB2EAE127E00882D01AE06B7BAC6A7E9079B71113D19FBBCCE94D0E794DF6C89E80613CF8379A2CC5025E4B8BED0B
                      Malicious:false
                      Preview:..........#.e.rq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....'r....4r....:r....Ir....Or....ar....ir....nr....vr....~r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....-s....6s....Fs....{s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t.....t....ft.....t.....t.....t.....u.....u....=u....Hu....Yu....bu....du....lu....ru.....u.....u.....u.....u.....u.....u.....v....@v....Cv....vv.....v.....v.....v.....v.....v.....v.....w.....w.....w....,w....9w....bw....xw.....w.....w.....w.....w.....w.....w.....w.....w.....x.....x....@x....Rx....bx....fx....px....wx.....x.....x.....x.....x.....x...."y....Ey....\y....`y.....y.....y.....y.....y.....y.....y....'z....Fz....Nz....[z....fz....qz....vz.....z..!..z.."..z..$..z..%..z..6..z.....{.....{....-{....@{....X{.....{.....{.....{.....{....&|....c|.....|....w}.....}.....~.....~.....~.....~....`.................&.....9.....q................F..................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):207909
                      Entropy (8bit):5.390864473189282
                      Encrypted:false
                      SSDEEP:3072:82WRm1BTt2BslQbZsdVaSGSZEaxA3AkB5765io9jOTcmvDCj/BxtVPf1VhsEHwU:9BToVbZ1OEaxeAs654DsBlftsEHwU
                      MD5:26E9CF4B3B1F71DAE9FB80A9385788FD
                      SHA1:C69053EB376ACC5B0EF5DA56EE3823E02D43DA8F
                      SHA-256:6A1A13FFA37FD6492E2F0196256DDE55887EF28BA40E76D68CD7EB6BC574E454
                      SHA-512:15A9799FE8FCB74A60BD4F252BDE5FCC8B67DA74A537D857BA1B0FC2A9B4074F080DE2C1E6098DE8442C8158CD6847DA2D432EFB6F08FC95A54D7BEB6FC0191B
                      Malicious:false
                      Preview:..........".e.tq..f..q..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....q.....r.....r....(r....5r....;r....Jr....Pr....br....jr....or....wr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....3s....As....\s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s....)t....3t....lt.....t.....t.....t.....t.....u....'u....1u....Iu....Ou....Uu....gu....ou.....u.....u.....u.....u.....u.....u.....v....6v....9v....nv.....v.....v.....v.....v.....v.....v.....w...."w.....w....Aw....Vw....yw.....w.....w.....w.....w.....w.....w.....w.....w.....x....*x....7x....bx....vx.....x.....x.....x.....x.....x.....x.....x.....x.....y....Ay....ay.....y.....y.....y.....y.....y.....z....$z....9z....pz.....z.....z.....z.....z.....z.....z.....z..!..{.."..{..$.2{..%.D{..6.d{.....{.....{.....{.....{.....{....2|....F|....n|.....|.....|.....}....`}.....~....s~.....~.....~....L...........1......................'.....k................9.....m.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):525312
                      Entropy (8bit):4.1291514010279835
                      Encrypted:false
                      SSDEEP:1536:ZKIoysaCw7420ZGonD/AWpwQrNhJHBK5dzE1mAbj1WnlJ6rwQzAiyiDjjFW/c2sR:ZKIS3f246c50X2Y/s
                      MD5:432E8BBC51DDD478AB5D62299BF2467F
                      SHA1:2A1AF3A9C4D164E878E9D69A200240713D437BDA
                      SHA-256:3997C89E6678F0E3CDB2E016FF6AB9688F9867E328B821EECCEBD1E44EBF6383
                      SHA-512:458E0B74A5C09EC106157EEBBF06F3CFE63D6A880CC64ABED1608004898CD5EA04AE8A1463F8E1E4BA5165A895DBD926159DCD53A19ED0C44551026E708E6F7D
                      Malicious:false
                      Preview:..........-.e.^q..f.}q..z..q..{..q..|..q..}..q..~..q.....q.....q.....r.....r.....r.....r....7r....Lr....Yr...._r....nr....tr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r....'s....gs....os.....s....nt....wt.....t....*u.....u.....u.....u.....u.....u.....v.....v.....v.....v....%v....fv....Dw....lw.....x.....x.....y.....y.....y.....z.....z.....z....${....9{....Q{....p{....|{.....{...."|....`|.....|.....|.....}....|}.....}.....}....?~....d~.....~.....~.....~..........I.......................7................F.....k......................B.....].....y.....................|...................................L................+................9.................".....J......................>..........3.....X...........................7...!.....".....$.....%.....6.D...............!.....`....................../.......................e..................................N...........@.....{.....4....._...........F................R...........5.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):498318
                      Entropy (8bit):4.342452283625557
                      Encrypted:false
                      SSDEEP:12288:zfPZEGTOygsqpSVtBh1PvlPQYtyFybF5eAyL68lyIwpKqO2WQeGDi5kEXwygMWb9:y6B5v
                      MD5:ED0BB1F4E9CB2B0782F06EFA2221CDB1
                      SHA1:5C8478DDC1DC1AA44E1E570EB4AC9B05144766DB
                      SHA-256:2624A61E13FFB04F5A173B6A81CA95B2CC3B6B5C0CB0CE0E3CD1D768AC0E733D
                      SHA-512:6E1437FB355A993BB77011805768EF0362B65839D9F0BD1999BEE61BC78E61BA1B37266E52101EB13525C1D25335DBDB583543D3E4774928E79F371E39A86BB9
                      Malicious:false
                      Preview:............e..q..f..q..z. r..{.:r..|.Fr..}.Ur..~.`r....hr....mr....zr.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.....s.....s.....s....$s....+s....2s....4s....6s....7s....8s....=s....ts.....s.....s.....s.....t.....t.....t.....u.....u.....u.....v....?v....fv....~v.....v.....v.....v.....v.....v.....v.....w.....w.....w....lx....+y....Fy.....z....Pz.....z.....{....:{....l{....x{.....{.....{.....{.....|.....|.....|.....}....[}.....}.....~....^~....a~.....~....;.............................!.....P.....l................*.....................3......................1.....M.....x................]................................\................S.................Z................N......................F.....v...........S..................................F...!.....".....$....%.#...6.Z......................U...........a......................^.................@.....?.......... ...........0.....I.................\...........&.....o.....-...........u.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):423628
                      Entropy (8bit):4.410854948298791
                      Encrypted:false
                      SSDEEP:12288:nkUlwsC82/mg7U0VQsD8hz09X2/IcC94urBN5+s+mJXIOwE3HVnw1pTuzOZt6UfI:g5p
                      MD5:E329D78B773CB1CD5656738AB2D42A10
                      SHA1:2D3872AC3316E2BDFD93A1BDE2AA069E00E4C130
                      SHA-256:F6C15BEAE6EEC5C7946976FABDD3495A38A9BA9ADE90050E80266DFBA3E73EFB
                      SHA-512:0878630DBB89BE504AF1BD6075E016DB9D5EF4085D0F1C4B2A7C13429F2B5C4ED4CB9F23154715DE346B48AC82EB3BDB33A40DB5A7FBF8C5E684F3BB967C1ECE
                      Malicious:false
                      Preview:..........`.e..p..f..q..z.@q..{.Hq..|.Sq..}.bq..~.hq....pq....}q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r....#r....(r....0r....7r....>r....Er....Gr....Ir....Kr....Pr....tr.....r.....r.....r.....s.....s.....s.....s....Kt.....t.....t.....t.....t.....t.....t.....t.....t.....u.....u.....u..../v.....v.....v....Mw....ww.....w....Ix....ax.....x.....x.....x.....x.....y....'y.....y.....y.....y.....z....Gz.....z.....z.....z....B{....u{.....{.....{.....{.....|....-|....f|....x|.....|.....|.....|....2}...._}....~}.....}.....}.....~..../~....J~....\~.....~.....~....%.........................................<.....i......................8.....k......................0.......................&...........................%.....g.....p.........!...."....$....%. ...6.P......................C.....r.....R.....y.................n................B.............................*.....B.....w........... .....P...........H.................................\.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):217133
                      Entropy (8bit):5.652922536901471
                      Encrypted:false
                      SSDEEP:3072:Jh5lLqW6cgLSiK4QpBpwR9vYpYxuTlLBoRzAKRDV2gj7KeY/SoYLmWhyNbCOGuAy:JnlG64xcFiDD0rVUC5N+WwjBaVR
                      MD5:7001302D34D2D8AEB43C8B380C74F089
                      SHA1:DC66D589B57F3014AE6866B3A26BD5232C49F117
                      SHA-256:0B83FE0ED8412905860E4F1B3B0C720E122C4C93DD8B983F52B87F8C69D86316
                      SHA-512:C9B7741CD28C774DC9F383BB7326F960A4A5D5DEDBA2EFB7E308DF51B30FCB2C3478DFD032C1899DE5EA237A3722FB51D6F1EE49B376D7774302D5C55C2C5504
                      Malicious:false
                      Preview:............e..q..f..q..z..q..{..q..|..q..}..q..~..q.....r.....r.....r.....r....*r....;r....Dr....Yr....fr....lr....{r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s.... s....+s.....s.....s.....s.....s.....s.....t.....t.... t....%t..../t....9t....@t....Ct....Dt....Lt....[t.....t.....t.....t....%u....+u....su.....u.....u.....u.....u.....u.....u.....u.....v.....v....*v....Jv....iv....uv.....v.....v.....v.....v.....v....,w....;w....Rw....Xw....ew.....w.....w.....w.....w.....w.....w.....w....)x....Ax....Vx....bx.....x.....x.....x.....x.....x.....x.....x.....x....%y....2y....Gy....Iy....Ly....Sy....jy....~y.....y.....y.....y.....y.....y...."z.....z....ez....sz.....z.....z.....z.....z.....{....4{....C{....O{....Z{....j{....u{.....{..!..{.."..{..$..{..%..{..6..|....$|....6|....V|....m|.....|.....|.....|.....}..../}....T}.....}.....}.....~....$.....q.................z.................................'.....M.................H.....h.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):354530
                      Entropy (8bit):4.95318162884041
                      Encrypted:false
                      SSDEEP:6144:HYTgTZ7MQ1rGnUDDRYKgVoiQi4fZNh50IB3IjFaLNiXExCqXMWPqy:FTuVnUDD2KTiQ5h50IB3IjFaLNiXEsqJ
                      MD5:A2B8811EBA5F639F1B3C92680EE0809E
                      SHA1:29AC667EC390DB72EC3A6BF207E9C963DB75A44F
                      SHA-256:0F92BDAD34BAFC6AEFD2AE7D6E6A634F997CA49052F06725938DEADE5A0E6E53
                      SHA-512:AC3E01FB67FEEE1B8154618C39035A4FB0FBAD883F9C349EC941486F6586D23A5078B7BBD39D1109045BD7CB1377BBE4E12B0764B8DA9AFE66BA978011C5A9EA
                      Malicious:false
                      Preview:..........5.e.Nq..f.oq..z..q..{..q..|..q..}..q..~..q.....q.....q.....q.....q.....r.....r.....r..../r....<r....Br....Qr....Wr....ir....qr....vr....~r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....r.....s.....s..../s.....s.....s.....s....=t.....t.....t.....t.....t.....t.....t.....t.....t.....t.....t.....u.....u.....u....,v.....v.....v....Kw....|w.....w.....x....#x....Sx....rx.....x.....x.....x.....x.....y....@y....ly.....y.....y.....y....4z....7z.....z.....z.....z.....z.....{..../{....J{.....{.....{.....{.....{.....{.....|....K|....Z|.....|.....|.....|.....|.....}.....}....8}....^}.....}.....}.....}.....}.....}.....~....6~....O~....f~.....~.....~.....~....*.....N.....Z.......................$.....[.....r...........................*.....J.....X.....y...!.....".....$....%.....6.;..................................o......................_................W..........(.....O......................U................."...................................*...........7.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):251195
                      Entropy (8bit):5.842471403251654
                      Encrypted:false
                      SSDEEP:6144:w6T4OXy7dxS0Dd9vu+k+i9L2Y5QtoHt5QGjklbWEOPqVj:XtiZxS0Dd9vu+kJLf5QKHt5QGjkMEOPU
                      MD5:A826B1FDCA25AA1392E1ADBBA22FEC72
                      SHA1:4565EEA2710E134D23A3069E88A6CA17FECFFC50
                      SHA-256:16E0F57947E9E85DB7EC15B498DA7774BC407695C1787EA9D7D253A257F51772
                      SHA-512:11C3F22E14F5C1DC22241C33DA1887F01DEBCE0740A99E55CF18DE4FD1CFF38AAFD29C5DAAFFFB1AB3454232EF9724DC14F5A1CB91C13B3E16CC598F932ABBBB
                      Malicious:false
                      Preview:..........J.e.$q..f.?q..z.Uq..{.oq..|.{q..}..q..~..q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r....-r....5r....:r....Br....Jr....Rr....Yr....`r....gr....ir....kr....lr....mr....or.....r.....r.....r.....r.....r.....s....&s....Os.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....s.....t....Et....Ot.....t.....t.....t....#u....>u....Pu.....u.....u.....u.....u.....u.....u.....u.....u....6v....Rv....ev.....v.....v.....v.....v.....v..../w....Ew....dw....ow....|w.....w.....w.....w.....w.....w.....x....7x....gx....~x.....x.....x.....x.....x.....x.....x.....x.....y.....y.....y....Uy....fy.....y.....y.....y.....y.....y.....y.....y.....z...."z....Hz....ez.....z.....z.....z.....z....3{....@{....`{....w{.....{.....{.....|.....|.....|..../|....;|....T|..!.z|..".}|..$..|..%..|..6..|.....|.....}....9}....T}....t}.....}.....}.....~....S~.....~.....~....I.....&............................V...........................6.....}.................d................0.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):187627
                      Entropy (8bit):6.712972688208396
                      Encrypted:false
                      SSDEEP:3072:sWrFe6IpoOJ5ndB4cp5nTYdbQvJYJE2Jv5B/ggdScSVzwUPlg:NrFjKTdB465nTYd82y2Jv5nSwUPlg
                      MD5:07D6A14B26C86D6023D32CD877FAC744
                      SHA1:C5AF1D0B9D21439C1BEE049DABB545713585D245
                      SHA-256:607F193B40D40637CB730F55ED6B30DCF084DBD3597BC14A18A9F778BA2F7A67
                      SHA-512:CA6504C069692516C70305BFEEC764BF4F8478605FD3B3EBA9AACC4504F2BA6E0784C4EB15DD27ADB717CAB02A0CC17CFBF98F3056516159DD99E0443C62E639
                      Malicious:false
                      Preview:..........U.e..q..f..q..z./q..{.7q..|.:q..}.Iq..~.Pq....Xq....^q....cq....iq....xq.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r.....r.....r.....r....$r....-r....9r....Kr....Sr....Yr.....r.....r.....r....$s....6s....?s....Hs....Ns....Ts....is....us....|s.....s.....s.....s.....s.....s.....s.....t....:t....@t.....t.....t.....t.....t.....t.....t.....t.....t.....t.....u.....u....$u....3u....?u....Wu....cu....~u.....u.....u.....u.....u.....v.....v.....v....Dv....Yv....qv....wv.....v.....v.....v.....v.....v.....v.....v.....w...."w.....w....4w....:w....Fw....^w....jw.....w.....w.....w.....w.....w.....w.....w.....w.....x....!x....9x....Qx....ix.....x.....x.....x.....x.....x.....y.....y....;y...._y....}y.....y.....y.....y.....y.....y.....y..!..y.."..y..$..z..%."z..6.7z....Lz....[z....zz.....z.....z.....z.....{....2{....S{....x{.....{.....{.....|.....|....$}....9}.....}.....~.....~..........'.....`.....o.......................J.....o...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):187941
                      Entropy (8bit):6.716558362521756
                      Encrypted:false
                      SSDEEP:3072:XvMOjTW/jF7r8shBTPknR7wYR7zL8TBnP5mKUUnuRtedHXy1xgCuv9XiPbb5GbD3:E0qZbrj085hUS/v9yjbTm
                      MD5:16AFE92B4A89CAA7B72CDFA2C6F84A1C
                      SHA1:B4AB0A08416A0311978AB39C2D249DC58629F763
                      SHA-256:45386106980158E588FCA97C01490DB78DCA23F62BC5A4F97BBF722671091015
                      SHA-512:C03FD252481F17C432DB0F5456FD22AAE9A0BB6AC56FE6BE013E3FA26E214F8508AA3A9A16214F45912B5603A7F42E73E7B33898C8599C45509B39A3A3649BF8
                      Malicious:false
                      Preview:..........f.e..p..f..p..z..q..{..q..|."q..}.1q..~.<q....Dq....Iq....Qq....Wq....fq....wq.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....q.....r.....r.....r.....r.....r.....r....!r....0r....8r....>r.....r.....r.....r.....r.....r.....s.....s.....s.....s....&s....-s....0s....2s....<s....Ls....ys.....s.....s.....s.....s.....t....0t....Bt....ct....ot....{t.....t.....t.....t.....t.....t.....t.....t.....t.....u.....u....2u....Qu....Tu.....u.....u.....u.....u.....u.....u.....u.....v.....v.....v....*v....6v....Sv....ev....rv....~v.....v.....v.....v.....v.....v.....v.....v.....v.....w.....w....&w....,w....2w....8w....Pw...._w....nw.....w.....w.....w.....w.....w.....w.....w.....x....2x....>x....Yx....tx.....x.....x.....x.....x.....x.....x.....x.....y..!..y.."..y..$.Oy..%.dy..6.yy.....y.....y.....y.....y.....y....:z....Xz....zz.....z.....z.....z....>{.....{..../|....\|....q|.....|....b}.....}....y~.....~.....~.....~....4.....M.......................:.....n............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):83217
                      Entropy (8bit):5.040887283408914
                      Encrypted:false
                      SSDEEP:1536:+bz4Oif2sMnL8gDpKD0rrr/4or06mGsY3csV3/EBSee0fHVvJ4TGD3zT+2/ei7g5:+bz4Oif2sMHEBSx0fHVvOT6jTVeikwV8
                      MD5:D2414B8AE71F3F827B984167054E21A1
                      SHA1:A1768D8F11596C7E24F702E6B7FCF6B0C45D0506
                      SHA-256:66A747124929695FDF5B74812E15518EE7ED4E1406E53FEBE064C39931948449
                      SHA-512:E575FC3673D278F7B80625D99C840CDA059661B977A37ED738F36C4A260850D92EFA2EE567584F58FD57D82D31FCFBF5DF4B0769BDF03D796DF6326476B4ABAC
                      Malicious:false
                      Preview: @CommonOperationsU..(function(global, binding, v8) {.'use strict';.const _queue = v8.createPrivateSymbol('[[queue]]');.const _queueTotalSize = v8.createPrivateSymbol('[[queueTotalSize]]');.const _isSettled = v8.createPrivateSymbol('isSettled');.const Boolean = global.Boolean;.const Number = global.Number;.const Number_isFinite = Number.isFinite;.const Number_isNaN = Number.isNaN;.const RangeError = global.RangeError;.const TypeError = global.TypeError;.const TypeError_prototype = TypeError.prototype;.const hasOwnProperty = v8.uncurryThis(global.Object.hasOwnProperty);.const getPrototypeOf = global.Object.getPrototypeOf.bind(global.Object);.const getOwnPropertyDescriptor =.global.Object.getOwnPropertyDescriptor.bind(global.Object);.const thenPromise = v8.uncurryThis(Promise.prototype.then);.const JSON_parse = global.JSON.parse.bind(global.JSON);.const JSON_stringify = global.JSON.stringify.bind(global.JSON);.function hasOwnPropertyNoThrow(x, property) {.return Boolean(x) && hasOwnPrope
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):292784
                      Entropy (8bit):4.531901938261794
                      Encrypted:false
                      SSDEEP:3072:5OsaRxRPygaUS/splQzbvfrgqtbfEPxYkCtJuo:8Lx9aUanzzgqV+YkCtJ9
                      MD5:EA4AD096FD3526228D2563EC81A886E4
                      SHA1:08D0E8FCCE743E5C7247A374DDD93C0CE87F12F5
                      SHA-256:E3E58C856B785A3A1C15207F45A90CF2F275D8C8AD6F5CCF8D015CDEB55E62EB
                      SHA-512:836990C20CF20900718D496575E68874C19A735A7A24215E4CB8A1A17EAA33E2563FBFF7A12E44E7A043C3D411C7ADAF2A9E6DA4F77A0C844C871B9AA3AAFEC9
                      Malicious:false
                      Preview:.........:!.AZ[.7.4.288.28...................................................... /...............................B..............`........`........`........`........`........`........`....5...`........`.......... ....U.`....$...D..X!a...X!%...X!%.D. ..-.`....$...D..X!Q...X!)...X!).D. ..`....$...D..X!a...X!-...X!-.D. ..a.`....$...D..X!a...X!1...X!1.D. ..E.`....D...D..X!U...X!5...X!5.D. ....`....$...D..X!a...X!9...X!9.D. ....`....$...D..X!a...X!=...X!=.D. ..`....$...D..X!a...X!A...X!A.D. ..`....$...D..X!a...X!E...X!E.D. ....`....$...D..X!Y...X!I...X!I.D. ..`....$...D..X!a...X!M...X!M.D.(Ja....!..... ......F`........^`.........M...V`.........(Ja....1..... ......F`........^`...........A..@...IDa................D`........D`........D`.........`.........D]....D....D...V`..........W`........I`...........V`..........W`........I`...........W`........I`...........W`........I`...........W`........I`...........V`..........W`........I`...........W`........I`...........W`........I`...........V`.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):703424
                      Entropy (8bit):4.892194033032743
                      Encrypted:false
                      SSDEEP:6144:UX2ufe78HIhGu3fDtr4AYKGIHX7GdfotpiTkTjpC/dMVRi54F:U3Af+AYZIWau/oE6F
                      MD5:ED3E6287B042714B8043EFCB301D42CA
                      SHA1:ABD65B6C946076392249049A5A313369339F503C
                      SHA-256:53F1C56093FE4D9E25A17B873D88F6542AF94AF2F49C10F7262FC20EDA96D87F
                      SHA-512:4916FDDF1B35F68DF4CE97614560B0FF6B0128BB68E9EAC738F690DFAF1ACB25D06777567992EF3315BBDE7BA9ED5DB2E980F7B29272EEA3710F1E1D21AA24BF
                      Malicious:false
                      Preview:.............7.4.288.28.......................................................R...... ....;..........0R...................B..........`........`........`........`........`....:...`........`....5...`........`.......... ....U.`....$...D..X!a...X!%...X!%.D. ..-.`....$...D..X!Q...X!)...X!).D. ..`....$...D..X!a...X!-...X!-.D. ..a.`....$...D..X!a...X!1...X!1.D. ..E.`....D...D..X!U...X!5...X!5.D. ....`....$...D..X!a...X!9...X!9.D. ....`....$...D..X!a...X!=...X!=.D. ..`....$...D..X!a...X!A...X!A.D. ..`....$...D..X!a...X!E...X!E.D. ....`....$...D..X!Y...X!I...X!I.D. ..`....$...D..X!a...X!M...X!M.D.(Ja....!..... ......F`........^`.........M...V`.........(Ja....1..... ......F`........^`...........A..@...IDa................D`........D`........D`.........`.........D]....D....D...V`..........W`........I`...........V`..........W`........I`...........W`........I`...........W`........I`...........W`........I`...........V`..........W`........I`...........W`........I`...........W`........I`...........V
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):110340608
                      Entropy (8bit):6.650741163317557
                      Encrypted:false
                      SSDEEP:1572864:2rPUJF4vUNiAew4rBj6t/8L9IjBfDP08g6J:2r8bxDf
                      MD5:8811410D160148CDDCE3C50C3365254C
                      SHA1:73CD56D6DB139ED98F6BF8E6942243BCC6A33295
                      SHA-256:1A41359801A10913FDE588F01318205AB9469283DB21F700D0BE3DE24B2AEA68
                      SHA-512:9657B502C47064960F05DF9938B61280A0965C43A8CD292C656C866084648036EA32E7728411DAC8145786B0949DE2C3B59EE300F0E66DA052D15B91F4F13EBF
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......\.........." .....,c..v0.....$.^...................................................`.........................................S.@.....d.@.H....P.. .... a..7..........p..L.....@.......................@.(...p.+...............A..!..0.@.@....................text...R+c......,c................. ..`.rdata..t....@c......0c.............@..@.data........0D.......D.............@....pdata...7.. a...7...H.............@..@.00cfg...............Z..............@..@.gfids..0...........\..............@..@.retplnel............j...................rodata.P............l..............@..@.tls....a.... .......z..............@...CPADinfo8....0.......|..............@...prot.........@.......~..............@..@.rsrc... ....P......................@..@.reloc..L....p......................@..B/4...........p......................@..B........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):14
                      Entropy (8bit):3.2359263506290334
                      Encrypted:false
                      SSDEEP:3:+DQW4Utln:+Z
                      MD5:6DBC62CA7BF8372C770E1211817B3614
                      SHA1:FD82934D2AF934835A389395E3640A15B91445B9
                      SHA-256:8A6B00A332BDCA77DDD54FB235D89936130A827185E6B0481A22FB588A025CDB
                      SHA-512:DE7CEE1221809ED9D6D2627FD0C92EA4B15748E47F9804B264EC09F7C7D97386AF67EB78772373BA0DB2E977E3FC9CC0824697FB5296B547BD6902C051A8FCD5
                      Malicious:false
                      Preview:.zfbRes_v1....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):14
                      Entropy (8bit):3.2359263506290334
                      Encrypted:false
                      SSDEEP:3:+DQW4Utln:+Z
                      MD5:6DBC62CA7BF8372C770E1211817B3614
                      SHA1:FD82934D2AF934835A389395E3640A15B91445B9
                      SHA-256:8A6B00A332BDCA77DDD54FB235D89936130A827185E6B0481A22FB588A025CDB
                      SHA-512:DE7CEE1221809ED9D6D2627FD0C92EA4B15748E47F9804B264EC09F7C7D97386AF67EB78772373BA0DB2E977E3FC9CC0824697FB5296B547BD6902C051A8FCD5
                      Malicious:false
                      Preview:.zfbRes_v1....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):3721196
                      Entropy (8bit):2.4075785522992836
                      Encrypted:false
                      SSDEEP:6144:jmJlKyBL6ihOt9OYWjJ9WqdJUZHgk63uyS0q6sJn:CTh26jdQuPSkIn
                      MD5:3881A048D6CA48F04FB01B5AFCE9CC7B
                      SHA1:F82AB6BE14FD7D05A3414D8E9EBCB2FF9E4B9D2A
                      SHA-256:15150BE5E88A2675BEEC66F1217A31ECF4593628799E86689DB8D4A9C43BC7E5
                      SHA-512:D909503F884AA0C50BC0FD5D18B7606C5BA7D632A0183B4A476586740F756AADBB94A1D2DAAA06435A1B3B0267616E3C75C5B671550082B0BC1CAADED13E1320
                      Malicious:false
                      Preview:.....8..............2018.3.11f1..........s.......n.0..I?..'.B..0........`.>....J6._.5.H........R......*CV.r/........l@.})Q...OZ`.O]........q4m...)M...f..m.......j.S""h.h....N..+......3f.@..(+;....8.s.......1M..q68...b.c).br........0...m.4xIx .@$.n{..q..:.2J.H...............$5......D........7..........E...........\:......,.......PF.........-....... ...L........'......p....U......t'......0...........u'..........h@......v'...... /..........w'......@0..l........'.......0...e.......'......X............'......h............'...................'.......... ^.......'...... 3...........'.......I..0........'..........X........'......P[...........'......8x..P........'.......z..\........'.........$........'..........$........(......8...tt.......(...........R.......(......8N..(*.......(......`x..@.*......(.......#6.<........(.......36.xx.......(......X.7..........(...... .7.T........(......x.7..........(........7..........(......X.7.l .......(........8.L........(........8.@........*......X.8.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):756940
                      Entropy (8bit):4.402379211615748
                      Encrypted:false
                      SSDEEP:3072:4cv9yToNMh+SeWkcIrQf954wm+1pTdFtYbLanTu8DqafTEm13PNWIEzPsyw00/6e:CBh+SGUPp1H1i8D9WIUOLYGOxr6/
                      MD5:AB2E517AE2C1B084D78C9FB9F8DD2141
                      SHA1:68AA9DDCE060CA95B4046E8CB4F7C47899A0C746
                      SHA-256:3DD4D51E27F553D771A55402C5E94E0810E822E0F238602C862FB25BA55FEE05
                      SHA-512:F5DC36F3E49D51624B8B75A8A87AE1D11DFEF6B9D1117378DCF93834F45D6B5676A676BC84EBF36EF7C6948F9434A7A5B5CBE3A7F6AB05B855D1439A0DF9ADEF
                      Malicious:false
                      Preview:....................2018.4.0f1..........0........`.>....J6._.5.%.................4...............4..<...........................>...................?.......xf..d|......@...........t\......A.......X?..........B.......(N..........C........[..@.......D.......Xg..D.......E........t.........J.......p....!......K............&......f........?..........i.......HL..........k........X..X.......m.......Pf..........n....... s..................(...................(...P...............x...........(#......p...........)#......@...........*#......`...@.......+#..................,#......p............*......P9..(........*......xQ...........*.......h..|........*..........,........;...................;......h............;..........(........;......8....u.......;.......D...........>.......Q...f.......>I.....(n..........................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):3721196
                      Entropy (8bit):2.4075785522992836
                      Encrypted:false
                      SSDEEP:6144:jmJlKyBL6ihOt9OYWjJ9WqdJUZHgk63uyS0q6sJn:CTh26jdQuPSkIn
                      MD5:3881A048D6CA48F04FB01B5AFCE9CC7B
                      SHA1:F82AB6BE14FD7D05A3414D8E9EBCB2FF9E4B9D2A
                      SHA-256:15150BE5E88A2675BEEC66F1217A31ECF4593628799E86689DB8D4A9C43BC7E5
                      SHA-512:D909503F884AA0C50BC0FD5D18B7606C5BA7D632A0183B4A476586740F756AADBB94A1D2DAAA06435A1B3B0267616E3C75C5B671550082B0BC1CAADED13E1320
                      Malicious:false
                      Preview:.....8..............2018.3.11f1..........s.......n.0..I?..'.B..0........`.>....J6._.5.H........R......*CV.r/........l@.})Q...OZ`.O]........q4m...)M...f..m.......j.S""h.h....N..+......3f.@..(+;....8.s.......1M..q68...b.c).br........0...m.4xIx .@$.n{..q..:.2J.H...............$5......D........7..........E...........\:......,.......PF.........-....... ...L........'......p....U......t'......0...........u'..........h@......v'...... /..........w'......@0..l........'.......0...e.......'......X............'......h............'...................'.......... ^.......'...... 3...........'.......I..0........'..........X........'......P[...........'......8x..P........'.......z..\........'.........$........'..........$........(......8...tt.......(...........R.......(......8N..(*.......(......`x..@.*......(.......#6.<........(.......36.xx.......(......X.7..........(...... .7.T........(......x.7..........(........7..........(......X.7.l .......(........8.L........(........8.@........*......X.8.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):756940
                      Entropy (8bit):4.402379211615748
                      Encrypted:false
                      SSDEEP:3072:4cv9yToNMh+SeWkcIrQf954wm+1pTdFtYbLanTu8DqafTEm13PNWIEzPsyw00/6e:CBh+SGUPp1H1i8D9WIUOLYGOxr6/
                      MD5:AB2E517AE2C1B084D78C9FB9F8DD2141
                      SHA1:68AA9DDCE060CA95B4046E8CB4F7C47899A0C746
                      SHA-256:3DD4D51E27F553D771A55402C5E94E0810E822E0F238602C862FB25BA55FEE05
                      SHA-512:F5DC36F3E49D51624B8B75A8A87AE1D11DFEF6B9D1117378DCF93834F45D6B5676A676BC84EBF36EF7C6948F9434A7A5B5CBE3A7F6AB05B855D1439A0DF9ADEF
                      Malicious:false
                      Preview:....................2018.4.0f1..........0........`.>....J6._.5.%.................4...............4..<...........................>...................?.......xf..d|......@...........t\......A.......X?..........B.......(N..........C........[..@.......D.......Xg..D.......E........t.........J.......p....!......K............&......f........?..........i.......HL..........k........X..X.......m.......Pf..........n....... s..................(...................(...P...............x...........(#......p...........)#......@...........*#......`...@.......+#..................,#......p............*......P9..(........*......xQ...........*.......h..|........*..........,........;...................;......h............;..........(........;......8....u.......;.......D...........>.......Q...f.......>I.....(n..........................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):105037
                      Entropy (8bit):5.391894979894011
                      Encrypted:false
                      SSDEEP:3072:RxoqXPvugUWfGMODHCsiJGhwXKrE/aPd+Ka2MIWtvOWKcNx/ahubG8:ET6Em9xiU1
                      MD5:E327ADD2891FAA97964F07DB642CA866
                      SHA1:374889274BC17110412A6AA6178B8509AF068DB1
                      SHA-256:CF84C522838D159BDB6A1EB9CA481174274AF9D212802F7EAB9A9792175B2240
                      SHA-512:4E8D1B5A83C3D28EF1D87C6C517F1BD159CAE6C9034B2E128627E025AD5D95EA93EDFFA3DFFAE003B22840D4E03F02A6991615934DD364C070C78EF9FED9BA07
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........M...@...[...C....Q........@.............CAB-cd06526ca7a8e0debb711311c0271d99....E................2018.4.0f1..................._F..ZW.-OBIr.:...............7...................H.......................1...1............@..............................Q...j...........................................1...1............@..............................y...j...............................................$.......................-...................1...1...............................................j...................H.......................1...1............@..............................Q...j...................9...........................C.......................P...................y...\...............................................$...................9...b.......................C.......................P...................y...\...............................................$.......................n...................H........... ...........1...1.......!....@..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):418396
                      Entropy (8bit):4.357949691922999
                      Encrypted:false
                      SSDEEP:3072:plDjKEdJtR6EZw9RdPregnGGp2edSH5WlgXnEXlan6bG6QwclxUvWfIpYyMrSyJp:p8nk5
                      MD5:F5F7BB644E5AA2635650BD1D16A6A05B
                      SHA1:E8E496A1FDE3628A9B6D553B65C8C5AE01F23125
                      SHA-256:9BE41463C07EDE518FF187393415E95FFA96D2E71CD81221C4B9FB053B126F54
                      SHA-512:070375D1934A4983FB8DEE5BAB033F349D935C1991EDC0694FCD3AFE852C43E85A29DD93F2F10CC536C0B58D9EA00AA4715F75A9CE0209AB6C9AB881FAF708C7
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1647356728.AssetBundleManifest:. AssetBundleInfos:. Info_0:. Name: anim-common. Dependencies:. Dependency_0: map-sprite-common. Dependency_1: mainui. Dependency_2: ui-icon-base. Dependency_3: ui-effect-common. Dependency_4: ui-effect-fireworks. Dependency_5: texture-mandala. Dependency_6: ui-interface-avatar. Dependency_7: ui-effect-pve. Dependency_8: anim-npc-younier. Dependency_9: texture-resource. Dependency_10: ui-interface-eggs. Dependency_11: common-uieffect-lion. Dependency_12: ui-anim-guider-common. Dependency_13: ui-interface-world. Dependency_14: sprite-puzzle-shooting. Dependency_15: ui-effect-qizhihong. Dependency_16: common-texture. Dependency_17: local-material. Dependency_18: anim-puzzle. Dependency_19: ui-effect-animation. Dependency_20: fbx-common. Dependency_21: prefab-map-np
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):23284030
                      Entropy (8bit):6.849986119138639
                      Encrypted:false
                      SSDEEP:196608:02FMkAEiAHJVjvGvPHwPGjuIVQdlKXjpvNYig6GLKxezHJdur+FY2E/Hz6xYLfy:rp/XHJJKPnyIjXRNGGMzpkr+FFWTKYu
                      MD5:AEF1C1D824DF1121BC9D7941179EED7F
                      SHA1:0231E9F40112A9F1204178DFEC6874C4981452ED
                      SHA-256:127D79C4BEDEE3D150D4FEB0EE88288735A36601BEBD8CE5816DC9957B577454
                      SHA-512:62F075C10A84F1FF46A18F7AEBA9D4F869E1668C9312F027A73E21AC6C916602ED51D21CCC28F51176223703E54899DD8B335FD5A13DD36F683D5B2B8ED34447
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......cI>...A...[...C....P..cH... .@.............CAB-033355c909bf9d507eaff7a9bf69d727......cH.............2018.4.0f1.................j.S""h.h....N..C...............7...................H.......................1...1............@..............................Q...j...........................................E........................... .......................).......................2.......................=............@.......... .......................).......................G.......................Z.......................e.......................x...................................................................1...1...............................................j...)........................................................................................................................................................................................................................................................................... .......................!......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4421115
                      Entropy (8bit):3.3558047454876903
                      Encrypted:false
                      SSDEEP:12288:1VLkPgOIJWt1U7rC2Dk7P8kccF+5xYGYcuwfpCCPiD6kjhvl6Ey8D9P7dtIbOw8s:DLkP3Grx5c+lYc4CPiD6MjPvIPX4wl
                      MD5:4948AB0B908342E62C34ED4805939170
                      SHA1:500D047533E48B56F1F46F987B75128DCB67B9BB
                      SHA-256:482CEFD87195915C68AEA2A2A4E5C21D63AF535330C6D60FC7E25319ACAF5319
                      SHA-512:6BC14E2E29367A2BF63532A16FC278753DE70A8BB411518E96F2C5F763769CC70079301395D271666AFC91ECC25A012E34F2ADD613AC68029B8541DAB6CD45FE
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......Cu....V.......C....Q..Cut..Y@...............CAB-7e5bc4e953c748a0f29f181437f3eaf61.P..<....9..`.resS...Gt..........G.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):244717
                      Entropy (8bit):4.50867388510156
                      Encrypted:false
                      SSDEEP:3072:/w/8PRBK7/qYM70DEmEEIXKNnbtsMMbd:JBK7y5eHEEIX8eMMbd
                      MD5:6AAADE1F202146E2FC3970A464340656
                      SHA1:75093476BCE83F64DD065E3A87DA2F99A42B063E
                      SHA-256:1971404CC87866FB3D66F5224442C7D2906470C9950D73FDAF28513C6B007763
                      SHA-512:1F86D0A6DAE24059399D0D627C042B129213CC5150E6B718DA8C4B649B340A869A1BE8134382744E2F14DD3D7DDE6D6049ED7B08B510ED3379BAEED1740EC67D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q....h..Z@........;h....CAB-94906411e548dc8efdf1a3afd7e937651.A.......9..`.resS.......;h............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ...........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):5107
                      Entropy (8bit):4.784254519424676
                      Encrypted:false
                      SSDEEP:96:p2zzKNdO5k2XEOFWqFFGw72poRpTei4EwGGAjNlSuvpGcsvWN2VYl+Kij+zmj0gs:pen5k2XEOFWqFFGw72poRpTei4EwhAjx
                      MD5:782D7693D89E2D74ED27551173E7F48B
                      SHA1:18CBF038771936770347AF8ABB1DCDEB2009C05F
                      SHA-256:5A9077FD552D59D393DE64C5706680175BDEBEEEA6CE20BBBA6ACB222039405D
                      SHA-512:B77CCC730DFF2D446012289C4C28DDCDF8C928D5083B729EED2BFA5ABDE7DA39B72E69ABF71A4FD9CE49355D37493BA70F2948831B64F4ABD4C81947E7FB8C17
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 312221760.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 6d097b706fea92014deaf56ef57e08af. TypeTreeHash:. serializedVersion: 2. Hash: 2215a0e0435a7784e7784ff76cb08d71.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 74. Script: {instanceID: 0}.- Class: 91. Script: {instanceID: 0}.- Class: 115. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/effect/load/0000019.png.- Assets/PackageRes/LocalResource/sprite/loading_scene/remind_bg01.png.- Assets/PackageRes/LocalResource/sprite/effect/load/0000010.png.- Assets/PackageRes/LocalResource/sprite/effect/load/0000017.png.- Assets/PackageRes/LocalResource/sprite/effect/load/0000016.png.- Assets/PackageRes/LocalResource/sprite/effect/load/0000021.png.- Assets/PackageRes/LocalResource/anim/8.controller.- Assets/PackageRes/LocalResource
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):11586
                      Entropy (8bit):5.0385081278400055
                      Encrypted:false
                      SSDEEP:192:lEqh8E2BL1uUbKkGFEvtZ7GD1he7zHGPElORBkoX6uUD:lCE2Bpjb5GFEvByOoX6R
                      MD5:48295BE0F29961E7B5AF4DAE1E0F35D0
                      SHA1:96480CB93C74858D4A894B35D1E5D4A38DFFB8D7
                      SHA-256:922B5F92F613A593A7B45B0EB0695DF1A988495BC6B4C9CB05061BF1160B446A
                      SHA-512:4527D5014D3EB717FCA03370D7E864E37D5E2F1BA29A03DB75D6D242056B6920AF1A9973944B0656E551BF819A42D70346048DC5CE61AACA05BA2B3932296D98
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......-B...U.......C....Q...,...Z@..............CAB-d99235859c4dd2cc8fc792d376a99a891.P........9..`.resS....|................2018.4.0f1..................l@.})Q...OZ`.O]$...q.......j...7...................H.......................1...1............@..............................Q...j...........................................L................@..........+.......................3.......................<.......................P.......................`...................L...k...................L...x............@.......................@..................................................................................................................................................................................................................................!.......................2...................~...?............@..................................j...................J...X.......................e...........................................H...l....... ..........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):33816
                      Entropy (8bit):3.657889261486804
                      Encrypted:false
                      SSDEEP:384:s2BpjbGwpybipX/mNimYVDt0yHRe/mGPnVK9R8LGhXInNPsZoy+J4kJWz5:1NvEsOSRe/l4qTPOr5
                      MD5:2602F4E77AF4FF85887E8687943E6066
                      SHA1:BF5B327B8A1E89A870501B73FAE4746DE2F4BF1C
                      SHA-256:B88DF8FF27FA01CF318BF7FC224402ECFFC0C66BD19E37D1D4E7CE21215F62F1
                      SHA-512:ECDBDDF672C32F7E94AFF7CB05F19EF6058AF94E90E2D5546FAA2053DE9AF4BC99F693FFCF82BBF3C23AA68F91FCAC746AFE6875CA8D1EA0CA29B754364BAA96
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............?...[...C....Q........@............CAB-9dcf669b4bfef7d3b265a4fba42eebc1...a...........b.....2018.4.0f1..................._F..ZW.-OBIr.:...............7...................H.......................1...1............@..............................Q...j...........................................1...1............@..............................y...j...............................................$.......................-...................1...1...............................................j...................H.......................1...1............@..............................Q...j...................9...........................C.......................P...................y...\...............................................$...................9...b.......................C.......................P...................y...\...............................................$.......................n...................H........... ...........1...1.......!....@...
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):558
                      Entropy (8bit):5.100522314461056
                      Encrypted:false
                      SSDEEP:12:1v2YWwe29kHEQx7e29He/lNXqGDqrZQN8ORQN8g1KLQN89QN8ni:p2AravrQ/l9pkQNJQNFeQNcQNJ
                      MD5:711AB0A84FF991150DA513CBD02DF9CA
                      SHA1:A41B597D95C2B4198A7BE1CB8C3DB944F1EF7625
                      SHA-256:5A172C528965A33C181E1892C95EA09FDF942BE25FB375F5263B707EE51E11E5
                      SHA-512:F9061DDE4886EEF2E83B879A47E4DA82E7F2F5ADD0447756D1BC2724026FDF263596035311A7186EB6D8C3CDD94F5E7C95B08FFD643BF46BCD392E9370513C51
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3875492364.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 791f084baa0dfeff00c88e2960087f98. TypeTreeHash:. serializedVersion: 2. Hash: fdf6c57a251b9f6ec27bdd2fe01b033c.HashAppended: 0.ClassTypes:.- Class: 74. Script: {instanceID: 0}.- Class: 91. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/anim/cn.controller.- Assets/PackageRes/LocalResource/anim/UIPopText_Animation.anim.- Assets/PackageRes/LocalResource/anim/cn.anim.- Assets/PackageRes/LocalResource/anim/long.anim.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):15738
                      Entropy (8bit):5.389688332389932
                      Encrypted:false
                      SSDEEP:384:pfi1ixipioiXiaiXi0iGiyQiziAF3dkAVRbvzLd:pfi1ixipioiXiaiXi0iGiyQiziAF3RRh
                      MD5:0301DCC07FB688275323F017906DE3B0
                      SHA1:CF96E8A3D8037370020A5D5F0CA3BF8DC1ABCE4B
                      SHA-256:2C1E0C2F6A4195982D409CF50C45D53BF10B89AF0D8016DA96986D3E93B6360B
                      SHA-512:900094D4C1E77A74F938C4AF9025B965B7CF1B289ACE77F30CF69ADC8036CA5D27DA59F726FE5A0A00C730BC8AE1D4F2020D300C7A3CABEE894F84AF70DDFE6A
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1629241105.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: ae5e4aeb96de59244b0a18cb58ead346. TypeTreeHash:. serializedVersion: 2. Hash: 05d971bdc565159b1dc58dacbc921b38.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 20. Script: {instanceID: 0}.- Class: 21. Script: {instanceID: 0}.- Class: 23. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 33. Script: {instanceID: 0}.- Class: 43. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 58. Script: {instanceID: 0}.- Class: 60. Script: {instanceID: 0}.- Class: 81. Script: {instanceID: 0}.- Class: 82. Script: {instanceID: 0}.- Class: 90. Script: {instanceID: 0}.- Class: 91. Script: {instanceID: 0}.- Class: 92. Script: {instanceID: 0}.- Class: 95. Script: {instanceID: 0}.- Class: 111. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: 747981004c46d7848b04200f8
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):5222823
                      Entropy (8bit):5.797439385558632
                      Encrypted:false
                      SSDEEP:98304:eJrpyd9a6/XDxhxfFEATqyiuKrBT7GF8CUWzqPrdZOMAo:Arpyd1dTNPEB8l8io
                      MD5:D57FEF33DC7152C81193F5E4A71B5A69
                      SHA1:BDE9AF24E8633B841F047372506E6C90F0B17409
                      SHA-256:8CA65524A2156235E9FF22DD847E0CE5A2C64F5582464576D1120ED28A679239
                      SHA-512:F90479A95CE8C1F429560569352AF34E99EF99D54C3556905CE8AF072E17F6D7C3B8D5D1B2FACE17F67019010981A4DA199CEEADE87099AEEB9527905A7C830C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......O.....V.......C....Q..O. ..Y@...............CAB-cc2a4bd791e39fbb93e1829f3d2311ef1.P..L.8...9..`.resS................0....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4941811
                      Entropy (8bit):4.375906112366849
                      Encrypted:false
                      SSDEEP:49152:xHrh2HX2GH7ZNGRADf45JLwTEocUYOb4gMqdOAX/umJVbdVDjt:xLoHQRqfcp+LMqdOAx1J
                      MD5:FBC8A3910F71BC866B01333C5D2C0088
                      SHA1:54DCA026947021A5672298F6667828AF1B6535EE
                      SHA-256:86229E8149355983FE564080E2B53FDAC315BF90CCB1D7A8DE11BE3706719FA9
                      SHA-512:FEE0F1F91598BCD8B31B70EBE9049B8ECDD1A29C16E68AE771DC37EBD8B6C3E73F539E55194EC29A482838A4EE025E26011391FE02945C5737095C0DCAECCBE3
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......Kg....V.......C....Q..Kgl..Y@...............CAB-5140ff498b44f4eec4b731c22f794cbf1.P..@UT...9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):6251
                      Entropy (8bit):4.980760946317052
                      Encrypted:false
                      SSDEEP:192:pceUMIUDC6eUafjQCH3/YSfypalbgyH14oaoHL36XyBrCyo1xxoPVRcmRC/Ri7zs:pcbD0jDl7
                      MD5:7F29AA8ABF32C3273446A4FBB2FCD452
                      SHA1:B5B16726287E8317F5208A4A82B4FCCAD56F7FD5
                      SHA-256:D998CF1FCC7BFD6ED2B155EF79E0C7C71CA8024F49B523BE58ABBFFA70CC01F4
                      SHA-512:B514C154E268F61E30440A50452A109D5EC9A76FD45F33312399D2C663A01F4F6C3A76681D0CB84F728BAA0AABEA0522B46B6F6245AE89313CCE6EA3F3ACDD2C
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1277931793.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: daec61e0714f23db9b81aa08d1edeca5. TypeTreeHash:. serializedVersion: 2. Hash: 3b0db16f5ef7448d73bf6ef33d5fe5c9.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: cb1c140e8ea294aa0b9d6a1c667df106, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: 4417304ef4e6f6549bf9faa471f7e240, type: 3}.- Class: 115. Script: {instanceID: 0}.- Class: 198. Script: {instanceID: 0}.- Class: 199. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.- Class: 331. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/Raw/Sprite/UI/Icon/UIIcons/icon_switch1.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/line_jp.png.- Assets/PackageRes/LocalResource/material/fire1.mat
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):931472
                      Entropy (8bit):7.529432163624965
                      Encrypted:false
                      SSDEEP:24576:MAlAFaLFIGS100bNYrTshs2uegxbAx/B/gpRAixOvqOSBjT8:4ILFS10jrTx2LOABB/g5OvqXC
                      MD5:235AA160E07723F9136B4D4D4070E87D
                      SHA1:9F0D2FE0C045302E4BC7C2D9DB757CAD10D6ED47
                      SHA-256:4B81BA8B9918E62CBF063CD7383F4AD87C36BEC7B61844247F2D2A448A1C5F49
                      SHA-512:3DC1FB51A87F2F812CF56C47860D45674E9E11B67E9E292E66E6E990CDEF7530FE69E2457BEBE4F7498FAF4C0C57D702E845BC3A6017EA838149F2EFE562712F
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......6....S.......C....Q...6...Z@........6.....CAB-8eb5afc69756348754dcedcf093bbc3c1.2......9..`.resS.......6.............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):2068
                      Entropy (8bit):4.832492872619365
                      Encrypted:false
                      SSDEEP:48:p2UZ2LkWz0Wmm0WR0WS0Wzh0W70WR0Wk0WO0WV0Wxx0WSm0WZr0WZ+60WZ90WJ0P:p2UZ/NhNa22HrmEXf9QIQOQSbDQpqe4Z
                      MD5:7262EFCFE7B4C2D500E3D93B88D1B9DB
                      SHA1:6128B51973E73C847A767E06093382BFBB9E96D1
                      SHA-256:7AD1F7EA30EF998C0A3AE6259879C6A709EC19D078FC0A4EACA213186C62C76D
                      SHA-512:9A50834597F9E7A806D355F7B9277B3787DF247F2396BE135DB753CE2365DE80EB3BD31294F9546E78F7677E0A2A87D79189CFDF7BB72305AD5C80FCD8A5C98D
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3058749669.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: fef02163ceb9ab83efef451b972f4ba5. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/ui/icon_wrong_64.png.- Assets/PackageRes/LocalResource/sprite/ui/Ico_Zhifubao.png.- Assets/PackageRes/LocalResource/sprite/ui/Ico_wechat.png.- Assets/PackageRes/LocalResource/sprite/ui/Btn_Pay.png.- Assets/PackageRes/LocalResource/sprite/ui/Btn_civilization.png.- Assets/PackageRes/LocalResource/sprite/ui/Line_Crude.png.- Assets/PackageRes/LocalResource/sprite/ui/btn_Choice2.png.- Assets/PackageRes/LocalResource/sprite/ui/btn_yollow.png.- Assets/PackageRes/LocalResource/sprite/ui/fix_icon.png.- Assets/PackageRes/LocalResource/sprite/ui/icon_GuideAroow.png.- Assets/PackageRes/LocalResource/sprite/ui/Toggle_off.png.- Assets/P
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):2109873
                      Entropy (8bit):4.460827768689303
                      Encrypted:false
                      SSDEEP:12288:OUSsuIwrO+P6ssDaumy0SrSYAVAVDWbaaiXmQ17pS5uycuj0eQbSmQT65q3ASSgy:aHeZF/WTSKC0+
                      MD5:6A8C11CB375DD61CCF5D17D1F1B5A409
                      SHA1:AB255B3F0FD3FB0F53DCBDF13B1814BFFF2F274C
                      SHA-256:B307D60D8E012148CFFCEDD1ECD6F15E84B0A534C9591DD8B10A6F73D0BAD726
                      SHA-512:A6E29074EA77986410426AEE1DED0C3B36159C59F16AB4F6E9962F489E0547B4FB902A938D03E78DAE707A14602AF380C042673D30CD280B9AD952A00F7766D5
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...... 1....@...[...C....Q.. 1@...@.............CAB-c236c26044bbd2dda67734e4a9b82d4f....H. 1@.......`....2018.4.0f1..........0........`.>....J6._.5.-...............7...................H.......................1...1............@..............................Q...j...........................................%...:.......................E...................1...1...........................................M...j...................H.......................1...1............@..............................Q...j...................H...`...................1...1............@..............................Q...j.......................n...................1...1...........................................H...j...................1...1............@..............................Q...j...............................................{............................................................................................................................... ...........H...........!.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):850
                      Entropy (8bit):5.059022196131855
                      Encrypted:false
                      SSDEEP:24:p2wNfrMpir4NE36fLkQNa50QNaG+0QNaC0QNaG0QNaj0QNaS6K0QNaC:p2wtM+2LkWa50WaG+0WaC0WaG0Waj0Wr
                      MD5:11FAD79ADA19D9537CCC29A098FC7C93
                      SHA1:C95A6522DCBE4A25EDCB973CE35EE9D16BCC6B72
                      SHA-256:A85EF7EBD37657675FFB34C60F1208BDA521458434394E8CDF2339941133E990
                      SHA-512:C8FFAFB9F7C80F2C03A58C796D0B02C86655A73037EB3CF302CFDF3FC63052E918CBEF02E5D3F52D6B89151F7462B07A0AC8F715448076A5E7DA179749B86C42
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3577163496.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 1be146005a33c6f25e3132a428b843b9. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony7_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony3_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony6_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony2_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony5_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony4_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony1_vn.png.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):224598
                      Entropy (8bit):4.478586820066412
                      Encrypted:false
                      SSDEEP:1536:mNk6ROxkkLEacsRTwVNlPQYXuslriP2oeIiGiRMZYSpgoZzNiFGjw1rTi3xd/Csp:kvNTxSp/wivFzW5ZIQcBZ
                      MD5:D7FAC9456BCD3B4359C7A7DEEDC726C1
                      SHA1:8BEA6740C79ED410E26289F216E606A7FE609ECF
                      SHA-256:279B2F5B82FAD06A7C0593FFF1EA717E508CEC30EB40DCA1A00F3A762557F0CC
                      SHA-512:0C5DA93F351388407922B24B58007BE6EDB59C1197C12566DCB86C89A6E4F52D4163B7E15D07509DE80175AC558DAD419ECFF236602341314A092E8E93F067B8
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......mV...U.......C....Q...l...Y@.........d.....CAB-133d099960a40a5c0ae86476b081b2561.A.......9..`.resS.......d.............2018.4.0f1..................q4m...)M...f..mL...'...........7...................H.......................1...1............@..............................Q...j.......................................................................(...................H...1...................1...1............@..............................Q...j.......................B...................L...R...................L...m............@..........}...........................................1...1...............................................j...................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...........................................1...1...........................................H...j...................1...1....... ....@.....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):2367139
                      Entropy (8bit):3.6899738389184695
                      Encrypted:false
                      SSDEEP:12288:HX5mHBGTDKquvKVhdaWJN/YTmFLkkLnOaLr:40KquKVvpJN/jLko/Lr
                      MD5:3667C3BC0D864E35922816453F015796
                      SHA1:3C9C112F3F6FEA752F16A4E1E74F68B4CB19E4CD
                      SHA-256:6F422F534DEE4B77DD722E77283068EBC0C3A29901376D1ECD011257BE263560
                      SHA-512:B00AA73706CF9A7BBBD598735FE82796BB4039F449AF6BF07952DEF3E060B3E7A57CBFC05EB7F964DAB01F66FCBD1D07007E59D2CDDE22FCBCB43A8A760B7FB2
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......$.....V.......C....Q..$....Y@........$.|....CAB-eaec0411ab28653904f541e622fc2d981.P........9..`.resS...*..$.|......+.....2018.4.0f1......q...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):107932396
                      Entropy (8bit):3.596331052008626
                      Encrypted:false
                      SSDEEP:1572864:KKxWtkU7HTVdmEaFKW9hsVKWQvhtuke3E:FWOU7TVdmJFKWHmKthtukL
                      MD5:7CDFE9FCCBE335CD27631EA903E78406
                      SHA1:20419032984A1E7FB58723AD0CB3CD78C0C4B3D8
                      SHA-256:D4921FB5284E9ECA046FD905CD2EA3958EEB726077EBA0D14740326FCF3C02F8
                      SHA-512:5291ADAF4F1FD709F6F26445559F63D0F0304D8C715D42F49DD1C9917F984BEE3F4BEBEB4D437954085D4388F61065EB7EC143178EE4FB1A54ED157F1C088832
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......n.....W.......C....P..n.d..i.@........*......CAB-0fe3df0bc12f581f14329965c1ea52b81.P..D.T...9..`.resS......*.........0....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@...
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):197630
                      Entropy (8bit):5.273595500167126
                      Encrypted:false
                      SSDEEP:3072:ZajwQF+HwBnnRrMPWXCZDsNIQffgh3pfh8:MK4ro4CoIQffgh3pfG
                      MD5:2D93B270076447C002C8609952A40819
                      SHA1:DA00FE94E6716F92BEDF0FC22FFD56C191DF0B95
                      SHA-256:24450188150269A8654D5CD2123B7265E9D754387CCF3E4A4CA2A914012F0603
                      SHA-512:FE1AAE09DAAA0FC7BB2C7200CAE3FA8D16A7B091CFC15AB433CEE9025EC4292636D0649BCAE96B68EC659394B1B85F7B5BCCE84E0EDCFAEFBB3F59C6780C8BDE
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............U.......C....Q....x..Z@........*.....CAB-636d07f87837fc6de0a147ace1cc47101.P.......9..`.resS....m..*.............2018.4.0f1..................l@.})Q...OZ`.O]$...q.......j...7...................H.......................1...1............@..............................Q...j...........................................L................@..........+.......................3.......................<.......................P.......................`...................L...k...................L...x............@.......................@..................................................................................................................................................................................................................................!.......................2...................~...?............@..................................j...................J...X.......................e...........................................H...l....... ..........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):3378
                      Entropy (8bit):4.814759203487136
                      Encrypted:false
                      SSDEEP:96:p2QVNK2bkQZ2I2B2i026+EkM2ZVXkrB9KmIeQkE1GOMkcVf2/9jrU8tF+QJaDGsO:p4kfZL8h09+EXs9OB9KmIeQBgOMDJ2/J
                      MD5:8393B149EEC9D34EF446E219BBBD4A31
                      SHA1:B7F9F4D444FBD73E63FB9E5F224098FE571D0521
                      SHA-256:DA55B7E6889A47318596625971C291569DD7A0CD28FF274D61DACAB361457E8F
                      SHA-512:BFE7E1ECE8B1CC0BB2BBD0ABE8BB6DF44C0557DC2BE2ADBADCDB6F7396A065B41513F4DC938D744B162C543D810F2FBFBFA9E4DC2604A14783B28DA2A95BF798
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 4260396515.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 418fb4189073142676c8c81e360face5. TypeTreeHash:. serializedVersion: 2. Hash: 11e69e6fadea9d6248cd74c8a6d510dc.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 49. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: a6b194f808b1af6499c93410e504af42, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: f1b3b4b945939a54ea0b23d3396115fb, type: 3}.- Class: 115. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/general/ru/bidedadi_Atlas.asset.- Assets/PackageRes/LocalResource/general/jp/riben_Material.mat.- Assets/PackageRes/LocalResource/general/eu/lichadadi.atlas.txt.- Assets/PackageRes/LocalResource/general/ru/bidedadi.png.- Assets/PackageRes/LocalResource/general/ru/bidedadi.json.- Assets/PackageRes/Loca
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):9035853
                      Entropy (8bit):3.3821922226513665
                      Encrypted:false
                      SSDEEP:24576:GizPtpiFfUk+/XHgQyCmHd29A4oOcxTQnzVWL7+8vqKRTTcjUOhLtiK:PX/XHgQyndMcKzVWP/N2hLtiK
                      MD5:9714559A274979A2B1323DA47045D8DF
                      SHA1:64218F81538DD985843598807122917CBA04DCB5
                      SHA-256:E3F48C88E635DDE0B1FD25827ECEB9773F612EDCCFCE9A4747ABE016B4AC04D7
                      SHA-512:3AA2CAFAB36A21744A46A224A42574AF990FC3364A4A0721F59398B368AFEF4200620BCCC3E5AC82A976DB7592273A6CDBBB9C2CAA6A255428357E812744A639
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........M...T.......C....Q.......Y@...............CAB-ed4879b10107c85932dd4e4ae180a7841.2..p...9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4567
                      Entropy (8bit):3.394902431496091
                      Encrypted:false
                      SSDEEP:96:I2B5lpwsuUPTDs9Ku0erg03N6pBC88A9AVa:I2BL1uUbKKx03M2nA9AVa
                      MD5:85D9577D1E8AB1B6999AB8AD42446431
                      SHA1:97BBA3AC8FCBD4A21232E0CA6452FAD4554E5BA8
                      SHA-256:7ED5B50FC8B8F7BF74232CB1A3DF6E769F189914567DA5ACBB8411D55BD43731
                      SHA-512:E236B1396ACB0EE4E54218F7D190C42A3B172121240E4850122C347D191B7EA0CA602CD24957615707B9B27F78E34F9E86B49F38DF2C62CC85F040C12F35821C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............?...[...C....Q....g...@............CAB-9348d93c800af77f2c5aab365e64e381........g............2018.4.0f1..................._F..ZW.-OBIr.:...............7...................H.......................1...1............@..............................Q...j...........................................1...1............@..............................y...j...............................................$.......................-...................1...1...............................................j...................H.......................1...1............@..............................Q...j...................9...........................C.......................P...................y...\...............................................$...................9...b.......................C.......................P...................y...\...............................................$.......................n...................H........... ...........1...1.......!....@...
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):11129
                      Entropy (8bit):4.76584765355406
                      Encrypted:false
                      SSDEEP:192:pMshrgyVg474i7XugZwHYjAdAngk9A+2Az/odgmgog+gJ2wntjgA47gdBA74kX9e:pD/tvArfVFMbX
                      MD5:73A51FC4200662BD23425B005AAB22B5
                      SHA1:8E31380978E3BF11AA53C05E0D3DF2595D3F7C94
                      SHA-256:A32C45C4BD4E119A86E0A7729EF112873EADC83BBC8D7D24460BF17653EB5D68
                      SHA-512:D072FE719AA562DD61F32E1FE4F8EF25657B2A7A203F253A7D546C6E496FCDAFB47926A1BFE84879E2132331961496395A0BF07154AF4AA3B8D150EFE0310757
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3773303932.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 6fe8977044de76ecf5fb2930c0d68a19. TypeTreeHash:. serializedVersion: 2. Hash: 0f6653d6b7f92e9b2f4e865572aa4804.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 109. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: 78b2425a2284af743826c689403a4924, type: 3}.- Class: 200. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/common_shader2/custom-area-effect.shader.- Assets/PackageRes/LocalResource/common_shader/UIDissolveDoubleTex.shader.- Assets/PackageRes/LocalResource/common_shader2/custom-particle-alphablend_rgba.shader.- Assets/PackageRes/LocalResource/common_shader/SpriteInOutLight.shader.- Assets/PackageRes/LocalResource/common_shader/SkinPBRCombineMask.shader.- Assets/PackageRes/LocalResource/common_shader/em_shader_vars.shadervariants.- Assets/PackageRes/LocalResource/common_
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):491
                      Entropy (8bit):5.074476125137265
                      Encrypted:false
                      SSDEEP:12:1v2Hwe29JAA7e29heNRIbN3PqGXqG3rEyUWw+NKZQN8lM1i:p2QrTPrG8bNR14yUWtsQND8
                      MD5:C5D26506D81352F8EC82380631A6E173
                      SHA1:E617DEA65D681AE60B304FAECA6F53FB090F28C3
                      SHA-256:0A859ECC7F4BC99404EBC1A09691867497D9798BB2A00634EB7B708AC3DC7319
                      SHA-512:CC0A4A3E2AE4B859A334DD1ADE264D0AA7F519DE04F9D28455E24DEF1A1B10782A7C7606D23D91A7EBDB08CE1C382D773D2D26D9DC0ADFF96F8F4616F1CE8A79
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1116332981.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: faceecb631a3dad9cde5997c3b0b9e6e. TypeTreeHash:. serializedVersion: 2. Hash: a543ea25167c0f2458855fa0fa4327b6.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: 441b55d13c7a3c049b35714b57a0f50c, type: 3}.Assets:.- Assets/PackageRes/LocalResource/prefab/Debugger.prefab.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):418396
                      Entropy (8bit):4.357949691922999
                      Encrypted:false
                      SSDEEP:3072:plDjKEdJtR6EZw9RdPregnGGp2edSH5WlgXnEXlan6bG6QwclxUvWfIpYyMrSyJp:p8nk5
                      MD5:F5F7BB644E5AA2635650BD1D16A6A05B
                      SHA1:E8E496A1FDE3628A9B6D553B65C8C5AE01F23125
                      SHA-256:9BE41463C07EDE518FF187393415E95FFA96D2E71CD81221C4B9FB053B126F54
                      SHA-512:070375D1934A4983FB8DEE5BAB033F349D935C1991EDC0694FCD3AFE852C43E85A29DD93F2F10CC536C0B58D9EA00AA4715F75A9CE0209AB6C9AB881FAF708C7
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1647356728.AssetBundleManifest:. AssetBundleInfos:. Info_0:. Name: anim-common. Dependencies:. Dependency_0: map-sprite-common. Dependency_1: mainui. Dependency_2: ui-icon-base. Dependency_3: ui-effect-common. Dependency_4: ui-effect-fireworks. Dependency_5: texture-mandala. Dependency_6: ui-interface-avatar. Dependency_7: ui-effect-pve. Dependency_8: anim-npc-younier. Dependency_9: texture-resource. Dependency_10: ui-interface-eggs. Dependency_11: common-uieffect-lion. Dependency_12: ui-anim-guider-common. Dependency_13: ui-interface-world. Dependency_14: sprite-puzzle-shooting. Dependency_15: ui-effect-qizhihong. Dependency_16: common-texture. Dependency_17: local-material. Dependency_18: anim-puzzle. Dependency_19: ui-effect-animation. Dependency_20: fbx-common. Dependency_21: prefab-map-np
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):3495066
                      Entropy (8bit):4.150524989149209
                      Encrypted:false
                      SSDEEP:24576:UuMOw/0cEBUB/2byl5/2bylvG9hC+qVVVC+OvX111111111111PZgkDWwitujGXt:rVw/0cUMl5kDWcc3CaVCVZBs
                      MD5:2AD51BBB2C3974FCF2E11CFB24F6635D
                      SHA1:828DAF41EB15D2FB7F5E91EE600F01D5A30A80FB
                      SHA-256:DC2C5027F58D583A490E2BA3018C21D3DA5B0845D5E11649E59EDDF9220F04CA
                      SHA-512:A93471C6F51BB329ACDF786A171F3D28A52C7E0E81A096FDA3C4DEDDF186FD46758917DEA4C3AED135986D154FF90D54178BB3A49E6CAA17CB31408E73A2D4D6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......5T....U.......C....Q..5T...Z@........}.....CAB-a8f4ce95431154ce73222912985e5aeb1.P..4....9..`.resS... Q..}....... p....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ..........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):2005
                      Entropy (8bit):5.017632132928824
                      Encrypted:false
                      SSDEEP:48:p2+d42LkWYs0WYr0WYq0WYU0WYB0WY7m0WYW0Wgy0WYg0WYm0WYj0WYZ0WYH0WY+:p2+2/Vcr963D3pBH0SAIRxvs+WoDmi
                      MD5:D71385E7C3CEC332A24A5AA986C5AE46
                      SHA1:FE0A8AC58B38D3D1E0CCA2277EA4185C035A8395
                      SHA-256:19D516CB5472E84CE56D6EC4BBCC916FC56EE06483089E900C81475C0B941E4E
                      SHA-512:B87735FD4E783754D9267389379B24D723C6F38AC994A1F47263F5CCFB75681BF26DFDFD5B0E19F73ADDCC1A9D3DC24F32BE500489EAF0D5F7A46024E5BD12DF
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1405147586.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 7a53d1498d17a911c03b68726dbb3eee. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_01.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_19.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_21.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_09.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_13.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_14.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_03.png.- Assets/PackageRes/LocalResource/arab_res/sprite+UIChooseEvony+ebuff+e_buff_07.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):954
                      Entropy (8bit):5.051453844238285
                      Encrypted:false
                      SSDEEP:24:p22rqMr4NE36fLkQNH0QNMQNB0QNebQNMQNbQNTVLQNJGQN4:p2Qj2LkWH0WMWB0WebWMWbWTBWcW4
                      MD5:5CDF40D84F95871D9EACB9BD1645ECD5
                      SHA1:55510BB28C2627324C1865F57FAA33537AAFFDB4
                      SHA-256:7CE7E70986727F2E1F6605FADB19C22B985843EBC6525A7BA73B8F49EF7DAD60
                      SHA-512:3D4651D86872C6846A935EF145014DBF3EDA10DBE3265E71A5291E290438995683A8F36884A1ED555E0D4544D4E835345E9CAA6DC1B7C121C9B3021809366946
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 955401083.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 186236fe47e829ef939df4934b1fb7fd. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/effect/tex_em_fire04.png.- Assets/PackageRes/LocalResource/sprite/effect/hightglow.jpg.- Assets/PackageRes/LocalResource/sprite/effect/evony/fx_glow_a1105_003.png.- Assets/PackageRes/LocalResource/sprite/effect/evony/Flash14.jpg.- Assets/PackageRes/LocalResource/sprite/effect/evony/glow.jpg.- Assets/PackageRes/LocalResource/sprite/effect/evony/YellowParticle.jpg.- Assets/PackageRes/LocalResource/sprite/effect/smoke_additive.jpg.- Assets/PackageRes/LocalResource/sprite/effect/evony/star_yellow02.jpg.- Assets/PackageRes/LocalResource/sprite/effect/SparkOrange.jpg.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):3245
                      Entropy (8bit):4.909785599233786
                      Encrypted:false
                      SSDEEP:96:p2WQlZAWILp0ifmWZGbIdSosQflsUlIl/L+YIe/SCffIC0kgQpOnq32pzb:pYILp0ifmWZGbIdSosQflsUlIl/L+YIf
                      MD5:4AC6494BE7C196442E6D573DACFF0206
                      SHA1:FFD048E7E6D0D8677F4CF2CDBFF3F9FEB7FE0C65
                      SHA-256:837F1901038837EE8FF05B8B27C98DAFD5685A89296E6036C6B230EE1170A8EF
                      SHA-512:F68DFBE6E4957D8C397549B32CDC4FD9B4B936B449D3C74A6AEC63D54BC20CEC5CF78122B61CE2ADB5FDEDD7AB86C09D92AB34654F136C365F88CD95BA0E1582
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1666929481.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 3e2a8c88af3ec1bb243f02e9c1384afd. TypeTreeHash:. serializedVersion: 2. Hash: fe397485c3cec1106b49e9ff95e8f8a2.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/common_material/custom-add.mat.- Assets/PackageRes/LocalResource/common_material/default_particle.mat.- Assets/PackageRes/LocalResource/material/smoke_3.mat.- Assets/PackageRes/LocalResource/common_material/splitalpha_gray_ui.mat.- Assets/PackageRes/LocalResource/fbx/Materials/hz001.mat.- Assets/PackageRes/LocalResource/material/hightglow.mat.- Assets/PackageRes/LocalResource/common_material/thanks_Orange.mat.- Assets/PackageRes/LocalResource/common_material/storeGiftBlue.mat.- Assets/PackageRes/LocalResource/common_material/No Name.mat.- Assets/PackageRes/LocalResource/common_material/custom-
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):1126
                      Entropy (8bit):4.956316911745548
                      Encrypted:false
                      SSDEEP:24:p22jru1ar4NE36fLkQNAc0QNsm0QNMWJ0QNtp0QN9HD0QNELm0QNLQw0QNgQNLIE:p22nu+2LkWAc0WX0W50Wr0WlD0WF0WL7
                      MD5:1508097574D7DB0830700A7D5A39E977
                      SHA1:7523D52BEE84120163BE92DB99E709870B82BC96
                      SHA-256:D28E1984D12C0757E7B7F3C1AD57C31B77F36491214B64327CD13D7F996018F0
                      SHA-512:D9CE33F13AAE54A75E7ED0A7F409855CABD26B55EE805858E255D3B7869B723AD0FCB31DC80A424B6FC7E594606C3D49258B281CF0C466A60CD4FCB4275E069F
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3455822327.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 46aaf7850e2b6445edb009a144cda295. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/titlebar/Monster_bg_title.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Bg_topres_copy.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Monster_close_icon.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Button_Report.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Icon_back_copy.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Frame_Contacts_copy.png.- Assets/PackageRes/LocalResource/sprite/titlebar/BG_civilization.png.- Assets/PackageRes/LocalResource/sprite/titlebar/bg_title3_copy.jpg.- Assets/PackageRes/LocalResource/sprite/titlebar/BG_civilization_light.png.- Assets/PackageRes/LocalResourc
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):4493
                      Entropy (8bit):4.857978096751818
                      Encrypted:false
                      SSDEEP:96:p2VhDA1LRRRjrRYRNRQirR6RfRTR3RDURCRLRIRmRHRwRGRCRjRLRCRWRURhR8cL:pC0rzjdenQidQZVhWI9OExmkIl9I0yDn
                      MD5:59465C90B5621651A0B0F567EB90D1D8
                      SHA1:100616419834DFB1B451ADDC3350D73CC63945B5
                      SHA-256:8D8DD0375C7A54A44AC1E277FD59942FCAB7FC99816CFE0DD672962CF57619BB
                      SHA-512:478D2890B4C249E935FB01C085C68E62A238136BD018F42419C8AA1619B09153A7AC9A54B31E6596B951EAF6619C401E4C85515B27BBFA18841ECB5A6A33B55E
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3662444195.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 3bb71a004336483612efec5ccea4934f. TypeTreeHash:. serializedVersion: 2. Hash: 3f7d0c5e0986ec71841622bcb2f9be1c.HashAppended: 0.ClassTypes:.- Class: 83. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/Raw/RunEscapeNew/Sound/1103_skl.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/get_reinforce.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/runEscape10_SingleShot.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/run_escape_bgm1.wav.- Assets/PackageRes/LocalResource/sound/intro_music_03.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/runEscape5_SingleShot.wav.- Assets/PackageRes/LocalResource/sound/intro_music_06.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/FireWall_1.wav.- Assets/PackageRes/LocalResource/sound/intro_music_05.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/3002_atk.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/get_debuff.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4390546
                      Entropy (8bit):7.9511381117449424
                      Encrypted:false
                      SSDEEP:98304:ikpGo5zN/JWMUTKPpBr2/JWMUTKPpBawpA3BRUYJbznKqWPCda6KNcvu:ikpGGxJZUTTJZUTBwqnUuzKqW0a/Gvu
                      MD5:A1C35782D12F4C6377EF9BB6AE2D8809
                      SHA1:22CC6FA1F2EB500505878E1719E2AFC18F2108E5
                      SHA-256:E936F81B582495202D4DFE4BD94A30BB854FC3C581E6D99FD74F3A8067D5C175
                      SHA-512:F7ACD4824F83FA71B29EE8CD1787DFE6F7C3D974A50F111FCD8F9827E6418996DAF64DA50369E2DB238EB1E2894062F806F44FB30B0AA9BA6D29DBD9D8D7BFA1
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......B.....Y.......C....Q..B....Z@........Y(....CAB-7d3418d4cc4d583fa3c95f4e1dc6bd1f1.P..B.....9....resource.......Y(............2018.4.0f1..........S.......4IF^7c..3Z.....................7...................H.......................1...1............@..............................Q...j....................................................................... .......................,.......................<...................L...E...................L...W............@..........c...................L...s...................L.......................L................@..............................H.......................1...1............@..............................Q...j....................................................................................@..AudioClip.m_LoadType.m_Channels.m_Frequency.m_BitsPerSample.m_Length.m_IsTrackerFormat.m_Ambisonic.m_SubsoundIndex.m_PreloadAudioData.m_LoadInBackground.m_Legacy3D.StreamedResource.m_Resource.m_Source.m_Offset.m_Siz
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):105037
                      Entropy (8bit):5.391894979894011
                      Encrypted:false
                      SSDEEP:3072:RxoqXPvugUWfGMODHCsiJGhwXKrE/aPd+Ka2MIWtvOWKcNx/ahubG8:ET6Em9xiU1
                      MD5:E327ADD2891FAA97964F07DB642CA866
                      SHA1:374889274BC17110412A6AA6178B8509AF068DB1
                      SHA-256:CF84C522838D159BDB6A1EB9CA481174274AF9D212802F7EAB9A9792175B2240
                      SHA-512:4E8D1B5A83C3D28EF1D87C6C517F1BD159CAE6C9034B2E128627E025AD5D95EA93EDFFA3DFFAE003B22840D4E03F02A6991615934DD364C070C78EF9FED9BA07
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........M...@...[...C....Q........@.............CAB-cd06526ca7a8e0debb711311c0271d99....E................2018.4.0f1..................._F..ZW.-OBIr.:...............7...................H.......................1...1............@..............................Q...j...........................................1...1............@..............................y...j...............................................$.......................-...................1...1...............................................j...................H.......................1...1............@..............................Q...j...................9...........................C.......................P...................y...\...............................................$...................9...b.......................C.......................P...................y...\...............................................$.......................n...................H........... ...........1...1.......!....@..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):392017
                      Entropy (8bit):4.746532204342741
                      Encrypted:false
                      SSDEEP:6144:qC5hbaPvG0J4fKs6DJIJosi40zPr96qQEQk0q5II4B5kNcAnk+Nt1DJY8PUNz1/r:1TK5kOZAV1GLq
                      MD5:79FC66EF26C612F5940FF7507D6571E0
                      SHA1:EAEA3293EC5F0B5EDF779CAD7DD66F89857F7AD2
                      SHA-256:2714167F9069B10FA3AFA8336B8583E38C2AE2F0E73376A91C91C8041F0C9C80
                      SHA-512:F28A8DE7607B9F12361F14484A73645BA3A7FD17710B2536E199DB8CA1870BCA45460928B484453E7CEDA31FF2FB6F5239A3A92CD1D37ED45B8E53F49847CDE4
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........Q...T.......C....Q.......Z@........z.....CAB-fe05007a5593413dbb0708c2e69a49491.A.......9..`.resS... ...z....... 0....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ...........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):829
                      Entropy (8bit):5.070189676678041
                      Encrypted:false
                      SSDEEP:24:p2+krvr4NE36fLkQNaVQNaS/bQNaxQNaXQNaiQNajQNa4:p2+OD2LkWaVWaibWaxWaXWaiWajWa4
                      MD5:DD3BA62B66CD6C853CD8C04CD033081B
                      SHA1:A7AB167C022C0D6E651359FD55C2373F291D1C9E
                      SHA-256:44E8D62BA123F9BF18A3402FC8781F3B9B834956645220CC1606308034E9A3C1
                      SHA-512:AE54718CB5DEEF9DE48B72389A53C10D41284B22DB39BADC72F91FBC4D4316DA1682DF4ABE95E8C6A0A0C4B5D52FE89D102AE6AD356E3619F192231B53F6F699
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1672353467.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: f65fa72030fdd0a4c9596e559d629035. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony7.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony4.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony3.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony5.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony2.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony1.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony6.jpg.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):21540
                      Entropy (8bit):4.8038303368102095
                      Encrypted:false
                      SSDEEP:192:pKKNUD7eo6A5iAgn/vu7Za27G07AA5NjERyaah+Rn9PxfqLHJwHP1/8eRvGJ6C+e:pKKr1aErjAl3h
                      MD5:83B242496B61BFC30EBDC5078CAE8B7C
                      SHA1:C4B82D54D3486636A0657CC0B1BE7308508610A9
                      SHA-256:DB85484730936FDA23BA7DC626FE9B2B5B471121F54AE1300FDB7B5E18878952
                      SHA-512:E210DB088045E5A68241CC563318BA511041DD8254AB21DB4EBD705E0595530395B3DB26198900031B93F7EA1262C8BC0AB4008A345ECFF901C609EE7012311B
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 2256837176.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: c9091d7180bbe7aa5d2f2c85077d936c. TypeTreeHash:. serializedVersion: 2. Hash: 62810051076162514a64b40501fbf5e7.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 21. Script: {instanceID: 0}.- Class: 23. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 33. Script: {instanceID: 0}.- Class: 43. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 49. Script: {instanceID: 0}.- Class: 95. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: d247ba06193faa74d9335f5481b2b56c, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: a6b194f808b1af6499c93410e504af42, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: f1b3b4b945939a54ea0b23d3396115fb, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: a1fd8daaed7b64148a34acb96ba14ce1, type: 3}.- Class: 114.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):567
                      Entropy (8bit):5.102238695830329
                      Encrypted:false
                      SSDEEP:12:1v2bRwe29G/7e29tFtK7NtvqGbfqGRfqrZQN8Xjuv+QN81QN8uEi:p2bir8jr7FtevvZfDfkQNvGQNsQNj
                      MD5:D9937A277221B208B4D9917BE0DF8DE1
                      SHA1:A69159E466C4B388DC2582D6B8BB6036347C01D7
                      SHA-256:1165ABBB1CD0DA23A1F46D8E23396980C68A2F037C326C579BC9AD084B40F2D8
                      SHA-512:A32EC5E7C3087C446A97D9DAB7B8C7F29D12D1AEF69C3A224D3B78796044B7D243D77786571852571D7D4A43F2F2EF029FCDFD17A924E908A6A917DABDBAB216
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 2928257521.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 03ecb93051af287d27fe17dfd6c1b473. TypeTreeHash:. serializedVersion: 2. Hash: fe397485c3cec1106b49e9ff95e8f8a2.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/effect/star_yellow02.jpg.- Assets/PackageRes/LocalResource/sprite/star_yellow.jpg.- Assets/PackageRes/LocalResource/material/star_yellow02.mat.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):931532
                      Entropy (8bit):7.22055760767837
                      Encrypted:false
                      SSDEEP:24576:5Vl1WW2EMnMk1WYVWm0GhPsP3mQko4Ovd8+0:5VEliY8mXiWJoYX
                      MD5:6037AF6736D8D05A610422505F3F278F
                      SHA1:730EC781B182C1BA35097999E996A6432191EE30
                      SHA-256:C8E14F407400D169161157B6258D7DF16281E07886A7E4E3514E79223FC6CA6A
                      SHA-512:D48207BBB7133A653E5950277C0DC414DDFEA893B8867041314C087139D168AE650C070279600FCFD0FA9B459A7B58CD1B10C07DFE7D584ED843A21443386D8E
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......6....S.......C....Q...6H..Z@........6H....CAB-492f03c5cf2f9214d59de91ce73f717d1.2......9..`.resS.......6H............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):8262
                      Entropy (8bit):4.881847441239691
                      Encrypted:false
                      SSDEEP:192:pkJ5Bu9/5tt3CA1n+UcHkEz8M0hX1bSxcGuOAwn6DKg5BqAyv2CsatDis7fJGxua:po07
                      MD5:A2DD0C6D9C3D7AC4000F2B8A7A156653
                      SHA1:F814CFBADD5989DF0D7AF9FDC9FDA1EF4A6AA6C7
                      SHA-256:43432BC11A619A124F26B3C2EA84F116F00B7B00712F9990900E65672F8F192F
                      SHA-512:B91465D12CC233DD926A87E75D091B92BFB913F89550A5A7F1405E1EC27533CB005A2FCAC518616584E796474C91FE29469FB1B4B1BF5B5FD713E18484589FA8
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3325686664.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 3890270a2ddf2c346f72f707ad171066. TypeTreeHash:. serializedVersion: 2. Hash: 4bd58a228d008f9654313553a1feb0ca.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 43. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: 4417304ef4e6f6549bf9faa471f7e240, type: 3}.- Class: 115. Script: {instanceID: 0}.- Class: 198. Script: {instanceID: 0}.- Class: 199. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/material/smoke01.mat.- Assets/PackageRes/LocalResource/material/background_03_smoke_03.mat.- Assets/PackageRes/LocalResource/sprite/effect/tex_em_smoke_01_mask.png.- Assets/PackageRes/LocalResource/material/evony/flash14.mat.- Assets/Package
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1773037
                      Entropy (8bit):4.147922904092557
                      Encrypted:false
                      SSDEEP:12288:n2gdMBgvq6qM60cOyopWBnD5Bi2XAqSZN+7jkKKVRmmiDG0Dx:vmoZ1pW3Bi2+WN
                      MD5:350E45F6C72C31ACA47A4BAA056529F7
                      SHA1:7165B650143F00D569C95AB00C5EA4CB31F2DE46
                      SHA-256:CFB99D02C4CEBEF7F7908CCCBA985C1453BD97945474B4B61E225F3790E7C0AB
                      SHA-512:844DFB0484D2442491FB6FC4CC971A8D7D8F9BAE617E66EFB41AB2AFEA4BFFFD5F8EE8FCF27A730028CF4368C2E2AC9B29EE94C9A5B5A8B6421AA49C1C8EAC49
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q....h..Z@........ih....CAB-63490e8f6c0e326cebb67b8bbd786ced1.A.......9..`.resS.......ih............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):33816
                      Entropy (8bit):3.657889261486804
                      Encrypted:false
                      SSDEEP:384:s2BpjbGwpybipX/mNimYVDt0yHRe/mGPnVK9R8LGhXInNPsZoy+J4kJWz5:1NvEsOSRe/l4qTPOr5
                      MD5:2602F4E77AF4FF85887E8687943E6066
                      SHA1:BF5B327B8A1E89A870501B73FAE4746DE2F4BF1C
                      SHA-256:B88DF8FF27FA01CF318BF7FC224402ECFFC0C66BD19E37D1D4E7CE21215F62F1
                      SHA-512:ECDBDDF672C32F7E94AFF7CB05F19EF6058AF94E90E2D5546FAA2053DE9AF4BC99F693FFCF82BBF3C23AA68F91FCAC746AFE6875CA8D1EA0CA29B754364BAA96
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............?...[...C....Q........@............CAB-9dcf669b4bfef7d3b265a4fba42eebc1...a...........b.....2018.4.0f1..................._F..ZW.-OBIr.:...............7...................H.......................1...1............@..............................Q...j...........................................1...1............@..............................y...j...............................................$.......................-...................1...1...............................................j...................H.......................1...1............@..............................Q...j...................9...........................C.......................P...................y...\...............................................$...................9...b.......................C.......................P...................y...\...............................................$.......................n...................H........... ...........1...1.......!....@...
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):558
                      Entropy (8bit):5.100522314461056
                      Encrypted:false
                      SSDEEP:12:1v2YWwe29kHEQx7e29He/lNXqGDqrZQN8ORQN8g1KLQN89QN8ni:p2AravrQ/l9pkQNJQNFeQNcQNJ
                      MD5:711AB0A84FF991150DA513CBD02DF9CA
                      SHA1:A41B597D95C2B4198A7BE1CB8C3DB944F1EF7625
                      SHA-256:5A172C528965A33C181E1892C95EA09FDF942BE25FB375F5263B707EE51E11E5
                      SHA-512:F9061DDE4886EEF2E83B879A47E4DA82E7F2F5ADD0447756D1BC2724026FDF263596035311A7186EB6D8C3CDD94F5E7C95B08FFD643BF46BCD392E9370513C51
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3875492364.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 791f084baa0dfeff00c88e2960087f98. TypeTreeHash:. serializedVersion: 2. Hash: fdf6c57a251b9f6ec27bdd2fe01b033c.HashAppended: 0.ClassTypes:.- Class: 74. Script: {instanceID: 0}.- Class: 91. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/anim/cn.controller.- Assets/PackageRes/LocalResource/anim/UIPopText_Animation.anim.- Assets/PackageRes/LocalResource/anim/cn.anim.- Assets/PackageRes/LocalResource/anim/long.anim.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):392017
                      Entropy (8bit):4.746532204342741
                      Encrypted:false
                      SSDEEP:6144:qC5hbaPvG0J4fKs6DJIJosi40zPr96qQEQk0q5II4B5kNcAnk+Nt1DJY8PUNz1/r:1TK5kOZAV1GLq
                      MD5:79FC66EF26C612F5940FF7507D6571E0
                      SHA1:EAEA3293EC5F0B5EDF779CAD7DD66F89857F7AD2
                      SHA-256:2714167F9069B10FA3AFA8336B8583E38C2AE2F0E73376A91C91C8041F0C9C80
                      SHA-512:F28A8DE7607B9F12361F14484A73645BA3A7FD17710B2536E199DB8CA1870BCA45460928B484453E7CEDA31FF2FB6F5239A3A92CD1D37ED45B8E53F49847CDE4
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........Q...T.......C....Q.......Z@........z.....CAB-fe05007a5593413dbb0708c2e69a49491.A.......9..`.resS... ...z....... 0....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ...........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):2005
                      Entropy (8bit):5.017632132928824
                      Encrypted:false
                      SSDEEP:48:p2+d42LkWYs0WYr0WYq0WYU0WYB0WY7m0WYW0Wgy0WYg0WYm0WYj0WYZ0WYH0WY+:p2+2/Vcr963D3pBH0SAIRxvs+WoDmi
                      MD5:D71385E7C3CEC332A24A5AA986C5AE46
                      SHA1:FE0A8AC58B38D3D1E0CCA2277EA4185C035A8395
                      SHA-256:19D516CB5472E84CE56D6EC4BBCC916FC56EE06483089E900C81475C0B941E4E
                      SHA-512:B87735FD4E783754D9267389379B24D723C6F38AC994A1F47263F5CCFB75681BF26DFDFD5B0E19F73ADDCC1A9D3DC24F32BE500489EAF0D5F7A46024E5BD12DF
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1405147586.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 7a53d1498d17a911c03b68726dbb3eee. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_01.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_19.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_21.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_09.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_13.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_14.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e_buff_03.png.- Assets/PackageRes/LocalResource/arab_res/sprite+UIChooseEvony+ebuff+e_buff_07.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/ebuff/e
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4567
                      Entropy (8bit):3.394902431496091
                      Encrypted:false
                      SSDEEP:96:I2B5lpwsuUPTDs9Ku0erg03N6pBC88A9AVa:I2BL1uUbKKx03M2nA9AVa
                      MD5:85D9577D1E8AB1B6999AB8AD42446431
                      SHA1:97BBA3AC8FCBD4A21232E0CA6452FAD4554E5BA8
                      SHA-256:7ED5B50FC8B8F7BF74232CB1A3DF6E769F189914567DA5ACBB8411D55BD43731
                      SHA-512:E236B1396ACB0EE4E54218F7D190C42A3B172121240E4850122C347D191B7EA0CA602CD24957615707B9B27F78E34F9E86B49F38DF2C62CC85F040C12F35821C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............?...[...C....Q....g...@............CAB-9348d93c800af77f2c5aab365e64e381........g............2018.4.0f1..................._F..ZW.-OBIr.:...............7...................H.......................1...1............@..............................Q...j...........................................1...1............@..............................y...j...............................................$.......................-...................1...1...............................................j...................H.......................1...1............@..............................Q...j...................9...........................C.......................P...................y...\...............................................$...................9...b.......................C.......................P...................y...\...............................................$.......................n...................H........... ...........1...1.......!....@...
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):491
                      Entropy (8bit):5.074476125137265
                      Encrypted:false
                      SSDEEP:12:1v2Hwe29JAA7e29heNRIbN3PqGXqG3rEyUWw+NKZQN8lM1i:p2QrTPrG8bNR14yUWtsQND8
                      MD5:C5D26506D81352F8EC82380631A6E173
                      SHA1:E617DEA65D681AE60B304FAECA6F53FB090F28C3
                      SHA-256:0A859ECC7F4BC99404EBC1A09691867497D9798BB2A00634EB7B708AC3DC7319
                      SHA-512:CC0A4A3E2AE4B859A334DD1ADE264D0AA7F519DE04F9D28455E24DEF1A1B10782A7C7606D23D91A7EBDB08CE1C382D773D2D26D9DC0ADFF96F8F4616F1CE8A79
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1116332981.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: faceecb631a3dad9cde5997c3b0b9e6e. TypeTreeHash:. serializedVersion: 2. Hash: a543ea25167c0f2458855fa0fa4327b6.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: 441b55d13c7a3c049b35714b57a0f50c, type: 3}.Assets:.- Assets/PackageRes/LocalResource/prefab/Debugger.prefab.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):5222823
                      Entropy (8bit):5.797439385558632
                      Encrypted:false
                      SSDEEP:98304:eJrpyd9a6/XDxhxfFEATqyiuKrBT7GF8CUWzqPrdZOMAo:Arpyd1dTNPEB8l8io
                      MD5:D57FEF33DC7152C81193F5E4A71B5A69
                      SHA1:BDE9AF24E8633B841F047372506E6C90F0B17409
                      SHA-256:8CA65524A2156235E9FF22DD847E0CE5A2C64F5582464576D1120ED28A679239
                      SHA-512:F90479A95CE8C1F429560569352AF34E99EF99D54C3556905CE8AF072E17F6D7C3B8D5D1B2FACE17F67019010981A4DA199CEEADE87099AEEB9527905A7C830C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......O.....V.......C....Q..O. ..Y@...............CAB-cc2a4bd791e39fbb93e1829f3d2311ef1.P..L.8...9..`.resS................0....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):8262
                      Entropy (8bit):4.881847441239691
                      Encrypted:false
                      SSDEEP:192:pkJ5Bu9/5tt3CA1n+UcHkEz8M0hX1bSxcGuOAwn6DKg5BqAyv2CsatDis7fJGxua:po07
                      MD5:A2DD0C6D9C3D7AC4000F2B8A7A156653
                      SHA1:F814CFBADD5989DF0D7AF9FDC9FDA1EF4A6AA6C7
                      SHA-256:43432BC11A619A124F26B3C2EA84F116F00B7B00712F9990900E65672F8F192F
                      SHA-512:B91465D12CC233DD926A87E75D091B92BFB913F89550A5A7F1405E1EC27533CB005A2FCAC518616584E796474C91FE29469FB1B4B1BF5B5FD713E18484589FA8
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3325686664.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 3890270a2ddf2c346f72f707ad171066. TypeTreeHash:. serializedVersion: 2. Hash: 4bd58a228d008f9654313553a1feb0ca.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 43. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: 4417304ef4e6f6549bf9faa471f7e240, type: 3}.- Class: 115. Script: {instanceID: 0}.- Class: 198. Script: {instanceID: 0}.- Class: 199. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/material/smoke01.mat.- Assets/PackageRes/LocalResource/material/background_03_smoke_03.mat.- Assets/PackageRes/LocalResource/sprite/effect/tex_em_smoke_01_mask.png.- Assets/PackageRes/LocalResource/material/evony/flash14.mat.- Assets/Package
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):9035853
                      Entropy (8bit):3.3821922226513665
                      Encrypted:false
                      SSDEEP:24576:GizPtpiFfUk+/XHgQyCmHd29A4oOcxTQnzVWL7+8vqKRTTcjUOhLtiK:PX/XHgQyndMcKzVWP/N2hLtiK
                      MD5:9714559A274979A2B1323DA47045D8DF
                      SHA1:64218F81538DD985843598807122917CBA04DCB5
                      SHA-256:E3F48C88E635DDE0B1FD25827ECEB9773F612EDCCFCE9A4747ABE016B4AC04D7
                      SHA-512:3AA2CAFAB36A21744A46A224A42574AF990FC3364A4A0721F59398B368AFEF4200620BCCC3E5AC82A976DB7592273A6CDBBB9C2CAA6A255428357E812744A639
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........M...T.......C....Q.......Y@...............CAB-ed4879b10107c85932dd4e4ae180a7841.2..p...9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):3378
                      Entropy (8bit):4.814759203487136
                      Encrypted:false
                      SSDEEP:96:p2QVNK2bkQZ2I2B2i026+EkM2ZVXkrB9KmIeQkE1GOMkcVf2/9jrU8tF+QJaDGsO:p4kfZL8h09+EXs9OB9KmIeQBgOMDJ2/J
                      MD5:8393B149EEC9D34EF446E219BBBD4A31
                      SHA1:B7F9F4D444FBD73E63FB9E5F224098FE571D0521
                      SHA-256:DA55B7E6889A47318596625971C291569DD7A0CD28FF274D61DACAB361457E8F
                      SHA-512:BFE7E1ECE8B1CC0BB2BBD0ABE8BB6DF44C0557DC2BE2ADBADCDB6F7396A065B41513F4DC938D744B162C543D810F2FBFBFA9E4DC2604A14783B28DA2A95BF798
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 4260396515.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 418fb4189073142676c8c81e360face5. TypeTreeHash:. serializedVersion: 2. Hash: 11e69e6fadea9d6248cd74c8a6d510dc.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 49. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: a6b194f808b1af6499c93410e504af42, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: f1b3b4b945939a54ea0b23d3396115fb, type: 3}.- Class: 115. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/general/ru/bidedadi_Atlas.asset.- Assets/PackageRes/LocalResource/general/jp/riben_Material.mat.- Assets/PackageRes/LocalResource/general/eu/lichadadi.atlas.txt.- Assets/PackageRes/LocalResource/general/ru/bidedadi.png.- Assets/PackageRes/LocalResource/general/ru/bidedadi.json.- Assets/PackageRes/Loca
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1773037
                      Entropy (8bit):4.147922904092557
                      Encrypted:false
                      SSDEEP:12288:n2gdMBgvq6qM60cOyopWBnD5Bi2XAqSZN+7jkKKVRmmiDG0Dx:vmoZ1pW3Bi2+WN
                      MD5:350E45F6C72C31ACA47A4BAA056529F7
                      SHA1:7165B650143F00D569C95AB00C5EA4CB31F2DE46
                      SHA-256:CFB99D02C4CEBEF7F7908CCCBA985C1453BD97945474B4B61E225F3790E7C0AB
                      SHA-512:844DFB0484D2442491FB6FC4CC971A8D7D8F9BAE617E66EFB41AB2AFEA4BFFFD5F8EE8FCF27A730028CF4368C2E2AC9B29EE94C9A5B5A8B6421AA49C1C8EAC49
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q....h..Z@........ih....CAB-63490e8f6c0e326cebb67b8bbd786ced1.A.......9..`.resS.......ih............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):107932396
                      Entropy (8bit):3.596331052008626
                      Encrypted:false
                      SSDEEP:1572864:KKxWtkU7HTVdmEaFKW9hsVKWQvhtuke3E:FWOU7TVdmJFKWHmKthtukL
                      MD5:7CDFE9FCCBE335CD27631EA903E78406
                      SHA1:20419032984A1E7FB58723AD0CB3CD78C0C4B3D8
                      SHA-256:D4921FB5284E9ECA046FD905CD2EA3958EEB726077EBA0D14740326FCF3C02F8
                      SHA-512:5291ADAF4F1FD709F6F26445559F63D0F0304D8C715D42F49DD1C9917F984BEE3F4BEBEB4D437954085D4388F61065EB7EC143178EE4FB1A54ED157F1C088832
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......n.....W.......C....P..n.d..i.@........*......CAB-0fe3df0bc12f581f14329965c1ea52b81.P..D.T...9..`.resS......*.........0....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@...
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):21540
                      Entropy (8bit):4.8038303368102095
                      Encrypted:false
                      SSDEEP:192:pKKNUD7eo6A5iAgn/vu7Za27G07AA5NjERyaah+Rn9PxfqLHJwHP1/8eRvGJ6C+e:pKKr1aErjAl3h
                      MD5:83B242496B61BFC30EBDC5078CAE8B7C
                      SHA1:C4B82D54D3486636A0657CC0B1BE7308508610A9
                      SHA-256:DB85484730936FDA23BA7DC626FE9B2B5B471121F54AE1300FDB7B5E18878952
                      SHA-512:E210DB088045E5A68241CC563318BA511041DD8254AB21DB4EBD705E0595530395B3DB26198900031B93F7EA1262C8BC0AB4008A345ECFF901C609EE7012311B
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 2256837176.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: c9091d7180bbe7aa5d2f2c85077d936c. TypeTreeHash:. serializedVersion: 2. Hash: 62810051076162514a64b40501fbf5e7.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 21. Script: {instanceID: 0}.- Class: 23. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 33. Script: {instanceID: 0}.- Class: 43. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 49. Script: {instanceID: 0}.- Class: 95. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: d247ba06193faa74d9335f5481b2b56c, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: a6b194f808b1af6499c93410e504af42, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: f1b3b4b945939a54ea0b23d3396115fb, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: a1fd8daaed7b64148a34acb96ba14ce1, type: 3}.- Class: 114.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):5107
                      Entropy (8bit):4.784254519424676
                      Encrypted:false
                      SSDEEP:96:p2zzKNdO5k2XEOFWqFFGw72poRpTei4EwGGAjNlSuvpGcsvWN2VYl+Kij+zmj0gs:pen5k2XEOFWqFFGw72poRpTei4EwhAjx
                      MD5:782D7693D89E2D74ED27551173E7F48B
                      SHA1:18CBF038771936770347AF8ABB1DCDEB2009C05F
                      SHA-256:5A9077FD552D59D393DE64C5706680175BDEBEEEA6CE20BBBA6ACB222039405D
                      SHA-512:B77CCC730DFF2D446012289C4C28DDCDF8C928D5083B729EED2BFA5ABDE7DA39B72E69ABF71A4FD9CE49355D37493BA70F2948831B64F4ABD4C81947E7FB8C17
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 312221760.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 6d097b706fea92014deaf56ef57e08af. TypeTreeHash:. serializedVersion: 2. Hash: 2215a0e0435a7784e7784ff76cb08d71.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 74. Script: {instanceID: 0}.- Class: 91. Script: {instanceID: 0}.- Class: 115. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/effect/load/0000019.png.- Assets/PackageRes/LocalResource/sprite/loading_scene/remind_bg01.png.- Assets/PackageRes/LocalResource/sprite/effect/load/0000010.png.- Assets/PackageRes/LocalResource/sprite/effect/load/0000017.png.- Assets/PackageRes/LocalResource/sprite/effect/load/0000016.png.- Assets/PackageRes/LocalResource/sprite/effect/load/0000021.png.- Assets/PackageRes/LocalResource/anim/8.controller.- Assets/PackageRes/LocalResource
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):931472
                      Entropy (8bit):7.529432163624965
                      Encrypted:false
                      SSDEEP:24576:MAlAFaLFIGS100bNYrTshs2uegxbAx/B/gpRAixOvqOSBjT8:4ILFS10jrTx2LOABB/g5OvqXC
                      MD5:235AA160E07723F9136B4D4D4070E87D
                      SHA1:9F0D2FE0C045302E4BC7C2D9DB757CAD10D6ED47
                      SHA-256:4B81BA8B9918E62CBF063CD7383F4AD87C36BEC7B61844247F2D2A448A1C5F49
                      SHA-512:3DC1FB51A87F2F812CF56C47860D45674E9E11B67E9E292E66E6E990CDEF7530FE69E2457BEBE4F7498FAF4C0C57D702E845BC3A6017EA838149F2EFE562712F
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......6....S.......C....Q...6...Z@........6.....CAB-8eb5afc69756348754dcedcf093bbc3c1.2......9..`.resS.......6.............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):931532
                      Entropy (8bit):7.22055760767837
                      Encrypted:false
                      SSDEEP:24576:5Vl1WW2EMnMk1WYVWm0GhPsP3mQko4Ovd8+0:5VEliY8mXiWJoYX
                      MD5:6037AF6736D8D05A610422505F3F278F
                      SHA1:730EC781B182C1BA35097999E996A6432191EE30
                      SHA-256:C8E14F407400D169161157B6258D7DF16281E07886A7E4E3514E79223FC6CA6A
                      SHA-512:D48207BBB7133A653E5950277C0DC414DDFEA893B8867041314C087139D168AE650C070279600FCFD0FA9B459A7B58CD1B10C07DFE7D584ED843A21443386D8E
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......6....S.......C....Q...6H..Z@........6H....CAB-492f03c5cf2f9214d59de91ce73f717d1.2......9..`.resS.......6H............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):850
                      Entropy (8bit):5.059022196131855
                      Encrypted:false
                      SSDEEP:24:p2wNfrMpir4NE36fLkQNa50QNaG+0QNaC0QNaG0QNaj0QNaS6K0QNaC:p2wtM+2LkWa50WaG+0WaC0WaG0Waj0Wr
                      MD5:11FAD79ADA19D9537CCC29A098FC7C93
                      SHA1:C95A6522DCBE4A25EDCB973CE35EE9D16BCC6B72
                      SHA-256:A85EF7EBD37657675FFB34C60F1208BDA521458434394E8CDF2339941133E990
                      SHA-512:C8FFAFB9F7C80F2C03A58C796D0B02C86655A73037EB3CF302CFDF3FC63052E918CBEF02E5D3F52D6B89151F7462B07A0AC8F715448076A5E7DA179749B86C42
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3577163496.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 1be146005a33c6f25e3132a428b843b9. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony7_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony3_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony6_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony2_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony5_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony4_vn.png.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony1_vn.png.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):829
                      Entropy (8bit):5.070189676678041
                      Encrypted:false
                      SSDEEP:24:p2+krvr4NE36fLkQNaVQNaS/bQNaxQNaXQNaiQNajQNa4:p2+OD2LkWaVWaibWaxWaXWaiWajWa4
                      MD5:DD3BA62B66CD6C853CD8C04CD033081B
                      SHA1:A7AB167C022C0D6E651359FD55C2373F291D1C9E
                      SHA-256:44E8D62BA123F9BF18A3402FC8781F3B9B834956645220CC1606308034E9A3C1
                      SHA-512:AE54718CB5DEEF9DE48B72389A53C10D41284B22DB39BADC72F91FBC4D4316DA1682DF4ABE95E8C6A0A0C4B5D52FE89D102AE6AD356E3619F192231B53F6F699
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1672353467.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: f65fa72030fdd0a4c9596e559d629035. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony7.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony4.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony3.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony5.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony2.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony1.jpg.- Assets/PackageRes/LocalResource/sprite/ChooseEvony/edge_evony6.jpg.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):224598
                      Entropy (8bit):4.478586820066412
                      Encrypted:false
                      SSDEEP:1536:mNk6ROxkkLEacsRTwVNlPQYXuslriP2oeIiGiRMZYSpgoZzNiFGjw1rTi3xd/Csp:kvNTxSp/wivFzW5ZIQcBZ
                      MD5:D7FAC9456BCD3B4359C7A7DEEDC726C1
                      SHA1:8BEA6740C79ED410E26289F216E606A7FE609ECF
                      SHA-256:279B2F5B82FAD06A7C0593FFF1EA717E508CEC30EB40DCA1A00F3A762557F0CC
                      SHA-512:0C5DA93F351388407922B24B58007BE6EDB59C1197C12566DCB86C89A6E4F52D4163B7E15D07509DE80175AC558DAD419ECFF236602341314A092E8E93F067B8
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......mV...U.......C....Q...l...Y@.........d.....CAB-133d099960a40a5c0ae86476b081b2561.A.......9..`.resS.......d.............2018.4.0f1..................q4m...)M...f..mL...'...........7...................H.......................1...1............@..............................Q...j.......................................................................(...................H...1...................1...1............@..............................Q...j.......................B...................L...R...................L...m............@..........}...........................................1...1...............................................j...................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...........................................1...1...........................................H...j...................1...1....... ....@.....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):3245
                      Entropy (8bit):4.909785599233786
                      Encrypted:false
                      SSDEEP:96:p2WQlZAWILp0ifmWZGbIdSosQflsUlIl/L+YIe/SCffIC0kgQpOnq32pzb:pYILp0ifmWZGbIdSosQflsUlIl/L+YIf
                      MD5:4AC6494BE7C196442E6D573DACFF0206
                      SHA1:FFD048E7E6D0D8677F4CF2CDBFF3F9FEB7FE0C65
                      SHA-256:837F1901038837EE8FF05B8B27C98DAFD5685A89296E6036C6B230EE1170A8EF
                      SHA-512:F68DFBE6E4957D8C397549B32CDC4FD9B4B936B449D3C74A6AEC63D54BC20CEC5CF78122B61CE2ADB5FDEDD7AB86C09D92AB34654F136C365F88CD95BA0E1582
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1666929481.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 3e2a8c88af3ec1bb243f02e9c1384afd. TypeTreeHash:. serializedVersion: 2. Hash: fe397485c3cec1106b49e9ff95e8f8a2.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/common_material/custom-add.mat.- Assets/PackageRes/LocalResource/common_material/default_particle.mat.- Assets/PackageRes/LocalResource/material/smoke_3.mat.- Assets/PackageRes/LocalResource/common_material/splitalpha_gray_ui.mat.- Assets/PackageRes/LocalResource/fbx/Materials/hz001.mat.- Assets/PackageRes/LocalResource/material/hightglow.mat.- Assets/PackageRes/LocalResource/common_material/thanks_Orange.mat.- Assets/PackageRes/LocalResource/common_material/storeGiftBlue.mat.- Assets/PackageRes/LocalResource/common_material/No Name.mat.- Assets/PackageRes/LocalResource/common_material/custom-
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):2367139
                      Entropy (8bit):3.6899738389184695
                      Encrypted:false
                      SSDEEP:12288:HX5mHBGTDKquvKVhdaWJN/YTmFLkkLnOaLr:40KquKVvpJN/jLko/Lr
                      MD5:3667C3BC0D864E35922816453F015796
                      SHA1:3C9C112F3F6FEA752F16A4E1E74F68B4CB19E4CD
                      SHA-256:6F422F534DEE4B77DD722E77283068EBC0C3A29901376D1ECD011257BE263560
                      SHA-512:B00AA73706CF9A7BBBD598735FE82796BB4039F449AF6BF07952DEF3E060B3E7A57CBFC05EB7F964DAB01F66FCBD1D07007E59D2CDDE22FCBCB43A8A760B7FB2
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......$.....V.......C....Q..$....Y@........$.|....CAB-eaec0411ab28653904f541e622fc2d981.P........9..`.resS...*..$.|......+.....2018.4.0f1......q...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):15738
                      Entropy (8bit):5.389688332389932
                      Encrypted:false
                      SSDEEP:384:pfi1ixipioiXiaiXi0iGiyQiziAF3dkAVRbvzLd:pfi1ixipioiXiaiXi0iGiyQiziAF3RRh
                      MD5:0301DCC07FB688275323F017906DE3B0
                      SHA1:CF96E8A3D8037370020A5D5F0CA3BF8DC1ABCE4B
                      SHA-256:2C1E0C2F6A4195982D409CF50C45D53BF10B89AF0D8016DA96986D3E93B6360B
                      SHA-512:900094D4C1E77A74F938C4AF9025B965B7CF1B289ACE77F30CF69ADC8036CA5D27DA59F726FE5A0A00C730BC8AE1D4F2020D300C7A3CABEE894F84AF70DDFE6A
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1629241105.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: ae5e4aeb96de59244b0a18cb58ead346. TypeTreeHash:. serializedVersion: 2. Hash: 05d971bdc565159b1dc58dacbc921b38.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 20. Script: {instanceID: 0}.- Class: 21. Script: {instanceID: 0}.- Class: 23. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 33. Script: {instanceID: 0}.- Class: 43. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 58. Script: {instanceID: 0}.- Class: 60. Script: {instanceID: 0}.- Class: 81. Script: {instanceID: 0}.- Class: 82. Script: {instanceID: 0}.- Class: 90. Script: {instanceID: 0}.- Class: 91. Script: {instanceID: 0}.- Class: 92. Script: {instanceID: 0}.- Class: 95. Script: {instanceID: 0}.- Class: 111. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: 747981004c46d7848b04200f8
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4421115
                      Entropy (8bit):3.3558047454876903
                      Encrypted:false
                      SSDEEP:12288:1VLkPgOIJWt1U7rC2Dk7P8kccF+5xYGYcuwfpCCPiD6kjhvl6Ey8D9P7dtIbOw8s:DLkP3Grx5c+lYc4CPiD6MjPvIPX4wl
                      MD5:4948AB0B908342E62C34ED4805939170
                      SHA1:500D047533E48B56F1F46F987B75128DCB67B9BB
                      SHA-256:482CEFD87195915C68AEA2A2A4E5C21D63AF535330C6D60FC7E25319ACAF5319
                      SHA-512:6BC14E2E29367A2BF63532A16FC278753DE70A8BB411518E96F2C5F763769CC70079301395D271666AFC91ECC25A012E34F2ADD613AC68029B8541DAB6CD45FE
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......Cu....V.......C....Q..Cut..Y@...............CAB-7e5bc4e953c748a0f29f181437f3eaf61.P..<....9..`.resS...Gt..........G.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):6251
                      Entropy (8bit):4.980760946317052
                      Encrypted:false
                      SSDEEP:192:pceUMIUDC6eUafjQCH3/YSfypalbgyH14oaoHL36XyBrCyo1xxoPVRcmRC/Ri7zs:pcbD0jDl7
                      MD5:7F29AA8ABF32C3273446A4FBB2FCD452
                      SHA1:B5B16726287E8317F5208A4A82B4FCCAD56F7FD5
                      SHA-256:D998CF1FCC7BFD6ED2B155EF79E0C7C71CA8024F49B523BE58ABBFFA70CC01F4
                      SHA-512:B514C154E268F61E30440A50452A109D5EC9A76FD45F33312399D2C663A01F4F6C3A76681D0CB84F728BAA0AABEA0522B46B6F6245AE89313CCE6EA3F3ACDD2C
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 1277931793.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: daec61e0714f23db9b81aa08d1edeca5. TypeTreeHash:. serializedVersion: 2. Hash: 3b0db16f5ef7448d73bf6ef33d5fe5c9.HashAppended: 0.ClassTypes:.- Class: 1. Script: {instanceID: 0}.- Class: 4. Script: {instanceID: 0}.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: cb1c140e8ea294aa0b9d6a1c667df106, type: 3}.- Class: 114. Script: {fileID: 11500000, guid: 4417304ef4e6f6549bf9faa471f7e240, type: 3}.- Class: 115. Script: {instanceID: 0}.- Class: 198. Script: {instanceID: 0}.- Class: 199. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.- Class: 331. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/Raw/Sprite/UI/Icon/UIIcons/icon_switch1.png.- Assets/PackageRes/LocalResource/sprite/UIChooseEvony/line_jp.png.- Assets/PackageRes/LocalResource/material/fire1.mat
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):2109873
                      Entropy (8bit):4.460827768689303
                      Encrypted:false
                      SSDEEP:12288:OUSsuIwrO+P6ssDaumy0SrSYAVAVDWbaaiXmQ17pS5uycuj0eQbSmQT65q3ASSgy:aHeZF/WTSKC0+
                      MD5:6A8C11CB375DD61CCF5D17D1F1B5A409
                      SHA1:AB255B3F0FD3FB0F53DCBDF13B1814BFFF2F274C
                      SHA-256:B307D60D8E012148CFFCEDD1ECD6F15E84B0A534C9591DD8B10A6F73D0BAD726
                      SHA-512:A6E29074EA77986410426AEE1DED0C3B36159C59F16AB4F6E9962F489E0547B4FB902A938D03E78DAE707A14602AF380C042673D30CD280B9AD952A00F7766D5
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...... 1....@...[...C....Q.. 1@...@.............CAB-c236c26044bbd2dda67734e4a9b82d4f....H. 1@.......`....2018.4.0f1..........0........`.>....J6._.5.-...............7...................H.......................1...1............@..............................Q...j...........................................%...:.......................E...................1...1...........................................M...j...................H.......................1...1............@..............................Q...j...................H...`...................1...1............@..............................Q...j.......................n...................1...1...........................................H...j...................1...1............@..............................Q...j...............................................{............................................................................................................................... ...........H...........!.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):11129
                      Entropy (8bit):4.76584765355406
                      Encrypted:false
                      SSDEEP:192:pMshrgyVg474i7XugZwHYjAdAngk9A+2Az/odgmgog+gJ2wntjgA47gdBA74kX9e:pD/tvArfVFMbX
                      MD5:73A51FC4200662BD23425B005AAB22B5
                      SHA1:8E31380978E3BF11AA53C05E0D3DF2595D3F7C94
                      SHA-256:A32C45C4BD4E119A86E0A7729EF112873EADC83BBC8D7D24460BF17653EB5D68
                      SHA-512:D072FE719AA562DD61F32E1FE4F8EF25657B2A7A203F253A7D546C6E496FCDAFB47926A1BFE84879E2132331961496395A0BF07154AF4AA3B8D150EFE0310757
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3773303932.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 6fe8977044de76ecf5fb2930c0d68a19. TypeTreeHash:. serializedVersion: 2. Hash: 0f6653d6b7f92e9b2f4e865572aa4804.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.- Class: 109. Script: {instanceID: 0}.- Class: 114. Script: {fileID: 11500000, guid: 78b2425a2284af743826c689403a4924, type: 3}.- Class: 200. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/common_shader2/custom-area-effect.shader.- Assets/PackageRes/LocalResource/common_shader/UIDissolveDoubleTex.shader.- Assets/PackageRes/LocalResource/common_shader2/custom-particle-alphablend_rgba.shader.- Assets/PackageRes/LocalResource/common_shader/SpriteInOutLight.shader.- Assets/PackageRes/LocalResource/common_shader/SkinPBRCombineMask.shader.- Assets/PackageRes/LocalResource/common_shader/em_shader_vars.shadervariants.- Assets/PackageRes/LocalResource/common_
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4390546
                      Entropy (8bit):7.9511381117449424
                      Encrypted:false
                      SSDEEP:98304:ikpGo5zN/JWMUTKPpBr2/JWMUTKPpBawpA3BRUYJbznKqWPCda6KNcvu:ikpGGxJZUTTJZUTBwqnUuzKqW0a/Gvu
                      MD5:A1C35782D12F4C6377EF9BB6AE2D8809
                      SHA1:22CC6FA1F2EB500505878E1719E2AFC18F2108E5
                      SHA-256:E936F81B582495202D4DFE4BD94A30BB854FC3C581E6D99FD74F3A8067D5C175
                      SHA-512:F7ACD4824F83FA71B29EE8CD1787DFE6F7C3D974A50F111FCD8F9827E6418996DAF64DA50369E2DB238EB1E2894062F806F44FB30B0AA9BA6D29DBD9D8D7BFA1
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......B.....Y.......C....Q..B....Z@........Y(....CAB-7d3418d4cc4d583fa3c95f4e1dc6bd1f1.P..B.....9....resource.......Y(............2018.4.0f1..........S.......4IF^7c..3Z.....................7...................H.......................1...1............@..............................Q...j....................................................................... .......................,.......................<...................L...E...................L...W............@..........c...................L...s...................L.......................L................@..............................H.......................1...1............@..............................Q...j....................................................................................@..AudioClip.m_LoadType.m_Channels.m_Frequency.m_BitsPerSample.m_Length.m_IsTrackerFormat.m_Ambisonic.m_SubsoundIndex.m_PreloadAudioData.m_LoadInBackground.m_Legacy3D.StreamedResource.m_Resource.m_Source.m_Offset.m_Siz
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):4493
                      Entropy (8bit):4.857978096751818
                      Encrypted:false
                      SSDEEP:96:p2VhDA1LRRRjrRYRNRQirR6RfRTR3RDURCRLRIRmRHRwRGRCRjRLRCRWRURhR8cL:pC0rzjdenQidQZVhWI9OExmkIl9I0yDn
                      MD5:59465C90B5621651A0B0F567EB90D1D8
                      SHA1:100616419834DFB1B451ADDC3350D73CC63945B5
                      SHA-256:8D8DD0375C7A54A44AC1E277FD59942FCAB7FC99816CFE0DD672962CF57619BB
                      SHA-512:478D2890B4C249E935FB01C085C68E62A238136BD018F42419C8AA1619B09153A7AC9A54B31E6596B951EAF6619C401E4C85515B27BBFA18841ECB5A6A33B55E
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3662444195.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 3bb71a004336483612efec5ccea4934f. TypeTreeHash:. serializedVersion: 2. Hash: 3f7d0c5e0986ec71841622bcb2f9be1c.HashAppended: 0.ClassTypes:.- Class: 83. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/Raw/RunEscapeNew/Sound/1103_skl.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/get_reinforce.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/runEscape10_SingleShot.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/run_escape_bgm1.wav.- Assets/PackageRes/LocalResource/sound/intro_music_03.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/runEscape5_SingleShot.wav.- Assets/PackageRes/LocalResource/sound/intro_music_06.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/FireWall_1.wav.- Assets/PackageRes/LocalResource/sound/intro_music_05.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/3002_atk.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound/get_debuff.wav.- Assets/PackageRes/Raw/RunEscapeNew/Sound
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):197630
                      Entropy (8bit):5.273595500167126
                      Encrypted:false
                      SSDEEP:3072:ZajwQF+HwBnnRrMPWXCZDsNIQffgh3pfh8:MK4ro4CoIQffgh3pfG
                      MD5:2D93B270076447C002C8609952A40819
                      SHA1:DA00FE94E6716F92BEDF0FC22FFD56C191DF0B95
                      SHA-256:24450188150269A8654D5CD2123B7265E9D754387CCF3E4A4CA2A914012F0603
                      SHA-512:FE1AAE09DAAA0FC7BB2C7200CAE3FA8D16A7B091CFC15AB433CEE9025EC4292636D0649BCAE96B68EC659394B1B85F7B5BCCE84E0EDCFAEFBB3F59C6780C8BDE
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............U.......C....Q....x..Z@........*.....CAB-636d07f87837fc6de0a147ace1cc47101.P.......9..`.resS....m..*.............2018.4.0f1..................l@.})Q...OZ`.O]$...q.......j...7...................H.......................1...1............@..............................Q...j...........................................L................@..........+.......................3.......................<.......................P.......................`...................L...k...................L...x............@.......................@..................................................................................................................................................................................................................................!.......................2...................~...?............@..................................j...................J...X.......................e...........................................H...l....... ..........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):11586
                      Entropy (8bit):5.0385081278400055
                      Encrypted:false
                      SSDEEP:192:lEqh8E2BL1uUbKkGFEvtZ7GD1he7zHGPElORBkoX6uUD:lCE2Bpjb5GFEvByOoX6R
                      MD5:48295BE0F29961E7B5AF4DAE1E0F35D0
                      SHA1:96480CB93C74858D4A894B35D1E5D4A38DFFB8D7
                      SHA-256:922B5F92F613A593A7B45B0EB0695DF1A988495BC6B4C9CB05061BF1160B446A
                      SHA-512:4527D5014D3EB717FCA03370D7E864E37D5E2F1BA29A03DB75D6D242056B6920AF1A9973944B0656E551BF819A42D70346048DC5CE61AACA05BA2B3932296D98
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......-B...U.......C....Q...,...Z@..............CAB-d99235859c4dd2cc8fc792d376a99a891.P........9..`.resS....|................2018.4.0f1..................l@.})Q...OZ`.O]$...q.......j...7...................H.......................1...1............@..............................Q...j...........................................L................@..........+.......................3.......................<.......................P.......................`...................L...k...................L...x............@.......................@..................................................................................................................................................................................................................................!.......................2...................~...?............@..................................j...................J...X.......................e...........................................H...l....... ..........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):567
                      Entropy (8bit):5.102238695830329
                      Encrypted:false
                      SSDEEP:12:1v2bRwe29G/7e29tFtK7NtvqGbfqGRfqrZQN8Xjuv+QN81QN8uEi:p2bir8jr7FtevvZfDfkQNvGQNsQNj
                      MD5:D9937A277221B208B4D9917BE0DF8DE1
                      SHA1:A69159E466C4B388DC2582D6B8BB6036347C01D7
                      SHA-256:1165ABBB1CD0DA23A1F46D8E23396980C68A2F037C326C579BC9AD084B40F2D8
                      SHA-512:A32EC5E7C3087C446A97D9DAB7B8C7F29D12D1AEF69C3A224D3B78796044B7D243D77786571852571D7D4A43F2F2EF029FCDFD17A924E908A6A917DABDBAB216
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 2928257521.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 03ecb93051af287d27fe17dfd6c1b473. TypeTreeHash:. serializedVersion: 2. Hash: fe397485c3cec1106b49e9ff95e8f8a2.HashAppended: 0.ClassTypes:.- Class: 21. Script: {instanceID: 0}.- Class: 28. Script: {instanceID: 0}.- Class: 48. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/effect/star_yellow02.jpg.- Assets/PackageRes/LocalResource/sprite/star_yellow.jpg.- Assets/PackageRes/LocalResource/material/star_yellow02.mat.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):954
                      Entropy (8bit):5.051453844238285
                      Encrypted:false
                      SSDEEP:24:p22rqMr4NE36fLkQNH0QNMQNB0QNebQNMQNbQNTVLQNJGQN4:p2Qj2LkWH0WMWB0WebWMWbWTBWcW4
                      MD5:5CDF40D84F95871D9EACB9BD1645ECD5
                      SHA1:55510BB28C2627324C1865F57FAA33537AAFFDB4
                      SHA-256:7CE7E70986727F2E1F6605FADB19C22B985843EBC6525A7BA73B8F49EF7DAD60
                      SHA-512:3D4651D86872C6846A935EF145014DBF3EDA10DBE3265E71A5291E290438995683A8F36884A1ED555E0D4544D4E835345E9CAA6DC1B7C121C9B3021809366946
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 955401083.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 186236fe47e829ef939df4934b1fb7fd. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/effect/tex_em_fire04.png.- Assets/PackageRes/LocalResource/sprite/effect/hightglow.jpg.- Assets/PackageRes/LocalResource/sprite/effect/evony/fx_glow_a1105_003.png.- Assets/PackageRes/LocalResource/sprite/effect/evony/Flash14.jpg.- Assets/PackageRes/LocalResource/sprite/effect/evony/glow.jpg.- Assets/PackageRes/LocalResource/sprite/effect/evony/YellowParticle.jpg.- Assets/PackageRes/LocalResource/sprite/effect/smoke_additive.jpg.- Assets/PackageRes/LocalResource/sprite/effect/evony/star_yellow02.jpg.- Assets/PackageRes/LocalResource/sprite/effect/SparkOrange.jpg.Dependencies: [].
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):244717
                      Entropy (8bit):4.50867388510156
                      Encrypted:false
                      SSDEEP:3072:/w/8PRBK7/qYM70DEmEEIXKNnbtsMMbd:JBK7y5eHEEIX8eMMbd
                      MD5:6AAADE1F202146E2FC3970A464340656
                      SHA1:75093476BCE83F64DD065E3A87DA2F99A42B063E
                      SHA-256:1971404CC87866FB3D66F5224442C7D2906470C9950D73FDAF28513C6B007763
                      SHA-512:1F86D0A6DAE24059399D0D627C042B129213CC5150E6B718DA8C4B649B340A869A1BE8134382744E2F14DD3D7DDE6D6049ED7B08B510ED3379BAEED1740EC67D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q....h..Z@........;h....CAB-94906411e548dc8efdf1a3afd7e937651.A.......9..`.resS.......;h............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ...........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):1126
                      Entropy (8bit):4.956316911745548
                      Encrypted:false
                      SSDEEP:24:p22jru1ar4NE36fLkQNAc0QNsm0QNMWJ0QNtp0QN9HD0QNELm0QNLQw0QNgQNLIE:p22nu+2LkWAc0WX0W50Wr0WlD0WF0WL7
                      MD5:1508097574D7DB0830700A7D5A39E977
                      SHA1:7523D52BEE84120163BE92DB99E709870B82BC96
                      SHA-256:D28E1984D12C0757E7B7F3C1AD57C31B77F36491214B64327CD13D7F996018F0
                      SHA-512:D9CE33F13AAE54A75E7ED0A7F409855CABD26B55EE805858E255D3B7869B723AD0FCB31DC80A424B6FC7E594606C3D49258B281CF0C466A60CD4FCB4275E069F
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3455822327.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: 46aaf7850e2b6445edb009a144cda295. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/titlebar/Monster_bg_title.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Bg_topres_copy.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Monster_close_icon.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Button_Report.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Icon_back_copy.png.- Assets/PackageRes/LocalResource/sprite/titlebar/Frame_Contacts_copy.png.- Assets/PackageRes/LocalResource/sprite/titlebar/BG_civilization.png.- Assets/PackageRes/LocalResource/sprite/titlebar/bg_title3_copy.jpg.- Assets/PackageRes/LocalResource/sprite/titlebar/BG_civilization_light.png.- Assets/PackageRes/LocalResourc
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):3495066
                      Entropy (8bit):4.150524989149209
                      Encrypted:false
                      SSDEEP:24576:UuMOw/0cEBUB/2byl5/2bylvG9hC+qVVVC+OvX111111111111PZgkDWwitujGXt:rVw/0cUMl5kDWcc3CaVCVZBs
                      MD5:2AD51BBB2C3974FCF2E11CFB24F6635D
                      SHA1:828DAF41EB15D2FB7F5E91EE600F01D5A30A80FB
                      SHA-256:DC2C5027F58D583A490E2BA3018C21D3DA5B0845D5E11649E59EDDF9220F04CA
                      SHA-512:A93471C6F51BB329ACDF786A171F3D28A52C7E0E81A096FDA3C4DEDDF186FD46758917DEA4C3AED135986D154FF90D54178BB3A49E6CAA17CB31408E73A2D4D6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......5T....U.......C....Q..5T...Z@........}.....CAB-a8f4ce95431154ce73222912985e5aeb1.P..4....9..`.resS... Q..}....... p....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ..........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):2068
                      Entropy (8bit):4.832492872619365
                      Encrypted:false
                      SSDEEP:
                      MD5:7262EFCFE7B4C2D500E3D93B88D1B9DB
                      SHA1:6128B51973E73C847A767E06093382BFBB9E96D1
                      SHA-256:7AD1F7EA30EF998C0A3AE6259879C6A709EC19D078FC0A4EACA213186C62C76D
                      SHA-512:9A50834597F9E7A806D355F7B9277B3787DF247F2396BE135DB753CE2365DE80EB3BD31294F9546E78F7677E0A2A87D79189CFDF7BB72305AD5C80FCD8A5C98D
                      Malicious:false
                      Preview:ManifestFileVersion: 0.CRC: 3058749669.Hashes:. AssetFileHash:. serializedVersion: 2. Hash: fef02163ceb9ab83efef451b972f4ba5. TypeTreeHash:. serializedVersion: 2. Hash: ea5a42e0fd8ea905efa7aa926a3b8944.HashAppended: 0.ClassTypes:.- Class: 28. Script: {instanceID: 0}.- Class: 213. Script: {instanceID: 0}.Assets:.- Assets/PackageRes/LocalResource/sprite/ui/icon_wrong_64.png.- Assets/PackageRes/LocalResource/sprite/ui/Ico_Zhifubao.png.- Assets/PackageRes/LocalResource/sprite/ui/Ico_wechat.png.- Assets/PackageRes/LocalResource/sprite/ui/Btn_Pay.png.- Assets/PackageRes/LocalResource/sprite/ui/Btn_civilization.png.- Assets/PackageRes/LocalResource/sprite/ui/Line_Crude.png.- Assets/PackageRes/LocalResource/sprite/ui/btn_Choice2.png.- Assets/PackageRes/LocalResource/sprite/ui/btn_yollow.png.- Assets/PackageRes/LocalResource/sprite/ui/fix_icon.png.- Assets/PackageRes/LocalResource/sprite/ui/icon_GuideAroow.png.- Assets/PackageRes/LocalResource/sprite/ui/Toggle_off.png.- Assets/P
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4941811
                      Entropy (8bit):4.375906112366849
                      Encrypted:false
                      SSDEEP:
                      MD5:FBC8A3910F71BC866B01333C5D2C0088
                      SHA1:54DCA026947021A5672298F6667828AF1B6535EE
                      SHA-256:86229E8149355983FE564080E2B53FDAC315BF90CCB1D7A8DE11BE3706719FA9
                      SHA-512:FEE0F1F91598BCD8B31B70EBE9049B8ECDD1A29C16E68AE771DC37EBD8B6C3E73F539E55194EC29A482838A4EE025E26011391FE02945C5737095C0DCAECCBE3
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......Kg....V.......C....Q..Kgl..Y@...............CAB-5140ff498b44f4eec4b731c22f794cbf1.P..@UT...9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):23284030
                      Entropy (8bit):6.849986119138639
                      Encrypted:false
                      SSDEEP:
                      MD5:AEF1C1D824DF1121BC9D7941179EED7F
                      SHA1:0231E9F40112A9F1204178DFEC6874C4981452ED
                      SHA-256:127D79C4BEDEE3D150D4FEB0EE88288735A36601BEBD8CE5816DC9957B577454
                      SHA-512:62F075C10A84F1FF46A18F7AEBA9D4F869E1668C9312F027A73E21AC6C916602ED51D21CCC28F51176223703E54899DD8B335FD5A13DD36F683D5B2B8ED34447
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......cI>...A...[...C....P..cH... .@.............CAB-033355c909bf9d507eaff7a9bf69d727......cH.............2018.4.0f1.................j.S""h.h....N..C...............7...................H.......................1...1............@..............................Q...j...........................................E........................... .......................).......................2.......................=............@.......... .......................).......................G.......................Z.......................e.......................x...................................................................1...1...............................................j...)........................................................................................................................................................................................................................................................................... .......................!......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                      Category:dropped
                      Size (bytes):2357281
                      Entropy (8bit):7.932261321149221
                      Encrypted:false
                      SSDEEP:
                      MD5:DEA314C78815C1957765830087CE4ECD
                      SHA1:5131E0CEB810BB1EF8324851F4891C981C7BB295
                      SHA-256:98CBE5BF5B3BE8E1B56D29A522FD348DB8B798ACBF6AE4CA067B02638B18003E
                      SHA-512:1A9983B0F8D6DFED4BC617750AC89DA53A6213A82DBFB47F58D0EE95635D0C0D6CF4474A8D980FB933E2ED9C50BE9E87D7DE400A27AF5AB555A33D0F8B7C27FF
                      Malicious:false
                      Preview:....ftypisom....isomavc1...&moov...lmvhd.....G...G.....X..K.................................................@...................................iods.......O..(.....mtrak...\tkhd.....G...G............K.................................................@...............mdia... mdhd.....G...G....N ...@U......&hdlr........vide............video.....minf....vmhd...............$dinf....dref............url .......{stbl....stsd............avc1......................... ...H...H...............................................5avcC.d......gd.....@......".........Q.(U@...h.2.....btrt..e............stts...................Hstss...............u...........................n...................;....stsc.......*.......................................................................................................................................................................................................................................!..........."...........$...........%...........(...........)..........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                      Category:dropped
                      Size (bytes):2357281
                      Entropy (8bit):7.932261321149221
                      Encrypted:false
                      SSDEEP:
                      MD5:DEA314C78815C1957765830087CE4ECD
                      SHA1:5131E0CEB810BB1EF8324851F4891C981C7BB295
                      SHA-256:98CBE5BF5B3BE8E1B56D29A522FD348DB8B798ACBF6AE4CA067B02638B18003E
                      SHA-512:1A9983B0F8D6DFED4BC617750AC89DA53A6213A82DBFB47F58D0EE95635D0C0D6CF4474A8D980FB933E2ED9C50BE9E87D7DE400A27AF5AB555A33D0F8B7C27FF
                      Malicious:false
                      Preview:....ftypisom....isomavc1...&moov...lmvhd.....G...G.....X..K.................................................@...................................iods.......O..(.....mtrak...\tkhd.....G...G............K.................................................@...............mdia... mdhd.....G...G....N ...@U......&hdlr........vide............video.....minf....vmhd...............$dinf....dref............url .......{stbl....stsd............avc1......................... ...H...H...............................................5avcC.d......gd.....@......".........Q.(U@...h.2.....btrt..e............stts...................Hstss...............u...........................n...................;....stsc.......*.......................................................................................................................................................................................................................................!..........."...........$...........%...........(...........)..........
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):36
                      Entropy (8bit):4.405764584655452
                      Encrypted:false
                      SSDEEP:
                      MD5:59E4D6DA2E4B1629CFBD0D2E47544CAF
                      SHA1:F05798F1CD16C148C4A28FA2930B6286EC46CA38
                      SHA-256:437E78BE30A7E43DF7C0AF21FD442B1DB318AF1ECCB1DD8D63DD65F937341AFE
                      SHA-512:955FFAC94B8F08543F0346D1B003A28DE92C6783739C6F48858FB4B14173A531D8E0ACE092854595D02DE9A6B244B10098ED35A602AC3AFDD001D920D8F5754B
                      Malicious:false
                      Preview:topgamesinc.Evony: The King's Return
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):123
                      Entropy (8bit):4.436750024393471
                      Encrypted:false
                      SSDEEP:
                      MD5:FA158312957535B4BD2DB8F3157D7A95
                      SHA1:A83ECC941D9964152776BDA1AAA0D7ABCBB7B380
                      SHA-256:FA4676698D002157B4C44991B9791EA637301A04C19FDBE2FCB07EA2668147C6
                      SHA-512:6B5D7F25211EA67738F97249F3C78782861140A5096786EAF0EB549821D79A55B0BBD56F3D48E3A153EB7D39EB449D696588E3E917764409875A1AF1B08278C0
                      Malicious:false
                      Preview:gfx-enable-native-gfx-jobs=.wait-for-native-debugger=0.scripting-runtime-version=legacy.vr-enabled=0.hdr-display-enabled=0.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):279672
                      Entropy (8bit):6.0990140619090765
                      Encrypted:false
                      SSDEEP:
                      MD5:E7110138DB0E9A4757FDBC215270D899
                      SHA1:8AA357EAEA5D5C7CE4B04D53513838F3673DF296
                      SHA-256:ECA5D4A01194D5228FE4BAB51677D17A86FE045BB32915391722522D8117DEE0
                      SHA-512:F4FE914B8C471F3429889D1BC232F1DF90C346E1A58382A6D9AB2314CD5F5200499741961249F5554BF981C8B28D2C4E7E08EF50F5A69DA86C6BE8B6F8523A5A
                      Malicious:false
                      Preview:...f..Dx............2018.4.0f1..................O.y.....^..I9.........P.x..D.0@..K&1N......=...[+.?.f.'..............$...i.V3.V.^.......$.|u.y.W..z....t.......(%....-.v...\..........!..s....W>.............#eo.Z5.y..8...b......d>..}nr..J.~.FD.7.......GZ|..7Y.....~.>........p.I.-[.e..+..../.......<.n.'.(}.z.M...............3.o...)..~......0i..T...ZExf..!........7{=. ..i...#...,......ns/O.4T{..t~l.,.6.........y....6?....N....S...g2....}......=.....7......1.[.Y.."..NE2...................\...............`...........................................0...............0....)...............4...................B..................8F..................HF..................HF..................8G..4...............p...$....................4...............-.................../...................0..................p3..................H4..................H4..0....................................globalgamemanagers.assets......................library/unity default resources......................resourc
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1356452
                      Entropy (8bit):5.02498668002077
                      Encrypted:false
                      SSDEEP:
                      MD5:58AE9A4B219028E3222CC587B75C942F
                      SHA1:A6E649F0ACC393B9538F469F816EA37012E5E940
                      SHA-256:8B85784F29AC31E0446915C49CEBBBBD1E6BE8653F79C1492909D5534DE654CC
                      SHA-512:FAEC9E2F644191CDACBE1CB6A293816F8FF9DD42DA62E13AFCA136D296B93A84F755872BC41A760D9D8F614792C2598CAFC97F73518159922E71940B88DA4E4C
                      Malicious:false
                      Preview:...............0....2018.4.0f1..........s.......n.0..I?..'.B.........q...\..|...q~.........q4m...)M...f..m0........`.>....J6._.5........&.Z$.S6..jpx.SlK.................U...............X...$...................................(...................0....:..............(.......................l...................................(...@...............h...................`B...................W.................../...................D...................X..................0g...................u.....................p...............8.......................l...............p...\...................h...............8...\{...............u.................. ..............................................................l................................................................... .......p...........!.......@..........."...........d.......#.......x...........$.......8...........%...........h.......&.......h...h.......'...........h.......(.......8...h.......)...........`.......*...........`.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):27421292
                      Entropy (8bit):5.447288438821186
                      Encrypted:false
                      SSDEEP:
                      MD5:646D5F3A162FF3AD6BDE8EF80D235F84
                      SHA1:14683A22B4A0E998372593CBBF7040D5CC622F1B
                      SHA-256:03A7CEE95021CAC402E02D27A3ABCAB90AE5D2D816B669B897AB879D9C2869AD
                      SHA-512:1B444D4D1B733B7E55E35B182013BF1DACE4CAAC65BF96CEB560764DA743BA5BBC51A18D94EF9E1DF63851CD0C80F644B7EC92E68554DBC035F5360202AA1A79
                      Malicious:false
                      Preview:............P...`...,.........D...R.h.....R......g[..g..X...D...........d.......Pn..D-......0......h...,b&..J...&.......&..=....&.XS...C'..k....'.......1.....|.3.|....;N.0e..(.N.......N.......N......Y...8.t.......d...<............g...g..8...T...#...9...\.......\......"...........".......'.......*.......=.......B.......F.......L.......W......._.......g.......k.......u.......~...................................................)....... ...................................#.......5.......C.......T.......k...............................................................................".......0.......>.......L.......Z.......h.......v.......................................................................................................,.......9.......F.......S.......`.......a.......d.......i.......m.......s...............................................................................%.......4.......E.......T.......e.......s...................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):27421292
                      Entropy (8bit):5.447288438821186
                      Encrypted:false
                      SSDEEP:
                      MD5:646D5F3A162FF3AD6BDE8EF80D235F84
                      SHA1:14683A22B4A0E998372593CBBF7040D5CC622F1B
                      SHA-256:03A7CEE95021CAC402E02D27A3ABCAB90AE5D2D816B669B897AB879D9C2869AD
                      SHA-512:1B444D4D1B733B7E55E35B182013BF1DACE4CAAC65BF96CEB560764DA743BA5BBC51A18D94EF9E1DF63851CD0C80F644B7EC92E68554DBC035F5360202AA1A79
                      Malicious:false
                      Preview:............P...`...,.........D...R.h.....R......g[..g..X...D...........d.......Pn..D-......0......h...,b&..J...&.......&..=....&.XS...C'..k....'.......1.....|.3.|....;N.0e..(.N.......N.......N......Y...8.t.......d...<............g...g..8...T...#...9...\.......\......"...........".......'.......*.......=.......B.......F.......L.......W......._.......g.......k.......u.......~...................................................)....... ...................................#.......5.......C.......T.......k...............................................................................".......0.......>.......L.......Z.......h.......v.......................................................................................................,.......9.......F.......S.......`.......a.......d.......i.......m.......s...............................................................................%.......4.......E.......T.......e.......s...................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):21533
                      Entropy (8bit):4.907555207699923
                      Encrypted:false
                      SSDEEP:
                      MD5:5839E1B9E810E14B6107BC7C54FA9735
                      SHA1:DB45804050384F6EFBD53FDBD7A3BC5D73B6F64E
                      SHA-256:9A858F3E8E00A7FE752674EADEAF8E17B1372AEA170006AC80DBA789C8CA98D8
                      SHA-512:9696D0DE388832C6171F455B1BEA256926EF5DC8BB0CF61390648BC40070F552EA3DC5FA6D747B658CFAF93886FBBCE94AC9C617F06D254E045FA392265C4D44
                      Malicious:false
                      Preview:c...............Mono.ico........Information.ico........Error.ico........Warning.ico........Question.ico...... .... .........(... ...@..... .........................................................................................................................................................................................................................................................................................................~|...............................................................................................................................~................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:Matlab v4 mat-file (little endian) pes.schema<?xml version="1.0"?>, rows 1, columns 2293, imaginary
                      Category:dropped
                      Size (bytes):2323
                      Entropy (8bit):5.138456754320975
                      Encrypted:false
                      SSDEEP:
                      MD5:30D30059F180A4073523C86781081106
                      SHA1:96BBA8700090DBF98FF6FFD86E945308BE9F7AE2
                      SHA-256:598B68E46146A2E7036A7A462795CB2956ABB7BA8BDFC9ACFEC4FE0AAF0562F5
                      SHA-512:20ECE472FCCFDB798C32C6C2C6CA724B4F094F771AC0DE4338D50C20AD7DD378ECD770A6ADF73940F863EB8637AF2FD2B571C87C8CA3F73B7DC62598C69E50EA
                      Malicious:false
                      Preview:................mstypes.schema<?xml version="1.0"?>.<xs:schema xmlns:tns="http://schemas.microsoft.com/2003/10/Serialization/" attributeFormDefault="qualified" elementFormDefault="qualified" targetNamespace="http://schemas.microsoft.com/2003/10/Serialization/" xmlns:xs="http://www.w3.org/2001/XMLSchema">..<xs:element name="anyType" nillable="true" type="xs:anyType" />..<xs:element name="anyURI" nillable="true" type="xs:anyURI" />..<xs:element name="base64Binary" nillable="true" type="xs:base64Binary" />..<xs:element name="boolean" nillable="true" type="xs:boolean" />..<xs:element name="byte" nillable="true" type="xs:byte" />..<xs:element name="dateTime" nillable="true" type="xs:dateTime" />..<xs:element name="decimal" nillable="true" type="xs:decimal" />..<xs:element name="double" nillable="true" type="xs:double" />..<xs:element name="float" nillable="true" type="xs:float" />..<xs:element name="int" nillable="true" type="xs:int" />..<xs:element name="long" nillable="true" type="xs:long
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):54703
                      Entropy (8bit):7.104791458519938
                      Encrypted:false
                      SSDEEP:
                      MD5:2C05E9758F84D7925A8CE0A27A43A66A
                      SHA1:4A94BC6CC52EF62BAF32634DBC2726D1D427D7C9
                      SHA-256:0A1EA11A162D65135B767E3AC58989912FDD45019EE091FC3C8398850F392A75
                      SHA-512:4976B118854898FB7E5AB244442389F7723086B64686C0828505073D87F74D84BB2F44CF39C6DBDFED5DFCE7540A9A9DCCD3D206AE2B0D06B77D1E9E19263D74
                      Malicious:false
                      Preview:c.......J5......Asterisk.wav.&......Beep.wav.-......Exclamation.wavj.......Hand.wav.2......Question.wavRIFFB5..WAVEfmt ........@....>......data.5..........................................................$...%.<.5.S.-.(.....I.f.....E.......w.Z.......Z...\.......?.............<.j...j...........N.C.......".W.....p.4...............c.4.S.........C...6.........*.......I.....I...*...........v.u.=...|.........O.~.....W.g...<...4...v...t.f.........G.....U.`.E.......K.....)...%...........9.....G.....M. .x.s.......`.'.=.%.......`...............).........[...9.........9...(...........?.................z.........;...?.a.......H....._.......E.B.......7.......D........./.b...2.....|.9.K.B."...{.......<.|...........[...U.............e.......#.^.......I.......).V...*.".*.....;...#...\.=.'.....x./.......G...s...r.........C...R.............U...E.............~...F.-...........i.....,.....r...#.i.]...S.....>...M.Q.........\.......H...-...?.6...,.....{.....3.....W.....@...s.u.....n.K.......}.d...Y.v.S......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):21533
                      Entropy (8bit):4.907555207699923
                      Encrypted:false
                      SSDEEP:
                      MD5:5839E1B9E810E14B6107BC7C54FA9735
                      SHA1:DB45804050384F6EFBD53FDBD7A3BC5D73B6F64E
                      SHA-256:9A858F3E8E00A7FE752674EADEAF8E17B1372AEA170006AC80DBA789C8CA98D8
                      SHA-512:9696D0DE388832C6171F455B1BEA256926EF5DC8BB0CF61390648BC40070F552EA3DC5FA6D747B658CFAF93886FBBCE94AC9C617F06D254E045FA392265C4D44
                      Malicious:false
                      Preview:c...............Mono.ico........Information.ico........Error.ico........Warning.ico........Question.ico...... .... .........(... ...@..... .........................................................................................................................................................................................................................................................................................................~|...............................................................................................................................~................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:Matlab v4 mat-file (little endian) pes.schema<?xml version="1.0"?>, rows 1, columns 2293, imaginary
                      Category:dropped
                      Size (bytes):2323
                      Entropy (8bit):5.138456754320975
                      Encrypted:false
                      SSDEEP:
                      MD5:30D30059F180A4073523C86781081106
                      SHA1:96BBA8700090DBF98FF6FFD86E945308BE9F7AE2
                      SHA-256:598B68E46146A2E7036A7A462795CB2956ABB7BA8BDFC9ACFEC4FE0AAF0562F5
                      SHA-512:20ECE472FCCFDB798C32C6C2C6CA724B4F094F771AC0DE4338D50C20AD7DD378ECD770A6ADF73940F863EB8637AF2FD2B571C87C8CA3F73B7DC62598C69E50EA
                      Malicious:false
                      Preview:................mstypes.schema<?xml version="1.0"?>.<xs:schema xmlns:tns="http://schemas.microsoft.com/2003/10/Serialization/" attributeFormDefault="qualified" elementFormDefault="qualified" targetNamespace="http://schemas.microsoft.com/2003/10/Serialization/" xmlns:xs="http://www.w3.org/2001/XMLSchema">..<xs:element name="anyType" nillable="true" type="xs:anyType" />..<xs:element name="anyURI" nillable="true" type="xs:anyURI" />..<xs:element name="base64Binary" nillable="true" type="xs:base64Binary" />..<xs:element name="boolean" nillable="true" type="xs:boolean" />..<xs:element name="byte" nillable="true" type="xs:byte" />..<xs:element name="dateTime" nillable="true" type="xs:dateTime" />..<xs:element name="decimal" nillable="true" type="xs:decimal" />..<xs:element name="double" nillable="true" type="xs:double" />..<xs:element name="float" nillable="true" type="xs:float" />..<xs:element name="int" nillable="true" type="xs:int" />..<xs:element name="long" nillable="true" type="xs:long
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):337563
                      Entropy (8bit):5.444600169977809
                      Encrypted:false
                      SSDEEP:
                      MD5:21D06DBC8AF6432B2B49536ED30609AF
                      SHA1:11A1C0E2AB2F8C06FE4507535ED47E0DD279A60D
                      SHA-256:C5BAA176A5B72CD545266340E42102D393A5E43D38C95796BC828918BB95277F
                      SHA-512:2971F54EAA14C3CE6E2352E5A1AEA5B044F0894BF4EAC92DE8CD92515B6473B5CA56EBFCAD4369A9D4935CBEFEA2540A83F332FD4D832C37768310E8776CEB5E
                      Malicious:false
                      Preview:........u.......collation.core.binD.......collation.tailoring.bin........collation.cjkCHS.bin........collation.cjkCHT.bin........collation.cjkJA.bin........collation.cjkKO.bin.W......collation.cjkKOlv2.bin..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):54703
                      Entropy (8bit):7.104791458519938
                      Encrypted:false
                      SSDEEP:
                      MD5:2C05E9758F84D7925A8CE0A27A43A66A
                      SHA1:4A94BC6CC52EF62BAF32634DBC2726D1D427D7C9
                      SHA-256:0A1EA11A162D65135B767E3AC58989912FDD45019EE091FC3C8398850F392A75
                      SHA-512:4976B118854898FB7E5AB244442389F7723086B64686C0828505073D87F74D84BB2F44CF39C6DBDFED5DFCE7540A9A9DCCD3D206AE2B0D06B77D1E9E19263D74
                      Malicious:false
                      Preview:c.......J5......Asterisk.wav.&......Beep.wav.-......Exclamation.wavj.......Hand.wav.2......Question.wavRIFFB5..WAVEfmt ........@....>......data.5..........................................................$...%.<.5.S.-.(.....I.f.....E.......w.Z.......Z...\.......?.............<.j...j...........N.C.......".W.....p.4...............c.4.S.........C...6.........*.......I.....I...*...........v.u.=...|.........O.~.....W.g...<...4...v...t.f.........G.....U.`.E.......K.....)...%...........9.....G.....M. .x.s.......`.'.=.%.......`...............).........[...9.........9...(...........?.................z.........;...?.a.......H....._.......E.B.......7.......D........./.b...2.....|.9.K.B."...{.......<.|...........[...U.............e.......#.^.......I.......).V...*.".*.....;...#...\.=.'.....x./.......G...s...r.........C...R.............U...E.............~...F.-...........i.....,.....r...#.i.]...S.....>...M.Q.........\.......H...-...?.6...,.....{.....3.....W.....@...s.u.....n.K.......}.d...Y.v.S......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):337563
                      Entropy (8bit):5.444600169977809
                      Encrypted:false
                      SSDEEP:
                      MD5:21D06DBC8AF6432B2B49536ED30609AF
                      SHA1:11A1C0E2AB2F8C06FE4507535ED47E0DD279A60D
                      SHA-256:C5BAA176A5B72CD545266340E42102D393A5E43D38C95796BC828918BB95277F
                      SHA-512:2971F54EAA14C3CE6E2352E5A1AEA5B044F0894BF4EAC92DE8CD92515B6473B5CA56EBFCAD4369A9D4935CBEFEA2540A83F332FD4D832C37768310E8776CEB5E
                      Malicious:false
                      Preview:........u.......collation.core.binD.......collation.tailoring.bin........collation.cjkCHS.bin........collation.cjkCHT.bin........collation.cjkJA.bin........collation.cjkKO.bin.W......collation.cjkKOlv2.bin..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:HTML document, ASCII text
                      Category:dropped
                      Size (bytes):58196
                      Entropy (8bit):5.314287080296142
                      Encrypted:false
                      SSDEEP:
                      MD5:66FED2411C14A0FC8CE4C593EF601BFB
                      SHA1:4680A34AAE1193F1E4A6AAC1A5DD3C307DE257FB
                      SHA-256:D87D5196B2AE2ABF4E673315E1FD22C3A44DF80192F23E89B78108579C287524
                      SHA-512:331874A9956C87DB0646E4D21937A88009804A59FDF5F5882EA5B1DFB7DD7EF17724E09877D98F52E7327BBF38A46DDE0C54D5C85F1E860B88322BDFAD64679D
                      Malicious:false
                      Preview:<%--.//.// DefaultWsdlHelpGenerator.aspx: .//.// Author:.// Lluis Sanchez Gual (lluis@ximian.com).//.// (C) 2003 Ximian, Inc. http://www.ximian.com.//.--%>..<%@ Import Namespace="System.Collections" %>.<%@ Import Namespace="System.IO" %>.<%@ Import Namespace="System.Xml.Serialization" %>.<%@ Import Namespace="System.Xml" %>.<%@ Import Namespace="System.Xml.Schema" %>.<%@ Import Namespace="System.Web.Services.Description" %>.<%@ Import Namespace="System" %>.<%@ Import Namespace="System.Net" %>.<%@ Import Namespace="System.Globalization" %>.<%@ Import Namespace="System.Resources" %>.<%@ Import Namespace="System.Diagnostics" %>.<%@ Import Namespace="System.CodeDom" %>.<%@ Import Namespace="System.CodeDom.Compiler" %>.<%@ Import Namespace="Microsoft.CSharp" %>.<%@ Import Namespace="Microsoft.VisualBasic" %>.<%@ Import Namespace="System.Text" %>.<%@ Import Namespace="System.Text.RegularExpressions" %>.<%@ Import Namespace="System.Security.Cryptography.X509Certificates" %>.<%@ Assembly na
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text, with very long lines (368)
                      Category:dropped
                      Size (bytes):17258
                      Entropy (8bit):5.38551648001985
                      Encrypted:false
                      SSDEEP:
                      MD5:4BAD452A2FFC4C6F982E2F43FB44F6B9
                      SHA1:4445D53DC755CA2F977B01BF9D77357B3DFB0CC7
                      SHA-256:EDED908C507A7A230EE7AD3146D8893CF140638E6EAEAB58BFF05C95C2F3A7E3
                      SHA-512:1611968D2C19F3C9472A43D692A4451FD140DEC1D6D5DA6B819D33E62936F1D69D69E65C13B893158AACF985093BD7167F50D9C80C0789A79303FE66A9AD956C
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>...<configSections>...<section name="appSettings" type="System.Configuration.NameValueFileSectionHandler, System, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />...<section name="system.diagnostics" type="System.Diagnostics.DiagnosticsConfigurationHandler, System, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />...<section name="system.runtime.remoting" type="System.Configuration.IgnoreSectionHandler, System, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" allowLocation="false"/>...<section name="system.windows.forms" type="System.Configuration.IgnoreSectionHandler, System, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />...<sectionGroup name="system.web">....<section name="httpHandlers"..... type="System.Web.Configuration.HttpHandlersSectionHandler, System.Web, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />....<
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:HTML document, ASCII text
                      Category:dropped
                      Size (bytes):58196
                      Entropy (8bit):5.314287080296142
                      Encrypted:false
                      SSDEEP:
                      MD5:66FED2411C14A0FC8CE4C593EF601BFB
                      SHA1:4680A34AAE1193F1E4A6AAC1A5DD3C307DE257FB
                      SHA-256:D87D5196B2AE2ABF4E673315E1FD22C3A44DF80192F23E89B78108579C287524
                      SHA-512:331874A9956C87DB0646E4D21937A88009804A59FDF5F5882EA5B1DFB7DD7EF17724E09877D98F52E7327BBF38A46DDE0C54D5C85F1E860B88322BDFAD64679D
                      Malicious:false
                      Preview:<%--.//.// DefaultWsdlHelpGenerator.aspx: .//.// Author:.// Lluis Sanchez Gual (lluis@ximian.com).//.// (C) 2003 Ximian, Inc. http://www.ximian.com.//.--%>..<%@ Import Namespace="System.Collections" %>.<%@ Import Namespace="System.IO" %>.<%@ Import Namespace="System.Xml.Serialization" %>.<%@ Import Namespace="System.Xml" %>.<%@ Import Namespace="System.Xml.Schema" %>.<%@ Import Namespace="System.Web.Services.Description" %>.<%@ Import Namespace="System" %>.<%@ Import Namespace="System.Net" %>.<%@ Import Namespace="System.Globalization" %>.<%@ Import Namespace="System.Resources" %>.<%@ Import Namespace="System.Diagnostics" %>.<%@ Import Namespace="System.CodeDom" %>.<%@ Import Namespace="System.CodeDom.Compiler" %>.<%@ Import Namespace="Microsoft.CSharp" %>.<%@ Import Namespace="Microsoft.VisualBasic" %>.<%@ Import Namespace="System.Text" %>.<%@ Import Namespace="System.Text.RegularExpressions" %>.<%@ Import Namespace="System.Security.Cryptography.X509Certificates" %>.<%@ Assembly na
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text, with very long lines (368)
                      Category:dropped
                      Size (bytes):17258
                      Entropy (8bit):5.38551648001985
                      Encrypted:false
                      SSDEEP:
                      MD5:4BAD452A2FFC4C6F982E2F43FB44F6B9
                      SHA1:4445D53DC755CA2F977B01BF9D77357B3DFB0CC7
                      SHA-256:EDED908C507A7A230EE7AD3146D8893CF140638E6EAEAB58BFF05C95C2F3A7E3
                      SHA-512:1611968D2C19F3C9472A43D692A4451FD140DEC1D6D5DA6B819D33E62936F1D69D69E65C13B893158AACF985093BD7167F50D9C80C0789A79303FE66A9AD956C
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>...<configSections>...<section name="appSettings" type="System.Configuration.NameValueFileSectionHandler, System, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />...<section name="system.diagnostics" type="System.Diagnostics.DiagnosticsConfigurationHandler, System, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />...<section name="system.runtime.remoting" type="System.Configuration.IgnoreSectionHandler, System, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" allowLocation="false"/>...<section name="system.windows.forms" type="System.Configuration.IgnoreSectionHandler, System, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />...<sectionGroup name="system.web">....<section name="httpHandlers"..... type="System.Web.Configuration.HttpHandlersSectionHandler, System.Web, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />....<
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:exported SGML document, ASCII text, with CRLF, LF line terminators
                      Category:dropped
                      Size (bytes):1605
                      Entropy (8bit):4.863785513987257
                      Encrypted:false
                      SSDEEP:
                      MD5:0D831C1264B5B32A39FA347DE368FE48
                      SHA1:187DFF516F9448E63EA5078190B3347922C4B3EB
                      SHA-256:8A1082057AC5681DCD4E9C227ED7FB8EB42AC1618963B5DE3B65739DD77E2741
                      SHA-512:4B7549EDA1F8ED2C4533D056B62CA5030445393F9C6003E5EE47301FF7F44B4BD5022B74D54F571AA890B6E4593C6EDED1A881500AC5BA2A720DC0FF280300AF
                      Malicious:false
                      Preview: .. This file defines some of the browsers that Microsoft's implementation provides in.. <windir>\Microsoft.NET\Framework\<ver>\CONFIG\Browsers\*.browser....It is not derived from any file distributed with Microsoft's implementation. Since..we can't distribute MS's browser files, we use browscap.ini to determine ..browser capabilities. Then, if and only if the application contains App_Browser/*.browser..files and we are using .NET 2.0 or higher, we supplement the capabilities with the ..information in those files and the files in this directory. The primary goal of this file..is provide browser definitions that might be referenced in App_Browser/*.browser files...-->..<browsers>.. <defaultBrowser id="Default">.. </defaultBrowser>. <browser id="Default">. <identification>. .<userAgent match="." />. </identification>.. </browser>.. <browser id="IE6to9" parentID="Default">. <identification>. <capability name="majorver" match="^[6-9]" />. <capability
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:exported SGML document, ASCII text, with CRLF, LF line terminators
                      Category:dropped
                      Size (bytes):1605
                      Entropy (8bit):4.863785513987257
                      Encrypted:false
                      SSDEEP:
                      MD5:0D831C1264B5B32A39FA347DE368FE48
                      SHA1:187DFF516F9448E63EA5078190B3347922C4B3EB
                      SHA-256:8A1082057AC5681DCD4E9C227ED7FB8EB42AC1618963B5DE3B65739DD77E2741
                      SHA-512:4B7549EDA1F8ED2C4533D056B62CA5030445393F9C6003E5EE47301FF7F44B4BD5022B74D54F571AA890B6E4593C6EDED1A881500AC5BA2A720DC0FF280300AF
                      Malicious:false
                      Preview: .. This file defines some of the browsers that Microsoft's implementation provides in.. <windir>\Microsoft.NET\Framework\<ver>\CONFIG\Browsers\*.browser....It is not derived from any file distributed with Microsoft's implementation. Since..we can't distribute MS's browser files, we use browscap.ini to determine ..browser capabilities. Then, if and only if the application contains App_Browser/*.browser..files and we are using .NET 2.0 or higher, we supplement the capabilities with the ..information in those files and the files in this directory. The primary goal of this file..is provide browser definitions that might be referenced in App_Browser/*.browser files...-->..<browsers>.. <defaultBrowser id="Default">.. </defaultBrowser>. <browser id="Default">. <identification>. .<userAgent match="." />. </identification>.. </browser>.. <browser id="IE6to9" parentID="Default">. <identification>. <capability name="majorver" match="^[6-9]" />. <capability
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:HTML document, ASCII text
                      Category:dropped
                      Size (bytes):60453
                      Entropy (8bit):5.320278070055995
                      Encrypted:false
                      SSDEEP:
                      MD5:3B3452C399F27A24EA5A589C7BFE750B
                      SHA1:B06CB1D09AD3BBDF1D8214C910E3DA2A228D113C
                      SHA-256:AE044CD9CC2C7C42F8864195125AB440472D657E5F0D55E131F7890BD45C518A
                      SHA-512:41C099350159E942BE8BC04C8F59C7FB0FD4BD99DB46F1C0158F0FA053C08AE0C73E9D169F6816B77376283CCE5BEAFDCFE5D3D5E3B98E8B358D67C34B954A04
                      Malicious:false
                      Preview:<%--.//.// DefaultWsdlHelpGenerator.aspx: .//.// Author:.// Lluis Sanchez Gual (lluis@ximian.com).//.// (C) 2003 Ximian, Inc. http://www.ximian.com.//.--%>..<%@ Import Namespace="System.Collections" %>.<%@ Import Namespace="System.Collections.Generic" %>.<%@ Import Namespace="System.IO" %>.<%@ Import Namespace="System.Xml.Serialization" %>.<%@ Import Namespace="System.Xml" %>.<%@ Import Namespace="System.Xml.Schema" %>.<%@ Import Namespace="System.Web.Services" %>.<%@ Import Namespace="System.Web.Services.Description" %>.<%@ Import Namespace="System.Web.Services.Configuration" %>.<%@ Import Namespace="System.Web.Configuration" %>.<%@ Import Namespace="System" %>.<%@ Import Namespace="System.Net" %>.<%@ Import Namespace="System.Globalization" %>.<%@ Import Namespace="System.Resources" %>.<%@ Import Namespace="System.Diagnostics" %>.<%@ Import Namespace="System.CodeDom" %>.<%@ Import Namespace="System.CodeDom.Compiler" %>.<%@ Import Namespace="Microsoft.CSharp" %>.<%@ Import Namespace
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text, with very long lines (541)
                      Category:dropped
                      Size (bytes):27625
                      Entropy (8bit):5.304941932930338
                      Encrypted:false
                      SSDEEP:
                      MD5:433D143955AB359DFF61C0BFF982A176
                      SHA1:7EAB623C58D853D733C0A5E586A47E09C4E3EFDB
                      SHA-256:531D0D5BC30466A8A7EA6C032639721D7F16AAB57C9701EF0AFAB5FDB432792F
                      SHA-512:914E7043806FCC2788DBE388F94A2C9CBC6B0D5EAE59609EE411A4815926D879B05BA8F338EE07B88E95A44304EBC9CBEFA19A948FA52FFC0F786957C9729C39
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>...<configSections>...<section name="configProtectedData" type="System.Configuration.ProtectedConfigurationSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />...<section name="appSettings" type="System.Configuration.AppSettingsSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />...<section name="connectionStrings" type="System.Configuration.ConnectionStringsSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />...<section name="mscorlib" type="System.Configuration.IgnoreSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" allowLocation="false"/>...<section name="runtime" type="System.Configuration.IgnoreSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" allowLocation="false"/>...<section name="assembl
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):2618
                      Entropy (8bit):4.79211315258249
                      Encrypted:false
                      SSDEEP:
                      MD5:55DAC562878B7DD98EE8A7AD203A26E6
                      SHA1:D16BAA15E7D3042BCF9D7318209C696F4DAF2CB0
                      SHA-256:CA89036B7D7F1AE9311A6A2FBCF05FC5B997BD43FD21DD54E11C18018EF65F08
                      SHA-512:987C5CD86A9825953DE670E5C15404694FEB15CD5FA9AFA8AF4C2D5BDA9D805839C9695D44122B32E0FFAFE08D720C3DF58000E89C8822FD9A5EB28EAF2AD478
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8" ?>.<settingsMap>. <map sectionType="System.Web.Configuration.MembershipSection, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a". mapperType="Mono.Web.Util.MembershipSectionMapper, Mono.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756". platform="Unix">.. The 'what' tag specifies which region of the section to modify. The 'value' attribute value is mapper-specific and is not defined here. It can be. any expression understood by the mapper to designate the section region to modify.. -->. <what value="providers">. 'what' can contain any number of occurrences of any three elements:. replace - replace the designated region.. add - add a new entry to the region.. clear - clear the region.. remove - remove the designatedregion.. The attributes to any of the above are freeform and are not processed by the mapper manager.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:HTML document, ASCII text
                      Category:dropped
                      Size (bytes):60453
                      Entropy (8bit):5.320278070055995
                      Encrypted:false
                      SSDEEP:
                      MD5:3B3452C399F27A24EA5A589C7BFE750B
                      SHA1:B06CB1D09AD3BBDF1D8214C910E3DA2A228D113C
                      SHA-256:AE044CD9CC2C7C42F8864195125AB440472D657E5F0D55E131F7890BD45C518A
                      SHA-512:41C099350159E942BE8BC04C8F59C7FB0FD4BD99DB46F1C0158F0FA053C08AE0C73E9D169F6816B77376283CCE5BEAFDCFE5D3D5E3B98E8B358D67C34B954A04
                      Malicious:false
                      Preview:<%--.//.// DefaultWsdlHelpGenerator.aspx: .//.// Author:.// Lluis Sanchez Gual (lluis@ximian.com).//.// (C) 2003 Ximian, Inc. http://www.ximian.com.//.--%>..<%@ Import Namespace="System.Collections" %>.<%@ Import Namespace="System.Collections.Generic" %>.<%@ Import Namespace="System.IO" %>.<%@ Import Namespace="System.Xml.Serialization" %>.<%@ Import Namespace="System.Xml" %>.<%@ Import Namespace="System.Xml.Schema" %>.<%@ Import Namespace="System.Web.Services" %>.<%@ Import Namespace="System.Web.Services.Description" %>.<%@ Import Namespace="System.Web.Services.Configuration" %>.<%@ Import Namespace="System.Web.Configuration" %>.<%@ Import Namespace="System" %>.<%@ Import Namespace="System.Net" %>.<%@ Import Namespace="System.Globalization" %>.<%@ Import Namespace="System.Resources" %>.<%@ Import Namespace="System.Diagnostics" %>.<%@ Import Namespace="System.CodeDom" %>.<%@ Import Namespace="System.CodeDom.Compiler" %>.<%@ Import Namespace="Microsoft.CSharp" %>.<%@ Import Namespace
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):11686
                      Entropy (8bit):5.27854139529115
                      Encrypted:false
                      SSDEEP:
                      MD5:2B6303C4F12762B71051DB6E947F90A4
                      SHA1:A4D7E05516F63D6AB67327B299D4FB2852CB840B
                      SHA-256:3C1A76A5849074B437D297656A208A3BEF6D84B982153542B9C797046C601DFC
                      SHA-512:80F5DA60654E1851EF21526E434B32D94E18883A08BACBBAA0E1F85B80469C46510B6DDB9B429F16CC4BE89C6F2BB2627BBAE9CB1D0C7E45B665EFB7721C6D86
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>...<system.web>...<monoSettings>....<compilersCompatibility>.....<compiler language="c#;cs;csharp" extension=".cs" compilerOptions="/nowarn:0169"...... type="Microsoft.CSharp.CSharpCodeProvider, System, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />....</compilersCompatibility>...</monoSettings>......<authorization>....<allow users="*" />...</authorization>...<httpHandlers>....<add verb="*" path="Trace.axd" type="System.Web.Handlers.TraceHandler, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />....<add verb="*" path="UrlRouting.axd" type="System.Web.HttpForbiddenHandler, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />....<add verb="*" path="*.aspx" type="System.Web.UI.PageHandlerFactory, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />....<add verb="*" path="*.asmx" validate="false" type="System.Web.Services.P
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text, with very long lines (541)
                      Category:dropped
                      Size (bytes):27625
                      Entropy (8bit):5.304941932930338
                      Encrypted:false
                      SSDEEP:
                      MD5:433D143955AB359DFF61C0BFF982A176
                      SHA1:7EAB623C58D853D733C0A5E586A47E09C4E3EFDB
                      SHA-256:531D0D5BC30466A8A7EA6C032639721D7F16AAB57C9701EF0AFAB5FDB432792F
                      SHA-512:914E7043806FCC2788DBE388F94A2C9CBC6B0D5EAE59609EE411A4815926D879B05BA8F338EE07B88E95A44304EBC9CBEFA19A948FA52FFC0F786957C9729C39
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>...<configSections>...<section name="configProtectedData" type="System.Configuration.ProtectedConfigurationSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />...<section name="appSettings" type="System.Configuration.AppSettingsSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />...<section name="connectionStrings" type="System.Configuration.ConnectionStringsSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />...<section name="mscorlib" type="System.Configuration.IgnoreSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" allowLocation="false"/>...<section name="runtime" type="System.Configuration.IgnoreSection, System.Configuration, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" allowLocation="false"/>...<section name="assembl
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):2618
                      Entropy (8bit):4.79211315258249
                      Encrypted:false
                      SSDEEP:
                      MD5:55DAC562878B7DD98EE8A7AD203A26E6
                      SHA1:D16BAA15E7D3042BCF9D7318209C696F4DAF2CB0
                      SHA-256:CA89036B7D7F1AE9311A6A2FBCF05FC5B997BD43FD21DD54E11C18018EF65F08
                      SHA-512:987C5CD86A9825953DE670E5C15404694FEB15CD5FA9AFA8AF4C2D5BDA9D805839C9695D44122B32E0FFAFE08D720C3DF58000E89C8822FD9A5EB28EAF2AD478
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8" ?>.<settingsMap>. <map sectionType="System.Web.Configuration.MembershipSection, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a". mapperType="Mono.Web.Util.MembershipSectionMapper, Mono.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=0738eb9f132ed756". platform="Unix">.. The 'what' tag specifies which region of the section to modify. The 'value' attribute value is mapper-specific and is not defined here. It can be. any expression understood by the mapper to designate the section region to modify.. -->. <what value="providers">. 'what' can contain any number of occurrences of any three elements:. replace - replace the designated region.. add - add a new entry to the region.. clear - clear the region.. remove - remove the designatedregion.. The attributes to any of the above are freeform and are not processed by the mapper manager.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):11686
                      Entropy (8bit):5.27854139529115
                      Encrypted:false
                      SSDEEP:
                      MD5:2B6303C4F12762B71051DB6E947F90A4
                      SHA1:A4D7E05516F63D6AB67327B299D4FB2852CB840B
                      SHA-256:3C1A76A5849074B437D297656A208A3BEF6D84B982153542B9C797046C601DFC
                      SHA-512:80F5DA60654E1851EF21526E434B32D94E18883A08BACBBAA0E1F85B80469C46510B6DDB9B429F16CC4BE89C6F2BB2627BBAE9CB1D0C7E45B665EFB7721C6D86
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>...<system.web>...<monoSettings>....<compilersCompatibility>.....<compiler language="c#;cs;csharp" extension=".cs" compilerOptions="/nowarn:0169"...... type="Microsoft.CSharp.CSharpCodeProvider, System, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />....</compilersCompatibility>...</monoSettings>......<authorization>....<allow users="*" />...</authorization>...<httpHandlers>....<add verb="*" path="Trace.axd" type="System.Web.Handlers.TraceHandler, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />....<add verb="*" path="UrlRouting.axd" type="System.Web.HttpForbiddenHandler, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />....<add verb="*" path="*.aspx" type="System.Web.UI.PageHandlerFactory, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" />....<add verb="*" path="*.asmx" validate="false" type="System.Web.Services.P
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):311984
                      Entropy (8bit):5.426486634209472
                      Encrypted:false
                      SSDEEP:
                      MD5:378BE809DF7D15AAC75A175693E25FBB
                      SHA1:2D5454E161DE8A5B65910F27BD70D9D0AD8FA476
                      SHA-256:4DDD50F31FB968F30BEDEFC253A46DC3F2890192D05CDAA9E0A64A056EEE807E
                      SHA-512:D0D181E806CBD2C016EB0A8786F7D9DB877463EAAC0195DB4E891BE111C9ED87491A1ABCFA0D9ED7C2743E004E1F4A3F4789333D0B535E63358C672AE833C363
                      Malicious:false
                      Preview:;;; Provided courtesy of http://browsers.garykeith.com.;;; Created on Wednesday, June 17, 2009 at 6:30 AM GMT..[GJK_Browscap_Version].Version=4476.Released=Wed, 17 Jun 2009 06:30:21 -0000..;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; DefaultProperties..[DefaultProperties].Browser=DefaultProperties.Version=0.MajorVer=0.MinorVer=0.Platform=unknown.Alpha=false.Beta=false.Win16=false.Win32=false.Win64=false.Frames=false.IFrames=false.Tables=false.Cookies=false.BackgroundSounds=false.CDF=false.VBScript=false.JavaApplets=false.JavaScript=false.ActiveXControls=false.isBanned=false.isMobileDevice=false.isSyndicationReader=false.Crawler=false.CssVersion=0.supportsCSS=false.AOL=false.aolVersion=0.ECMAScriptVersion=0.0.W3CDOMVersion=0.0..;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; Ask..[Ask].Parent=DefaultProperties.Browser=Ask.Frames=true.Tables=true.Crawler=true..[Mozilla/?.0 (compatible; Ask Jeeves/Teoma*)].Parent=Ask.Browser=Teoma..[Mozilla/2.0 (compatible; Ask Jeeves)].Parent=Ask.Browser=AskJeeves.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):1691
                      Entropy (8bit):4.804294180613563
                      Encrypted:false
                      SSDEEP:
                      MD5:F95C345C1C53B820487F6B72E62D5485
                      SHA1:957E4E50E74C50347AF92ABF240C2C7AAB3F3F79
                      SHA-256:B585C70C70C88B3E03489361558F5D711C2EF71DF9BAAF37D92DBF95FBF6CD92
                      SHA-512:6B06434D07EE51BE064A3EFDCA65B73E6C8E7560B43FB61633B08C7D2A0D792FE0670E57088C1DABD23929E0B7F7A27F65F503F2B640587042C8BBE98946368B
                      Malicious:false
                      Preview:<configuration>..<dllmap dll="i:cygwin1.dll" target="libc.dylib" os="!windows" />..<dllmap dll="libc" target="libc.dylib" os="!windows"/>..<dllmap dll="intl" target="libintl.dylib" os="!windows"/>..<dllmap dll="intl" name="bind_textdomain_codeset" target="libc.dylib" os="solaris"/>..<dllmap dll="libintl" name="bind_textdomain_codeset" target="libc.dylib" os="solaris"/>..<dllmap dll="libintl" target="libintl.dylib" os="!windows"/>..<dllmap dll="i:libxslt.dll" target="libxslt.dylib" os="!windows"/>..<dllmap dll="i:odbc32.dll" target="libodbc.dylib" os="!windows"/>..<dllmap dll="i:odbc32.dll" target="libiodbc.dylib" os="osx"/>..<dllmap dll="oci" target="libclntsh.dylib" os="!windows"/>..<dllmap dll="db2cli" target="libdb2_36.dylib" os="!windows"/>..<dllmap dll="MonoPosixHelper" target="libMonoPosixHelper.dylib" os="!windows" />..<dllmap dll="i:msvcrt" target="libc.dylib" os="!windows"/>..<dllmap dll="i:msvcrt.dll" target="libc.dylib" os="!windows"/>..<dllmap dll="sqlite" target="libsqlite
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):311984
                      Entropy (8bit):5.426486634209472
                      Encrypted:false
                      SSDEEP:
                      MD5:378BE809DF7D15AAC75A175693E25FBB
                      SHA1:2D5454E161DE8A5B65910F27BD70D9D0AD8FA476
                      SHA-256:4DDD50F31FB968F30BEDEFC253A46DC3F2890192D05CDAA9E0A64A056EEE807E
                      SHA-512:D0D181E806CBD2C016EB0A8786F7D9DB877463EAAC0195DB4E891BE111C9ED87491A1ABCFA0D9ED7C2743E004E1F4A3F4789333D0B535E63358C672AE833C363
                      Malicious:false
                      Preview:;;; Provided courtesy of http://browsers.garykeith.com.;;; Created on Wednesday, June 17, 2009 at 6:30 AM GMT..[GJK_Browscap_Version].Version=4476.Released=Wed, 17 Jun 2009 06:30:21 -0000..;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; DefaultProperties..[DefaultProperties].Browser=DefaultProperties.Version=0.MajorVer=0.MinorVer=0.Platform=unknown.Alpha=false.Beta=false.Win16=false.Win32=false.Win64=false.Frames=false.IFrames=false.Tables=false.Cookies=false.BackgroundSounds=false.CDF=false.VBScript=false.JavaApplets=false.JavaScript=false.ActiveXControls=false.isBanned=false.isMobileDevice=false.isSyndicationReader=false.Crawler=false.CssVersion=0.supportsCSS=false.AOL=false.aolVersion=0.ECMAScriptVersion=0.0.W3CDOMVersion=0.0..;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; Ask..[Ask].Parent=DefaultProperties.Browser=Ask.Frames=true.Tables=true.Crawler=true..[Mozilla/?.0 (compatible; Ask Jeeves/Teoma*)].Parent=Ask.Browser=Teoma..[Mozilla/2.0 (compatible; Ask Jeeves)].Parent=Ask.Browser=AskJeeves.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):1691
                      Entropy (8bit):4.804294180613563
                      Encrypted:false
                      SSDEEP:
                      MD5:F95C345C1C53B820487F6B72E62D5485
                      SHA1:957E4E50E74C50347AF92ABF240C2C7AAB3F3F79
                      SHA-256:B585C70C70C88B3E03489361558F5D711C2EF71DF9BAAF37D92DBF95FBF6CD92
                      SHA-512:6B06434D07EE51BE064A3EFDCA65B73E6C8E7560B43FB61633B08C7D2A0D792FE0670E57088C1DABD23929E0B7F7A27F65F503F2B640587042C8BBE98946368B
                      Malicious:false
                      Preview:<configuration>..<dllmap dll="i:cygwin1.dll" target="libc.dylib" os="!windows" />..<dllmap dll="libc" target="libc.dylib" os="!windows"/>..<dllmap dll="intl" target="libintl.dylib" os="!windows"/>..<dllmap dll="intl" name="bind_textdomain_codeset" target="libc.dylib" os="solaris"/>..<dllmap dll="libintl" name="bind_textdomain_codeset" target="libc.dylib" os="solaris"/>..<dllmap dll="libintl" target="libintl.dylib" os="!windows"/>..<dllmap dll="i:libxslt.dll" target="libxslt.dylib" os="!windows"/>..<dllmap dll="i:odbc32.dll" target="libodbc.dylib" os="!windows"/>..<dllmap dll="i:odbc32.dll" target="libiodbc.dylib" os="osx"/>..<dllmap dll="oci" target="libclntsh.dylib" os="!windows"/>..<dllmap dll="db2cli" target="libdb2_36.dylib" os="!windows"/>..<dllmap dll="MonoPosixHelper" target="libMonoPosixHelper.dylib" os="!windows" />..<dllmap dll="i:msvcrt" target="libc.dylib" os="!windows"/>..<dllmap dll="i:msvcrt.dll" target="libc.dylib" os="!windows"/>..<dllmap dll="sqlite" target="libsqlite
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text, with very long lines (334)
                      Category:dropped
                      Size (bytes):25817
                      Entropy (8bit):5.166379989535013
                      Encrypted:false
                      SSDEEP:
                      MD5:F34B330F20DCE1BDCCE9058FCA287099
                      SHA1:936520D5BB5C00A1985D7A4C4F0EF763A9031862
                      SHA-256:0C56E34C69124510FA8C19E7B4C2CA6C1C4FF460AE19F798DD0CA035809E396D
                      SHA-512:D6D4A8321EB44C117755A41A2590296BE86A0568D27A5347F9D7F32F2D151D8F7E169675C83FAED2DAB5AD0F8D81858F8CD1167E439CD4BFF7E68C243E3544FD
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8"?>.<mconfig>. <configuration>. <handlers>. <handler section="feature" .. type="Mono.MonoConfig.FeatureNodeHandler, mconfig, Version=0.1.0.0, Culture=neutral, PublicKeyToken=null".. storageType="System.Collections.Generic.Dictionary`2[[System.String, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089],[Mono.MonoConfig.FeatureNode, mconfig, Version=0.1.0.0, Culture=neutral, PublicKeyToken=null]], mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"/>. <handler section="configBlock".. type="Mono.MonoConfig.ConfigBlockNodeHandler, mconfig, Version=0.1.0.0, Culture=neutral, PublicKeyToken=null".. storageType="System.Collections.Generic.Dictionary`2[[System.String, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089],[Mono.MonoConfig.ConfigBlockBlock, mconfig, Version=0.1.0.0, Culture=neutral, PublicKeyToken=null]], mscorlib, Version=2.0.0.0, Cult
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:XML 1.0 document, ASCII text, with very long lines (334)
                      Category:dropped
                      Size (bytes):25817
                      Entropy (8bit):5.166379989535013
                      Encrypted:false
                      SSDEEP:
                      MD5:F34B330F20DCE1BDCCE9058FCA287099
                      SHA1:936520D5BB5C00A1985D7A4C4F0EF763A9031862
                      SHA-256:0C56E34C69124510FA8C19E7B4C2CA6C1C4FF460AE19F798DD0CA035809E396D
                      SHA-512:D6D4A8321EB44C117755A41A2590296BE86A0568D27A5347F9D7F32F2D151D8F7E169675C83FAED2DAB5AD0F8D81858F8CD1167E439CD4BFF7E68C243E3544FD
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="utf-8"?>.<mconfig>. <configuration>. <handlers>. <handler section="feature" .. type="Mono.MonoConfig.FeatureNodeHandler, mconfig, Version=0.1.0.0, Culture=neutral, PublicKeyToken=null".. storageType="System.Collections.Generic.Dictionary`2[[System.String, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089],[Mono.MonoConfig.FeatureNode, mconfig, Version=0.1.0.0, Culture=neutral, PublicKeyToken=null]], mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"/>. <handler section="configBlock".. type="Mono.MonoConfig.ConfigBlockNodeHandler, mconfig, Version=0.1.0.0, Culture=neutral, PublicKeyToken=null".. storageType="System.Collections.Generic.Dictionary`2[[System.String, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089],[Mono.MonoConfig.ConfigBlockBlock, mconfig, Version=0.1.0.0, Culture=neutral, PublicKeyToken=null]], mscorlib, Version=2.0.0.0, Cult
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):6532
                      Entropy (8bit):2.190626203670541
                      Encrypted:false
                      SSDEEP:
                      MD5:C983F6E04F5C2C8FA443B7682F1D481C
                      SHA1:3BF88486BE8DAC38B5F2FCB00860E5FB6AA6D6E3
                      SHA-256:EF3755BC8FE9C0ACB98EE7849B36DC6D1A653D8FB34D9145CA29817E1D726E0D
                      SHA-512:D05FA5CF7F24F320C86E0DEE6310085563855AEFC49E2EAA339DAB8D9ED9C6A7EC20B8737019FCAA196E959C227E0350A54D7CF977C1F249FD31AE5D01E9394D
                      Malicious:false
                      Preview:...k................2018.4.0f1...................N..vB...............v...xI.B..7...4U........>H[.IP.y.#....h......0..ZgA.$. ?..&._.............Bh._'86j.r.........@z..U.c.:0).c.Bt...<.h......lr.......zMy.wk...w.......&....I....r.......:.E..?.Q.V9..ft........-..EhKr.......[.Z...Xr.#L..._q.jkl../...L}..Or.........(.:...K....N<.......q.aqb..r..........n0P../.A.8.q.jkl../...L}..Or.........f.y&*...S....q.jkl../...L}..Or.......9W.r.e......7.Q%.+...}.bq.Z.r......C&Hc......&v...`I...!.........r.........YX.ee?L3..".q.jkl../...L}..Or........M.EK..K-.%."....b"Y..lq.$..2.o................K...............P...C...................?...................K...............(...;...............h.../...................D...................P...............0...D...............x...P...................D...................D...............X...........................................M...................=...................4...............P...$...............x...`................... ...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):5668
                      Entropy (8bit):1.82387616095623
                      Encrypted:false
                      SSDEEP:
                      MD5:D5A28CD7514AA226CFE657023B8BB0D4
                      SHA1:39F15DF3EB4C01088F990B7A89BC523D751ABB2F
                      SHA-256:FF266CF6DAF100BDF6DCD50860A1EF1B94E3B4641EB6F818987125F022171A70
                      SHA-512:C76A12D0CFED93878E9295EE2BC4E192157A973A924C8D87676563A672F731E519ACEFC5534E861CFB7DCF5210CF23F4E108804AFE9744C24F096EF7269ACA88
                      Malicious:false
                      Preview:...S...$............2018.4.0f1...................N..vB...............v...xI.B..7...4Uh......0..ZgA.$. ?..&._.............Bh._'86j.r.........@z..U.c.:0).c.Bt...<.h......lr......D......qP...(...........^.].q3..r.......-...7@.y..z]j.w......|..6vX..lr..........n0P../.A.8.q.jkl../...L}..Or.............t.'..v.Fq.jkl../...L}..Or......eu.j....C....gzM.1qQ..[..J-.4r.............,..h\3.q.jkl../...L}..Or.......:.E..?.Q.V9..ft........-..EhKr........M.EK..K-.%."....b"Y..lq.$..2.o.................7...............8...c...................G...................?...............(...D...............p...D...................D...................D...............H...M...................=...................4...................D...............X...,................... ................... ...................0................... ...................`...............x...................m.......................(...........r...........................................................N...........................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4459444
                      Entropy (8bit):6.603400793437201
                      Encrypted:false
                      SSDEEP:
                      MD5:B1D4645BF5123D87B7B4B98445D3B014
                      SHA1:4297B813079A80D35FECBE060A4BFABE22792129
                      SHA-256:773AF8980A22224040EC8E0D00F9D14A91E47C2D07CF0B1152ABA869B685C940
                      SHA-512:0EB764EED98319EF848BC19240174691D2675FEA6C338F651115247B42A1528BFC4119325BE251F15444389E492F2B38EC4AFD5AA041D2EE6AC9F303CFC0C32A
                      Malicious:false
                      Preview:.....D..............2018.4.0f1......9...........q4m...)M...f..m........l@.})Q...OZ`.O]+......3f.@..(+;....8.s0........`.>....J6._.5.1......Hk..].j...d0X..>......NX.c2UF4.~..h...J............E...w...Z......2.L..;.N.xR)M9..[..........+..y;..m......Hk..].j...d0X..y.......A.J.!....xh6.......j.S""h.h....N........?..Qv...__...B}.......1M..q68...b.c).b?...........'.j................N..vB...............v...xI.B..7...4U.......(8....'....N.b!........0...$..nX`..y-........... .9...F!..C2......n.g.&.~..g....kT6.......[....l.k(.k..D......!.o\4..0>..Xa.}K.......m.....2.f._..._......u..X@....m.a,..............k.G.EV.C.................,VHYU.@.>.........B.!....vh....D........@.A<5.~v..r#.........WP.N ..hBM...........~........K.~..............#.f[..75E.K.......{.,D./.?...Mr.........16...%.*......R)..`..W.76.r............D.A$.hK.). .?.g..TYD.=....r.......:O./..h._..`.x...L.."p6.3s...r......X...O.....e..,..}...g...B{M..r......L..ke..^`...;./..`..6@..d.u..}r.....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):12128
                      Entropy (8bit):3.719887923662832
                      Encrypted:false
                      SSDEEP:
                      MD5:781989846F68EB4EEAC0A1EDD8BB2AAF
                      SHA1:736241B5B6665B852369CF9CD58D4350DDD31958
                      SHA-256:4E973E89F51B3535D1CDD737334CC1B6D532B6797CA918B9C3B410F8D08AD6F6
                      SHA-512:3053609DC50F9BD2F83D0AAFF5F1333EBEC347A0CE8DDC55C81F403DA952E74632B71A322C765CBAFE040D3C035A485570AEB031BC44CA1A6DC0D00372755303
                      Malicious:false
                      Preview:...]../`............2018.4.0f1..................q...\..|...q~.........q4m...)M...f..m........l@.})Q...OZ`.O]0........`.>....J6._.5........-+.c.*h......{.................%...............(...................(.......................x...............8...(....................................library/unity default resources......................globalgamemanagers.assets.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):6888
                      Entropy (8bit):2.28770523133811
                      Encrypted:false
                      SSDEEP:
                      MD5:959AE6F19B3FF38E2336911D538DA786
                      SHA1:0C8209980B7C57E3D3A79D0F27BCD1B29CFCC5AD
                      SHA-256:DAC300D2AD28FF951ED5790D9E6E9032B1AAA14216D1AC0243BED8027F684E35
                      SHA-512:344C44F5BF8CAE0671CF88DECDF35274D141FB8C12AACA0B3E20076D6758E398E92A5C67B290C1E6080EA15D76A71BE6EC9B49F55B3B76CDC1699C2A14F7532E
                      Malicious:false
                      Preview:...w................2018.4.0f1...................N..vB...............v...xI.B..7...4U........>H[.IP.y.#....Q......0^J..K..%...u..R......a]".. k.p..T.<Uh......0..ZgA.$. ?..&._.............Bh._'86j.r.........@z..U.c.:0).c.Bt...<.h......lr.......Y..^#..,&.....xq.jkl../...L}..Or.........(.:...K....N<.......q.aqb..r........N..._...l...;bP..&..ly...:=H..r.........YX.ee?L3..".q.jkl../...L}..Or.......m.g.r...%.....Fy...p..O......qIr.........f.y&*...S....q.jkl../...L}..Or.......zMy.wk...w.......&....I....r.......:.E..?.Q.V9..ft........-..EhKr......B...PZ.....6..q.jkl../...L}..Or..........n0P../.A.8.q.jkl../...L}..Or........M.EK..K-.%."....b"Y..lq.$..2.or.......G+..<I.(.X..6..V.6T.L..:.B.!...............K...............P...G...................3...................G...................;...............X...c...................+...................D...............8...P...................D...................P............... ...D...............h...D...................D...............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4265
                      Entropy (8bit):0.41938788561015394
                      Encrypted:false
                      SSDEEP:
                      MD5:1D0CA96D7BA31C5155480C03FF8534F8
                      SHA1:3035976480079BA828D5D4C9E01586F4E4A83A3F
                      SHA-256:81D5AFF2876DF5F61CB61FE42552336FDB0DF489E074D454CAC8BCE3599E30EE
                      SHA-512:F54B3D5F64C31E15DAECEF48176378DF0E26F318E25581E3E5CB8CC4CD11D6514E74ED22B6CAE3E12DF228453410F8023CE909061A633D52776C574F64E8AA2E
                      Malicious:false
                      Preview:....................2018.4.0f1..................q...\..|...q~.......................................................library/unity default resources......................globalgamemanagers.assets......................resources.assets...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):279672
                      Entropy (8bit):6.0990140619090765
                      Encrypted:false
                      SSDEEP:
                      MD5:E7110138DB0E9A4757FDBC215270D899
                      SHA1:8AA357EAEA5D5C7CE4B04D53513838F3673DF296
                      SHA-256:ECA5D4A01194D5228FE4BAB51677D17A86FE045BB32915391722522D8117DEE0
                      SHA-512:F4FE914B8C471F3429889D1BC232F1DF90C346E1A58382A6D9AB2314CD5F5200499741961249F5554BF981C8B28D2C4E7E08EF50F5A69DA86C6BE8B6F8523A5A
                      Malicious:false
                      Preview:...f..Dx............2018.4.0f1..................O.y.....^..I9.........P.x..D.0@..K&1N......=...[+.?.f.'..............$...i.V3.V.^.......$.|u.y.W..z....t.......(%....-.v...\..........!..s....W>.............#eo.Z5.y..8...b......d>..}nr..J.~.FD.7.......GZ|..7Y.....~.>........p.I.-[.e..+..../.......<.n.'.(}.z.M...............3.o...)..~......0i..T...ZExf..!........7{=. ..i...#...,......ns/O.4T{..t~l.,.6.........y....6?....N....S...g2....}......=.....7......1.[.Y.."..NE2...................\...............`...........................................0...............0....)...............4...................B..................8F..................HF..................HF..................8G..4...............p...$....................4...............-.................../...................0..................p3..................H4..................H4..0....................................globalgamemanagers.assets......................library/unity default resources......................resourc
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4712
                      Entropy (8bit):1.1718532494469927
                      Encrypted:false
                      SSDEEP:
                      MD5:8A6C0A3CCFF67A1D4F7BCACBCBF2DC3B
                      SHA1:C9BC02F33070E31E49AF1B9943EC7B7F25B4AAA6
                      SHA-256:899844BE109C1FF29EFE4C3B632CA77B4B9D7CEB70A8B0601343AF37CEFEA58D
                      SHA-512:342ABEA644D9DA21AF2605E61892CF6F0EE6447726298B3A6572026BE0E87EF91CA345A63D3726F6A680BC912071C5A915448A2474EB9A46552C19D79B2856EB
                      Malicious:false
                      Preview:.......h............2018.4.0f1...................N..vB...............v...xI.B..7...4Uh......0..ZgA.$. ?..&._.............Bh._'86j.r........$Vy..tS.}7C..usX.8fD$C...u.o.................3...............8...D...................M...................a...............8...0................................................globalgamemanagers.assets......................sharedassets3.assets......................library/unity default resources...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1356452
                      Entropy (8bit):5.02498668002077
                      Encrypted:false
                      SSDEEP:
                      MD5:58AE9A4B219028E3222CC587B75C942F
                      SHA1:A6E649F0ACC393B9538F469F816EA37012E5E940
                      SHA-256:8B85784F29AC31E0446915C49CEBBBBD1E6BE8653F79C1492909D5534DE654CC
                      SHA-512:FAEC9E2F644191CDACBE1CB6A293816F8FF9DD42DA62E13AFCA136D296B93A84F755872BC41A760D9D8F614792C2598CAFC97F73518159922E71940B88DA4E4C
                      Malicious:false
                      Preview:...............0....2018.4.0f1..........s.......n.0..I?..'.B.........q...\..|...q~.........q4m...)M...f..m0........`.>....J6._.5........&.Z$.S6..jpx.SlK.................U...............X...$...................................(...................0....:..............(.......................l...................................(...@...............h...................`B...................W.................../...................D...................X..................0g...................u.....................p...............8.......................l...............p...\...................h...............8...\{...............u.................. ..............................................................l................................................................... .......p...........!.......@..........."...........d.......#.......x...........$.......8...........%...........h.......&.......h...h.......'...........h.......(.......8...h.......)...........`.......*...........`.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):36
                      Entropy (8bit):4.405764584655452
                      Encrypted:false
                      SSDEEP:
                      MD5:59E4D6DA2E4B1629CFBD0D2E47544CAF
                      SHA1:F05798F1CD16C148C4A28FA2930B6286EC46CA38
                      SHA-256:437E78BE30A7E43DF7C0AF21FD442B1DB318AF1ECCB1DD8D63DD65F937341AFE
                      SHA-512:955FFAC94B8F08543F0346D1B003A28DE92C6783739C6F48858FB4B14173A531D8E0ACE092854595D02DE9A6B244B10098ED35A602AC3AFDD001D920D8F5754B
                      Malicious:false
                      Preview:topgamesinc.Evony: The King's Return
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4289
                      Entropy (8bit):0.43268019175662237
                      Encrypted:false
                      SSDEEP:
                      MD5:5FF426319B45ABDA9CF4E80E93D999B3
                      SHA1:C68FDD382E8BDFB54CB21D9857DA6C2995F996C4
                      SHA-256:921B2E81EA750D86506AB408CE3FE7F52134A7A1C125B9AB150809C7E1801837
                      SHA-512:B6C32178DA50BB1134AA57EE7255FE607241EDC00B3D5FE915E723925E9EA7FA7DF5FECA37A11EBB796468D5C1D50D42BBF662AFFDB7F91C876A3DECA7B9E056
                      Malicious:false
                      Preview:....................2018.4.0f1..................q...\..|...q~.......................................................library/unity default resources......................globalgamemanagers.assets......................resources.assets...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):123
                      Entropy (8bit):4.436750024393471
                      Encrypted:false
                      SSDEEP:
                      MD5:FA158312957535B4BD2DB8F3157D7A95
                      SHA1:A83ECC941D9964152776BDA1AAA0D7ABCBB7B380
                      SHA-256:FA4676698D002157B4C44991B9791EA637301A04C19FDBE2FCB07EA2668147C6
                      SHA-512:6B5D7F25211EA67738F97249F3C78782861140A5096786EAF0EB549821D79A55B0BBD56F3D48E3A153EB7D39EB449D696588E3E917764409875A1AF1B08278C0
                      Malicious:false
                      Preview:gfx-enable-native-gfx-jobs=.wait-for-native-debugger=0.scripting-runtime-version=legacy.vr-enabled=0.hdr-display-enabled=0.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1398128
                      Entropy (8bit):4.441122393849138
                      Encrypted:false
                      SSDEEP:
                      MD5:FCFC415F428F40F742C1AF62C66B4F7A
                      SHA1:38E344E0C9FD1C89DC1E48A9ADE577B35FEAAF6B
                      SHA-256:6351A22E2E499F89CE243619A6BEC27D023D2FE63FE813575C62004E8884D135
                      SHA-512:73F25ADDEA7D757E3D9A0F0A451A08B3F8319FCDF99BD1FBC6388198553BFD8CD1884EBBA0FD02431AD80E328D341CC09C547340B894B40F57C07F152525DE3A
                      Malicious:false
                      Preview:++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):23469532
                      Entropy (8bit):6.8422810685165825
                      Encrypted:false
                      SSDEEP:
                      MD5:C12D025D7AD8F722AA189A14659245E1
                      SHA1:634A9333B61C7A0E866A0E5830CFCF5B120BE4B8
                      SHA-256:394D4105B9F3B92DAC7559A952808C107CDF45967557B96D79A445FC4EE203F6
                      SHA-512:B2706F4C8AAF1351C12B9CFBAA1906F6E5368C964885571AC4885FA66D7C95998E7F05F2750B879E0E696D818992082EF90AA6FD77CF8853927E137FE7B851B7
                      Malicious:false
                      Preview:..*`.f........*.....2018.4.0f1......5...........q...\..|...q~.........q4m...)M...f..m........l@.})Q...OZ`.O]0........`.>....J6._.5.J............E...w...[..........+..y;.........j.S""h.h....N.........1M..q68...b.c).b.........N..vB...............v...xI.B..7...4U........>H[.IP.y.#....:.......8W.iIJ..s...h..<...........@.5.V/..7BXQ......0^J..K..%...u..R......a]".. k.p..T.<U\..............$.g.].._......u..X@....m.a,...{.......'.....i..+....|..............$.g.]..........@#.1:y.^.b...........B.P.....?..$N.}........WP.N ..hBM.............-z6a.....:a`e........~........K.~..K.......{.,D./.?...Mr.......f.-.(0CD........;...\.....@,r........I..]...X!....o.!.Y....2..{r.......ST5.3."w.vt..2.-....P.`...L.z..r............|.3g.u..e.d.L...w..&.@...r.......P..?.k....J.*L[7....]?.....r..........a]f...X.CC.n.3...9.d..%.."hr........G$kz....'.~..q<...._d.1.d.q..r.......,}.g...A.G..3q2q.jkl../...L}..Or......TC..>........U-...H.u...u..x.r.......I.-.....}J...9?d.L...w..&.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):20158308
                      Entropy (8bit):6.738406915323269
                      Encrypted:false
                      SSDEEP:
                      MD5:F44B26D65E84804238199C753FC1FC2B
                      SHA1:1CC6D8670929A47CC575C113CA1E29E2166BEA5F
                      SHA-256:3E2FB28C606B7B5B5590FAB2749F5003407C010B0171D22CF0EDB25F815B4F9F
                      SHA-512:7BE7FCC93481679823ED49AE081624405F736A1EC65539C43EB7149487E60139D8BA5CDBED573BB9E76A61B8B0BE1B9DEBB467D2042343E50D43C6C146634713
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1633280
                      Entropy (8bit):4.109844974449858
                      Encrypted:false
                      SSDEEP:
                      MD5:03967B19A20F0F8C630DF2BDD6842D16
                      SHA1:12FDACDAB32300C7A19644FE7627C930C02675B1
                      SHA-256:D9F5258A0EA6924D1FF414A280C7DBC54888E6B0374D5D47C57BF3C5E0A82D4E
                      SHA-512:1FBFA5A78ED016AF2620D853FE44CC3704CC63475B0FDDFF3BC60D32D78205826378C72100CA5E12EEF42437DC790CD137E8E83E262A9D35BAA1F2D778C41D87
                      Malicious:false
                      Preview:@....... ""S2.R.@........."Cd...@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):5668
                      Entropy (8bit):1.82387616095623
                      Encrypted:false
                      SSDEEP:
                      MD5:D5A28CD7514AA226CFE657023B8BB0D4
                      SHA1:39F15DF3EB4C01088F990B7A89BC523D751ABB2F
                      SHA-256:FF266CF6DAF100BDF6DCD50860A1EF1B94E3B4641EB6F818987125F022171A70
                      SHA-512:C76A12D0CFED93878E9295EE2BC4E192157A973A924C8D87676563A672F731E519ACEFC5534E861CFB7DCF5210CF23F4E108804AFE9744C24F096EF7269ACA88
                      Malicious:false
                      Preview:...S...$............2018.4.0f1...................N..vB...............v...xI.B..7...4Uh......0..ZgA.$. ?..&._.............Bh._'86j.r.........@z..U.c.:0).c.Bt...<.h......lr......D......qP...(...........^.].q3..r.......-...7@.y..z]j.w......|..6vX..lr..........n0P../.A.8.q.jkl../...L}..Or.............t.'..v.Fq.jkl../...L}..Or......eu.j....C....gzM.1qQ..[..J-.4r.............,..h\3.q.jkl../...L}..Or.......:.E..?.Q.V9..ft........-..EhKr........M.EK..K-.%."....b"Y..lq.$..2.o.................7...............8...c...................G...................?...............(...D...............p...D...................D...................D...............H...M...................=...................4...................D...............X...,................... ................... ...................0................... ...................`...............x...................m.......................(...........r...........................................................N...........................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):6532
                      Entropy (8bit):2.190626203670541
                      Encrypted:false
                      SSDEEP:
                      MD5:C983F6E04F5C2C8FA443B7682F1D481C
                      SHA1:3BF88486BE8DAC38B5F2FCB00860E5FB6AA6D6E3
                      SHA-256:EF3755BC8FE9C0ACB98EE7849B36DC6D1A653D8FB34D9145CA29817E1D726E0D
                      SHA-512:D05FA5CF7F24F320C86E0DEE6310085563855AEFC49E2EAA339DAB8D9ED9C6A7EC20B8737019FCAA196E959C227E0350A54D7CF977C1F249FD31AE5D01E9394D
                      Malicious:false
                      Preview:...k................2018.4.0f1...................N..vB...............v...xI.B..7...4U........>H[.IP.y.#....h......0..ZgA.$. ?..&._.............Bh._'86j.r.........@z..U.c.:0).c.Bt...<.h......lr.......zMy.wk...w.......&....I....r.......:.E..?.Q.V9..ft........-..EhKr.......[.Z...Xr.#L..._q.jkl../...L}..Or.........(.:...K....N<.......q.aqb..r..........n0P../.A.8.q.jkl../...L}..Or.........f.y&*...S....q.jkl../...L}..Or.......9W.r.e......7.Q%.+...}.bq.Z.r......C&Hc......&v...`I...!.........r.........YX.ee?L3..".q.jkl../...L}..Or........M.EK..K-.%."....b"Y..lq.$..2.o................K...............P...C...................?...................K...............(...;...............h.../...................D...................P...............0...D...............x...P...................D...................D...............X...........................................M...................=...................4...............P...$...............x...`................... ...................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):6888
                      Entropy (8bit):2.28770523133811
                      Encrypted:false
                      SSDEEP:
                      MD5:959AE6F19B3FF38E2336911D538DA786
                      SHA1:0C8209980B7C57E3D3A79D0F27BCD1B29CFCC5AD
                      SHA-256:DAC300D2AD28FF951ED5790D9E6E9032B1AAA14216D1AC0243BED8027F684E35
                      SHA-512:344C44F5BF8CAE0671CF88DECDF35274D141FB8C12AACA0B3E20076D6758E398E92A5C67B290C1E6080EA15D76A71BE6EC9B49F55B3B76CDC1699C2A14F7532E
                      Malicious:false
                      Preview:...w................2018.4.0f1...................N..vB...............v...xI.B..7...4U........>H[.IP.y.#....Q......0^J..K..%...u..R......a]".. k.p..T.<Uh......0..ZgA.$. ?..&._.............Bh._'86j.r.........@z..U.c.:0).c.Bt...<.h......lr.......Y..^#..,&.....xq.jkl../...L}..Or.........(.:...K....N<.......q.aqb..r........N..._...l...;bP..&..ly...:=H..r.........YX.ee?L3..".q.jkl../...L}..Or.......m.g.r...%.....Fy...p..O......qIr.........f.y&*...S....q.jkl../...L}..Or.......zMy.wk...w.......&....I....r.......:.E..?.Q.V9..ft........-..EhKr......B...PZ.....6..q.jkl../...L}..Or..........n0P../.A.8.q.jkl../...L}..Or........M.EK..K-.%."....b"Y..lq.$..2.or.......G+..<I.(.X..6..V.6T.L..:.B.!...............K...............P...G...................3...................G...................;...............X...c...................+...................D...............8...P...................D...................P............... ...D...............h...D...................D...............
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4712
                      Entropy (8bit):1.1718532494469927
                      Encrypted:false
                      SSDEEP:
                      MD5:8A6C0A3CCFF67A1D4F7BCACBCBF2DC3B
                      SHA1:C9BC02F33070E31E49AF1B9943EC7B7F25B4AAA6
                      SHA-256:899844BE109C1FF29EFE4C3B632CA77B4B9D7CEB70A8B0601343AF37CEFEA58D
                      SHA-512:342ABEA644D9DA21AF2605E61892CF6F0EE6447726298B3A6572026BE0E87EF91CA345A63D3726F6A680BC912071C5A915448A2474EB9A46552C19D79B2856EB
                      Malicious:false
                      Preview:.......h............2018.4.0f1...................N..vB...............v...xI.B..7...4Uh......0..ZgA.$. ?..&._.............Bh._'86j.r........$Vy..tS.}7C..usX.8fD$C...u.o.................3...............8...D...................M...................a...............8...0................................................globalgamemanagers.assets......................sharedassets3.assets......................library/unity default resources...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4459444
                      Entropy (8bit):6.603400793437201
                      Encrypted:false
                      SSDEEP:
                      MD5:B1D4645BF5123D87B7B4B98445D3B014
                      SHA1:4297B813079A80D35FECBE060A4BFABE22792129
                      SHA-256:773AF8980A22224040EC8E0D00F9D14A91E47C2D07CF0B1152ABA869B685C940
                      SHA-512:0EB764EED98319EF848BC19240174691D2675FEA6C338F651115247B42A1528BFC4119325BE251F15444389E492F2B38EC4AFD5AA041D2EE6AC9F303CFC0C32A
                      Malicious:false
                      Preview:.....D..............2018.4.0f1......9...........q4m...)M...f..m........l@.})Q...OZ`.O]+......3f.@..(+;....8.s0........`.>....J6._.5.1......Hk..].j...d0X..>......NX.c2UF4.~..h...J............E...w...Z......2.L..;.N.xR)M9..[..........+..y;..m......Hk..].j...d0X..y.......A.J.!....xh6.......j.S""h.h....N........?..Qv...__...B}.......1M..q68...b.c).b?...........'.j................N..vB...............v...xI.B..7...4U.......(8....'....N.b!........0...$..nX`..y-........... .9...F!..C2......n.g.&.~..g....kT6.......[....l.k(.k..D......!.o\4..0>..Xa.}K.......m.....2.f._..._......u..X@....m.a,..............k.G.EV.C.................,VHYU.@.>.........B.!....vh....D........@.A<5.~v..r#.........WP.N ..hBM...........~........K.~..............#.f[..75E.K.......{.,D./.?...Mr.........16...%.*......R)..`..W.76.r............D.A$.hK.). .?.g..TYD.=....r.......:O./..h._..`.x...L.."p6.3s...r......X...O.....e..,..}...g...B{M..r......L..ke..^`...;./..`..6@..d.u..}r.....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):20158308
                      Entropy (8bit):6.738406915323269
                      Encrypted:false
                      SSDEEP:
                      MD5:F44B26D65E84804238199C753FC1FC2B
                      SHA1:1CC6D8670929A47CC575C113CA1E29E2166BEA5F
                      SHA-256:3E2FB28C606B7B5B5590FAB2749F5003407C010B0171D22CF0EDB25F815B4F9F
                      SHA-512:7BE7FCC93481679823ED49AE081624405F736A1EC65539C43EB7149487E60139D8BA5CDBED573BB9E76A61B8B0BE1B9DEBB467D2042343E50D43C6C146634713
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):23469532
                      Entropy (8bit):6.8422810685165825
                      Encrypted:false
                      SSDEEP:
                      MD5:C12D025D7AD8F722AA189A14659245E1
                      SHA1:634A9333B61C7A0E866A0E5830CFCF5B120BE4B8
                      SHA-256:394D4105B9F3B92DAC7559A952808C107CDF45967557B96D79A445FC4EE203F6
                      SHA-512:B2706F4C8AAF1351C12B9CFBAA1906F6E5368C964885571AC4885FA66D7C95998E7F05F2750B879E0E696D818992082EF90AA6FD77CF8853927E137FE7B851B7
                      Malicious:false
                      Preview:..*`.f........*.....2018.4.0f1......5...........q...\..|...q~.........q4m...)M...f..m........l@.})Q...OZ`.O]0........`.>....J6._.5.J............E...w...[..........+..y;.........j.S""h.h....N.........1M..q68...b.c).b.........N..vB...............v...xI.B..7...4U........>H[.IP.y.#....:.......8W.iIJ..s...h..<...........@.5.V/..7BXQ......0^J..K..%...u..R......a]".. k.p..T.<U\..............$.g.].._......u..X@....m.a,...{.......'.....i..+....|..............$.g.]..........@#.1:y.^.b...........B.P.....?..$N.}........WP.N ..hBM.............-z6a.....:a`e........~........K.~..K.......{.,D./.?...Mr.......f.-.(0CD........;...\.....@,r........I..]...X!....o.!.Y....2..{r.......ST5.3."w.vt..2.-....P.`...L.z..r............|.3g.u..e.d.L...w..&.@...r.......P..?.k....J.*L[7....]?.....r..........a]f...X.CC.n.3...9.d..%.."hr........G$kz....'.~..q<...._d.1.d.q..r.......,}.g...A.G..3q2q.jkl../...L}..Or......TC..>........U-...H.u...u..x.r.......I.-.....}J...9?d.L...w..&.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1633280
                      Entropy (8bit):4.109844974449858
                      Encrypted:false
                      SSDEEP:
                      MD5:03967B19A20F0F8C630DF2BDD6842D16
                      SHA1:12FDACDAB32300C7A19644FE7627C930C02675B1
                      SHA-256:D9F5258A0EA6924D1FF414A280C7DBC54888E6B0374D5D47C57BF3C5E0A82D4E
                      SHA-512:1FBFA5A78ED016AF2620D853FE44CC3704CC63475B0FDDFF3BC60D32D78205826378C72100CA5E12EEF42437DC790CD137E8E83E262A9D35BAA1F2D778C41D87
                      Malicious:false
                      Preview:@....... ""S2.R.@........."Cd...@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.........33....@.......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4265
                      Entropy (8bit):0.41938788561015394
                      Encrypted:false
                      SSDEEP:
                      MD5:1D0CA96D7BA31C5155480C03FF8534F8
                      SHA1:3035976480079BA828D5D4C9E01586F4E4A83A3F
                      SHA-256:81D5AFF2876DF5F61CB61FE42552336FDB0DF489E074D454CAC8BCE3599E30EE
                      SHA-512:F54B3D5F64C31E15DAECEF48176378DF0E26F318E25581E3E5CB8CC4CD11D6514E74ED22B6CAE3E12DF228453410F8023CE909061A633D52776C574F64E8AA2E
                      Malicious:false
                      Preview:....................2018.4.0f1..................q...\..|...q~.......................................................library/unity default resources......................globalgamemanagers.assets......................resources.assets...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):4289
                      Entropy (8bit):0.43268019175662237
                      Encrypted:false
                      SSDEEP:
                      MD5:5FF426319B45ABDA9CF4E80E93D999B3
                      SHA1:C68FDD382E8BDFB54CB21D9857DA6C2995F996C4
                      SHA-256:921B2E81EA750D86506AB408CE3FE7F52134A7A1C125B9AB150809C7E1801837
                      SHA-512:B6C32178DA50BB1134AA57EE7255FE607241EDC00B3D5FE915E723925E9EA7FA7DF5FECA37A11EBB796468D5C1D50D42BBF662AFFDB7F91C876A3DECA7B9E056
                      Malicious:false
                      Preview:....................2018.4.0f1..................q...\..|...q~.......................................................library/unity default resources......................globalgamemanagers.assets......................resources.assets...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):12128
                      Entropy (8bit):3.719887923662832
                      Encrypted:false
                      SSDEEP:
                      MD5:781989846F68EB4EEAC0A1EDD8BB2AAF
                      SHA1:736241B5B6665B852369CF9CD58D4350DDD31958
                      SHA-256:4E973E89F51B3535D1CDD737334CC1B6D532B6797CA918B9C3B410F8D08AD6F6
                      SHA-512:3053609DC50F9BD2F83D0AAFF5F1333EBEC347A0CE8DDC55C81F403DA952E74632B71A322C765CBAFE040D3C035A485570AEB031BC44CA1A6DC0D00372755303
                      Malicious:false
                      Preview:...]../`............2018.4.0f1..................q...\..|...q~.........q4m...)M...f..m........l@.})Q...OZ`.O]0........`.>....J6._.5........-+.c.*h......{.................%...............(...................(.......................x...............8...(....................................library/unity default resources......................globalgamemanagers.assets.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):1398128
                      Entropy (8bit):4.441122393849138
                      Encrypted:false
                      SSDEEP:
                      MD5:FCFC415F428F40F742C1AF62C66B4F7A
                      SHA1:38E344E0C9FD1C89DC1E48A9ADE577B35FEAAF6B
                      SHA-256:6351A22E2E499F89CE243619A6BEC27D023D2FE63FE813575C62004E8884D135
                      SHA-512:73F25ADDEA7D757E3D9A0F0A451A08B3F8319FCDF99BD1FBC6388198553BFD8CD1884EBBA0FD02431AD80E328D341CC09C547340B894B40F57C07F152525DE3A
                      Malicious:false
                      Preview:++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++..............++......
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):650752
                      Entropy (8bit):6.454781590856132
                      Encrypted:false
                      SSDEEP:
                      MD5:B78BC21D6DEEE736214C8A9B48532663
                      SHA1:0AFD9709075EBDDD1CDA5BB580CAB974DEE7CC9B
                      SHA-256:A7BA9BBEAA5704E12F6D2432A797921DA6B7F78B42FDAB390B03AE595F5AE671
                      SHA-512:C2E21540ED3C706B1D1CCDB976AB44F725A2D0F2F3A0B339EE02BA45D74F62A88C7FD7D907C592BA31B8CC4D579785CAD249F001EFD34EC148BA0C32A60C4507
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?..@^.[@^.[@^.[/:.ZJ^.[/:.ZE^.[/:.Z.^.[/:.ZB^.[.;.ZI^.[.;.Zb^.[.;.ZS^.[P8.ZC^.[@^.[.^.[P8.ZB^.[P8.ZA^.[P8.[A^.[P8.ZA^.[Rich@^.[................PE..d......\.........."..........\......h..........@.............................0............`..........................................0.......0..<....p......`..0............ ......P!..T............................!.................. ............................text............................... ..`.rdata.............................@..@.data........@.......,..............@....pdata..0....`.......6..............@..@.rsrc.......p.......D..............@..@.reloc....... ......................@..B................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):22972872
                      Entropy (8bit):6.651971657474417
                      Encrypted:false
                      SSDEEP:
                      MD5:BF3C5660895A3F0A031466379C295982
                      SHA1:CF58FE47EB498CFB252C084E56636AB12356B537
                      SHA-256:D47B18340529E10FD51357FF0E1A821D76EC26E719995A3D648F58FE3813D499
                      SHA-512:8797D706847B313E35037DA8C982BCD4BF3E61A4CB785F10DB6F9F3D7672EEBB7386F43AEF4D8D4B12B3EAF9CC3545BB4A5C66B5AADF014986933F6B0C16F5F7
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$..........$...w...w...w..v...w..v...w..v...w.u.w...w..v...w..v..w..7w...w?.v..w..'w...w...w...w_.v...w..vv..w..v...w..v...w..v...w...w...w3.sw...w..v...w..v...w...w...w..vO..w..v...w..Kw...w..v...wRich...w................PE..d...W..\.........." .....N...TR.....H.........................................l......._...`.........................................P.I.L.....I......pk...... \.l....r^.......k.h^..@9:.T....................::.(....9:..............`...............................text...DL.......N.................. ..`.rdata...e/..`...f/..R..............@..@.data....C....I.......I.............@....pdata..l.... \.......M.............@..@.rodata.......j......N\.............@..@_RDATA..0.....j......Z\.............@..@.rsrc........pk.......].............@..@.reloc..h^....k..`....].............@..B........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):992082
                      Entropy (8bit):6.568677192877011
                      Encrypted:false
                      SSDEEP:
                      MD5:0E490F69B9EB4ED261A3AE6A33EA769E
                      SHA1:9749D1738E61FED018CEC893B32B31107ECDAFA7
                      SHA-256:CEDE1BC33633D7C3D1F357CAC892AE672100C19EC24ED20B41547C9819765815
                      SHA-512:CD07FAEBFB5DF701CEB558D7F6E9692A7B55246F22C276E05D9E9634086B2ABC0D430F3C9AB86D5DEA9C3D0D68A573730C000BD9A0BCDE026C364583A246168C
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 3%
                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................R....................@..........................@...................@..............................:)... ..\....................`...............................P......................................................CODE................................ ..`DATA................................@...BSS......................................idata..:).......*..................@....tls.........@...........................rdata.......P......................@..P.reloc.......`......................@..P.rsrc...\.... ......................@..P.............@......................@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):650752
                      Entropy (8bit):6.454781590856132
                      Encrypted:false
                      SSDEEP:
                      MD5:B78BC21D6DEEE736214C8A9B48532663
                      SHA1:0AFD9709075EBDDD1CDA5BB580CAB974DEE7CC9B
                      SHA-256:A7BA9BBEAA5704E12F6D2432A797921DA6B7F78B42FDAB390B03AE595F5AE671
                      SHA-512:C2E21540ED3C706B1D1CCDB976AB44F725A2D0F2F3A0B339EE02BA45D74F62A88C7FD7D907C592BA31B8CC4D579785CAD249F001EFD34EC148BA0C32A60C4507
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?..@^.[@^.[@^.[/:.ZJ^.[/:.ZE^.[/:.Z.^.[/:.ZB^.[.;.ZI^.[.;.Zb^.[.;.ZS^.[P8.ZC^.[@^.[.^.[P8.ZB^.[P8.ZA^.[P8.[A^.[P8.ZA^.[Rich@^.[................PE..d......\.........."..........\......h..........@.............................0............`..........................................0.......0..<....p......`..0............ ......P!..T............................!.................. ............................text............................... ..`.rdata.............................@..@.data........@.......,..............@....pdata..0....`.......6..............@..@.rsrc.......p.......D..............@..@.reloc....... ......................@..B................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):85824512
                      Entropy (8bit):6.35847424139208
                      Encrypted:false
                      SSDEEP:
                      MD5:77B351C541B9FE71E7C4EEC08264BB30
                      SHA1:09C58F99FE56BE9EAA7046C4B37A26CF8207398A
                      SHA-256:6DEE972CFF5DDA68AD4D59310C94B02AD1B501A0BF2B72329C02A16B693B20FC
                      SHA-512:8CF73DFD3885ECD85CAFA4A2608DB4910813588BE8692361A25CC9B4CBF4E6A5F693676D2BEA37CD243524E7D521B3678B9E1BEB3301A2F243C76B7DA4650350
                      Malicious:false
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........K.g...g...g.......g.......g......Yg..h.c..g.......g.......g.......g.......g.......g...g...g..^....g..^....c..^....g..^....g..Rich.g..................PE..d...!.}f.........." ................D.D.......................................Z...........`.........................................p,......dJ............... ..x.&...........>.T7..0.u.T.....................u.(.....u..............0..8............................text.....G.......G................. ..`il2cpp..VD~...G..F~...G............. ..`.rdata..r-...0......................@..@.data.....t..`....8..>..............@....pdata..x.&.. ....&.................@..@.reloc..T7....>..8...\..............@..B........................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):42704
                      Entropy (8bit):6.562678677892789
                      Encrypted:false
                      SSDEEP:
                      MD5:AE4D6C34422B85BFA2E99A456FC4C733
                      SHA1:BBFB4B08C694FF7DF134939A19F05EAC0C84A816
                      SHA-256:2F84A7583F08064F55AC9EA3426F898E1BEF6F408FECEE22C1F5567601E70123
                      SHA-512:E49D71B062B935445FDC172CD401A3CCC890225147D19D477E9353EA408D8DF5590C93176D420E619CAAD5A9BFE2BF1B95941195B1F3866ABA6D1876C36ACD8A
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... ...d..d..d..m.u.l.._..`.._..f.._..n..a..a..d..4.._..u....c....e......e..d.q.e....e..Richd..........PE..d..../.X.........." .....8...:.......7.............................e................5.....`A.........................................a.......c.......................h...>......h...@W..8....................X..(....W...............P...............................text....6.......8.................. ..`.rdata.......P.......<..............@..@.data........p.......X..............@....pdata...............Z..............@..@.tls....)............^..............@....rsrc................`..............@..@.reloc..h............f..............@..B........................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1458120
                      Entropy (8bit):4.704411747703894
                      Encrypted:false
                      SSDEEP:
                      MD5:9E1BD55580B0F983A43493DF89AE77FC
                      SHA1:A4F12787640B93B6F532F0A55345694D813E344D
                      SHA-256:723467A702315734BC9F8A990EB6B4B270CC9AE910C8743FDFED4FE0557DBEE7
                      SHA-512:813A6C8DA77CF07137CB9781C288826137AC6BF3056857C075D78E15B6040ED98BB9D8DCA204FD3D3F30F823FB0CA8B974F335A023CA319F2284ED0B68700260
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 2%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&.[~H.[~H.[~H.4.L.L~H.4.K.W~H.4.M..~H....Z~H...K.Q~H...M.n~H...L.}~H.4.N.Z~H.4.I.L~H.[~I.~H.K.L.S~H.K.M.C~H.K...Z~H.K.J.Z~H.Rich[~H.................PE..d..._..\.........."..........R.................@..........................................`..................................................F..........@Z.......\...(.......p..........T.......................(.................... ...............................text...l........................... ..`.rdata...;... ...<..................@..@.data....K...`.......N..............@....pdata...\.......^...^..............@..@.rsrc...@Z.......\..................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):992082
                      Entropy (8bit):6.568677192877011
                      Encrypted:false
                      SSDEEP:
                      MD5:0E490F69B9EB4ED261A3AE6A33EA769E
                      SHA1:9749D1738E61FED018CEC893B32B31107ECDAFA7
                      SHA-256:CEDE1BC33633D7C3D1F357CAC892AE672100C19EC24ED20B41547C9819765815
                      SHA-512:CD07FAEBFB5DF701CEB558D7F6E9692A7B55246F22C276E05D9E9634086B2ABC0D430F3C9AB86D5DEA9C3D0D68A573730C000BD9A0BCDE026C364583A246168C
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 3%
                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................R....................@..........................@...................@..............................:)... ..\....................`...............................P......................................................CODE................................ ..`DATA................................@...BSS......................................idata..:).......*..................@....tls.........@...........................rdata.......P......................@..P.reloc.......`......................@..P.rsrc...\.... ......................@..P.............@......................@..P........................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5622
                      Entropy (8bit):5.251561267678045
                      Encrypted:false
                      SSDEEP:
                      MD5:CBEBD46003415A8E935E4E995324F882
                      SHA1:9F4E24CA80F408B4552B5294398F946555269753
                      SHA-256:E6AA4127A2FD5492E666249BA7D52D1EFDD8D151CFE7B8840B0C365AF09BCCD5
                      SHA-512:C7798C0AF6354CA6C7B68545D96099BECAB8AAEB9565502968A54633F6ACE05A8A3C8827DA85BEE34608AD58955AACC7E727EAF36892E93163BFA011DE500D1D
                      Malicious:false
                      Preview:\.z.,..(iIFix.ILFixInterfaceBridge, Assembly-CSharp, Version=4.12.8947.39381, Culture=neutral, PublicKeyToken=null!...iIFix.ILFixInterfaceBridge, Assembly-CSharp, Version=4.12.8947.39381, Culture=neutral, PublicKeyToken=nullaUIAllyBlessedCell, Assembly-CSharp, Version=4.12.8947.39381, Culture=neutral, PublicKeyToken=null`ConfigureManager, Assembly-CSharp, Version=4.12.8947.39381, Culture=neutral, PublicKeyToken=null..BehaviourSingleton`1[[ConfigureManager, Assembly-CSharp, Version=4.12.8947.39381, Culture=neutral, PublicKeyToken=null]], Assembly-CSharp, Version=4.12.8947.39381, Culture=neutral, PublicKeyToken=nullhProtoConfig.DefaultConfigure, config-proto, Version=1.0.8944.20452, Culture=neutral, PublicKeyToken=nullZSystem.String, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089\MsgDown.item, evony-proto-down, Version=1.0.8944.19820, Culture=neutral, PublicKeyToken=nulllEvonyExtension.ItemExtension, Assembly-CSharp, Version=4.12.8947.39381, Culture=neutral,
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                      Category:dropped
                      Size (bytes):94
                      Entropy (8bit):4.924797793421913
                      Encrypted:false
                      SSDEEP:
                      MD5:2F1954237AEDEB586D3FC09AE6C64AC7
                      SHA1:AD04B33A303CE8E0E30893F5FFBEF42A8EDFEFF0
                      SHA-256:C04DA330A46747C36EAD0C4FC0E2140178DF2E091F4D6D0FD30C7ABADD8C7BD6
                      SHA-512:3AE524C3350682DC7891834474822B0285A81010447B4533D3CA7F2E97F921871581E5556AE74E3C4BB2A39DAE5F0BA295CE443642C0BD827D13969DF8F5D86F
                      Malicious:false
                      Preview:.{"fileName":"dynamic-pc-loading-l_9296308.brotli","isDownLoad":true,"isDecompression":true}
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):12152773
                      Entropy (8bit):7.9927989580434815
                      Encrypted:true
                      SSDEEP:
                      MD5:83AB619AB925578B996EFD72C46B2EFC
                      SHA1:634AE5AD0CE4EDB3A93CF739CD8C658486D7C278
                      SHA-256:95A9F87E56EDF32D277B6DBAA6EE98A009882E044DEAC8573F22842BF2D9B044
                      SHA-512:DD28B573B69479F18ECA1F2D73418108EC61B35246470D0C4B7A0F5CD2A5F3817030BB8AB2C5AFA7D3D22E87FA95AF94B9C7194B4234B7248469398BA0976963
                      Malicious:true
                      Preview:...........?.*....J?.n}5..=..{}.j.EJa...Rg....@`c...^a.......P ..Jb...q...Wv.....@.a;i.....I.V......;@.%.....r.=.v..nj.]......#....x..... ..TO....=.`...!FK.].C..T..._...|.&/.v......i...m.................................................s.p.}.M...>....T)"-...*....kl..........b.....5..ML.IL.......BVT.V.2`.1..t..c.7p.hR..Q8.............%.8T....~...rG.".y.c.CeT.. ..mC..0........Q.Q........~q.y.9!1).RR.4....22.PvN.....|[..."(..0.tpY9p....%....j....`.o.vqq..hXm<.q\..uuC..zTI0.pR2.....9...m..=j.9jt..h..q.KF....tl..bl..&N..3... ..? Q.O.j.......@.......e......7..dP.|(].....V......@-.YK.-..2/...,.pb...*6..W.V2.xU..F....[/.Z...`<.......@\`.x..J7...)6%......&..dIJ#...w33G.)c..V...{...B.....o.......rP.N...G.Z.......Rs......X..o.X..u.R....W*0*1f.3.Hv.Y..........z.k..3a..#.A.......[.A.vT.!.....b....Q.sM.!.T....sRp.qo...yd\B<6.HF.p.\....j^.e...h.`Y..RND.+...X...J.H.....k.........e.J2.:..I...P..y=.......m.N.1.[...RzC.Q?UF.L..a.@r..0.E.m..F"..o.4'.....1.w."...&%..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:
                      MD5:C4CA4238A0B923820DCC509A6F75849B
                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                      Malicious:false
                      Preview:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):110
                      Entropy (8bit):4.856251764159212
                      Encrypted:false
                      SSDEEP:
                      MD5:B4C522CF09889DB4160DEAE0987A1790
                      SHA1:70A150C62135E268CB58145584B78A24B67B40C3
                      SHA-256:A6E900095075D5FC11D3D0E0E196FBDBFD9A7E976A247597905ACF04AA303E33
                      SHA-512:375E849E683F71AB9C54237BDF952B3999488289CD55B501882E4F2A3B103C27597C8336D7112B6B5377D83D63643E319EBBC818559445178EFD602CE224D73A
                      Malicious:false
                      Preview:(1){"type":"analytics.appStart.v1","msg":{"previous_sessionid":0,"ts":1720153368480,"t_since_start":4017392}}.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:
                      MD5:C81E728D9D4C2F636F067F89CC14862C
                      SHA1:DA4B9237BACCCDF19C0760CAB7AEC4A8359010B0
                      SHA-256:D4735E3A265E16EEE03F59718B9B5D03019C07D8B6C51F90DA3A666EEC13AB35
                      SHA-512:40B244112641DD78DD4F93B6C9190DD46E0099194D5A44257B7EFAD6EF9FF4683DA1EDA0244448CB343AA688F5D3EFD7314DAFE580AC0BCBF115AECA9E8DC114
                      Malicious:false
                      Preview:2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):364
                      Entropy (8bit):4.828591204953426
                      Encrypted:false
                      SSDEEP:
                      MD5:78F74C6CE5CDA665C3CCFE80F8D867C3
                      SHA1:578CED6FF9E45352253A1ED6FB884F88D546A8D6
                      SHA-256:3300EE5D1759FAF9282119521260E1695B0937A83DF809F302BC53570E0F09B1
                      SHA-512:28F57F0AB60FC978A5069041A77A6DD00C6F2617F5521A65ACD9648FA0DFF8856AC4786EE1025822AB81E14C587B0B5F7EDF2AC9D9AFC23D7478C05BB6B3D6F9
                      Malicious:false
                      Preview:{"appid":"local.fd9416aee36cf4c459d84107fee6df6f","userid":"bb8fe5a1bfae0af46a87bfd06edea166","sessionid":7775255834087949806,"platform":"WindowsPlayer","platformid":2,"sdk_ver":"u2018.4.0f1","session_count":1,"localprojectid":"fd9416aee36cf4c459d84107fee6df6f","build_guid":"4b655e3a0af0299468ad365fc5d83d2b","deviceid":"badbeec431deadae2cd9056b9179f86f5dc40809"}
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:
                      MD5:C4CA4238A0B923820DCC509A6F75849B
                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                      Malicious:false
                      Preview:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):133
                      Entropy (8bit):4.776252221128151
                      Encrypted:false
                      SSDEEP:
                      MD5:A1E23651BDFCC785473B5C9AC4E10F30
                      SHA1:137F287858296BFCB4B0ADFA9FAC65DDC14F710E
                      SHA-256:1D170FA07C3941B79B2BB6AD43D82228E5FFF23D237DEABBFE8A1C9ECE5DB73D
                      SHA-512:D09E3B21EBFEBF6E73250553B82EDE08425E0899DD5385C4FE250093F2154D7DF19B0EB553E24D67F6DF9DDD8C97645777D557A5A45546B047343FEA8EC57BFE
                      Malicious:false
                      Preview:(1){"type":"analytics.appInstall.v1","msg":{"unity_ver":"2018.4.0f1","app_ver":"4.76.1","ts":1720153368480,"t_since_start":4017405}}.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:
                      MD5:C81E728D9D4C2F636F067F89CC14862C
                      SHA1:DA4B9237BACCCDF19C0760CAB7AEC4A8359010B0
                      SHA-256:D4735E3A265E16EEE03F59718B9B5D03019C07D8B6C51F90DA3A666EEC13AB35
                      SHA-512:40B244112641DD78DD4F93B6C9190DD46E0099194D5A44257B7EFAD6EF9FF4683DA1EDA0244448CB343AA688F5D3EFD7314DAFE580AC0BCBF115AECA9E8DC114
                      Malicious:false
                      Preview:2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):364
                      Entropy (8bit):4.828591204953426
                      Encrypted:false
                      SSDEEP:
                      MD5:78F74C6CE5CDA665C3CCFE80F8D867C3
                      SHA1:578CED6FF9E45352253A1ED6FB884F88D546A8D6
                      SHA-256:3300EE5D1759FAF9282119521260E1695B0937A83DF809F302BC53570E0F09B1
                      SHA-512:28F57F0AB60FC978A5069041A77A6DD00C6F2617F5521A65ACD9648FA0DFF8856AC4786EE1025822AB81E14C587B0B5F7EDF2AC9D9AFC23D7478C05BB6B3D6F9
                      Malicious:false
                      Preview:{"appid":"local.fd9416aee36cf4c459d84107fee6df6f","userid":"bb8fe5a1bfae0af46a87bfd06edea166","sessionid":7775255834087949806,"platform":"WindowsPlayer","platformid":2,"sdk_ver":"u2018.4.0f1","session_count":1,"localprojectid":"fd9416aee36cf4c459d84107fee6df6f","build_guid":"4b655e3a0af0299468ad365fc5d83d2b","deviceid":"badbeec431deadae2cd9056b9179f86f5dc40809"}
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:
                      MD5:C4CA4238A0B923820DCC509A6F75849B
                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                      Malicious:false
                      Preview:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text, with very long lines (988)
                      Category:dropped
                      Size (bytes):989
                      Entropy (8bit):5.185534483317675
                      Encrypted:false
                      SSDEEP:
                      MD5:31268D5307DE4AE2DBEE31B02217F3A9
                      SHA1:85D750E01CAA5AD33A503F5B3254FBC943E4DA5B
                      SHA-256:1D3222BEE65C9746971D80B541D3DB54B77E914CB1CC4152E056AA481E46999A
                      SHA-512:8EBF874C083C99F06A5035E8EB0D09CE2AA0C98718FB9542F625627BDDC184D3283526135334F0B6CA84835888E59AFCF4E2C11B358ECB2AD361930CDEE79D9F
                      Malicious:false
                      Preview:(2){"type":"analytics.deviceInfo.v1","msg":{"ts":1720153368535,"t_since_start":4072752,"os_ver":"Windows 10 (10.0.0) 64bit","app_ver":"4.76.1","rooted_jailbroken":false,"debug_build":false,"device_info_hash":1973059081,"model":"wT26GU33 (Lu9UckN4oo1VKu2)","device_name":"830021","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","cpu_count":4,"cpu_freq":2000,"ram":8191,"vram":2047,"screen":"1280 x 1024","app_resolution":"1280 x 945","dpi":96,"lang":"en","sensors":144,"flags":3271817162,"app_name":"topgamesinc.Evony: The King's Return","app_install_mode":"","app_install_store":"","app_build_ver":"2018.4.0f1","license_type":"advanced_pro","gfx_device_id":140,"gfx_device_vendor_id":5140,"gfx_name":"Microsoft Basic Render Driver","gfx_vendor":"Microsoft","gfx_ver":"Direct3D 11.0 [level 11.1]","gfx_driver":"","gfx_shader":50,"gfx_api":2,"gfx_tex":915,"gfx_rt":511,"gfx_flags":8387583,"max_texture_size":16384,"copy_texture_support":31,"max_cubemap_size":16384,"render_target_count":8}}.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:
                      MD5:C81E728D9D4C2F636F067F89CC14862C
                      SHA1:DA4B9237BACCCDF19C0760CAB7AEC4A8359010B0
                      SHA-256:D4735E3A265E16EEE03F59718B9B5D03019C07D8B6C51F90DA3A666EEC13AB35
                      SHA-512:40B244112641DD78DD4F93B6C9190DD46E0099194D5A44257B7EFAD6EF9FF4683DA1EDA0244448CB343AA688F5D3EFD7314DAFE580AC0BCBF115AECA9E8DC114
                      Malicious:false
                      Preview:2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):364
                      Entropy (8bit):4.828591204953426
                      Encrypted:false
                      SSDEEP:
                      MD5:78F74C6CE5CDA665C3CCFE80F8D867C3
                      SHA1:578CED6FF9E45352253A1ED6FB884F88D546A8D6
                      SHA-256:3300EE5D1759FAF9282119521260E1695B0937A83DF809F302BC53570E0F09B1
                      SHA-512:28F57F0AB60FC978A5069041A77A6DD00C6F2617F5521A65ACD9648FA0DFF8856AC4786EE1025822AB81E14C587B0B5F7EDF2AC9D9AFC23D7478C05BB6B3D6F9
                      Malicious:false
                      Preview:{"appid":"local.fd9416aee36cf4c459d84107fee6df6f","userid":"bb8fe5a1bfae0af46a87bfd06edea166","sessionid":7775255834087949806,"platform":"WindowsPlayer","platformid":2,"sdk_ver":"u2018.4.0f1","session_count":1,"localprojectid":"fd9416aee36cf4c459d84107fee6df6f","build_guid":"4b655e3a0af0299468ad365fc5d83d2b","deviceid":"badbeec431deadae2cd9056b9179f86f5dc40809"}
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):293
                      Entropy (8bit):4.63051803308932
                      Encrypted:false
                      SSDEEP:
                      MD5:8673A8AC0B06A9D056D08D62F857BA4B
                      SHA1:A351BEA1932270BAFBE468584058FEF20DCFC31E
                      SHA-256:83B3F90C4EDF1F122C8FAF9784CA0AEE4DD017C65493AC181C1814211703DB96
                      SHA-512:EDF28EB7FCEF654F139285D308F817EE230D6F064A4C865109D6DFE6F73C11F8F35737C8159C8A302118237AB980899BA5773F547CC9DA4028643A53B08E324F
                      Malicious:false
                      Preview:{"analytics":{"enabled":true},"connect":{"limit_user_tracking":false,"player_opted_out":false,"enabled":true},"performance":{"enabled":true},"dynamic":{"coreBusinessMetrics":{"enabled":true,"timeToWaitForUserInfoS":60},"analytics":{"shouldCollectAutomation":true,"timeToWaitForUserInfoS":60}}}
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):134
                      Entropy (8bit):4.712904400287344
                      Encrypted:false
                      SSDEEP:
                      MD5:D12BD22B7099861B8A50F81C09FE507C
                      SHA1:F0F0FC155B070335844EBBCF7AC4C4ADA2F44A9D
                      SHA-256:F39A2CA9C046B722AE50868A16E331B63996DA915F9989DA7F73E6A7300AE767
                      SHA-512:8B1184689B3C469545CBD899DF2C6882717D63CC8176844F048B12E7D22A1391482D58C961FD7B782BF76910FC1A43057EA2D87218A763825E49A1A2AFF87793
                      Malicious:false
                      Preview:{"config_etag":"","app_info_hash":1973059081,"app_installed":true,"engine_ver":"2018.4.0f1","app_ver":"4.76.1","registered_events":[]}
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text, with very long lines (461), with CRLF, CR line terminators
                      Category:dropped
                      Size (bytes):6821
                      Entropy (8bit):5.424145585806451
                      Encrypted:false
                      SSDEEP:
                      MD5:65CA18140947CEC8B70FA786EA1D27C6
                      SHA1:CF4CDE59578E5AFE557ADE01ED0213FEB97C6FFA
                      SHA-256:2B870CE85D07B6077FD73ED9E81AA00CAAC8242AD85E4CEB62BC0E7C30EBC73A
                      SHA-512:C539B331C18FDF8465613FC27ED31208AAE1AF636C26D183CF12E6F8B340DE48A1F4E6C26898CB545092C9FD87C739323399F81C77E6E403706B159C371CD1B0
                      Malicious:false
                      Preview:Initialize engine version: 2018.4.0f1 (b6ffa8986c8d)..GfxDevice: creating device client; threaded=1..Direct3D:.. Version: Direct3D 11.0 [level 11.1].. Renderer: Microsoft Basic Render Driver (ID=0x8c).. Vendor: .. VRAM: 2047 MB..FMOD failed to get number of drivers ... : "Error initializing output device. " (60).. ..(Filename: Line: 1179)....FMOD failed to get number of drivers ... : "Error initializing output device. " (60).. ..(Filename: Line: 1179)....FMOD failed to initialize any audio devices, running on emulated software output with no sound. Please check your audio drivers and/or hardware for malfunction...<RI> Initializing input....XInput1_3.dll not found. Trying XInput9_1_0.dll instead.....<RI> Input initialized....MaximizedWindow is not currently supported on Windows, setting to FullsceenWindow instead.. ..(Filename: Line: 275)....<RI> Initialized touch support....UnloadTime: 0.512300 ms..OST-Stopwatch-Load Start..UnityEngine.Logger:LogFormat(LogType, St
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):46
                      Entropy (8bit):4.457919564564537
                      Encrypted:false
                      SSDEEP:
                      MD5:9DD9F9404C4E36E60AA2DABC932E3D6D
                      SHA1:AA4ABF80448EF6F89CE970319442179A85D3BF8D
                      SHA-256:2973482566F2828315FEF590BDE89D9976574FD5EB1501518B19B61AF55182DE
                      SHA-512:A31647B2DF93B574CAB2BA59F8FB0E10D6FB312609024C971A37105114D781E9145EDB54C3C8D3F21C20000A9E1AE63799AF58C8B3FAC9B9AE3667D51CB490D6
                      Malicious:false
                      Preview:..New User shortId : AABBCCDDEEFCURLcode : 0..
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
                      File Type:ASCII text, with CRLF, CR line terminators
                      Category:dropped
                      Size (bytes):294
                      Entropy (8bit):5.185384437921823
                      Encrypted:false
                      SSDEEP:
                      MD5:5CFBFBEC79D62B317AA8A756F64C5CAF
                      SHA1:3D0129DBE51F8DDAAEE4E6CA602FD55DEF40544D
                      SHA-256:0CFC07FC7A0EB3EF022048000531FA89BF0B67AE34E9934B29DEC53272406F51
                      SHA-512:BD91E2EF058FB66579AA2A5B21F6A24AE4EBBAC93CEB8656287CD075C825CE7E3203C3A32EA58AD2A64314C9713FEF96FBADF5AC22465FDBC7E39AE28B2945F4
                      Malicious:false
                      Preview:CURLcode : 0....Response : .GetIDFACallback : CURLcode : 0....Response : //emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exe.GetInstallFileAddressCallback : //emggcdn1.ucimg.co/client/Evony_release_b343_s298013_20240628-003014_50m_windows_new_auto.exe
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):142621912
                      Entropy (8bit):7.999994358316379
                      Encrypted:true
                      SSDEEP:
                      MD5:1E5D15442BC7EF8000317CD820C15FEC
                      SHA1:82B5057627741EA339A1479C194E5F1E90ABF3CC
                      SHA-256:D9916E5FAA7EFE8A3947F5F2CFD80995292EF3BDE9B0B2D4D47E47A04AA63F4F
                      SHA-512:D59736E305AD7D82185CBD4FD0DAA216B5A49FC7E89F20FD048C9E24C41BAAFC8D409EB8D139CEAF4C68544872B5D58EFE2C5207183454CA1E711D1BF17F59EE
                      Malicious:true
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................0....................@..........................0.......1...........@..............................P.......................@)..........................................................................................CODE....8........................... ..`DATA....L...........................@...BSS......................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc............ ..................@..P.............@......................@..P........................................................................................................................................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):34
                      Entropy (8bit):4.013070929103845
                      Encrypted:false
                      SSDEEP:
                      MD5:3D79BBDD08CCA1FB02F286E7DFABF9A4
                      SHA1:3C960C8C5516E827EE904B1B0B573928D1FA748E
                      SHA-256:5C13EB5C78087957831881A8622CE904AAEA3421180768F7EF1D4F43C939BF6C
                      SHA-512:31996D7A764E0165D0C560853DCAA6C1EA31E230C7DC79CA09340AEC1DED2C6AEDE3BE950910138EB4C721BD45E4C579A139104785FE2FB5387C2981756123C5
                      Malicious:false
                      Preview:C:\Users\user\AppData\Local\Temp\
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):126
                      Entropy (8bit):3.6644977792004623
                      Encrypted:false
                      SSDEEP:
                      MD5:86A6E68611690FAC291A29A47C88052A
                      SHA1:49DE22891739A84D5396CF92411AEFFEE9D19EAB
                      SHA-256:61D542B749A6CBAA7B506856BBE5CFDFEF26D50D40BA4BD9D81B445DF35D4926
                      SHA-512:58280BEBEC38793D3D47052AAA28768DBE7FA10EADD8CB0E3BCF2260B9CC7F84AEE3A7CD64DC48A2DAA0B341419BFD84ADBFD5591D6C6E3E98B5D84154A59E8B
                      Malicious:false
                      Preview:CURLcode : 0..CURLcode : 0..CURLcode : 0..CURLcode : 0..CURLcode : 0..CURLcode : 0..CURLcode : 0..CURLcode : 0..CURLcode : 0..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):4096
                      Entropy (8bit):4.026670007889822
                      Encrypted:false
                      SSDEEP:
                      MD5:0EE914C6F0BB93996C75941E1AD629C6
                      SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                      SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                      SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32+ executable (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6144
                      Entropy (8bit):4.215994423157539
                      Encrypted:false
                      SSDEEP:
                      MD5:4FF75F505FDDCC6A9AE62216446205D9
                      SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                      SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                      SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                      Category:dropped
                      Size (bytes):23312
                      Entropy (8bit):4.596242908851566
                      Encrypted:false
                      SSDEEP:
                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 710 x 400, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):554232
                      Entropy (8bit):7.99643205246194
                      Encrypted:true
                      SSDEEP:
                      MD5:0EDBCC1DC8A9CAE69EFFAB6828D35392
                      SHA1:429223A8F8836CA362CCB89E172A24668E90431C
                      SHA-256:BCC69F35AE6BF08D34E6EAA4206186AD503FF75C9E668C80DB32AE0AA074B257
                      SHA-512:BFA3BA291D7F895F90F35C338A0F61E183B4C6F28902D9EA717D507EAEE30CD40D3EE857211FD1639A5DD87BD77725EC617888872E138E3BB3C2CB507F704184
                      Malicious:true
                      Preview:.PNG........IHDR............."51.....tEXtSoftware.Adobe ImageReadyq.e<....iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:d75c82fd-db44-be4c-8d22-8d3c704b6eea" xmpMM:DocumentID="xmp.did:B58A90634F7911EDBCC6A306F263336B" xmpMM:InstanceID="xmp.iid:B58A90624F7911EDBCC6A306F263336B" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:c6be8164-62cc-7443-9d53-4e4e925cc036" stRef:documentID="adobe:docid:photoshop:df26fa23-8045-054e-9e3b-0a6e4a5a6951"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.d....q.IDATx.l.I.mKv....
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 710 x 400, 8-bit/color RGB, interlaced
                      Category:dropped
                      Size (bytes):596042
                      Entropy (8bit):7.997938616493401
                      Encrypted:true
                      SSDEEP:
                      MD5:7B15805A8E88BC33FF17941EBF353A35
                      SHA1:EC58866282B3BFFDF3B136A651CBBF7723D85CFF
                      SHA-256:2FFE6696223B667132B60C072DD634EBE3D73D45F5C403683DF8286C84E3B89C
                      SHA-512:704DAE0D803F5219CDED6988FC08323763C07F925B93AFB4D5D36BE80E525A38A2E117DE133C08D596B4FD8976A24EA7211AF143936C07E62BAAD0C35346F165
                      Malicious:true
                      Preview:.PNG........IHDR.............U2.....CiCCPICC profile..x.SwX...>..e.VB..l.."#....Y....a...@...V....HU...H...(.gA..Z.U\8....}z...........y.....&..j.9R.<:...OH.....H.. ....g......yx~t.?...o...p..$......P&W. ...".....R...T.......S.d.....ly|B"......I>................(G$.@..`U.R,......@"......Y.2G.....v.X..@`...B,.. 8..C.... L..0.._p..H.....K.3.....w....!..l.Ba.).f.."...#.H..L.........8?......f.l....k.o">!.........N..._....p...u.k.[..V.h..]3...Z..z..y8.@...P.<......%b..0.>.3.o..~..@...z..q.@......qanv.R....B1n..#.....)..4.\,...X..P"M.y.R.D!.....2......w....O.N....l.~.....X.v.@~.-......g42y.......@+..........\...L....D..*.A..............a.D@.$.<.B.......A.T.:.............18....\..p..`........A...a!:..b.."......"aH4... ..Q"..r...Bj.]H#.-r.9.\@.... 2....G1...Q...u@......s.t4.]...k....=.....K.ut.}..c..1.f..a\..E`.X.&..c.X5V.5c.X7v....a..$......^...l...GXLXC.%.#....W...1.'"..O.%z...xb:..XF.&.!.!.%^'.._.H$...N.!%.2I.IkH.H-.S.>..i.L&.m....... ......O......:..L..$R...J5e?
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 710 x 400, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):523549
                      Entropy (8bit):7.996735091201269
                      Encrypted:true
                      SSDEEP:
                      MD5:5AD16CC0B0E483A1FEB039FB4EDB8BAE
                      SHA1:7AA8C349EED5ECFED509BCE56D09F187816823DB
                      SHA-256:E51D63A45A775858E4F153890084B12DC34B5B9E0C406AC71CFEF1CA821F5196
                      SHA-512:1E1D3CDC196470537689252CA60F0584E8588ADFD1CD2E804447839F65E3D9575A51FD5169435026831A121EB6657CCC8767FA2BE3D6A68273E65C5A85523889
                      Malicious:true
                      Preview:.PNG........IHDR............."51.....tEXtSoftware.Adobe ImageReadyq.e<...MiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmpMM:InstanceID="xmp.iid:469659834F6A11ED9322C6BC71B4A074" xmpMM:DocumentID="xmp.did:469659844F6A11ED9322C6BC71B4A074"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:469659814F6A11ED9322C6BC71B4A074" stRef:documentID="xmp.did:469659824F6A11ED9322C6BC71B4A074"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......fIDATx.L.i.eWv...3....j..*....m.R...%.N,...[r.KN.....A....D...Ob.A.[.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 710 x 530, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):593519
                      Entropy (8bit):7.997154717154107
                      Encrypted:true
                      SSDEEP:
                      MD5:53C192E5A86981C1C382D579B3E998D5
                      SHA1:526D9102877D66F60FB42B76B1101F95095B03EA
                      SHA-256:171272F49666B118E3A013BC635B366F407DD350471A38A57F3FDE8ADA8F7571
                      SHA-512:70C5228D162E8822C01F5E7C36F50BE7AFAB427B40BD4D1682BDA102E16825E1806052D2683B5C35BB530FDCE72EAB33D6A69B3C4A6137FA6F9BB7E48E8BDC5B
                      Malicious:true
                      Preview:.PNG........IHDR.............@.......tEXtSoftware.Adobe ImageReadyq.e<...MiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmpMM:InstanceID="xmp.iid:70ECA10958BE11ED98829CE937596048" xmpMM:DocumentID="xmp.did:70ECA10A58BE11ED98829CE937596048"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70ECA10758BE11ED98829CE937596048" stRef:documentID="xmp.did:70ECA10858BE11ED98829CE937596048"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.[.....IDATx.L.i.eWv...3....j..*....m.R...%.N,...[r.KN.....A....D...Ob.A.[.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):35840
                      Entropy (8bit):6.170138105760338
                      Encrypted:false
                      SSDEEP:
                      MD5:0177746573EED407F8DCA8A9E441AA49
                      SHA1:6B462ADF78059D26CBC56B3311E3B97FCB8D05F7
                      SHA-256:A4B61626A1626FDABEC794E4F323484AA0644BAA1C905A5DCF785DC34564F008
                      SHA-512:D4AC96DA2D72E121D1D63D64E78BCEA155D62AF828324B81889A3CD3928CEEB12F7A22E87E264E34498D100B57CDD3735D2AB2316E1A3BF7FA099DDB75C5071A
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 3%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................j..........$x............@.................................................................................................................................................................................................CODE....<h.......j.................. ..`DATA.................n..............@...BSS..................p...................idata...............p..............@....edata...............z..............@..P.reloc...............~..............@..P.rsrc...............................@..P....................................@..P................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 90 x 112, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):8863
                      Entropy (8bit):7.932742444444064
                      Encrypted:false
                      SSDEEP:
                      MD5:BAA8F07BBC969E64CD870D5B81632DC6
                      SHA1:0C41FFFB8E3D08CFE29121EF1AF794713DBE2EE2
                      SHA-256:52CCC7C3EA892ED1D3E46D4FEBC3A499141ADEA9F8C1DCB0A91FCF8C4DCBC74A
                      SHA-512:701059DFADE4FA0451D575B134B055630DF15C5E699CDBE9E8E1BD20219DB7EF54D5310C34220C537180BFB79FB83EF21A14514E1CD019BA5D3362FB13CCAA07
                      Malicious:false
                      Preview:.PNG........IHDR...Z...p.......gR....tEXtSoftware.Adobe ImageReadyq.e<...MiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmpMM:InstanceID="xmp.iid:EF92B25B540411EDA58BB45D4934D607" xmpMM:DocumentID="xmp.did:EF92B25C540411EDA58BB45D4934D607"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:EF92B259540411EDA58BB45D4934D607" stRef:documentID="xmp.did:EF92B25A540411EDA58BB45D4934D607"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......IDATx..}yp..y.... N. .. E..%..AF..V....)...S..h+.?6.+.wcg.I.rm.u
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 12 x 48, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):1333
                      Entropy (8bit):6.715290795250731
                      Encrypted:false
                      SSDEEP:
                      MD5:3EFF755058FB1BC474E17667BD9B2737
                      SHA1:852BF689DDE133726F27B14B9EFD83DD505539DE
                      SHA-256:F07C785D2C29D5B0790EDF5307F730DA8561FF9674380F84091D19A3A9BB7D57
                      SHA-512:F5F7650C462279146EB3C40A2941DDE56DD53B56EB240CE261F6A2D1F9FEA5A80E59C128511D370C5371419F532417B78B2765BC7096947EA4AFBA2DD8075914
                      Malicious:false
                      Preview:.PNG........IHDR.......0.....%.1....tEXtSoftware.Adobe ImageReadyq.e<...MiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmpMM:InstanceID="xmp.iid:2146976A4EC611EDBA8D8DB8ED8B3DB3" xmpMM:DocumentID="xmp.did:2146976B4EC611EDBA8D8DB8ED8B3DB3"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:214697684EC611EDBA8D8DB8ED8B3DB3" stRef:documentID="xmp.did:214697694EC611EDBA8D8DB8ED8B3DB3"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..<....~IDATx.b...?.I..a..E....+,.......w...m9} .L .G..I20p*M.....4~&'.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 220 x 192, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):73517
                      Entropy (8bit):7.989388008704635
                      Encrypted:false
                      SSDEEP:
                      MD5:692A3F4A31DF04B3A765DEEA1C337AD5
                      SHA1:061C17DDCDF4A46C189C96FE93566851F0E990D7
                      SHA-256:DF7216589781DFEE292123974E11FA74A210901413324D868108E3C39B23976F
                      SHA-512:F346076571563FA9A396D1C98DBAA8489765478F4F9ADF27D9ED81260EB5386A52A268C622C49A9F69CD0AB58A7DED090BDD6AC540AF7FC81A5B20D7B5EE246F
                      Malicious:false
                      Preview:.PNG........IHDR.............oN.a....pHYs................3iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmp:CreateDate="2022-10-18T13:33:12+08:00" xmp:ModifyDate="2022-10-31T09:51:19+08:00" xmp:MetadataDate="2022-10-31T09:51:19+08:00" xmpMM:InstanceID="xmp.iid:07a41be2-964a-ae46-852b-3ccc453aa1d9" xmpMM:DocumentID="xmp.did:4E9F01D1540911ED8C969FEF40BC4025" xm
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 75 x 120, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):7507
                      Entropy (8bit):7.795219107338012
                      Encrypted:false
                      SSDEEP:
                      MD5:4FD21C1088887A773345EB704DDA95C2
                      SHA1:6348E6F981F53B5CE926DE368280152D56004CFE
                      SHA-256:552571DFE7145D4353225D75B76CD984587F0C86C7C52BF1E01CEE9F42C4C210
                      SHA-512:790EBEE15F5F46515ACFD7F0A85228D5AEAACD8D5C8A7FF04CA866F0A5F24FF77139991032F0A7409BDA8151F9F7CFBDE34D3C91031052E42683CE4EFABF9720
                      Malicious:false
                      Preview:.PNG........IHDR...K...x.............pHYs................HiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmpMM:OriginalDocumentID="xmp.did:fcee2137-965b-3d49-b9f1-b494415754df" xmpMM:DocumentID="xmp.did:C0457ABF505B11ED9AA7BC9A1863A6D8" xmpMM:InstanceID="xmp.iid:ef8108a5-73d9-fd42-a14c-f8dab52db758" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmp:CreateDate="2022-10-20T17:30:26+08:00" xmp:ModifyDate="20
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 12 x 48, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):139
                      Entropy (8bit):5.735843715248865
                      Encrypted:false
                      SSDEEP:
                      MD5:062D0C3ABF7E428EE1192A1DB9DEE017
                      SHA1:48401BF01DFB8582458B9E491022DCBBF67CCF00
                      SHA-256:793ECF84D5B2D782D7D76A9808D0F50D48FE0AB558FD20AFA49F0CBAF75AFC6F
                      SHA-512:9A30A466679A23A6DD712D9130011C41C9457306E7F333442B89274A249996A4B5EC8018F1A6E33C6446F75B1CB2073B0BEBD33D38B9D4ACE8F0725FF0D1177D
                      Malicious:false
                      Preview:.PNG........IHDR.......0.....%.1....sRGB........EIDATH.c`...........!..G.....T<.lD..(-..}.K../..%"Cj.).-.F^....i.&!...g.!&.......IEND.B`.
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 220 x 192, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):77980
                      Entropy (8bit):7.990167220652078
                      Encrypted:true
                      SSDEEP:
                      MD5:A7DE1029328F308A7564982B33CD697C
                      SHA1:AF37A775716DE6EA97762C5EAD07FEEA7CB7F573
                      SHA-256:0F1DDF80765416F6FDFE5F57C9308FEDB5A5EEA0695862D2574FDB1B66CBDB7F
                      SHA-512:3791B83F87FBC069EE1944FD5B0CE05A2F18085625B95505E80C2587056B90FEB540C479642CF17F0482F50D75F94CE4BD7D5909AE38564FFD208C9DCAE76544
                      Malicious:true
                      Preview:.PNG........IHDR.............oN.a....pHYs................3iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmp:CreateDate="2022-10-18T13:33:12+08:00" xmp:ModifyDate="2022-10-31T09:51:17+08:00" xmp:MetadataDate="2022-10-31T09:51:17+08:00" xmpMM:InstanceID="xmp.iid:efd728c4-c48f-7543-aa72-4d289c0450c0" xmpMM:DocumentID="xmp.did:5400DA9C540911EDB188C036E1FAC3DE" xm
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 16 x 128, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):1604
                      Entropy (8bit):7.071983651244394
                      Encrypted:false
                      SSDEEP:
                      MD5:C0581F9AFF959F38728AEE224D217B9C
                      SHA1:DEA183558084A3DC2C3C198FC647713EA4DF5BC1
                      SHA-256:7822DED6C50E09F77C99BF745AC960678C17BCC3EB8D1AFA03A97B98EFC290B9
                      SHA-512:37B83B4C4CE5571994FFD7EF89867B842FB95B11C60276CDB2DCF68128730AB4F66DC4AE21745E222FD55C7F08192EEC5817FC22ECF0FF46E2C29A8604D3ABEE
                      Malicious:false
                      Preview:.PNG........IHDR................"....tEXtSoftware.Adobe ImageReadyq.e<...MiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmpMM:InstanceID="xmp.iid:E1DF42134EC511ED9AF2F2A6EDEC97D5" xmpMM:DocumentID="xmp.did:E1DF42144EC511ED9AF2F2A6EDEC97D5"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:E1DF42114EC511ED9AF2F2A6EDEC97D5" stRef:documentID="xmp.did:E1DF42124EC511ED9AF2F2A6EDEC97D5"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.[......IDATx...k.A...;..d.T.K.MiSh{.M..E.VD.=x..=y...<...QP..z...."H...
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):65024
                      Entropy (8bit):6.294124606541292
                      Encrypted:false
                      SSDEEP:
                      MD5:1C55AE5EF9980E3B1028447DA6105C75
                      SHA1:F85218E10E6AA23B2F5A3ED512895B437E41B45C
                      SHA-256:6AFA2D104BE6EFE3D9A2AB96DBB75DB31565DAD64DD0B791E402ECC25529809F
                      SHA-512:1EC4D52F49747B29CFD83E1A75FC6AE4101ADD68ADA0B9ADD5770C10BE6DFFB004BB47D0854D50871ED8D77ACF67D4E0445E97F0548A95C182E83B94DDF2EB6B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 5%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................<....................@..........................P..........................................P.......*....0..............................................................................................................CODE................................ ..`DATA....`...........................@...BSS.....U................................idata..*...........................@....edata..P...........................@..P.reloc..............................@..P.rsrc........0......................@..P.............P......................@..P................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 137 x 15, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3589
                      Entropy (8bit):7.418550507141912
                      Encrypted:false
                      SSDEEP:
                      MD5:7BE3660618B360F34E9F251B906B6E0E
                      SHA1:39F4D287B07B26181D447D96335247C293D90B82
                      SHA-256:4E0B9CEBFCCD2781DB5E3A9F624ECA4EF128291602EB3609BA96C962C7C0071F
                      SHA-512:AABA0A01378BB9DA73F14C0C87501907251F26319670FDFF8F350BA6444B53E71B3D38B2302460B192191CFB86D203759C002FEBBDD7E09C63CB49D7E8C3E251
                      Malicious:false
                      Preview:.PNG........IHDR.....................pHYs................<iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmp:CreateDate="2022-10-18T13:33:12+08:00" xmp:ModifyDate="2022-10-31T12:33:26+08:00" xmp:MetadataDate="2022-10-31T12:33:26+08:00" xmpMM:InstanceID="xmp.iid:f18f45d2-f3ec-744b-b548-fd46954b8064" xmpMM:DocumentID="xmp.did:431D1046540A11ED8BECC9970106AD0E" xm
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 66 x 18, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):1568
                      Entropy (8bit):7.06257468725188
                      Encrypted:false
                      SSDEEP:
                      MD5:79648C1CCB5EB0E9395D0E19E4985952
                      SHA1:05670701D97F3BA69F973E717E27B0BD49A0A104
                      SHA-256:CD77385760995EA80DE7786844B856963964DFD34B202EE3C55F978E1D89D3EC
                      SHA-512:44059B2F42FD54DD9FCB169859EDDA580362087AC62788AD78788EF6446D0421F8A61278434D88C1687A4751B7E5FA4AA54F49457715F0CED01965E959C49D43
                      Malicious:false
                      Preview:.PNG........IHDR...B.................tEXtSoftware.Adobe ImageReadyq.e<...MiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmpMM:InstanceID="xmp.iid:44FE3196540811EDABEF900CF63FB311" xmpMM:DocumentID="xmp.did:44FE3197540811EDABEF900CF63FB311"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:44FE3194540811EDABEF900CF63FB311" stRef:documentID="xmp.did:44FE3195540811EDABEF900CF63FB311"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......iIDATx..W.m.@.......:@..`....&H2.a....L.:A....T.......+..$Q ..I'...l?
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 96 x 68, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3978
                      Entropy (8bit):7.423971810695304
                      Encrypted:false
                      SSDEEP:
                      MD5:FF6ABD4DEFBBECC2D3CAB8BD93241595
                      SHA1:68915E57B5D5990B43E7139F7E24687F8AAAF98B
                      SHA-256:17A3096A92D9D2338532D2A0AB991DB23AC3A5705A6C8FCA2EC80B5FC6A94300
                      SHA-512:8911A17C41E14F14D8FBB78696A0198F56744A9AA578D83FEE1BE66CEA2E0711864A7FC2C2644BDE2F5B45A1C051AC39CD5C67BC831E2D8ED124CC0FECFEE5DB
                      Malicious:false
                      Preview:.PNG........IHDR...`...D.....~.0.....pHYs.................iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmp:CreateDate="2022-11-30T09:23:59+08:00" xmp:ModifyDate="2022-11-30T10:04:06+08:00" xmp:MetadataDate="2022-11-30T10:04:06+08:00" xmpMM:InstanceID="xmp.iid:3d220706-ae82-8047-9210-775c54e815d6" xmpMM:DocumentID="xmp.did:BFE3F4AD705011ED934F84A6F18F038E" xm
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 81 x 68, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3841
                      Entropy (8bit):7.379264724029118
                      Encrypted:false
                      SSDEEP:
                      MD5:9ED04183B28D41E1DF62E1DD9EA4CE8C
                      SHA1:3CA2C8D71AEE4AB40E991FAA27D1554A9680ABC1
                      SHA-256:4ED9FCD5DBCBD0AD100746E8E8BC6BD8BB1A637ADE3FFEDC3AAAE47347A5D5D5
                      SHA-512:C13C5B75A1FD043D6A69E78C79854E1A847048808FB7A60767100D379EB7A2D8DF7350827567D37C73D5E5637A62646D41058F371DB82E638BA68987CDE9BA48
                      Malicious:false
                      Preview:.PNG........IHDR...Q...D.............pHYs.................iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmp:CreateDate="2022-11-30T09:23:59+08:00" xmp:ModifyDate="2022-11-30T10:03:55+08:00" xmp:MetadataDate="2022-11-30T10:03:55+08:00" xmpMM:InstanceID="xmp.iid:7f7bd901-c966-ba43-8dee-f0954494c857" xmpMM:DocumentID="xmp.did:D40E5331705011ED851AF89743133B78" xm
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 165 x 17, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):3056
                      Entropy (8bit):7.243016241821966
                      Encrypted:false
                      SSDEEP:
                      MD5:A48A08D9513A1BE625CA50FD10B60C4E
                      SHA1:DADD4AF38A0A4412488C4D2BDCF2039BE364AD3F
                      SHA-256:01F8F9B8B745549AD2854D48F69C29635CE4877DBF236B40E65DB98229DF2887
                      SHA-512:440EED4680110739301054AD04E00FD7A96956058FAD65C86D41CA95C1449B00BFB605C360DAA6706D611BB11711DC09B4DF5ADE1D205604B908C431ABCE41CB
                      Malicious:false
                      Preview:.PNG........IHDR..............pl.....pHYs................<iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmp:CreateDate="2022-11-30T09:23:59+08:00" xmp:ModifyDate="2022-11-30T09:58:27+08:00" xmp:MetadataDate="2022-11-30T09:58:27+08:00" xmpMM:InstanceID="xmp.iid:8593225d-91bd-0a4a-98d2-aeca2f72b20c" xmpMM:DocumentID="xmp.did:A73106D3705011ED8B14C94DF9ADC407" xm
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 225 x 18, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):5197
                      Entropy (8bit):7.594871098988065
                      Encrypted:false
                      SSDEEP:
                      MD5:FFF37413C9E6828A24A7CD3552B980C3
                      SHA1:7C41FA8850D41322D6EA9327427FEA9D4C71EAC6
                      SHA-256:B3778E2BE63DDB6776D7B356BE8739F68F4870FFBAE3CB90B9CC7535750E0770
                      SHA-512:5668FC6E0656CD4E47B6C98B410E59975CA3319DCFA625BDB7F0ED600211BFF2F23CA4A1BFA00E46AFAEBFE99CB3942FB8134F6B2935C6CF7D35DDCD907DA101
                      Malicious:false
                      Preview:.PNG........IHDR.....................pHYs................3iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmp:CreateDate="2022-10-20T18:14:08+08:00" xmp:ModifyDate="2022-11-16T13:26:38+08:00" xmp:MetadataDate="2022-11-16T13:26:38+08:00" xmpMM:InstanceID="xmp.iid:fcaaee69-126d-7640-b60f-adfdc2151cb5" xmpMM:DocumentID="xmp.did:CA61F626505C11EDA921EEC2D5117DAD" xm
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):37
                      Entropy (8bit):3.977458529805331
                      Encrypted:false
                      SSDEEP:
                      MD5:E1A44AAA58EA8778E57AD2A32D0B625A
                      SHA1:910D02910BBD97F88EEB0F1EBFFC1C6F605B3FB6
                      SHA-256:1AF60E840A8F1D1DF26A4A48F8CCB22E75B9FE799180EE4F640B2399F3C8265C
                      SHA-512:EB44C19A2D44D83B5759750B1044DD1A6277538321FD7E42DD0E1F4F6EA4BE172EFD79B6B30B76253434DD307DFAF38C01F29ED399F6288B3CE12139468AE5F9
                      Malicious:false
                      Preview:welcome vue-nw-seed.....2333....+1s..
                      Process:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      File Type:PNG image data, 650 x 18, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):7628
                      Entropy (8bit):7.9259548764284755
                      Encrypted:false
                      SSDEEP:
                      MD5:41900D787D8240EBF02BCF737A5BB45C
                      SHA1:2E989485BB17D91C6DD3981CF01E52D13A274E63
                      SHA-256:F9D7D6C76EADE3F283F97512EACBC2118454EFD904AD87757FE9539024CB2C82
                      SHA-512:02C7948A33490AD1A4E7322E6A6E338AB1BB2DB8217C96E6F346B12082F6B459ED35061A923512989EFE8EBE4E94652E1B7FE22AFE3DCF39A6537E0DAD668CC1
                      Malicious:false
                      Preview:.PNG........IHDR.....................tEXtSoftware.Adobe ImageReadyq.e<...MiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (20200818.m.1012 2020/08/18: f82f433761) (Windows)" xmpMM:InstanceID="xmp.iid:E4ACF26C540611ED80CDF0EAFB6BA2F0" xmpMM:DocumentID="xmp.did:E4ACF26D540611ED80CDF0EAFB6BA2F0"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:E4ACF26A540611ED80CDF0EAFB6BA2F0" stRef:documentID="xmp.did:E4ACF26B540611ED80CDF0EAFB6BA2F0"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>{. .....IDATx..]K.$.q.`V....Jk..k...>....c...+..'.t0..0..>fw..+......~A.{z
                      Process:C:\Users\user\AppData\Local\Temp\evony_install.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):985088
                      Entropy (8bit):6.551711962564677
                      Encrypted:false
                      SSDEEP:
                      MD5:A7FCD2C71C42B045367F56DF9C1EA82D
                      SHA1:A3DBD9393450B18DC4CEE47D75F968FD35338D36
                      SHA-256:751B8CFCF6990096A858ABEB41EEA406767BCE1DB3F72EB504A2D442C3295565
                      SHA-512:22B52251B63F5D70B585A96C6A4D03A0D34D82C9CF3C1925992C4B780F566A149CBBD8B8E9754530F5149D0A5D345A97843C30341135823565DCB69D8C861DC6
                      Malicious:true
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................R....................@..........................@...................@..............................:)... ..\....................`...............................P......................................................CODE................................ ..`DATA................................@...BSS......................................idata..:).......*..................@....tls.........@...........................rdata.......P......................@..P.reloc.......`......................@..P.rsrc...\.... ......................@..P.............@......................@..P........................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):135471
                      Entropy (8bit):5.069813662072253
                      Encrypted:false
                      SSDEEP:
                      MD5:8F79627C9C7BE995D0BF4889652E2DC2
                      SHA1:A6ACED9A7FEFD9DB406C4AB481400AC7281CE7FE
                      SHA-256:24FB80D0FDAED9980C1D6C7962EA06C800C7154A0BE169C78706216CA62C3B40
                      SHA-512:036CD6D792308E9EB6CC7081E91989FD517D6B10B6D70615018E2E36618F0549E258ED103AB9DEDC215300944D010B9C26E813F1E8AE55A705B5060FD23CF59E
                      Malicious:false
                      Preview:{"abtest_10061_nisostavern":{"bundleName":"abtest_10061_nisostavern_2159393990.brotli","crc":"2159393990","size":459847},"abtest_10091_speciallandmarks":{"bundleName":"abtest_10091_speciallandmarks_2639736403.brotli","crc":"2639736403","size":843197},"abtest_10091_special_landmarks":{"bundleName":"abtest_10091_special_landmarks_2856592819.brotli","crc":"2856592819","size":61064},"abtest_10111_wishingtreedragon":{"bundleName":"abtest_10111_wishingtreedragon_2433286664.brotli","crc":"2433286664","size":30848},"abtest_10121_fans":{"bundleName":"abtest_10121_fans_3199364939.brotli","crc":"3199364939","size":25037},"abtest_10201_citypeople":{"bundleName":"abtest_10201_citypeople_1067310211.brotli","crc":"1067310211","size":102494},"abtest_10201_survivor":{"bundleName":"abtest_10201_survivor_192344458.brotli","crc":"192344458","size":691767},"abtest_10211_animbattlepass":{"bundleName":"abtest_10211_animbattlepass_994856893.brotli","crc":"994856893","size":85987},"abtest_10221_dustyimperialtr
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3848454
                      Entropy (8bit):5.925360452591405
                      Encrypted:false
                      SSDEEP:
                      MD5:E8ACB2C82F3B0CA6DFA85B319ECE8D98
                      SHA1:A54A8AB546055A92E3BD6C6E6ECAEDD35CB06563
                      SHA-256:D641FFD91A970305BCA2694FC3DC2FF80DE6E55D58FB1A1AD8F72B9472A3A852
                      SHA-512:453EAA95DC174ABAF0529A820EBCDDC39E4D806CB170A5E00C09F57ABA34A213572242226AB3CC00638E2E6E6BA9B93FFC4006FCF689979CBFC44B3B95CEE288
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......:.....V.......C....Q..:....Y@...............CAB-23bd0d22e3915228f7c6902a5bded1721.P../.....9..`.resS...}...........~.....2018.4.0f1......4...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):144741
                      Entropy (8bit):4.650007153996416
                      Encrypted:false
                      SSDEEP:
                      MD5:BAF64AEEA4A855B40D1C8E1E1BBB306A
                      SHA1:6D20E95681E3F1FE448843FBA4D4A5066C02B76A
                      SHA-256:930E4AB6F8D979EC9EA5CD3856FEC4971F9B080E008B7DE3E013D4572DFCE34C
                      SHA-512:BE1AF3472B3DFA8015DDA64CA4E9F1E09FABFC8244B2DBE226FCDD08DC76CCEC4FC27D8E5613A141C9702E694115086690D66507BE3DE2C1523B9A3BDC58414D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......5e...P.......C....Q...4...Z@........4.....CAB-7879df8f39ef95d0793454ddedc9f50c1..G..9..`.resS....E..4........`....2018.4.0f1..................l@.})Q...OZ`.O]$...q.......j...7...................H.......................1...1............@..............................Q...j...........................................L................@..........+.......................3.......................<.......................P.......................`...................L...k...................L...x............@.......................@..................................................................................................................................................................................................................................!.......................2...................~...?............@..................................j...................J...X.......................e...........................................H...l....... ...........1...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):200656
                      Entropy (8bit):4.9808687061304715
                      Encrypted:false
                      SSDEEP:
                      MD5:76BFC2BC1AD4FD8C9803DA0E18D4B330
                      SHA1:D8111AB65A34CD2D1E929BF4E4E172306EA3B3A6
                      SHA-256:C5788BE1EB07531C6A77A5AEC7E77BD27C10050278A9570C09F8FAA1444D4811
                      SHA-512:25D2762828188EE0F7D7BC7EED6A9812E620C7613E4969BC61EF4B808DB69027B144E60BE0FCAE0A5CA367215E4471BDA35995AA70D65C491921FE4FE948E1F3
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............V.......C....Q....I..Y@...............CAB-48915f4aa9732c05f4120c5af1dc9cf91.P....T...9..`.resS...p~..........p.....2018.4.0f1......6...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):673338
                      Entropy (8bit):3.6816616482843227
                      Encrypted:false
                      SSDEEP:
                      MD5:174C2387445504037F7C7E2F3D02C873
                      SHA1:64A18221F3ADBA5ACD7E9B6527F5DC560674A6C4
                      SHA-256:8B2F58765947CE07CF7F2D7039085B6269A44338AC6E85B1F89BEF3A16D47A42
                      SHA-512:05F7EC433E80D1853238EB4075B7BF08C4398F2BC2154A4E5871992D31431F3DC089CA434ACD8BEE311D86373B00BCF875286AB1E2B6F178F31449D331FCD86A
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......F:...U.......C....Q...E...Y@.........%.....CAB-9354fa5e73ec3468b5428fc2a2b2b87c1.A... ...9..`.resS.......%.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):989806
                      Entropy (8bit):4.0648005991661815
                      Encrypted:false
                      SSDEEP:
                      MD5:B6B4914DA0CAD618DD311BE01E01ED13
                      SHA1:ED4662093417ECB97F1EC9DBA116B9F18D6949CC
                      SHA-256:90B35915FE43CB50E04EF3CD1F44A1F41BDFD51D7F21A4B218E0BCAD44BC5C74
                      SHA-512:C1286807AA8C94F1C3280308879FF5155D3FE5363F8D894918829F9882DF23F27318C7DDAF4178A0F23F056EC5E365EFA739891CDB97F40929A4AA9640328F20
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........n...U.......C....Q.......Y@...............CAB-4f39c242bc0356f8e6229c08f60edf811.A.......9..`.resS................ ....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1954541
                      Entropy (8bit):4.157336040176243
                      Encrypted:false
                      SSDEEP:
                      MD5:B10BC06A71F267593D4ED9FEC6E94EB3
                      SHA1:CE8BC1EC6184853E66A0ECBA05ACA9F965AA132A
                      SHA-256:CA58AD5D82EA53C79344F95955C0353E4D749009D2FBF3892FB2CB7EABCF4B80
                      SHA-512:C3B9AFE27D484FFAA0733AED7590EA28D8A5B571CC4D65D79809B00BA27734B4DEE59528A0718B94AE10B1947C3A0270004C3EA1554867C8AEA7882D5ACC5BD5
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q....h..Y@..........h....CAB-a14dcf19fddb3705e5086b11cd0f2fdc1.2......9..`.resS....9...h.......P....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):983317
                      Entropy (8bit):4.222388482934303
                      Encrypted:false
                      SSDEEP:
                      MD5:19FE0B643C56291ED9A82FC047DFBC8C
                      SHA1:3BE07B1CA8E06398317AFD9F0741820A54BF8D0B
                      SHA-256:E44DF9B01566856E199FADBF540900B6BB9B1DA96EF7EB39AC16320958BDFF0B
                      SHA-512:6557992346F8FB8FEE04496BA43BBA3039D8156D4B9B39B20850ECB041B97216CAE15C06FF702C2241D3680A8E0B7FCF269E92726015F5833169AC62FF9B150F
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q.......Y@...............CAB-2cc4ae41bc19016639d9ec1d077e69431.2......9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1403669
                      Entropy (8bit):4.279607727559585
                      Encrypted:false
                      SSDEEP:
                      MD5:7013EE1EEC1292123B0DD11FBA1EBFBF
                      SHA1:29927FA710EC4ABEFA4E66DD5FFC5DFEA9AAA8AE
                      SHA-256:974B4BD7C7BE4CBC656851068A7502462743E9E724C6DB66EEA8BCD7EA553015
                      SHA-512:19F1CE0D637B71266D648B27DD7C3E9B14B44CA2F4D13CDDBB3FF44438A883997FCDBC4F86746AB80BEAB918371307C0D653F601F65DF631607FA787B53C7F96
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......k....T.......C....Q...j...Y@.........j.....CAB-b12af3065b0b4cf23a7f3917afa2ef691.2......9..`.resS.......j.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1241117
                      Entropy (8bit):3.428596003902113
                      Encrypted:false
                      SSDEEP:
                      MD5:23F24B420167D84B99B6929BEDFBA2BF
                      SHA1:67911480B3FCC16AC3F10912ED442DEDDE770808
                      SHA-256:E5925DCEDF6E5648B0DE1C6D2B0219B140E1DE828D6E443891B9F4F6F453D2F7
                      SHA-512:9988569261B03BA7D18F26BFE4E96D6172028F95F54D684DE0EE59B420B4BABFA18B9CBB11D980618639198161D8188CF7029D902D6E5CD97028E1C4B4821683
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q......Y@..............CAB-d77ccebb33d084d12e347e6b2c1711b71.2......9..`.resS....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1299332
                      Entropy (8bit):4.460620344615637
                      Encrypted:false
                      SSDEEP:
                      MD5:F8FBB80BEF850A25B212091090B326C5
                      SHA1:CD7AABE075749E6FBED15CEBD70D213EF35B28EE
                      SHA-256:5011C9389FF5D34D343CAA50EE10D299ACEFDD538739AC94868B4138191747D0
                      SHA-512:19DD25C5169927F036491016551D6F686B056F3BCDF95960DC88EBED8A5E834F11032052350183BCD21F5DB0C715E5DBFE3B446E6E56BD3D76BCDC67916867A6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........S.......C....Q.......Y@...... .......CAB-b897216d26bbcb41e8c97e790ff66cd41.2......9..`.resS................ ....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1239613
                      Entropy (8bit):3.199107433005517
                      Encrypted:false
                      SSDEEP:
                      MD5:7F3B23A5724FEAEAEEA2CE6E70E735C1
                      SHA1:C62396BE96C1D404E2E5619FEC66D4304E6E423A
                      SHA-256:67A15783A70DC9F79094BF8ED3769F0EE17B3FF8EE310F0C7D77492B0113260C
                      SHA-512:979BA6CCBEA539B157CB0B7096CCC898A67C587C11894006947E8C1FBC4D816388FC7A5368C2C67AA8FF11D5CAFF2CF2753849AC209A8A89D51EF40FC192A927
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........=...T.......C....Q......Y@..............CAB-9e4c7385d513eee562d8dd49dd1f9a671.2......9..`.resS....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1333569
                      Entropy (8bit):4.406715536363374
                      Encrypted:false
                      SSDEEP:
                      MD5:9CC5CEF87415C0927138D8CF869FC9B7
                      SHA1:B703FD071790F9294A23AB25B4FCDF8018F96C58
                      SHA-256:3B50B8741C378432D34FFBC4FC3365399D2AF88562C2CAC77BE0CB9FCF94FBB7
                      SHA-512:BA4E43191B8733E55EC17ADBC274B2A46823A63C14FA48B8AFDA66D0BA03E0A95F805DF02DBCFC4F0D4536D23F4677240855C7E62CBFFF4532228FDCCC83F61C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......YA...T.......C....Q...X...Y@.........X.....CAB-01b416ee8078a7addc4e0bf7ee4909061.2......9..`.resS....t..X............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1238325
                      Entropy (8bit):3.1961870774476533
                      Encrypted:false
                      SSDEEP:
                      MD5:440E85FCAA450F23DDEA3E3A18543A66
                      SHA1:A8A7487DFC1C16F8540306AC9827C1A8808CDAC1
                      SHA-256:6641997AD148A5D5942C2C0093AD6AD0FFF5AADD0D86D5036CA04272C5F542EC
                      SHA-512:05E6C20FBF8D56C5267F8D438A739DC98EE6179C808B3EEBE530E200350D75BADEFE0B273221208837F417127A311B6EA5A9D01330F35B2E073C26FEFDCAFD42
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........5...T.......C....Q......Y@..............CAB-8f8785e5de105eae232a6b27357404c01.2......9..`.resS....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1338041
                      Entropy (8bit):4.246681462736214
                      Encrypted:false
                      SSDEEP:
                      MD5:229F961C1DA8EEAAF523301511D759FE
                      SHA1:FA5B101B60A30FD86D96BE0DF9D957BD3FC8602D
                      SHA-256:B3C4FDE9FD85511B69740781316628571B55BA006991E6D5FD9FC36C98EEC9DF
                      SHA-512:94BD83BCCC30883911BF7D0F744F61B5D0F93C7AAC52DC22B9F76EAB15DB717E0CDCA7995587F7396E27577AE0B652DE755D116BE2CFEEA9ED2AE3AB9C8BD760
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......j....T.......C....Q...j4..Y@.........j4....CAB-87d25a62e854e0525fe1224b607b66bf1.2......9..`.resS.......j4............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1241513
                      Entropy (8bit):3.342446878462921
                      Encrypted:false
                      SSDEEP:
                      MD5:AA8DA83653A9194FD3D413521AE5D223
                      SHA1:A4F97416262BA8FCEAF7128B5EFF80CFBF46754B
                      SHA-256:EF98B9A31C0A5CFC2FFAC35CF8BEE6318ED016D04F45DF60169599561DF83F89
                      SHA-512:2CC60258CA0C714C3AF9EA84CC273DCCAFC6803BBB469B0F2ED405BA8B706756108DF19E9EA9A492CC6494454CA23E81F828703BDC08530CCCC32690F8925E24
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........T.......C....Q....$..Y@..........$....CAB-a2ad7be13bbd049ca6ac1c69196b3abe1.2......9..`.resS........$............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1394485
                      Entropy (8bit):4.161888353961818
                      Encrypted:false
                      SSDEEP:
                      MD5:ACDB3AD4E706EEBB767C9667DE8BECC5
                      SHA1:FB0957FF741CC09BDA1EE42AC3E071394FDC272F
                      SHA-256:2D8086B69A2B69E5D4B8559D96D8A101E333E712C5D790316B64FC952F91D8A2
                      SHA-512:9340B96FFB1F0DE8BA9A265D586BDC128EB79BF884303FD708A39C7BED6B1DE2A57B9503D579155539F9405DB5DCAE4299F03E9F0732BF3EBB2D48E3F54AF777
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......G5...T.......C....Q...F...Y@.........F.....CAB-73c6f4702c9ed910335d73379533bd001.2......9..`.resS....$..F........@....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1403349
                      Entropy (8bit):4.251384546699185
                      Encrypted:false
                      SSDEEP:
                      MD5:DBB60C190C4BBDFB8CCFC3A6600E464A
                      SHA1:2B2411B659AF6B402D8B4BECC40F5566577EABC4
                      SHA-256:F1A7691E6D9DD674DB595B1E1CA84BF81B9664F69882232688F0646324B4C232
                      SHA-512:FBF4861FA8D17A34FC5868EECB6E32BE572E0B75D2CF6CC26B3A98B32D9B76E08C32BA103DBD316D847008EF62798A5DEB62A82915BCBA7FAF2595AE156E4EE1
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......i....T.......C....Q...iP..Y@.........iP....CAB-7b8ad44d29f1779cfadc0551713604a71.2......9..`.resS....t..iP...........2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3823429
                      Entropy (8bit):3.671385896404096
                      Encrypted:false
                      SSDEEP:
                      MD5:F00D068A9596DF434DE1E8FCB661BAB9
                      SHA1:056E1C51BBF6AC77A776810581468BD6E10E3CF9
                      SHA-256:D4D33696FC0AFF0D5CCC8BD55A228EF6EA9C49B43BA3ED2E4B3AA98564EE54F5
                      SHA-512:876963BAFE9AE9F0E5C0B48CEE6EADFA41954471F9E3B61D92451D74E7E092598C4639A91E40EB2BF0C91CFB48C4955E3C08008641F12F30CD35F86E4C52560D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......:WE...T.......C....Q..:V...Y@.........V.....CAB-382161dbb8521b4c4b37210d84aa10a61.2..8...9..`.resS.......V.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):82993
                      Entropy (8bit):3.1536080150175034
                      Encrypted:false
                      SSDEEP:
                      MD5:06FBA3137C6AD02FEC540D438F4943E8
                      SHA1:EE0B23446990B7F99FB525B829C8733D67D4F761
                      SHA-256:9A7FD51AE6962D7FA5CAF02FE830D9442EC323F6CE91A31F98C10297FFF2D920
                      SHA-512:2D4D9185A57348B4DC7E500FADC84A19AD86CA82B69139FAC481E26E2A576AA9DB5111A1DABF6F66B7AD3FDD048CEB1CED3FD418C0073331098B43F8B4459A45
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......D1...@...[...C....Q...C....@.......C.....CAB-95fcafa35f72558b5a8c79d39e617d14...g...C.......g.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4223403
                      Entropy (8bit):2.96264075415929
                      Encrypted:false
                      SSDEEP:
                      MD5:E0D0D044A8251859E52B1020A711DD1D
                      SHA1:D7C6E87E9014ED2F10190EC545396C93A6029402
                      SHA-256:B2590B5C5498DABB0767C2DC70F62C29F20F2E6D9125B9C01668B4EF0254D326
                      SHA-512:C9711C10C064A99AA2B288E8A4B53BAF4FF914B55223CC8A68A1F26C5C1F41C7791354A980E6D2B8920081F1CA12322C2D298BF75930F236D4EB2A6EDCEC759F
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......@q....R.......C....R..@q(..J........q(....CAB-a525fc996d50aa1d1692eea6ef47adbc1.2..@...9..`.resS.......q(............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... .............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9646761
                      Entropy (8bit):3.384509243566755
                      Encrypted:false
                      SSDEEP:
                      MD5:7271155356A1ABCBC476E5E587BED198
                      SHA1:11E93A555D751612324E32E6C527B100F279023A
                      SHA-256:4C6B2EF960C67927759855761F0A47361CF06C882F203357E00A29FD5B4B52E4
                      SHA-512:4E9EC0746EBE2D8DE88FCB4C330517A97549490F90702281D919E340AD8590296158D0F63131D52C10C0B03D53E01D43D3815DF3302AF8DF794E42EC51B3C913
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......2....T.......C....Q...2$..Y@.........2$....CAB-52e6f08a688aca17f2b8bd674d9e2e981.2......9..`.resS....e..2$............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6313455
                      Entropy (8bit):5.122006314916257
                      Encrypted:false
                      SSDEEP:
                      MD5:9EF98034669BEE87DEC9C3E629C16F92
                      SHA1:828AF67A5F7907D1D9193BE50BB1D058CD2779CF
                      SHA-256:42A4306570DCDEC851F168582FE44F65356F225A2CD212E082E12AC07DB10810
                      SHA-512:71915BC36D9EC574AC084669360DB5061ECF896F0022AC327A4230760E207944B11EE8742103E6EFA7B42421C1DEB334260048A521DD716B2FE218792DA58D4C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......`U....V.......C....Q..`Uh..Y@.........>.....CAB-9b7e801201578cedeaddaf1a948a7dae1.P..Y.....9..`.resS.......>........0....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1654351
                      Entropy (8bit):2.7486935443251275
                      Encrypted:false
                      SSDEEP:
                      MD5:AE9D7EF353865733C4D22165F66EA847
                      SHA1:D4CCA92D42F8DDF81630AF488AE412A19D4B0F36
                      SHA-256:8653BF5FB6CB407C4B5331B99C3857E51FE79323B892368DF8DC92DD9327461A
                      SHA-512:C14121B0F3E023A4393A9878F1638B19B74CD4DD11D3EBEBC81DCD74FDAA6AD3D2CB668CB7DBB2435668502FFF5BBAEAA939061D2F887C7FC2460E945A04262A
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......>O...S.......C....Q...=...Z@........=.....CAB-d5779aacdd4c04590c1d89a6f8e54a6b1.2......9..`.resS.......=.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):56777528
                      Entropy (8bit):4.663952448835111
                      Encrypted:false
                      SSDEEP:
                      MD5:712C940A6C7E1143F45B46A3C0144C47
                      SHA1:16414AD009E0FE1003B67E08EEFB79E6187D93C8
                      SHA-256:D2E9E83D02C1CE9BE2F9DD70552D2044DC967D545ECD8D45E70955F4632E94D0
                      SHA-512:496DABDD89FEFE40FAC193DAE53CC9890FC44A6ED6D70ED918B2011807BE07C0CADE04D5186B1EF27C887E8B279F738682DC3C6B772030D13B73159D11D4FB49
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......b[8...W.......C....P..bZ...i.@........!.....CAB-a62673ee17865bd44531d579bf7054d61.P..@q....9..`.resS......!.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):29798870
                      Entropy (8bit):6.898398087667104
                      Encrypted:false
                      SSDEEP:
                      MD5:A45A57A78281E263242A37C75BC00A95
                      SHA1:74EF68A6CE922DECB42BFE0D723DA7B88A3BEB46
                      SHA-256:CF8EC60BD2CF353A2ACF8620979CCADD12A96BD61F681E30FA05C0E7F1C951F0
                      SHA-512:7D742A1D3C4EA9E6CFD566BB2978320FE446FDD30003A8DA12D96778119E2EEE43001501A4036CAB6112DFF75781E89236AB0D8E073F0013D475AC57ADD88A35
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........U.......C....P...P..i.@........z.P....CAB-9785fd472b51ec16a0d72b18047b865b1.2..L...9..`.resS......z.P....... ....2018.4.0f1......4...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):139849
                      Entropy (8bit):4.798487533593475
                      Encrypted:false
                      SSDEEP:
                      MD5:8C5B57A4095596A1D3CE2DE3396C3338
                      SHA1:0200A5D0D279CB9C302E2E4E8DE1C07B897B109D
                      SHA-256:A7572A731079D4B024BA04E03FEF9E742C962818C5FDABBF0882C0FF1CCD5E92
                      SHA-512:F7689D113FC5015F86C1F7B44DA0ADC1FCF06DB3DC99F38D696140D72FF109EFC043E7D958B1E78302C1DB6D25D5B3C4BF3E4C497DF928DC2BBE07550E58C920
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......."I...@...[...C....Q...!....@.............CAB-41f32f6003c347f50de89963e40c90c9.......!.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:DIY-Thermocam raw data (Lepton 3.x), scale 1024-0, spot sensor temperature 0.000000, unit celsius, color scheme 1, minimum point enabled, calibration: offset -2306124484190404608.000000, slope 4951760157141521099596496896.000000
                      Category:dropped
                      Size (bytes):219917
                      Entropy (8bit):2.8098864787692155
                      Encrypted:false
                      SSDEEP:
                      MD5:76277390B439AA8E7CA5F982D9ECFA43
                      SHA1:375510AA1BBFA3EA1718B7C6A53CA67A41D58470
                      SHA-256:C46D207E37FA16B3801219679C6C61E3F226B57DDBCC80640E1734CA4DF26062
                      SHA-512:1CCC4E8BE05EBADBEFB320E370C5F5A90B60321628A073FE11BE9BF48F85C97B7E8886DFEAEFFC4E84C195B518CD1650E2DB4BF1895F0F85D6FE377D6528B305
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......[....@...[...C....Q...Z....@.............CAB-3be57c6825c94b1b2d98ec6101ce18de.......Z.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1052359
                      Entropy (8bit):4.404650983594886
                      Encrypted:false
                      SSDEEP:
                      MD5:9D180681FBF77A95E925BBD8377A6F72
                      SHA1:09E7C34C73A1C0A89ED00D95A240F0E289C71E80
                      SHA-256:242FD279CC3BEC645CD368F58A1120494CE6B55C211617F3C1CF1F4709CDB213
                      SHA-512:3AF18DA69E6B5A7957CF27B8B7D962CBA68666060E1AE17C066E444FEAC50B29C52FE4C7EE12DCA5BD15D2C77490AD8A513688D7602ADA509807BEB85395925C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............V.......C....Q....@..Y@...............CAB-8fa282e9b7a13da7405a65a8529978b31.P...UT...9..`.resS....Q...........p....2018.4.0f1......-...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):22404
                      Entropy (8bit):4.522597416074183
                      Encrypted:false
                      SSDEEP:
                      MD5:3F61BF65861C26DDAAE7529FF6CD2C16
                      SHA1:0D2D04F127FC63EA4574FE06436FA64D7A8CE65A
                      SHA-256:C813166A78F7CB96C0B927C19F741C0AB7819A58968A0FA05559DC8A2B9DAEC7
                      SHA-512:4ABB65037499CADF3907D9693963DA00477378855303D27BBAC25514F5035129C0A022D841659D49465F14959AF2A1BB5FC6D6C6DE96F1B289FB1107335B94E0
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......W....?...[...C....Q...W....@............CAB-cd58007992e2f158093bc704a9d56c6f...1`..W.......1.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8363
                      Entropy (8bit):4.296487669823064
                      Encrypted:false
                      SSDEEP:
                      MD5:A1044162ED188507DB10235936188B79
                      SHA1:FB3AFEAA6BAA2665ED1AE1A3D076B16019E2A15D
                      SHA-256:EA8AFB823E55337D00759B753109B2341B52B70AED3793CE4763DEB9EDB7A76D
                      SHA-512:8B84DDA7E33BB9AE3691BD23D292E60EA6C2CD39C6D677C19F78DF9A8B2A95007CD0D2D8B689C61163329C4DF5E6EFD44E4D8421FCB16843AE327BDDD8A9DB0D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1....... ....?...[...C....Q... ;...@............CAB-3c1f85c07a60ada9ef43ca78ad4fc256....... ;............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):751537
                      Entropy (8bit):2.3673813433941047
                      Encrypted:false
                      SSDEEP:
                      MD5:B7F4839BD69B903C258859707B7F690F
                      SHA1:B2DA7B1DA01D4A74BDB31FF4035F381D894BE98F
                      SHA-256:735E0539D787F175928959B4C51864809244C3F8BB1EF389A9CC83C8760CFF50
                      SHA-512:0346CD7D2153C56595FDF0F0D6C08B5B9C2563FC213FF6128F0EEBE4176B3560D2BF1AC5DE2CBCF9123186B33E0C5EED27ACE7AB58801CCE27BAF90E68E01A79
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......w....@...[...C....Q...w@...@.............CAB-0fb11575b56cfc7ebb0c50f9d7914a5d......w@............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):108897
                      Entropy (8bit):5.042572868674783
                      Encrypted:false
                      SSDEEP:
                      MD5:9ED5861F412EAA1ECD7674B0BE6715DE
                      SHA1:7BCE2645DBF83C753D3A44C83AFE2AB8A989E00C
                      SHA-256:009D78FD4A28609C205FC90BCBE05C6C3EB3CC5CA1CE9AF97BF8181D5124701C
                      SHA-512:712AAA3832796241F498A54F22E64122D1A05C696EB0AE6521EBB04BEAB54916D958D5C98927B1C0C448F9ADA87BF6518B571575B05BB772C111557E6F53AEC4
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........a...U.......C....Q.......Z@........>3....CAB-d0c22b392f41894d1d0a85df98c862fc1.P...j....9..`.resS....r..>3............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):151014
                      Entropy (8bit):4.94268888679093
                      Encrypted:false
                      SSDEEP:
                      MD5:0626F50559090E8DA88D8F784B38AEE9
                      SHA1:6A17DBE50499BF360693A4D949F786A0D6946B54
                      SHA-256:EAD0A237E6AD5D33A8BAD91E87E9DEE3B9426BD707DD2440F62387DED963BF00
                      SHA-512:86A6955C0851A19EE2A93429F5072289B5BAABE101143A0D8D0870436F094B5CEA05EFB11EF0A3EA82E708B26FEB3202D1839C516E695B4245671E6D32783F78
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......M....@...[...C....Q...Mu...@.............CAB-7de1a6f5dd46fcbb291f906ea10c4230.......Mu............2018.4.0f1......'...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):390743
                      Entropy (8bit):4.757753053169112
                      Encrypted:false
                      SSDEEP:
                      MD5:BF517B6F2566B2A347D61D547F5A3010
                      SHA1:FD9D7BF39ED42F78E6E556FA0509D653980B1D2A
                      SHA-256:1E9EE45F5378BE6B0F36CAD0DB81A93B216ABDEB5AB1DE92D5E9ACE2788B6A32
                      SHA-512:F4392249E351341D22B407321FA0DF52F612D5ADBBFFEDC8E276A55EBA6B456BABFEA7FC4B0890300F0F08339BC3067A4C94652B38A3D40964CCFED5DB4D31E2
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........W...V.......C....Q.......Y@.........u.....CAB-0a0c11b0e439062c3220a782ff289a771.P........9..`.resS....*..u........@....2018.4.0f1......6...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):40492
                      Entropy (8bit):4.638081447347549
                      Encrypted:false
                      SSDEEP:
                      MD5:3503C803132F1A76793FFB75884C8C25
                      SHA1:BCB2045A3ADE9BCF601272946D31B6CBCA04B4F6
                      SHA-256:4995B1C78076E9426511FE44B20215EE5F08CF4C93836684280B9223F0F01562
                      SHA-512:B111B1E592AAFD567E327B08ED659C104562468813BF9927C5AE2390F51DD2AC5C3B17F8F4030EB8EDCE239D3F8E93637A71A3AB4973CB102AC2D26AF2C9B4F3
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........,...?...[...C....Q........@............CAB-514f7a81038b1bfa60e3f427b34ee868...Q...........Q.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):260320
                      Entropy (8bit):2.818913951834682
                      Encrypted:false
                      SSDEEP:
                      MD5:8F1BA09EAF5DFFC86CDE10698AA7131C
                      SHA1:7AB001C129BE44074AEB6F52963219E32DE62917
                      SHA-256:E1F4E300E086780AA0D2C833BEE8085B5A8532A6D6352E710F2E698C119A2123
                      SHA-512:0D7DB685B203A3D8AE86D73F685488450B182925BCB2727CA275E701A12683B05D38032DA8A628E3B7DDF5D97C27158AA7849D6F094D1B897DD754E122923C65
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............@...[...C....Q....o...@.............CAB-89291e756b16b9e05dca759cef75caec....V...o.......p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):102869
                      Entropy (8bit):5.137931608196948
                      Encrypted:false
                      SSDEEP:
                      MD5:3CD01F8A84B7B95F445BAD69972BE0B3
                      SHA1:5A53CA26B81E217C62C41FD3D17129EB04C11B0C
                      SHA-256:6EACA75D6DEE29D8F43FD7A7C5884ED77901388102F186BCBCB8156DC1CD16C4
                      SHA-512:BBF88838CD1E2CAFACC2A34D30E4D97C7C714B935EF5287D94581444CD8E7B89EB3F3658401E1F7DD8D7D4214C62E213D211C700D5D32B0623B9235A27F5AD50
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............@...[...C....Q....d...@........d....CAB-cf66db178af08c7e0d384cec32b1d84c...k>...d......k`....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47040
                      Entropy (8bit):4.726525385321518
                      Encrypted:false
                      SSDEEP:
                      MD5:CBE4FF436317D1C8F329339154574FC1
                      SHA1:BDA644F43C29D870C94C492E8991B5D0E991EFD9
                      SHA-256:142C748B6B8CB710F5A60D43C5978BDE4A6D5A1D236C0C948A8E72FEE1559E76
                      SHA-512:AFD626D89F9136AC24F535B0D29EE5A37BA58153CEC6A19D66FF16FAA7785ECF163F6D5AEA421107BDBC85D15FB8DC2FBA32910946B43E53AD62DB90FF546DB8
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............?...[...C....Q....P...@............CAB-313a665a3e2ea35032b355a6816e7364...v&...P......v@....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4397630
                      Entropy (8bit):3.0547149707603496
                      Encrypted:false
                      SSDEEP:
                      MD5:9F8614D8F25A238493A0B274A012AC72
                      SHA1:5EBA93815D11183A20A3BDD59AA232D4051E343E
                      SHA-256:771633F3D878E7828104D74F80A923484CCCA05A2A59235FC39F8404444B1BA2
                      SHA-512:2F21214093F22E3AC527A0DD632BFE11AE5875E8699455403D92DF4722C0618BA3FA87E36610E27E5F855696D2F066295F8A1757BEA719C59390C4BA9FFE36C2
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......C.>...U.......C....Q..C....Z@........A8....CAB-aed081d52bed71e807f7774623ab8e7c1.P..A....9..`.resS.......A8.......0....2018.4.0f1..........0........`.>....J6._.5.-...............7...................H.......................1...1............@..............................Q...j...........................................%...:.......................E...................1...1...........................................M...j...................H.......................1...1............@..............................Q...j...................H...`...................1...1............@..............................Q...j.......................n...................1...1...........................................H...j...................1...1............@..............................Q...j...............................................{............................................................................................................................... ..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1115792
                      Entropy (8bit):5.533017897106468
                      Encrypted:false
                      SSDEEP:
                      MD5:72F6F7F32491B060DA460DA0559CB2AB
                      SHA1:A69D01EABAC137EAD021E1B662091D8527CEF941
                      SHA-256:0A03488A48E3482BB852721BAD96598E318AC0AB7C89804CEACA13BAA8163CB1
                      SHA-512:F08C3CE7A11DE3B1BFD6CE51952140FC3002B7AA1C45AB7CBBBFC7C96B326FEA1D4ECE968992408FF0024819E37B10EB1ECBA5D913601AE643E4917B4F963039
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............S.......C....Q.......Z@..............CAB-0e1d49e82d0b5bd7f88530d9ac3797e21.2......9..`.resS...[q..........[.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):579224
                      Entropy (8bit):4.010049169603059
                      Encrypted:false
                      SSDEEP:
                      MD5:76822640B19874756EC989B15C44CF7D
                      SHA1:944DD75CC7B578177BEB251F39C67BC9CEA16296
                      SHA-256:BA4EB8020DD8A2211FB5A0120B0C44577C743A4A7AC6ACD3026862A865033519
                      SHA-512:77DC5FFFCA7FCFE62EBC952A9792DB7B29CEB628C24FB4185A113A522C2A5FE865C4CFB49103ED8182F159814BC1E9D81C01DE86B820D134CD67693BEFA0F164
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........S.......C....Q.......Z@..............CAB-1b76a9f7614e236d138c9e0ecdc705581.2......9..`.resS...}...........}.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):749540
                      Entropy (8bit):4.01683543994217
                      Encrypted:false
                      SSDEEP:
                      MD5:CCA326794444C2DC7E5446E72BC7B21D
                      SHA1:59AF728693B9AC3E59F7BD380290988C004E303F
                      SHA-256:7B3C4321DA803F92E872868118B3847CCAA191D1CF6373C653D8D536A331365D
                      SHA-512:47B771925E0D94AD506195261188BAE907A3339807CAE202B95723A0B115B9F48851459FAE121E1B874D6FC532DDEF0CEE0F2E0D2337678B15899072E5F40885
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......o....S.......C....Q...o`..Z@........o`....CAB-4164a6c7945961dddece268d38dfa6c11.2......9..`.resS....a..o`............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7887905
                      Entropy (8bit):3.4491428769395927
                      Encrypted:false
                      SSDEEP:
                      MD5:BC343910B1A4E2CF924B3E2B0E8A12AB
                      SHA1:B68B7F7D198252957C45ABE4F81D2499C38B23D4
                      SHA-256:9D675A56087489B7AD2B74F1E167077BCADB43418899281DC59B345FF1F13E8B
                      SHA-512:E7421B727D602D02361427694707FB1FF2A678F7FD87781361CB697DF7078FB56F97ACF199A35B5BCBFACE3475D0F91FFD03A08544063102B0F78E4335F9B7F8
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......x\!...T.......C....Q..x[...Y@.........[.....CAB-eb4b74a29fb892ff6644169d6442f01d1.2..v...9..`.resS.......[.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1370301
                      Entropy (8bit):2.3600041795372313
                      Encrypted:false
                      SSDEEP:
                      MD5:86025B871726BA2360F86568A1A18F75
                      SHA1:367BDAB5327C345E4DC117A5DAC9FE0A2A426D99
                      SHA-256:DBA0F6F68645D3AC496D173DDC3A2AA1626A6C97AB520BF095946B34F6E6C081
                      SHA-512:C83EAB28BB6F9F467AF6B92812DD47DCAF60940A8893B99C9AABD4F0A54EDF16C39FE0B7FDE99D2CFFFEBD6B3D4CDCE38A423AB2A4DBF4109459FDCA48389721
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........@...[...C....Q....L...@.............CAB-1457626ee1715e49e1f0675a3b294745........L............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... .......................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11474159
                      Entropy (8bit):4.902497205270554
                      Encrypted:false
                      SSDEEP:
                      MD5:42B8E68C13C3D161D828DE14E66AC864
                      SHA1:8A71E14C8CB6689FEA9E3821EB937DC1683E5856
                      SHA-256:FD29320889A6ADFCF20F52545AB6989069E2B17C88F37C0933914E9E6CE5C87F
                      SHA-512:4756823F08959FE512CA389AC3BA2456F878107E249B4C69349B74CA7879F116F60ED92EE7E6652E9233654BDE55ECF1B03FAB909B853FF7333BA80925460D95
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............V.......C....Q....h..Y@.........-X....CAB-57183ab520e61f9c69518b48b9138ddc1.P........9..`.resS.......-X............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2292716
                      Entropy (8bit):3.8014103143681357
                      Encrypted:false
                      SSDEEP:
                      MD5:BBBED8053E49716B105A4CC59B07575D
                      SHA1:AD2F57D346711365850137E620C6ACE1B35AEB56
                      SHA-256:FBBCFCEFEAC7E6498E3420BD3CF70212934684D3A2D47C334D94A7B81AB87EEE
                      SHA-512:19EDE0920A9F9C78667AD4805B4B254E99869FD9CDFB46D3ED8B81437B30D311760AE75B6259A2A3ED79ECAE621840B7702969D9E360CB111D9D9AAEA9637972
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......".....S.......C....Q..".h..Z@.........h....CAB-175ae4f6a8fa1d641890315326b15b911.2.."...9..`.resS... Q...h...... p....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):572744
                      Entropy (8bit):2.946245072780572
                      Encrypted:false
                      SSDEEP:
                      MD5:46B2BA7DD966CF773A6EA0DE17CB2F78
                      SHA1:B46C00B3F2BF596543AD56F9A8353FE4285F9397
                      SHA-256:F2AC13B4399D9BBD1A17E0D3A5252FA065806E150A013794E7107FF629E2564E
                      SHA-512:C1163F89576E40EEF0142B11C5387928085D0C9BBA4B58F468808DEC3202595E2E7D8735F39C3C7E4DD245939417CE3891796BB84392FE65FFBECFB476B8551A
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........H...S.......C....Q.......Z@..............CAB-49b497df36deb5dbb092512c21923fae1.2......9..`.resS...|...........}.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1967938
                      Entropy (8bit):5.122252380883658
                      Encrypted:false
                      SSDEEP:
                      MD5:A02BC78BE76811E5A5BB8DAF23B7DA1D
                      SHA1:C1E59480E8BB8A03AB65362594CD7A6DEF9F4F95
                      SHA-256:3412A929102D568E961A85E59F1F9A51D4319684F9E8C66C270E3C87DDE619A3
                      SHA-512:EE130DB33F8744924644C9914E11AD1A7FFEDA79816BFC88FFDA41742ED534A7A6CD47613E2ADBF887590548CE0D53D1A7CA5692D554BAD3E57D552E44246493
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........B...U.......C....Q.......Z@.............CAB-744bb770c441702d00d3a9cba312bea41.P...=0...9..`.resS...*..........*.....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9045065
                      Entropy (8bit):5.853506382231435
                      Encrypted:false
                      SSDEEP:
                      MD5:3D04CCBE60877EA37C325CF983B12394
                      SHA1:553048B7F098941886B2B746228464AA05D754C7
                      SHA-256:0049478809ADA1E209453D0518A95B0FAC5A7D0D172C3D7CB2AB115486A57AF6
                      SHA-512:D20FF7576780CCA45932F027470BE07CD970F27E3A3DF07E2D1CA886A4465B6862FF5C5641F0C986F277F680B980166D3AE021D293E341C892A975A4797E1836
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........I...T.......C....Q.......Y@...............CAB-c78d8358b7a9ce1023037c8be5e6e0861.2......9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2127768
                      Entropy (8bit):4.185018604479679
                      Encrypted:false
                      SSDEEP:
                      MD5:1EFB120D74FF820A07D0D41EFCC5FAE4
                      SHA1:0054FF322033A7270617DF75A765AC85165AAA63
                      SHA-256:467652BF4311DD82A5E85EE5D1BE275EFABD4FD4822B837CF4B594A0C9C63B00
                      SHA-512:322EB2DC2E1ADC645522E8DA552DAD3602E9C8158B2F7E5B66E7B09B932B80A5BFCA747C01FF43D9F8E343B75ACB2CF5FA61780BAE16D67E6AAEBDE01C95E150
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...... w....S.......C....Q.. w...Z@........w.....CAB-69af992d56e01a95aaa1c499eb1a9dae1.2.. ...9..`.resS.......w.............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3309722
                      Entropy (8bit):3.94873247410025
                      Encrypted:false
                      SSDEEP:
                      MD5:A26C24D94849C31FB71CF4729499EB29
                      SHA1:C82F937AD8107569CD1289821E7D4067325597CB
                      SHA-256:7DA8468063EC71A349EF44AF713411AE0F4ACB49A04E448A17331DE497D1299D
                      SHA-512:215A0359BD9CE21C2EBF3881E24799D0EEC2093A8AB3BB77F72CFF52BF50933CAE939E5EB7DA96BA6E2072A002049958EC0C2E2C9F050284598E90AA6B4507B1
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......2.....U.......C....Q..2....Y@...............CAB-31c6d26cd7cd8b9473a2d3b251a143091.A..0....9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26877026
                      Entropy (8bit):4.217729736118307
                      Encrypted:false
                      SSDEEP:
                      MD5:53D3A2598672C1189DC5E054A020CF6C
                      SHA1:7AFF4804629CED8902268A282C3B1DE918F020EB
                      SHA-256:4823512EF4001ACABF115090AF3A0080E4764E450A3529520F923C3F41DBF331
                      SHA-512:62310406764471BC77C5C6385B01085693FD8B8116018B02921E6BA12304D9F48EB7115A628A151AF99CBDBD9ECDEEDE91016D2219C9DDFE00829234D06F5B1E
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........b...U.......C....P.......i.@...............CAB-98bea7375c0e823b186eb2b218c03e9d1.2......9..`.resS...*M..........*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9468696
                      Entropy (8bit):2.8815398400511394
                      Encrypted:false
                      SSDEEP:
                      MD5:50387321D36C589CCD7CED305C80E1CB
                      SHA1:44D26C33971D6A0DDA89F160012AC2648B2C738D
                      SHA-256:720E9BC3DFA56586B37EFD000C9A9FF680FAF63EA8673C2803F2239082A3D3FD
                      SHA-512:E6908BF3EA23892AA207411EB60B5ED36A99BABE3590EE0433E140540C23302FE06B9E6FB14A16AC1F2D394823675CC6504B210DB5A34B62A5C61F9C59B6471F
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......{....S.......C....Q...z...Z@........z.....CAB-96672474746cced08c73dc1938e791521.2......9..`.resS....I..z........`....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26805542
                      Entropy (8bit):3.6635362160922718
                      Encrypted:false
                      SSDEEP:
                      MD5:C989E0CF18670AEB5E747CEDA800A974
                      SHA1:149A20B96A84F1AE59DECDA2178C2B95D5198EB4
                      SHA-256:6D6A91D76EE88688D15887A0D0BFE92AA088743A76071CEF56C34E0BD11AB900
                      SHA-512:69FDFCE2E8D94E28C8D5C480DFD75BF3830FD750C61310B39BAE6C5CEF8F24A13DD65D13274120A2C276C3900C0B292B54ABEBC7B0A318E5B95E20A805700918
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........&...U.......C....P.......i.@...............CAB-053f48e5ba433e9253a589c55bd5954f1.2......9..`.resS...*M..........*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8421588
                      Entropy (8bit):3.140932751313066
                      Encrypted:false
                      SSDEEP:
                      MD5:8BC9FCE350C3BA5E71FE79FFE142AF56
                      SHA1:3733400AAFD40914B6219728AF8DA0DD4A212F46
                      SHA-256:01D3C0EF948A78B237749A75080776D6120345A174C09A90E92FEBEB6DDC48AC
                      SHA-512:7C3A7993E4997DF8A33A7F1F81CC5B56670C5F259C5D3027189F13E75F5C927195ED49F8872A4BB2BACC7D7CC5B0BB5E5F8152ACC057ECD9B41849F495C87D72
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............S.......C....Q....P..Z@.........P....CAB-e0b20f2b560013ca513f801b8a1b25e51.2......9..`.resS....5...P.......P....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26817083
                      Entropy (8bit):3.959558247595731
                      Encrypted:false
                      SSDEEP:
                      MD5:83E2B673B2631D87E65940062342D830
                      SHA1:9E5E57F0DB577EE251727AAB92D19C2FED43F3FE
                      SHA-256:AA2B3A3B3347A105E24B968C0D135244B9B5327E463CBE4D1048FB451123BA41
                      SHA-512:D82FD6CBCBD057EAD162718AB430F845C183AA79209B442CD025E9FD79238499A0B864205D3C68601F0B97E11C6BB1F4E751386A68CD53FE5284F1D90C94AA8B
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......2;...U.......C....P...1...i.@.........1.....CAB-f4497f334d1cddc1f17cfb3ae701c2511.2......9..`.resS...*M..1.......*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9468684
                      Entropy (8bit):2.9824842201839834
                      Encrypted:false
                      SSDEEP:
                      MD5:6E97E24A64634AB59E1568363926FD7F
                      SHA1:E47369323D59C1A2661AB581147EF84D2E66EA23
                      SHA-256:0D02C289F03EFC3011977CAE86F51D0D3C02BE596488C25189E655AF58AE10FD
                      SHA-512:AE048CB41D961FB41587ED66DC65BCD65E164370080A2D0DB3B5AE4554381EF81D76F6283A475773F6876B4F4CF9BA8054B4EFC9C6759CD044DBCEBFA7FEB8E6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......{....S.......C....Q...z...Z@........z.....CAB-86b6919f75670e9d14ba410afc0bacb51.2......9..`.resS....I..z........`....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26424102
                      Entropy (8bit):4.220925506166558
                      Encrypted:false
                      SSDEEP:
                      MD5:D5170DFAC8408287955AAB2603DF0F4F
                      SHA1:1BDC635511A96F5CD5CBA938708EC9C9C1C9C525
                      SHA-256:26CC6EDF604804604D9114A43EB276F0BCF383C19C19A8B5BC703469BF9FEAF6
                      SHA-512:276A7A2CFE4032DA28F00DDB550B46A979972F7B40B597EB31125D86280E91675204C7F2108EE0B8C5751C1BB289B1A348C866DC2B5FF4764F42996E309CB8BE
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......3&...U.......C....P...2...i.@.........2.....CAB-eeb1e46a2c62907cf86ea26c6488076b1.2......9..`.resS...*M..2.......*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8942856
                      Entropy (8bit):3.9798315032741867
                      Encrypted:false
                      SSDEEP:
                      MD5:7F8002F94FB093F19A98E9F99E130652
                      SHA1:B85C1F8F1CF51F8923FAE278B58DFC9047C00F4B
                      SHA-256:3AA88E173EA67C095EA258CECEB91107AE15FCE1B1EC72FCDBFEBC0A97963F0D
                      SHA-512:D20716E89763EF6D5EAE7AF63BB47EAEF067E05CF736A083A2658A9C2F4CF7D3BADFFBA7DFD63B14E32D32215294CB264B820AD9AA8E59FC1B964D59BF0E18A6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......u....S.......C....Q...t...Z@........t.....CAB-2f0d6563d02cf6e62babb8e2c5834a011.2......9..`.resS.......t.............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26908914
                      Entropy (8bit):4.039617588290326
                      Encrypted:false
                      SSDEEP:
                      MD5:95518FDFCD7556CFDE734C099AEC1898
                      SHA1:DE7473D69ED7B09D418F217B2C17C9757F2A295E
                      SHA-256:A39BA041AA9DD67FBDAE6EAF2FF3B7E81778319892B13F1EAF2E8AB5ABB73426
                      SHA-512:62375115C7E09156DA0C90E98BB157C0DA90DA1F00982A8C93D5D44F97CD394A23DFF8F51D260FC02FD3C062CFFD3DEB014AC48F842C463598C3842A99C5DDE6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............U.......C....P....l..i.@..........l....CAB-74beadb11c188e5171c02b0c7121cdda1.2......9..`.resS...*M...l......*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):10519904
                      Entropy (8bit):2.970244927779966
                      Encrypted:false
                      SSDEEP:
                      MD5:7F58F5D3491B088CB9E0B95CE7CEBFD3
                      SHA1:7483625E5E71828634D68977C3B047AD07CEA005
                      SHA-256:403CE10684248FFC199E5FC46070F1692E45AF92EFF7521ACB2C2CEF8F861335
                      SHA-512:2C248F494271477E3CBC2E9FF8A0C0DE8A92E8B63AA5004C128E86F192D72650B2083DD32FB52035E26B3C0F9A465AF789D2B34E1D8B20255ED3FC3176323697
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........`...S.......C....Q.......Z@..............CAB-47b2f29f8e1f9f0ade99e80863b932391.2......9..`.resS....]................2018.4.0f1..................l@.})Q...OZ`.O]$...q.......j...7...................H.......................1...1............@..............................Q...j...........................................L................@..........+.......................3.......................<.......................P.......................`...................L...k...................L...x............@.......................@..................................................................................................................................................................................................................................!.......................2...................~...?............@..................................j...................J...X.......................e...........................................H...l....... ...........1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26650042
                      Entropy (8bit):3.957136876968476
                      Encrypted:false
                      SSDEEP:
                      MD5:A478836B51172D8A4A842FC7B87E6671
                      SHA1:7A31902BB81C92DA4E6DC598EF140BA43068C252
                      SHA-256:FC9FCC171714FA977A2B8BF1AD31E76783B6B169384D6E039E07CAA2B02F9993
                      SHA-512:693551B29CE99CE06EA00773F831CFCA4452291077AC54AC963E2D64A69BC407A47FEB70F43781FAD88E435FD66270A655D1E2E014C7DFB577E128796F4E89C9
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............U.......C....P....4..i.@..........4....CAB-e520187ced4a45e9e796f18c164190801.2......9..`.resS...Au...4......A.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8417324
                      Entropy (8bit):4.017065095760154
                      Encrypted:false
                      SSDEEP:
                      MD5:2607A8511F9471FC2CE63282AF888926
                      SHA1:CA0CE1FA1F0B5A66F650D317644015E23ED15A26
                      SHA-256:59861FBEDB9C151DB98B28FC584ACE3BA4874015A6E43F0E4F73E2E91ADBF822
                      SHA-512:237760DA82810B6B6E8B4582A06A880E344313AD52C6D2A8BF72A2356B5292B93629CC8E9393A75DDCFD5AC23F3A79B8D5A2C3BBB51C336F2E76B11FD752EE9D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......p,...S.......C....Q...o...Z@........o.....CAB-cd8ec9306f83d9d1855291361d62c3161.2......9..`.resS.......o.............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):135471
                      Entropy (8bit):5.069813662072253
                      Encrypted:false
                      SSDEEP:
                      MD5:8F79627C9C7BE995D0BF4889652E2DC2
                      SHA1:A6ACED9A7FEFD9DB406C4AB481400AC7281CE7FE
                      SHA-256:24FB80D0FDAED9980C1D6C7962EA06C800C7154A0BE169C78706216CA62C3B40
                      SHA-512:036CD6D792308E9EB6CC7081E91989FD517D6B10B6D70615018E2E36618F0549E258ED103AB9DEDC215300944D010B9C26E813F1E8AE55A705B5060FD23CF59E
                      Malicious:false
                      Preview:{"abtest_10061_nisostavern":{"bundleName":"abtest_10061_nisostavern_2159393990.brotli","crc":"2159393990","size":459847},"abtest_10091_speciallandmarks":{"bundleName":"abtest_10091_speciallandmarks_2639736403.brotli","crc":"2639736403","size":843197},"abtest_10091_special_landmarks":{"bundleName":"abtest_10091_special_landmarks_2856592819.brotli","crc":"2856592819","size":61064},"abtest_10111_wishingtreedragon":{"bundleName":"abtest_10111_wishingtreedragon_2433286664.brotli","crc":"2433286664","size":30848},"abtest_10121_fans":{"bundleName":"abtest_10121_fans_3199364939.brotli","crc":"3199364939","size":25037},"abtest_10201_citypeople":{"bundleName":"abtest_10201_citypeople_1067310211.brotli","crc":"1067310211","size":102494},"abtest_10201_survivor":{"bundleName":"abtest_10201_survivor_192344458.brotli","crc":"192344458","size":691767},"abtest_10211_animbattlepass":{"bundleName":"abtest_10211_animbattlepass_994856893.brotli","crc":"994856893","size":85987},"abtest_10221_dustyimperialtr
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):980826
                      Entropy (8bit):7.999403442298334
                      Encrypted:true
                      SSDEEP:
                      MD5:B53073245839D1D343AD53A294C03F13
                      SHA1:1ACC491DC3B0CF8FB150FF6132EDD25CF152B84A
                      SHA-256:6D1262E7DAACF89FB645915978DD9F91466E18C2BB49D8D3DD5501CF2695D4DD
                      SHA-512:3E15550E9C3B0F05C1D31E7779A859B75903465740415BE9077034DD5D0D6BDF96BC99E93927C1650AA6A77332209A83471D2C761ABF0961A715038D711112E8
                      Malicious:true
                      Preview:...:M.....V....$........N.vf.v..........c.VW..Y.-@...v.j.<.../..9.vl.4`KFN.U...*$......9..3.=......5...V..".............................t..{7..}/....S../y.x....!.B $. ..A0......AJ.a.J...LFZkA.X.*U.Vim..R........#JD....1J+..J.......$.B.H4...CH$.&...!cJ..!a....*...i#0...X!.e$...._..g*i2PU..R[:6.Q'.zA../....e.d.I.Z.=.k.?.io.NT(w.H..........I..S....nj...=..3.....q...gy...!z...d0..7...Ew..X<}.R....{.....;T]2..y..+m..U+=cIvj...k.F}..y*..b.....p.}..l@.........>.6...L..2oS..|.jS..L;-.........G6oYg.G....6...8-H9./..h...J.oWZ .T[..J..H.!.....$..|.[-.....@#'{...nQ...!.!.d^.G.x.q.....y.'....++O.5t.T.+......h%...l#B..H..K..Yl.].64..<....R.h'.2B.]..+...^{.;z...H`....w.?.;.CC...8..r...~z..?1'#....ssOa..z..f.i...E...K....-$..h1..y..8C..T.v4...V..Dw .C.zQG8..xg..."&.x...x.F..^..*.$. .d...q.2i"....T.f........Y.:.c.a.Q`....>>K.....b...g].;.4...;q.....5../._.K.k...I.....0A...w._.z.h.[......|..;>..J....g.H/2;J.52..v....x#ml.-..l>..(..r..d...A..l.s..`....u.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):45339
                      Entropy (8bit):7.993963082518639
                      Encrypted:true
                      SSDEEP:
                      MD5:DAE9804BE984002853C921662B7A96BA
                      SHA1:58517D630852FE22F38F1A604461EF364D548993
                      SHA-256:068A9D8BD67AABFE0D4A94C131011D29554512985CA1A5901F8335C58F5C5BD0
                      SHA-512:AC94F3BD517745DA853EC34C30CEB3571784A46160732EFAEA4072E0DE0A1E4F064AC9576670003CD1AD95E5243CE24B22506EC2B6C9609A41792E351FE67211
                      Malicious:true
                      Preview:Sd5R1&2v3..'....[..r.&.).~..P..;DT.2.....C...U.a..Pub#....S.ktR.kX|....-...O...tF.......`..B.(......_....e.C...Z .+.^J&.......q>j..Sn.... 3C$l..c..L...`..h.kE.-j......<k............(j..c....QR.}..P..K7..[Q[PPH...k..)...)..(..s.F.P.=.....U..[J6.`...... .GY.W.....I....V?u..'U.s...@ttZ.).A..^^.....+d...j.FH)..p.....(t.R...Y.?.....M.e.%.@.n.1..."....o..K...r.^...+_.|...).k.6.P.u...TNV~..Qn6...,H....(+ ..*.i+.9..E..E..B..*TAh...V.aA.#%..qC..$...@.h.....D..A^.$.g&s..XO.E..i....w.+&R.X.+?.".,....b.1W.X..._U..4.j[U&..i.ow..-v...ff-}.U...).k..].Zf......I..:...(....=....d.........@.P.j.<.."....99.........". 3i.....R6..-.D..U.`.~n4b.JJ...75&L.9..S?...w..V..g'."..h^$Y.Ok]..'......(8.....b.....U.....7....Rr )E..c@....,w.rZU:......T.> ..W....1...0.>...%.4]..T.1..!.N..h..j../g..2K..d..'...SJ_.....6..}....pG!<.J...W.. ....Q..%.......).2..Ekf.mI.....B..O.#..]...rZ..Fov.R..`.....3....u..p.3...s..?.Z..lJp.mEv..R'9....(:..8v.T../-............)i..J..'...tIt......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):33720
                      Entropy (8bit):7.9912507475318035
                      Encrypted:true
                      SSDEEP:
                      MD5:59BB7ABA7DB36F700FA2C6D195B244EB
                      SHA1:5656B71701B246101D3A7E4AC9FF177E97C99CDF
                      SHA-256:4AEE7238E7B69408EAFDBF72AD9E61BBC10DA0F46A2486B963D1359ADF78C222
                      SHA-512:07BB4EE34AB14A16B49C6DCD220235D45C3227A99A339EABE6EA8128ACC9F1148AEBBB83373E27A5B11431827D02C5358BD43C8D1543D2105F551F9B5F735837
                      Malicious:true
                      Preview:S..S..vDwBIu........sz...m.M....Eo%?n...O_t;S....8,......f.`C.!0.1M..T.t.m.>.j..>.D..2|.;.B4.... ....0..a.).....8.]u.dD..f.c.....><?.?...1`t..X0...H..E..Q!.E........Q...........s.0B..2./W7z...... ..G..,!......!b.............S....5.~+o.'...~.>.1.d...o.x.o...>-....d5.H.x..w......a.u......<.)....a$..{.....).@........B...h....&O.....3t.._.>.T._.~.r.2*.......W2..>...S]..>.. ...I.{.U..x@#g.r..,.%.....".....}..?..kr]..s....z....`!(..Z..s.7..4.f..7.BH.....7.....Z..1ADb.c!o.qM.....M..,...}.}..........cM&.... c3-...:.#..N.N&.!.~o5..{.....6I.J,...):.8..s.?..=(d..$.G.rz..U8mp.r........@...zl.3te...h...~.k.....`.>.~. C..S.>O(.w.t.SJ$V.i.u.w*...$}#..\9J ........{....U.....'.).5#5I..1.5......I.W..TV.T=..#q........g..s..g..?..+FO<$@..tK..GE...d&.+.@...D ......@ Vd.+.............S........O...O....>/.9...7b..x,..L#..Vr./....p..|.=..z.......<....=...@.!P......P../`X.-H7\....6l.0a...A$./.w|<(...@ .0.)..:.....A....G.+......w.2.-......]....a.....P?..`$.N".x..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):144614
                      Entropy (8bit):7.9974246700875735
                      Encrypted:true
                      SSDEEP:
                      MD5:FEC30FEB8B8C0BCB13AEFD037AF415AC
                      SHA1:8083285722583A93F646D7135CAB56DFA6D447FE
                      SHA-256:EF5FDE00C3C1186DC598FAA8E2554A98A8F67695F2BD82645F4FFA4A58BB769B
                      SHA-512:33D68122BEEDA73E58C5F348F2064F179039032EE69F98E1ECD4C607A49FD8B8E2317315F00B844164393DEB3245595E1AB9DDF302F800AE5AA8FD54A9B8D8DE
                      Malicious:true
                      Preview:W9F::....F."..v.9....W7.w..A,.j.F......*.....-.Zq2..`j...A...\l..*..)\.ZQ.:>......E=.L):\..II..f...Z0..q...n.w`..1]P./N..?..V.w>A...'..:P.0J7k..&........._....H...X...m.Y.....VI1j.F.b.}.,..;.*0...(...gzfw.~b..a...."#.T.U..W..8 Pw...........I(f..8o.w..L.$...F^.....S.}W.}-.u~.8..._.....*."..^R RY9...'.K@N........S3._.Z....l#7......>5.......K....BtJ..y/..K..T..-><.s...R...tq.....L..._...n...."...0...A3....S*j...t.%..\.y...%6.!.*`..B!).BH.....m.....rk#.+Z.\?H..e.o.-W/r..#......|9.S.R...z[.^.b.....z...o.Rk].0..O3.._.=..v....D^b.A,...^...b^.ya1/....)%).y........B.i.x!.O21....(..&3.3..w....,3mfA,.+@........:..RM..4;.v.g..i..5)...X.......?U.A.3Ww......8-e.Se...RL.C.0...1.(......Wb'8......x.s"...nw..=....].S.*\...i...Q.T..me...f...I.......t(.h.;...s{L.i.3..Z:G..D...I....,`.z.d'}..od32...I!.%3f.z.CJ..a..)]). {...qx.7...D.3.....Ff..N...I....eHf......$h...\W.`.Y.O.u.7...y.%.-[.+.`..lu.C.D........X#.X.c..T.......l......%(T.Z......O.>c.I.!.B.0QI.hL....w...M.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):215288
                      Entropy (8bit):7.997845592314956
                      Encrypted:true
                      SSDEEP:
                      MD5:6939E80084867D98B95989C3C82D0219
                      SHA1:82A6DCAED94793F8C9027FBAEFA82CE833E60789
                      SHA-256:998B90D08A24B19F6A1099385A0F6BF3C83ABC6ED6A97169492EC93B62CAEF65
                      SHA-512:F9670EC9F51C5767080CA9E898E3C08F32D7146EA5427373D1DC2861520F39229E97CDEA0E3ADD87EF07EC57A7A8D88371DC98BA0B5B430A06D747920FFFD584
                      Malicious:true
                      Preview:Wm._..u.@oVy....q....=n...:..W.Md.;...+.t.m...U^......l.X......-.O..4....tx).8.....A..;.._..KoC....., .h.~53*u....y..=..Z.MP...<...{v..Y.]>f4...)k...Q0_..0.....Y..&>O......QE.<.*..n&.|..>.^..^..>......./.......S....CY.}.p.......@dh..uZ..q.oU!...d.B.Fi}iZQ..==.6.<.....ym..O.......+......tXh:V.~.9...?...w.'+...}c....\N..1.R..~.,."]+bE."^.?j..."n."....r..$.9.[.......F......9....C.rS....Jq..IW.).oR ......@.{..y~M..=..p.`.".L|..*.:5.K..A.gW.z>5.....SW.p...i.jjN-D*T,..~..{M.c.s..p.!.R.h.k..I+0.o...X....Fvf..]......[%4...,...OO9.......^.v.@. .d..........]'...gd$.l..69.@. ;....;&.@..,.-.1-$lD^.eK.... e....NX.......q.HAQ.UW.CPh..ey..v.....Ei.C@F...6..D.8.B...#.Q.8...0(..%..?T..=.Nd..D'O].J.K..Np.8...t.....$.2....3.lF.I.]R...leKn^..R9k.....?I..`L...Z.P..`..F...Q......Q....h....RD.P......k}...9D.5hU$.V........O$*..$.....zIK..V...o.X!V*@..r.]&..C,..B;.N\xv...a.Ox..w..C&..Zi.Tj.5.P.?U..v).@....!."..b%.@.nS.....X[k....%.D.....oq+L.\...gj`.. .U...8...T.....jh....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):449200
                      Entropy (8bit):7.998302067722909
                      Encrypted:true
                      SSDEEP:
                      MD5:231EB6C5B79F82D4766A6513F88B70E5
                      SHA1:C3771A9CB078B4DE429060FFF7881A797F308787
                      SHA-256:A5E6230A938BAFBFD847FA6E5BE443FDB5CC9C390F88B25F801E1552031EB55B
                      SHA-512:6E2DA9ADF10EC9C60F3299481D04DBDBD00CA4AC0F2618EDA1A17519F21D05C61148332C375F2DB8D011F777E4CDD9148BE6776F7176C86084D9BA65FA42988C
                      Malicious:true
                      Preview:....%...............r.j..{%},.hJ.....@[z..Q.........`.I......c......P...n*..N.@......1.......o.q9..L.h....#.]....Q.N...s...m#.iC..n2H.d.).(. A.@..4.-.}.;,......n.!3...0.P....>.....-........|..A......MrW.......HA.J[.j..<.k..M.'g.,#$..A(m.r.X..t.....u....U.`e...q..5..8....<......y..s..."$/!......a.a..*K.1..Z...O.Dp..G.mq.....V...............q0.@...E..D.TB..]...$.y....$.\i..@Ft...apk......k....6n...6a.....p...Q.{.b....mR.aYf..O.....HZn.._.m./.......f.&...ZNC....fw+F`..%..C.}....<...I.$.2C...mS..H.....GE ..`s....j.........fP..}~j.e .K.............E.$.I....!...o+#e..Y..U^..o...$*B*3voe.g..._.;z..J.[+G.n.%4FA..../....m...l.Cm.R..J.P.......@jQ).>...k....P....Hj@#.-..`!bE..D.Krw3<.n.s.......S1.]..$."...n...Y.t..S.^.j..2v...r5.a%3Q7...oj).&*..D.)....A.........&.......y..~..0......'@<.....l..+..Z.+..b..)UE~..b..g...o..0.....n.W.HA.i.a.....[od.....m........i[..m1.Z%.(.....*.l....U.S.....j.^.y.6....(...j.X*....!..'.....6.F.K......y.4.w...q,O,?
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):263329
                      Entropy (8bit):7.997534682950662
                      Encrypted:true
                      SSDEEP:
                      MD5:5ED5A8539FFF7895A2BE4E9802C05EE6
                      SHA1:AE8189CB9AEDA71D52BEFED276A04093B3B60266
                      SHA-256:CC0FBCEDDC76B37D1B72551A2A9ABF07ACAB96405063C4B2C06AB0F1AEF11B0B
                      SHA-512:162C13DCB3DD81C5CBBF1EFB7580CA2DBDD1A2A801BF8E522B499ADB8FCB29C787801D46756AD047CE27DB143B8CF3C7F03541AF227E940F7497542007B8A7E9
                      Malicious:true
                      Preview:W.._..=.v.s....A.D$......1.Hju..6......J5U....${.c....>.63*."I....P...0..Q..,O.Zu......\R1....i. ......1...w...!...2....>...u....'.....7..e....|...........y.kEml...Q..............>!~g...\;u.g>.Na..^....pr{.@.. .P..t.\...`...............j.u...%.7.&6..7........{ywvoZ.*/.6..U2.!.\{C,..P.j....Z.0.G.b;.]..u..jx....H..)..j.6..4m..",.....Q.R...........p"#....qp*Nc...v.M..R.v.m.N.'.u....6.4+..:......x.....T...>.....]2.3.,..+.0v1.O....N..f.`r."Q..].i+.+].].a..7^[.........@R#..."..fj........Li....\DT...H$."n( ..D..D..........~....V...)T...]......W..>....t.........d'.V..:.:vD.&..c.....?....,.7....L....e.L....y..1.5E.G,..9...K..l....m.....3,)...V.$(...C.a.!...I.I.I.K......aY.l.H..q..^......{..*.T..[z,(.....!.v..d.=.Z.. AQQP...H.S.[u........g5.F.`..5DT..w2.!..@.$.{.Q.w..D.}.....Aa...\....*...O.W "A.$3D.../..o.U4..5h@(.......%.Vb..U!lK.D..kJAM....P+.iU09|....,.V.M..6.*..b.I..J...$...s.?I...%.).....T"E|...L.C.25.....$.b1.%.."....J...J7;UQ.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):349781
                      Entropy (8bit):7.998023336274342
                      Encrypted:true
                      SSDEEP:
                      MD5:1AC898363F62DBCA3B23D605058FBD2C
                      SHA1:89CCB1FC847ABAFCAD1FA6C83B91F3962F934B03
                      SHA-256:A0459B167B47F0AAD888FED57D3A7FC9D661E938187F10DC1568F2E5EEACFCC9
                      SHA-512:674940665E570DEDF954A07F2B220F2866484EA65561F80A366DACBBE6E168E5D179BACDC6233545D14039FDA692C8B2474DCC7C1CB69CF3A1B79BE322AD2358
                      Malicious:true
                      Preview:..k.....7....o...`..h.........P.C....3..i...0...v....../.2$..$DE....A..6.HA.s.v.@{..<...a!...!w}...Fex...f.1...4...fv.eo.h...$..H.C....nY....s?...z..'.......^.._.?C.w.%.Q(..Q..TCU%.....Q(..vT.H;#...{U.....'. .)....Bo.A..'.Dk:.{.<..<......xL....%.SjN.*...x=. Z........e.&.Q..E.mX..........f........8v..I2S...IB._.;....=aPh`.3g..fN.@.`)........`+.I.F.\..@|....N...|n.7.S.b....k....T......M.F..Q>.....v.......m....d...e.K..AD.(.K!.T.....e.I.....F....M..c6....`.1..Pa...=B.=JF...d..HG.P.G....'.......7R.rU.B..+U.t.'8.....".8>..m.p..<..@7...W.......?O..Kbd.".nG.%..e...5`l5GO....... ...D.J..+.....n....#...t+.Q..Z.......".!...2a~.r.?..,...JW.jE.A...n.ji....^...K5.C.M.Q..0".."....F@...t..j...`......P...V..I..|n.O......-m.$&..[.....qIZ_1....!.*$.<....mBX..j....-&...m..L[!...vA......I.*"J.;<...............!.k..nK.f$....C..........dHP0Z_..}....A...l...5&|...O.+Vh...V..P....n..."3...ZGUP..v?:..(*.Xk.c.B.Z..Z...Z:~.?.:.1..ml..@....m.......x.$o....@OR.b..?e
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):262662
                      Entropy (8bit):7.997398724341859
                      Encrypted:true
                      SSDEEP:
                      MD5:A1AD500E8A97487F84CB6A2EB06F7FCB
                      SHA1:38645869BBDA294F1645B3296F975766B51E84E5
                      SHA-256:DBFA5A872732A14CBDC32CDAB3A9E2A41D42D581CC3400D51EBCB51E2CD291D3
                      SHA-512:506A6BD81B9D7EAFC9136A8E600C442D2C85596F87B44D2ED91302FCC46DAA398F9C661AAEB31F9F1AA26075337FA8A283A2BB7CA7E3DED386ABD5CC6266979B
                      Malicious:true
                      Preview:....5..C.U.......q.;...6..$.M'~/...u?B.Z=B..4../I*2f:y.n ."[E...........})....R...Q..xrq..|.{..6YE.-............f..e.......\.5/..w.t..:.C......~<..(.mR8.}.}..EM.G.#..eBA?....L.Y.}....SQ|..^.....8..tk.............BDE.4....k.........!..e.sm...}...o..}<.........5Wa...cQ.\)k].*u.]4K.f....n....&..qs.......q.t.@.._.......tmKk.t..Nt?..p....IG.X.p....<..S...%.....(........_....[..x. ...4..f.tL*..o.S.......R.'...g..=B....Y)...H+............He..\...._<....&.H-.3.^......N=#<.w..I.(.....V.T....../..Z.PD.X+ZIh]).u...O..e7.@..VF...L.P.....&.( (3~&....Sg....?Z..$.M*.C.X....f...&iHj].~.5.n..k@......r.AD@.c..b...DM[..j.X..O..B.6AQ..J}.P.H.|.O.......%.....G.7..d..bs>.N..^.....HZ").(..+...3/....r....{W...T...C8..7.......".V..@..JWvKwS..H....W..IH(..O..TA.. .....*.\.M..n.J../@.......?..J.V...j.] .?....Ha^...`...b.z'.]....L...<.>~.....$a.P..1.6.T...c%M;...7.8."..$..h1O.I...l...-S.X........lLG....,./.."A..BE.!....9....1......V.Z.V_.W.U......r......d^.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):349362
                      Entropy (8bit):7.9975683038588254
                      Encrypted:true
                      SSDEEP:
                      MD5:1C96846D671F37C0719886CB3AC11A11
                      SHA1:EB29986BC5F2638CE566BF640B978B28B4D22C91
                      SHA-256:7EA1375AE65CB0FE14A2E16D97CE356DBCDFA7EC57D55ED3FA1AC7525C960ADE
                      SHA-512:D679B7E9C45D274320D0E22E9E4D1097EB3BD4D6E67B1EB71B345D894C69249780CF36301EE9760F5C6E67331B9B321FBA978E1050EA0E3E756A21208463DAF8
                      Malicious:true
                      Preview:.....l.N5.'`.~G...{#.....t.......&.m. ..dj..........MQ.1.=..@..;E.*..T...c.cb.-.;t9w..4.mN-.yHb.."Md.H.g...z....L...)..6.-iBjsDn.....c.....U.........../..B.2>.r......s[.FJ.j...FPPMu..#.p.I.....*.m"..B.n........6..[..k..r..g/ .sAqa_Ga.-...p.t.O..r....O...D.U..6.1.V.v...>........w.>.3......sGvh.ef..}Y;.3W.Jf....$..R.hI........ZR.x5K:.H4.T.hb..H.Oo^C..<..[...%'/.]..7Xx Hx..EE.\l.a{:....t~l..\......lF.......glQ..}..5.&.6.w..m&J1.l?.)hJ.92.(.#.......$t8VJ... .a).^b..pXv.Ny.)..w`..B.@....w?..Np..k.a.X...).T##a.>.8.9._n......j......<m,...PAMj..s..Zk...I.L.N:...8+.-..U........$&.>#.I..uZG..*.d. .r.....]......7.uAX"\dMLlDdlaw........Jc....e'.%..!.nLZe....;G.[.$.!.Hv.,..n..#...u..t.$.n.4."$!..bV|r1..aw..;...J|.0..Op............%../A......g.H.If.Dpi_.jEHH.J.g..I..r......$ ..M.i.2. n.o...3...n.M..d..e}......(..........A.g.]..QL.5*........!q\.....'.5qr4(....B.%...A.....H......v.....o..gf..;3;;.a)V@W..e5/.l....)b...A~xURH|.............n...US-/.......0..e../..)7...023!L.6...\.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):231614
                      Entropy (8bit):7.997674368104998
                      Encrypted:true
                      SSDEEP:
                      MD5:EC1CC17A03F9B5DF471207E2876B020B
                      SHA1:7325766EC1350F0E92550DE14F40258FBE11921A
                      SHA-256:36D3E0F04A4D0BCCCCC693B916CE2F310E165DEFF7822E223A4B2AC730C55CAD
                      SHA-512:639DF0EB88B541DC31A2054927E0F4E1FB5C72D2D7C6A0FA5D48FF37E6971746A547774B25E07355D6089941A0F8778D15A2033E552EAA885CB83A7E8BACD485
                      Malicious:true
                      Preview:.<....p.....z..0.l.D<.t...E.,l....~........t.O=&q.nu.<(?U....FP&...IP.Q.Y......xbJ4h..H..(.Yb.V.=<}.e..X..Qo.../..q.DC.O.t).R.^f/t...c.*d.P(Du....S.z.0.....X...-..1.B7z.>...........Q.kT.lT..TY....(.*.TDT,JT.....ys.?..4.i0.[.r.....Z.....;..J..Hi".xSpeb..)...t.6.BJC....JZ'Ek.+x>.....(..&.....k..r.Q..v.....}7.3..ea.H.d........v?......$!.rtL.N.F!!@..3.....B$8.`.~.........|. ....s..I..I.s....J.%.c?L{......dZm..x|i.}...D]....i..Ce..V.j......A.H.l.....ON...Y.SK........HHG.rH..3:.|.,K..w....'..j.Z......../...7-...yT.....v+cW..J.r.n.......X.2w5...deOH4..c.?S>~..........p...|n..(..Ni.vZi...]..;.n..YLfK^s..JY...{S.\..\5..,.8..m5....^d.H..F...t..P[.._q..n...;=.V...J.,..z.3qd.a(.f.....d.....5.W..Hz.H..r$.#...v.+...\:.A...H.3..s>..'xM.c~....%iH.5.T.]Q+nK[^7.....SF.....A.....*...V..F..4..@...\..6Ac..1.K...,.M".$.......A.....6..tl..N|....'._..uLC.k..BJ..6CjcvH.....M:....6R..,...'.....;ox;+q..PWeq-....&.h.wE.K6.K$.~!.`.bI.i....!e.;.0eS...W.N~>.6..0.C-...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):348600
                      Entropy (8bit):7.997643903655877
                      Encrypted:true
                      SSDEEP:
                      MD5:866D3305ED53843228468A92641183D6
                      SHA1:8E9DE047119A73542C67360843A938D2C423843B
                      SHA-256:523A79D957B098C36AD3A367BDE92718E587860BE5993004D93BEC108BAA5419
                      SHA-512:50C0716B1B8769E84F86B22967D8E373E56AD3600AEB149B705238DB2243386ABB225081AE89CFED07CB1E9CF2321B2A475570922FA9ACFB69F045E306748C8D
                      Malicious:true
                      Preview:.@Y.%.w....l._WoG.H[.v.`.......rE.....)u..E.x..7..1....>...ZU.m.4...9..-y.s.d....`.-.6..v.U..Qk..8.2B.S13m.z..G\......;.&....`(.x1...F.I..q.I4qV.7.-^x.Y.....xQ.y....L.K'...r....Np(3.O.p...).7...i.}1..ru....B.>@8|..d.J$.8.u#.2\..e......_Q(x.v.)J:..FN..0n.W.@Q1E....$d....:N.B.'..~I........E..8....\.<.../"5..^.!Z#3s.ue. d.......j.dt=;`[W.@.n^..dd,..ad_...1(..........HW.0#[c.Y...X.l.tM.8...x&.$.../&.B..iS..X,)i ...6..h..L..-M.Qn...$..6.Mm|}..*..)hg=.n/w. ...*2m..z...T.....W.n.#j..{P.....^xE-z..k)!.......$...Ug...~..K"....6D...E.[.u...O..z._...K..d..z.......z*.Hr......~.....~.....@%fSa.m.1z*(...0i....I.=z..B...*1J..?..f....$..Bpi...../...v....%..\...Qd1/....e.l.<..3u......"T.....D.C..V;.,..".e..O..$..!2V.C+2).d....:.]H.#QTf...$h...]%..AP@.vM.n.`$y!D..._.*......UQQP.V...|x^7.........f..;.......+.......\.!EK.J7r...._.....N0A...L.{/...n~.C.I#."%.f.Xf.'.O|r.;...9...c..'.e....L..........oi.5....2...:D.f?I.|B ...OJ(.....b.........\isFLbD...y........m..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):234884
                      Entropy (8bit):7.99811379624897
                      Encrypted:true
                      SSDEEP:
                      MD5:F6C7F04A92F4DC925163F0C1A5F41DAF
                      SHA1:F1AA0AA40E3E3DBA688BA37E9F9472239AD30357
                      SHA-256:A388578312C79CE3B310AF6E79607F8D2CDFC56BA361C048F16FD82A25720BF9
                      SHA-512:23B4C43E4BB7AC565005074017776CEDBC193F6AA4C65C056FD8BE4B159AC8A6757DFAB0763A05B91170B3E9B7EC90ABF74DEBF2CEF5C7562B6BFCADE631EC73
                      Malicious:true
                      Preview:.4...q..v.0.J.....G0j...Tg].1..m.&.m..o.d.O>P"c^....lNX.._PV+)M.<..K]+.m..}./.Y..qI~.....t.}A.%y...D...t.Nj...K..yw{....H(.......V/M.5F....P......KxU.5...?*.L.s%..PS......O.......,..Kd...a4..Ra....6f.......q `....Z9.X`0..C.......t.K....P.d...^...#eI..2{..EA.Q.q.....%O............5QJ.Y.,.*JEid(y.;....._........+....6&X.[7...,m...~....A.T.m.[.j._.U..@.`.i.dc.............V\?...Z[1........%..............w3W..Z..d%$.M.rL$...f.)...9.N.;s..p%......l.I...0..........;.(..P.....u.<..A.>E....?.F.6.j..H/JJ...!..j.y..y.^A..j..d.-K.mQ[..K...Z.X-.-m..............f......d..6..#..../Y...W.R!..DmI4J.R..DP.,PZ..(..p.GY...."...|.DyM..R.c...m.]V\....Q....0XZ.....#OL.RQ.m,.#nPI7ki<.X"...Q.I>h....2..0;3{.......&5...E..#4X.G.W.....9..3.Lv8...K...@e.3.9.<*........:.n#........@....s.?I.<E..~f..........S3.~...i..3.`.@..%.....J ....0.m.A..E...2."(n.....NU...*(D.$..)7?..r...zS........D<.V...%4E@.V..j...@.x4.\F........j...A4@-....."H.!..y....e...;.@.ho-......O.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):328239
                      Entropy (8bit):7.9981760509480235
                      Encrypted:true
                      SSDEEP:
                      MD5:9E3E423C9C155C8E488912E58324EBF4
                      SHA1:ACC956BE0274CBF274C717119A1065E1F2995880
                      SHA-256:6A2076B04946B1EA5C8B13A964B4F15183E635490533053A4F0E603D0536FBFA
                      SHA-512:129C2B5B180C72402DD9E78E83890B34F5266825CEBD92A738910AA015C4BC9CB6EE3649CD2E4F264AC7FEDAE54F09A0535A68DFD80849EEFD234236DB82E3B9
                      Malicious:true
                      Preview:..j.%*....6.(2...q$.p.O..9F.....i...J.....Z:o&.Z.....E2...&.._P....$a.D+...Qj.O..h;.Y..5z.3 .X...f...L6@.8Kn..{...D.....6..q#~.r.g..e.......b..&..3.NaZ..l{...X....x[.u...`}.\P_...N.....t.DB...$Rc.'d..D.Dz....2n..^.@H$....>..jm.+.O....y..O...x....w..{...3c=3".U.l..#;3.Z.ER!!I*IR..*I%..DCK[[..*.......o.-..!..!.%2$".....~..L......h.!.DN7.I...F.....?!.H(B.k....J1..Wj..&.}}&. e.D...%....HF..V.+............A.m-.T.D@.Y%.8a..N....LO.$..2....dd....B.z.l.........pW3..k.2...V":oF....OM.[,....B.O9.N.'..4)...f'<.M.......{$..f. .....d.l..[.J.md4fDt.>n~ ....\R...`...Hy..@.=F3.W...Xx.Wj.n...H.m?0.<....3#]....F.q...0.[...'qa..1..B..c.........I..B2..=.3vg...-...)(..V..y>7..B ...B.6]^L.:%...43c^Xjh..........$.....XB.pA......83...c..e..&.w.......H..E!...S.v%7.*.0...#..i....E+.o?.F....|.|V..I.T`/.....=w....~....n 4.j4.=.Zbe_c..mg....v..k.=..{.-......g2h$..%w7..+h ....l.hj...P...s..I@Y|B.*]^...b\fJ[j.....)....|/...A....+I.....\.........vYeP..F.mt!.+.Z\...<...M.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):250896
                      Entropy (8bit):7.997294855447496
                      Encrypted:true
                      SSDEEP:
                      MD5:08805C14A4D1FC321FA0786AB421B520
                      SHA1:48ED54C4D856CAAD982250A84F5CC7407222BE02
                      SHA-256:1B3154CF8AA7AC6781187AA1B1A43E09B5EC9392C9C893D5BA8E5135D0BBC917
                      SHA-512:97FA4543689BDB3E11D5FC9827BD232FE05B97F111D87B604CAE06C85077313CF72AF71C10103EADA6225155F9A9D27AEE6F518E0CB3C2D28EC55D20B93E889E
                      Malicious:true
                      Preview:......m.......4.6......4.c..FJ(.o(.>.HoV..7........V.v0T`..^....*.Q.GN...\L.......\....m...&.......`...Z._...W(e.Z.J....x...I..e..]..\.......>A...p...|..../..'........#E.....H$z.H..S:3...T........S...J.}L.`.....g.....z....,....K..p.,X(.y......c$...(....c7.Fa..a....U; .!..J.D...$.H....2..6Z.".KtV..Yr..Y.".KT+^.C"..Y.LG.<.:.d..q..wg..i.,:n...L..............,.B...rkP"a....6...b...r........nP..g......s..@.HX..N.i.~.Y.XBg.....[.j-]..1q.g-K^r..ST69....1gM..W#,../.b.....y..U. .e.}...Pn...E..U.......T...J.mlY........Rd..R..aEA..........zM..).$.M.V.....HHB.1.,..z...M~..@l......O.....&iH.w.. AW..R]0*&...J/Jy.R$....Z.VkAM8l.Ui.+.* ..K.k.P...h..u."...@9D......m... ..r.b..Q..ij...(.|a.I...,X...kI.N../!m...0<...yf.1b......V...r.\f.~....L`.%dF..j.U....WZ.v..G...\D.?...$V.OZ......-.*(.d.X.JW...d..b....|*.L**>Q..)7{3.@21N.6K..F..q.R.k5...n1e........v.b..{.c.5....... ....Jkm..^Q.xP./T..^......O....\_.14.$...Z..jk.qH.Xr..mN......V..DMH..C;...,...T.....V .[.g.Mr.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):330493
                      Entropy (8bit):7.997019797335946
                      Encrypted:true
                      SSDEEP:
                      MD5:BE775737B9F5EF0D7F6A44789F199317
                      SHA1:62300A9318AE49C53A246E9FC018269970FA4415
                      SHA-256:9FA239949988348860B51F174FF35596B9B1CA248898864FA6AAEBDC2D202898
                      SHA-512:F77B3F78CFEF4897A94A594F58F51135E1B9830A4244FD39FD6C9FBAF8BCEE2495469E588D7B2F034DFD4DCADB2D2A235089BF78AE1845CB479A4CF363C5B2AA
                      Malicious:true
                      Preview:.4G.5.c...........h...Z.U7.c......'.<.=X.sl.We.,+r...?&...m{...(..0...f.R........>..0..e*w1L..&...A.D.<l~.I../.....O.<.}.....2%..R..0...NR..zsg.~ ....\...*.Vj.[b]R...Uo..`<..>Cz..Sz..t.L...J..u.q.}a.n..]..A|.;..X.'.16....:n9...P.8.....x..q......m..........k.5.....f.8.k.E...Y..t)-.2.BKR[E.AD.....3.....%.'......w.^9.E2AO.%.B..zB..mlg&HOL........7H4.h.m.P..EK.".7....IO.....`.hF:.D.......[...X1..q.....H..B|ZjZ?...t..Iui.....y...3 Y5!14.......1.....+...B......b.....{........M....2....@W...j...4j..!..uC.......].Z..P.N..3)M .^.I...$@..^:X....:..S....$J$.[.8Fl.'|.8.....5.E.-J.Flp.-al~Dpi......`t.....,F&....6.z$..O:.gU@HB..[.b..I..c..+..0.${.z..K3`....s..%.\r.3..B+.....gL..}5.S.Z9..~..y....%!....M.=.P.O...L.s...u.i6a.....s.3........m....-..p...3.i.D...;Sj..8`.T.. .d..|...F.$0..).H.t..,.A.....*mIX.K.S."b.3%.X1.......l......./.V..1.0.E.Z.L.......^9.w.'.....ZO..k..CL..b...W._.YB#....6Q.R-.@"..ZE}.).U..T8.lk.Z..m......................1..*
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):349666
                      Entropy (8bit):7.997864213853345
                      Encrypted:true
                      SSDEEP:
                      MD5:461BC50F7376D8DD1B5EBDABAC228F07
                      SHA1:56AB3F455B77F20B1E43F96F048644722BCE45FC
                      SHA-256:B9A37FE51D9E1816953AFBF7542EACCA914723F6875CA30DECD521C8AAEB1A7A
                      SHA-512:92EFF72158D6DE1857399CA70FE6D7E768B1F16B9FA7CEABF239634DBCECB2E8797ABDEB6ED3B13C06AB33CB182E9FBE55E02C8C208D224306187846CE0ED4E4
                      Malicious:true
                      Preview:..i.U.lp..p.H_....O...l...y.R.9..P.}Rd:o..#.....o.6b....4g..[.6...3...FtN4...|..eDHv..dt.WLh...+.N.nT;....L#..{v.-7.7.>.:;\..0.|u.).............z...C>..=...6...aGD.......W..P0..2..6.....@&F.).H=S..=Ea.eG...(...U.m.t.HmFp..z.0.Z.#.TI...`.k.< /...Ds...%.!$.4../x(.RL..^...6)V.~5*".*<.N=..O.O..8..uj.3.x;..._..?.0"..............xs....fW...f..%K..q.l|z.....k[.X.p!.I.D..,.9].{>..p._...9'......'9..%5........FY....I"E%....+....@.5...P+......b#Ld"....R..(d.}Av<K.UQE...g|.hn...I.u...%CP&......Q=B...g.........C|n./....v.J....$.)._............)$!.....~..@.H...&k...a..JO)..V......*B@.....z.......F....l....P..............s.o...%q..[.....Y..tS. .r..o..op.{..nn.......".%.V.j..]...V( ..x.,.e~.r..L...!.....+.T..j........DF1P....$...f...mc..^...*Q..Vi}.H..\...@Q...D.k........*.....&.AY.[..K...T..3.. ...'.D.1Ar..(.K...........px.p.7..R...VP..$...6....%!....A.|...E.!E.y.E.\.p..r...vA+"...pt.[...w......78.N..T...y.6.s...{.w.F.h...3.8.:....n%.K......4
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):1104033
                      Entropy (8bit):7.999028437618327
                      Encrypted:true
                      SSDEEP:
                      MD5:234CD6D01578EA66F7C5BF747BE28CA1
                      SHA1:A75C4C3C80B3C4B69453C9A7061565087D78434C
                      SHA-256:DA3D7A427F5361A421D9B851BC435F3163CAFA6ADD4574A1B75A4D2557E7E783
                      SHA-512:15C44C6845375AC894ACB692A58313C1D3A2BB18905187DEAEB9B90B0AAF9C6F6287209AABD2F8ECD32D8F230EE52AFD196952EAA24D5A3AC3BE35CFB0615E9D
                      Malicious:true
                      Preview:.DW:yP1F.5/...!4$........j....Z...".*.'6.._>........[w..H.....!.....K..............6......g...Y.a..a..#.(..bl.i.i...>....`.J..".Z..#".....z..#A......9...O....G......&&.....".p..s....SQ......<....^.".......s.[...lLqF.k....E...EGp..&&....]..Q..(.i;......#..;e...&..Z..u..e...%1*CO...Hs.meI.CY..R3......#..b/.e....!C..:$:.%b!..B.M(g..J..P#.XH.D.@....7..[.8$..b....'...^...".3g...XD..}B^d.t..kyX...o.=..)/lE.....".b......52.e.Q?o.!6_.9...(-.......].t.sx...{zo......oN.v.<...S....i.q;..?..M.(.6.J..R..F......iJ.+.1.[..E. ..?..........`.....t....p.....Wb...~.<.....SY.1...Wwe.vf..............^...R.o3|....l.$1TR.>z=.r..2^......K...p.=....q..Y;].}.......%W...c&.L.......y.`?.....PmO.]o+w...k.(.H.+]7.Q8...1.dn..;F..*z..........+.w.?..s....+|..Z''.....+b&XM5..2-.;..y?.(.O.i<iO...'..Z....(.%"Eb.igs/......LdL.&?.. jf.....gP....8........CB....M.....qk...."...2.D.....O.$.....m.TUH..9..*..>.DZH..p.~.......m6.{.z.f.*....-,.....&6..RC\..7.... .SIHi..w'gK.S....D. .V ..}.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8432
                      Entropy (8bit):7.973833023991477
                      Encrypted:false
                      SSDEEP:
                      MD5:6D3434E5283C84A627E014554E5E3512
                      SHA1:EC78829AB91DBF6EE1BFAA3F5FC23D21669FB27E
                      SHA-256:2BF9CCD603E1BD061C6AE8919BF6B7313DFCEB42B5069EC9E91FF4FD041D3CDF
                      SHA-512:927E2BB9383FD2B4C618FF13085AD24D1E3E72364892ADADA1EB61794D7BBCDB51723FABD6DF52EBDC1B5A298C9685FB4A0ED3DAAFCA1F30FD158860FDF34D9C
                      Malicious:false
                      Preview:..!..q....\J..B....,.....(.. e....l.n..P....C.b...h7L..f~2......a'/..?B.............Y#....c4F.....Y...IX....+k..{.)..4.......R.......e..n...."..$..?.}3?...B..l+Y....J.....y......p.z......jb.8$....I..!...+)..n.F*........J=...9I.....u..........U.*e........S.......5.W*...%.,.....s.....\+....]y.W..',.g.B....!.....,I.r..9.[..3..!..IC0...Z..73...&Qs.u......r...._.09.....].....>~...I,.:....&D..L..;.....`.o.......s......,.q....WJ.#..j]......-........?5....mC.{.............%......t7...r.0.j.!>..[..95......-.].9fSttl..^.}.qY.q.1..(.......r........`..X}.?+....MS....i.w^...X.-.d../d.....&...\$.p..%.D`Cm..i.N8....V.>..A.yA.o......N..q...;)e4.. I...H@b$C.H.....#%zF*.Gj..l0*.`b..H.%..k".*"[..".h.<...%..>Z+.#..o..b.:.8.......Q<.sC..z._.c..8.....kr|!4..{.I....m.t4.MW...4.M_....:.....L[.[QU.^A..$..\.sb@.........~..M....|=...*)x.......t.ir..~Z.1..8!~A\..............$...B./).......u... .-.......y.A.=e:/...V.......n>..^....#.Y5r{z...~.-.h..@..b/..(N#..&..*n...w.@
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):524003
                      Entropy (8bit):7.996257126906113
                      Encrypted:true
                      SSDEEP:
                      MD5:BFCB0F7F3BD2CD6B18443A485123E5D9
                      SHA1:A70C213A6FBC0A917141F97E85E289A4B717E6E4
                      SHA-256:CC55C83D7CFD628413B7E88BD753EA78D286D0242F7A47427622A7589689D5B8
                      SHA-512:750DEDA8C04A25221973D3215F45B1CE7AD50AB8069ECE241FA64719D4921840F91C60BFEB9B105F6CA9CEFAF82096F2666E6170AD1C21797D5ACD329F3BD25C
                      Malicious:true
                      Preview:..q@7...S.q.....*u...N..D...kH.C. ..v#N.PP;.P.4.......X..?.. *&I@$...'].....g1W.H.t_...>81.......}..nh....QBL;1C1bFL..F.O..0..$..-._N......o~.JI4../g....Z.?....D)v'..4.!._....yI...b...M..y.Nc..O.:.j.r*.&..D....%.{.w...9U.9.F..hF..Gnh ....Ag}n..J..~..K....~..j....MK..Uq".../..D...GN...u...;7{e....Ko..95.^.G....Q....l&...4:..R.zB........n. $iD.U...D...s3..~........93... *...eP.JI....6...v.B.R...vT.u..4...p..{u..W....h..F.^_~0..-K......?3.wP....r...g=..>~......~.)f...%T4....lHR.Lr...:.....=.......!../..{...i.M......4rSDz..I.lQ...'~.A.M...O.f..........,$..#b.*.e.E.(.k.V.A<b...T.........T.zM.A..W..bh....].^.Q.-.*._...?....\"..T...\....[TR?.........A:.Y._......1._.)...!....a.MY.U.E.........0.........3L...!.B.0MgB..%.O.a?&.k)........O-.."6$......OQjkl3!.~..[R.}..>.O-.J+,RZ...B!...w.?9A...w.O...!.Wkm..a...Ln........q..1V. ..ji.~....\......xN....lX...g..B.6m.Ar.(7[..%D..O..`.J.[..@k%......1.b.HA ..........1.bP..B.j....G.6.F....U.....s..-..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2143491
                      Entropy (8bit):7.997797599756477
                      Encrypted:true
                      SSDEEP:
                      MD5:F6DBAA41CB14073E84E020F7EEB458ED
                      SHA1:765D7814DB400654477C6EDD9CE26BA5362AE6AA
                      SHA-256:80027292CE3D129725305E00152811568F56013089501DED061469A424608A3B
                      SHA-512:33F280DAA94D332F54710FFFD772DD3206B43808CC1A32EE15AF14003A6A63CC17F889D24D3352D0F7C5A699ED58B59BC822D7A1103D8AEDB08C3C46E22B238E
                      Malicious:true
                      Preview:..2...o2..v..@H..........6IT.."...Vc.I..0...:$.j.$...$=...K.+c..)(.Z..miU..{.j*~l...............r..?....S.=gw..P8.w1.(.`p....i.^n..8As>.,Y.._"q.X.a)......2...l...9.J.1...|M.E9..J.V..5..-.-.c.8.'~.T.(..0......*A..d41....:....a.k.....A8\;.........7......@...M[D..U.bV........W.`H.4.#.S.<<....W..&g7.D......_/4.&..8H.x...U....s....[....o.#.P..4..WW..n..[o..D.<.).........J....Y.g..b/.......j*e..&..Ke..G.....!..W8A...i...M&3,~{*....>.N%..r.].&..1)..LGi..$..A.bx...KO.{|uU.?(...`,..u&K..rRW...B.Q..9.q..a1v....nv0tM+H.0im.j.Q.V..S.]...&RY..E.>D4.i....5i...4y..1j.A.W...6.D...~..c]..k..;...M..|eu.....e............/...Bh..e.Js...4...8......a..N;2..!!x.^x.....r6t..6.[~.P2..v..x....$..p;..N8.......j......Xn..S....|T.f.1..4.C.H.m....T&..y...LN'.{.s.yJ.|....<W....0..R.F.r..R...#.).\.`.g#..G. F.2...z_..W........!..$.h4.s. .._..G..|'......U.I.;,%..D..k.!MP.E%..rQ.rU.R...F8..8..".O.)..p..seZ...r^*............8.C.a..y....z.O]..d...q..1....'..Y........f.U7..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2027599
                      Entropy (8bit):7.999087480883372
                      Encrypted:true
                      SSDEEP:
                      MD5:347DCADFB8ACF58C2A5A2EE7FA8B16B8
                      SHA1:DC3EFB755CEDFE61D591BCA81C2A15464C24D317
                      SHA-256:D75D192C2E0569A011AEA78BE574731A74349CE1164265DAB620D8673792C4D0
                      SHA-512:E0DBC49F2E94157ED8D6A5C24AB8A0752980FC18AA6E170E75DA71A7D9ED4C7E8F1F18E01CC3A959417C17CB1B7AE07DB45412B2BBA1BF4EB2D9D58428D22EB6
                      Malicious:true
                      Preview:..U`..!2......KH.ni......a..+........~<..?...L.j...S:.<.j......l....Q....$!......Y.(c..B.0f...^...4..Zc......................../..{g|...l.....h..4...V..%8Fx........G.. .lHb.',fqIJHhK.BS..MK...M.Q.X.G...0..6.T.8.P..-$...%b.VY..\....lS.Xjf.l.n.m.=...t..:]p.{z.N......t ;H.jmh...(.*u*.V..;.m,Y..m..0......2.!gvn.{....K...n.o.,[.C.....!.A.[qczk.1.....h....e.h........ ..!XQ4{8d....Qcpl...>.]GR_.Pp.....B..IK...S.....d.....Y..[WT.....|.a..B..(...}.Q...~..eF.K.......R............*..&+MJ.j:d.......wo.1.qi%.u....q......r.... ...<..8B.J..c...l|.+Q.....l!.jCU .....KqWp..3.e...Bx:....k".3T5...b>/W..7..r....g.......w............r..8n...K?.......m._ B..zCHJ.K.e....7o..W....W..W..Z9..`.5S.."C..?.`.}...^....O..{..<"RRL.....R.)I..T...l......lRH. ....x..a.R..S.....'5....1.P.I........m.....,..@.B..H.....E.%.E#d..iL...V.xy.......y........n....z.,.c..W4z:....j8.8.E#.....!....^...vU...b.\.@WL.=R.0.S^.-..dHq.....>7.....|..t..ga.....v..+.d.l&...=FGL.},.....,,.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):276316
                      Entropy (8bit):7.997844219226187
                      Encrypted:true
                      SSDEEP:
                      MD5:60D0A7A29EECF76397AF7A33A224E799
                      SHA1:321F9BD1C5920C8B365DD0C4227310FD2EE2499C
                      SHA-256:863179B744DD438396C0319C7B4E70B19B867AA2CA26AA3080866861D0605667
                      SHA-512:BA4E5463643D1F3098BF775571166B65C3F70B67D4E8F845A65C4D67B24B4FC7E3E0AC33296BA786D14F98E215960191C68FF17126F258AD486DE2D3B3FB3BB8
                      Malicious:true
                      Preview:.N>.%.v.......2...w.B..z4M...h".l8..m........4....A...XT..X.C.8......!*....l......w)...}.............M...%.3....f.....O.k,.Aa.T.aW....k.y?[.5..L.n.{.fT....;..j&A*..)9....D.u...5.p..C4.v^;.jc...f...A...t..d..duN.$.....!..`..@....1.B7z.>..........$]I]..A.#^...-.I.eY.T.d...m.&.E...&....(...~.J..0...J...*L7.X.Di.A.B.v...1.J.......<-...;....$....4Yl1_.l5.rK..@.65...[_n.T..n.RqZ....<>|.i(...Z{4..t)\..Eo.....gWsV.}..*...hZ.....q_of.R.F}..!...1\...hr...n....$....(j...........j:}.G..4.s.5u.]..KwS.v.....T......E!H...gER.O...mQ*V..? .#.....m.....(.(m.@$33?$..an...4..>.h?#..2.!..l.a........Ga...{1..M.oZa.....y~n.6..Y..Q0l.......=#...3j....8..Q..}..u...QC{|.........W..\.EzQ@Qy..Vj.-]...u..z)......ZK...}...(....r.b.g+_.....5KfX.Q.........1j...Xq.ew..61+YH..n..&..e.3a..&...W...f......[\...Fr..nCW.H.....m_..........V.P.........@..2..R.S..=...j...&.s..H+.).A..KZ..-m.k6RI...:Tt\..(..AsCP.!l0..>..3D.f?...........!$.@kH..!..di5h/BA..}..".6...?."RK.........}B.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):32
                      Entropy (8bit):3.691428031846024
                      Encrypted:false
                      SSDEEP:
                      MD5:17B231D15AF63FF2BFB28D3CBD7712C2
                      SHA1:AE364D7299D1A0AC987A5C95C02FC1471BF050DB
                      SHA-256:BD6A59E4AA9E1F518A12A0443C8923F894A32B23C7698504923E16CC034BB2E8
                      SHA-512:50EDA8C5E181AB14809CC677ED7F6EA9B07AE59ACFBA3EAF29991D2E17539117E50EFEDCF58E2ED1B2652DDC06FF97A828FA28C6F74D368573078BC430EC9ED5
                      Malicious:false
                      Preview:e596f913526978b3de874d1d4e9fcb93
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                      Category:dropped
                      Size (bytes):4651424
                      Entropy (8bit):7.995062562465305
                      Encrypted:true
                      SSDEEP:
                      MD5:524F6CC3C876E72F2D76E61F8F4F5E7C
                      SHA1:F32E14A5AD72BD0F5516E70E4BB4AB428D32ED82
                      SHA-256:144F1C99FF3B7A813520D8008CF2CF54E1CD26A683372AC25321E6297D04F06E
                      SHA-512:E3CF47E4B7736A1823ED321FC4764B42F4DCD2CEA321081B010854AE4A240F52D7BE944B961ADB72E1C3B90E2AB0F3276AB6CD24629DC678191129D078B6EBC6
                      Malicious:true
                      Preview:PK...........X..s[.....$......AbilityConfigure.bytesUT...Q.bfQ.bfux..............._L[U....^.g.8c.........O.......3c..]BT$l.1.1......./K...1Y.%..v@....6Q.V(l.n..).....J.mo.9.. ....{I>..w..s..xwWaP.....`..B:....P...7m.m.=.{k...Vy.l...~C..v.o.3u.....1..u&.fD.t...[ w`.a......s.f/f.s.s.3.....s....~...=....c.K]..9..Y...g#..9.!.,f.2.1.6..{0;0.b.....c.c.b..K.X..?.......t.....w..G.(..b.1g0g1.E....,b.ElO...,b]E.._.1.1G1..q...KE..d;.....N..7;.....;Y.."N6.dcN.._......_cv`....*f.b6R..c.s.s...V..1.0wc..t.V=..'G...X!....@.X%...b.C...X}....$V..d.F]..M.....r.).L....\...)2....S...T.L.).h.{0.}....%.S.u....4.TI....D.B@*.....R..A uP.R.".......T_.b.4.T.G...=..'.<...~.=..".......I.O.....p.....%.7_.........RW^m1v.......8..Y.1;"..d.j"s.25....!5...25.E.Y$;dnS..i.T..!@vHMd4\*..0 ;.&2...Av.....Y.)..h.T..Q@vTMd4\*.l.......KE...d.CVf..r..UAv...W..... ..d#j"..R.d.5~...Hq-..4...}u...l....?/X.U%....I@uR.T.......:.............5VjTs5.+[..j__.U`.~...........F..h.Q5t.*f[T?...s.*D
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                      Category:dropped
                      Size (bytes):801585
                      Entropy (8bit):7.9986398290342215
                      Encrypted:true
                      SSDEEP:
                      MD5:84185F38B1130802B70799B402571D32
                      SHA1:5DC617CFBB247AE9730A0D62B26A7D9758964912
                      SHA-256:766E0E6F7A4145CB646D41A4754A1BEB04B7155F362A5C73DAA53C9726720D74
                      SHA-512:9C22A320B9B3A9F5D7DCE57A3857897D2EB31237DACBC365DE9BC125388DEC8C8B93952C905C8C8B1DA66355E0CDFA78917BDFA60C27062BF415FD04B4184AB9
                      Malicious:true
                      Preview:PK........"..X..(P.:...F/.....en-US.bytesUT...p..fp..fux...............k...u .~.p.Ct...0.R....m.E.I5.M.(.e. ...U.].....*.....e....mIc...x,.g...l.......m..n..._8..#"..... 5.b...{..^['.t>..7[w.....|lk.<+.i..>-....,....YY.Y.....H.iv.C.c..=..."..<#.i...i9...'~.'...>>...K.<......Gd........g..|6K".....J?.J..*.K..<..t..#..@.....}(..'.4.p..i..iY..$......b...U.J&.,..gk.0.`Y.@......k.dUIE.Div6.O..4..tNsH?....ta.e.LWKk).Z...Hb.{-.fI.(..8.p@....v.._YR]...8)...W.....:z.&g.vt....<.K..4.Mqm..Y:)_...UQ...........y.Uy4.,.T..z...$...H..`.VI..EO.I\BQ...3.zt9K.h....6./`..=.8.%.s..LO.(.."?I..i\.u..../x...n..5l...E...<.....$..)..C.....'."..d....4...[w......v.3=..h.8I......Wy..~f...Y$.,t.4-......[.i.....x>..=..v_K.e.g0.9n.Hm....U..>.....Wk..s...y..m%..<M.$.&3..i.3K..-...&.....W...r...%....T...K_?.....M.y...,..#v....'xi.z...7.0^..'z].-1...r8rW[;..+..0....t...N+Z.....'..k`...9..O+9Cy..gp..x...E..._..-]N.tY.J.?.#=-...........\.u.x...e......hQ&I..>.e7....bQ.y...3|
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):32
                      Entropy (8bit):3.7150182662886326
                      Encrypted:false
                      SSDEEP:
                      MD5:97CB42349A84AB3EFA25A1923F946A4B
                      SHA1:6E2C0E33A623F6ECDB30C55CA2D00FA9A899DFAE
                      SHA-256:4D67CE874A9C315D3C940D48F3161DCE1FED2B910FFBC6ED2840E50B7B5BA6C7
                      SHA-512:1DB89D453E343AB5BAC71CAD08B43D7EF82CDF5DFCE1466FFC51F4D58E44D1704245FC1B4072CA3EBE842CD9A2A5998E33B17ADCB6774C482291FDE46C259534
                      Malicious:false
                      Preview:dfbb5179cc57dd362efb6df431b2da0c
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):15978539
                      Entropy (8bit):7.9994663068702865
                      Encrypted:true
                      SSDEEP:
                      MD5:0C63002E8A1494F1009EC59D7AD98F73
                      SHA1:4AAC4632C87668ED35244544E19DFAF7C252A930
                      SHA-256:24F9C0FFC2F0FFB2D3E7EB3EDF8FDFA7C88D81E1C957DE934C6DFB1D75F386E5
                      SHA-512:A00024D09CBE411AD3D5E4822E62726D49DA3A5878E3C6C340F4F8DF610CE135A341F958357193FA03F86CB32545D499758244DC88A1FABC2C2DFA69B83A5033
                      Malicious:true
                      Preview:...Q=.."...m.".0...!....x.t.../'.'RC.j.dI.....@W{..(..U$..}...4R....:.@..Mu..:...../T.H.a.....m.0..................?(.....w.s......$..d.ldY!.%.....D$.$.*.P.........Zmk...)9x .9....S.H4.1r@<.$S.68...l.....T...G2.....T+...h..z\/.k.uK-.z.._.p.. .rl....:#|t.9.......V(..F..6..4..P..^.l.x.q.sy.c.y#.....\i.Tw...4..d..*..... ..`g.Bd.......O..*..WN....p.T.&yJ t]T..L[RY..H.eJ.\k.s...W.p....5fT^OoPe3=HZe[^....n{3.C^..'....ca......\...N...8>....@.6.z.jL.p-..^..E....."....a....^.....3.`... .!.8..+....3......+x.K..%@x.A.C..G..........R ..!..g.7Yp.i..\.rp.HH..E/...S.S..:e.o..m.... ,W8.?58.V.a0.<..}....T...L.?k...pn...K.l*K.s.<.a.)r&h..iU..*........W...#...AwT.[*.J.*..w.[(~8.N..c.".Q1...Q!%..f.........(.L.J.f.3.S..,.....zxD.f.=~O..uq.9....|..u.`M3..uIJ'.n..9.4..}a_...;.....;..3).I.,.C.G.sJ.....`m.Q%_;..w..|.!...1. <.X.FG........^%<..Ry.....bdR..........`.I%.......:w.W/>%.>.y.9.....7`/...ce.....).5c.}.o......%.......5.).A.C.........^.>.}..].L.._......Z.i.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26829
                      Entropy (8bit):7.990884686401922
                      Encrypted:true
                      SSDEEP:
                      MD5:D1E53577CDFEC4010611A3656B5BB6F8
                      SHA1:C971A1ED52FE2B94AD056E150F9E346D8EDD8711
                      SHA-256:964A2FD1DB7E68A5BDB8D6ACEC82292DE46FDB2BD5EC242EF37953119C1E7E48
                      SHA-512:93DC91682C8497E97D38398584558C9B6D4D989FEF1274F6A8E4FCAD6393DDEC6629E3AE028A7729B2E6801BD197A8FA763CF7C55245606E6C885BA3DDA3A897
                      Malicious:true
                      Preview:SH"2.n......f..8.E...6......2.J.p.W...O.jH0A\.r".....L.Dq..3F`.Q..2...E.....MX.:...._[....%R2..%r.. .X.....^....b."..Vc.g%z......HrK"..Y....$R%.J...U...!.....Y."D..~7.:.J...0"..?Qx.8.....I.._........FFR......V.Q..7.O2.W.....gg...!.ira?...G[.k.....R...]Y.I...0.M|f.|8.Y.....mk..Av.c@...Q;.;....u.......4.Y.'...92...#....k_......D.GE( ...s.}.f.{........."p.Ev+.D..u.l.(.!..?..d...l.......j0......U.`.q.o..K......WO.f.m+....y.ay......C...O~.%....1......Q....H.p.+\.y....U.6.L.S.........82......E#f..~i....T......U_..#t.....F".O3.6e.:*.<g...,k\...U}..n.e}x..{.....?.W..g.......,.D.#.E.az........P.P..,F.(...........,....e....$.Q..Q..@ ...DEoW..?......nJ.$(..+...X..K.D....K...,X0`.$....`.......r....=c.....)...|..<.1.y.mn.*.nh. .q>.......R.).`..v.Yw6_..%uVh..@3h..........>&.H.M.V@). ..F 5]V.nuE....T..)#^p....Y.*.......+..)$M..;....L.|\T...>........*.[.=l.G../..^.{...;...&2....."."..!..db$.f......A. ..f2..Q...3..?..+w.G-5x.d..=....fM.\...5G...Is
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):14389
                      Entropy (8bit):7.924221216818747
                      Encrypted:false
                      SSDEEP:
                      MD5:5B40076C33C82324B258E2BFB7081D0E
                      SHA1:212EF0C1AB0201FD06EAA1D8B349E923E89FF312
                      SHA-256:6F5805B193DA07ED169BEE337D6FD515C1AA2E320BC6831BC4DCCA3E3A261383
                      SHA-512:D46B3A695D409BF17D7DD6ADE5D74A98FF2CFA25DADA837A24B7F8A956BE9E6D1DE353F9A7DA35BE058CE4FA31380FA4A7B60578EF8B559ECAAC0D7D8BE10177
                      Malicious:false
                      Preview:S.[.....A.T16...z.8....l"Cr77E..Lk.5..#............,...{...TZ.m...b....hQ..(.X7.W.C...s.......v[.y..v.......*h-...a.....r........R..?.G...1xP...na8q..^......J..|.pC.....p...Ej.{.....<|&...z.....^.F?.....3.{5...-/`g?~....e^........@D ...9..?.E9.WT../...x_.....o....0Q.q...Q5s......-...UQ.`..XI...4g'.`.`5.6....M..m.........0.....K.'...X;,Q.-.*..h...S.."sL..-......B.4.P*-...(.[..#.M...W..8@.......Sk....:.O|.O.^.%...H..n..{.P.e..Y@q.Y.Sf..c....*.*....5 ,.P....).........7g9.,..|&.;&..U.7.6.W+........;.^.y...h..$.X.A....../-.l[..T.O[..sq.?..$/Z..`..G..Is..P.s......io..J..'.2..n.L..1!F..s...?........Q.4..;......O..s..&.;....b.a...dK>.&.6x0.J..l.qD.-.iW#................X}2R.v..W...a.v..U..B`#T.%2&<.w.y..5IZ....u..................t.@z..P..|.O.}......A!XFo#.....*T...!; z2.q...gU.O.vl..x...A......t(.".t.F.:..3..)gY.S....q~.i......v.....{C..Ho.2.w...-........ ....|.A..).x&.WE.Xilo...(+i...3...."[.......f.......=...z.xf6P....3 .K.T.a..3u..6..Pf....[.N.Pf..,.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):127675
                      Entropy (8bit):7.995967162531798
                      Encrypted:true
                      SSDEEP:
                      MD5:0AA3EE0B3CA9010073E289786E051532
                      SHA1:04B669BF0A23A5FAE6B61C7CE30A53D809367786
                      SHA-256:3FE4609EDFF91250B598D790CE2C94561AED4153739C2E33CF16EC61DD4CA04A
                      SHA-512:2AEBA0DBCE116F05A0F505804FA82336071445469A112EB74B3CFAB7F3934367EA48ECFF774F8610D48CB60194CEAF2426658DD77D0192741C6DB1F4B0FEADED
                      Malicious:true
                      Preview:....k 2.q.*[W.A...........iDN..i.&+...c....J.W....-<OO...q.E.............K2.CK.x..Q...n.......1:L..JvT...\9GE.*u..f.P....`V.$WG.q.`g.P..g.Q.].....U.Hy..1..J....%...rPH....W&&&.-.[U%.....y..|...z.L..1.v..=.r...j._L?.f...L*.O.....N ).q..Ey .f....}1..}.A5....&i:a.......>.....<...(...j7..p.n.p.M....T.kW..]9n.....>8..l6?:k*.....+.h......`.l.p...{.Y......cW.a...W!..&#.#.#..tq!%....{..f......~..S.~......].e.i.o...1.R.P...%q D..d_..%.0...U~.......d..8))..Y.G...P}...2..N=C'.wG.......H.}...5.........P.T.....}.O......o.W.'....].d.I.v.L.@....@.......3.I......!J.]D.B..E.....V.....`.W..c...`~D{.e.}...F..,6.}D....D0..L*....X...H....H....`..`..O.v.a#.._B..m.....p..C.O.y...t.6....j_....f....L...<?.?.......5..=X. 6*G+H.h.....EL0.....B...z....Y..+Y.j.....u.WU....UwuS.]M..AM..!.. $.P.p.e...#.H6.IL.fF......8...2c.>...d..x.....NF....D;...&J...U.L........jF........;,g.Y.RX.!.%%.........R..s3..~..}K....4.~.YS...y*.j'.(E.....K.i....+... N."WNJ{a..3.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5182
                      Entropy (8bit):7.954617817940259
                      Encrypted:false
                      SSDEEP:
                      MD5:8A8D21C5AC88F1F000C1BE84D071503D
                      SHA1:BBC5A6AEACD48E7B2454A9B452EF9CA844D7ED7A
                      SHA-256:CA77FA7458C900A69E265140743EA4D191845B217722CE349921EE2AA0C1B047
                      SHA-512:B91F0E26391EFD52EAF86804B8AE02E6708CB50904881FBDA008EC92F0F3CE60C8FCD319B782E3A99F5785074D4C77B4A9D2345E211EA2F9794DC8B9D0B3609F
                      Malicious:false
                      Preview:...23`.%))...y..<.....8+t.1.=.<?...... .q..`...m0E|[..4u..t+5...;..;wEi.H....@.....j....?.y..Z....,.Mr....%.. .....NeY...P......k...#.l....!{zJ..|P~.....N6........Pq($......c..U_..N@A&..7.P..m.....aDa.$..c.....k.7=[;.$.....:.G.p..UJ.ZO.;..dK...z.........1U.'s.uM.J......\Z.....-.O......a..o1.S....S,.ey....\..Z".............y.@*....$:..W`0Yc1...~M.uJJ;....RRb.b.c.~.)q.%]..E)...%..@L!...[..-|)#......+9&....S.k....O..]@....$....`. ..1.....x,...C..D..Tv.p.OQ....X......W..(x].......3..%.+c..DL......4.i.!f.....1+T..#f.?cz...bL......."..p4...rZ]o..W.5A...w...a......D#.........\.-..%69.`~.0.P..*.m.yC.Vm.u..[....b...8..H....I.qr..a.[n.)wD...1.f..O.......@...:. .P..Ht....if.N3.4.t..u....ru:.Rk...*..2E..WO...+dba.(x5.f[K1...8N.(F.d.%r.-.#.$..\..v..,...FnUdY.e3..d..........|......i...F........z.)...uu.P&....\.K.>"{..}...0.X..p6.^..~.u.C.&....5Q....z.....1..n.Dn.HXZ..Bc.9\s.`faWhMO.B.....<.9...2f..1....x.=...q.8.9...av....\.+p....,.....,g...\
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2414
                      Entropy (8bit):7.9209920022563125
                      Encrypted:false
                      SSDEEP:
                      MD5:D80A1E40FE06029284792AFDF1B88E37
                      SHA1:A8D4939AE7F828A974393078CC1FC589DF0CB3F7
                      SHA-256:B07B8A5B89CC1F36FB7F320E661963A7018BC1A7847E7A50B1F46C95E9910913
                      SHA-512:FF794237B9D47D5F3DD633F048F97BA4C17F64A484507CA1633902376402ED61EF339741FB56187D06C462A087405823DFC527E95BEBDB2A36426A86321CE7BE
                      Malicious:false
                      Preview:.P.......BlY.L.T...."....dC...<...x;.uY...0..1..wWB..0........fw.9.$.$T...Z I.X...6..[.,@.gkj^2."...{....C.B.T....O`..J.>.......O...@.;..=F.....0..%K.>.~....!.k.6..O1d5 ..]..X.3;.,.t.8S....V.Y..=Ig$pL...R).....Q....fZ..[.6...^.l.V.B..../.q.yxr......yK....#EC..%+..$#..........&Ea.x.RT.c.Em..q.X.m..%...>?$HQ. .A...;}W..b....O8RW.I."....]9..+...JW.;.p.]5.....t.x.../...5.....m......|u....L....am+X;..N......78].n...c.v.,(5.....s;..{....}.x.T.{L.8.$.B=4B3.B;tB..1~-A.H'c..u...F.ry3e`.n..!.#...k,.xBg.._o...8.\X.b,.@.U..A...d..Y....D.#.B..-..C3.(.D."...H@.n.Vh..[....n.U..[.%....M.bq..o...d...../......#.......o/.R.p...^....Y..i.Q.@..%....".V.J.S...B..H...d>.,.1yB......e.2..\/(...c...T .A..T.e......L.5.E..8Z.*..e{?.\7.$[..o.........O..z~...k..O.O......,.*.U.`~.f............ltb..^(X..GB..Q.R..,Y.]".7.P.4>....L1..j...j...v,2.e)......)PA.e....)....5..d..i...5.V5.65.v5..5.N[.....).....z..><;......}.y...f...~nUS.4..H..``#......A.7...G.D..Q....K.a......Q4..! ......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):27928
                      Entropy (8bit):7.96679307074614
                      Encrypted:false
                      SSDEEP:
                      MD5:2888B6563931AC097FB5F396F5F1FBAD
                      SHA1:A05F5FF3ABD2AC62DB5D71B140703547409F54B1
                      SHA-256:1F277ABA1D4BD45DDB901E4EAD7E2F67F2E6AE8C1FBFF305B018BBF3A09D0EFE
                      SHA-512:3AA2B07A0A83D7E73CCCC0623532C3F985FD2AEDCF09861A33F54C1BC2B85C25AE728336F6192132D1B09C0FE3F2D230DE4C54D8AECC2379DEF723B9EFC34CF9
                      Malicious:false
                      Preview:W.w...M..f."S ...A.M.....l 2..J..-...6s_Ud@.8.0...........N&#..%.....j...9"&&...].!.J...6..t9....V..0...].........o .\..>*.......;.'...9..}..[.A.=..?.i.......7...Ue.....(.."....3.._.....:...74.....3p.@~=.4l.A3..n.I.x..=2.H.9L..{..%....~g.~....Q.........4....)._.<.....`...G..Y....\....U.........y.;..V.Y.*.&8..d.j.S....A........?...L.M..WZ.."..{b....Z.`...7..y[R.b../.....PD.1..<.cn{...B.......F.k4.F...X......i.|.y.D..~V. ..Mp..iUlkd..-)...C....6.1N.2?"'.j)1.FJd.....Q.xH....m...|.4R#...Ln"...0.s....'.S}.8}.N..S}B9!.^h.9.J..A.HH..H..}B.:!......z......G.....E.n....acy..}}....y.Tz..4=...k;..d.....Y.Y.@.aqC.O.`y%..g....l(..E.).+` .b .P7,..%.<...o5...Ec..@..8k.'.kq...'...,U1.F.....".3.Tl..h..03.kY%...o.....9#g..Y.?.h.!.}f....N...s#..d.LNn..Y,..0.....BL...P1c....S'.o)....C.lS9.Lhg.....B<....w..h...{...<h...X..6..].#..NlpS.,...>.c.Y....)..Zh.F....?.e.cfF........(..OF...~../|.....O..T....@....../......1....2r......v..WUW......P.@.....2.w.....l\.Z...*n.5.a...K..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):16805
                      Entropy (8bit):7.987296709157272
                      Encrypted:false
                      SSDEEP:
                      MD5:EE54865E27097807DA696181482B20BB
                      SHA1:226A25A4E063F2132F87A9160A99485837F20C4E
                      SHA-256:E5B7F36F9C1F0B1554B6DAD9F27DA209D8255CB3ADD05BBB9492C2FD215D4F5D
                      SHA-512:FB81B52129BD5A50623BFB1C3EDD3A336C28B196D9F5ABC3F03CD90652147967FC0B440F5816D7A433819F96B0E7542E346B2A508E9141EB385FBE87A3E6A766
                      Malicious:false
                      Preview:..K....vP1....Q....y+...4..ts.@...e .R./.l".`.......hi.B.. _.C...5k...zz.d$....N<...[.C.Hw........16`.@.`6(.F.P....A..j..J...0....J..2..j....U5....J.l.C.....h&2.F.4.`n.Q"JD..I...3..X 9zT..%.G..c...e...)5yx..........O_t....R.P.-?-.=..?....'Q.E|..D...._.j..i2......'Lk.6.........o.O.....-..~....J...U...}w...\P..}...~......q.zuN...?=...+.ed......f.LqO.H.m.#TV...H,.E.Q..t.F....69....E!.B{.R._.R.K7;..2r...t...P#.~.......bX.1Nw..Fw.P.B...."....F&@...H..pHx....vO..%.X..P..o.i....u.JP`H..{..1O..'...T.h...%...x@V"....BL"...M..+..?....hbQ>.b_..j.I....;.H%...1...&...?U?.t.5.I.3..........8.1......)g...6.P`..X\...(.zS..T..(....T.....e.$.2. .l......W.H).S`..x$G..Y......r....ng.;"..@ ...WV......W.[...............?.......q..H.,..'..O@..U......Un.......T@J`.=.......l....2..qk#.+8....l.FtG.wl'.r..&9 j`..r..g..ww...gkmO.........a.G.... .1I8:.v....t......4.{..A&'....\.,..1.L.s.. .B...wP...jF..q....H..#..+O.1....gO..s!.s%.s#.3..S.yP.y........w..=:xR.s..|........H....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26826
                      Entropy (8bit):7.988609236510185
                      Encrypted:false
                      SSDEEP:
                      MD5:BC153AE332339BD37FA85847FD6B6194
                      SHA1:C8B888657D927F046FBF6BF14D22B4DDCBCEB489
                      SHA-256:B8C18815F583527D6D557E4E08F6C94A340C00BDC7E760C23EB15ED2034FD1EE
                      SHA-512:8AF9E4DE0EA4498952065649A6D2E9853EF11501F1951F20B8A4CFA37FC85D16A33870AED06D2A0094DC8E4D5380704432B4B90B89D4729AD5A034944EEA4E03
                      Malicious:false
                      Preview:S.M2.!....BjE...E......8;.{.T...3.6V.$...:..U....K..TX...P*....o.....S.H....l...&.=D. .>_.....X...k..X.C.8.3z...!...}? .hJ..M...`.N.L..X.X.pn;..O.>}......TI..HA).Tz... 6H]..$....P....3.'..);.o(Z..e5B.7..S0D...~...!G...._m..ng/..!......BT)...i.F..V......X..0.BCW...-_.h.j-k..K..=_..d@C...F...../....!(<T...NMD..Z6. ^...<@.\xs?^...>7.x..G.q.........xUMd..s}YM$.3......w.......[...k.[.F..DO.. q.,!..f.uMA..3...<...\.......&.5..Ftu;.........3g&h?%l.].m.]v....ZD........O.`..=._Ep`1X.. ... 8.g...7.....)$_.@...iLa.[..A..!m.;..Hv.z?K..K......uwV......).,.,..4.4$$....|..uw.........(...M../J.........B.@:W+p.;c..M..(..cL.f1...*......B.../...........x.E.....>.[..S.k.:.c..F....@.....`.=.6.B....hy.[Q....L..4[^v..C^[..CTVc.J..D..P.qW.>n._hO.MH.el}Q".....i...P.1.Q.F..J..*...:W-wnZ...yh...q..w........j.@.v.S..v...H1j#.D...^.ND...+...|.R.....9;..\!P..........:..u.k.....8....B.e........!..GB..0K`?.P. .^t".YD.)......O...|w.....9-_.T.......L#IRsV..+...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):54166
                      Entropy (8bit):7.989865924820889
                      Encrypted:false
                      SSDEEP:
                      MD5:CE001A717FA5F75F071015D698729D6B
                      SHA1:CA7D33F1BA63584799CD93E2D57D3B7D3F0D0952
                      SHA-256:1768998A0E1598DB0615C17DED8C9DF06AA0A637E6D03BD3CFA61803C71FC5B2
                      SHA-512:3E17D0B14AABBB1716B58F3AB770524FCFC5969A6B20D755444CA184F64266CBF9C8023BE680EA89D52725A5CD2E51A2C4B112985F29F1414BA00191B3386942
                      Malicious:false
                      Preview:UV....D....... ..!&......pw.M..V...:e8h)04...........[^.............:....$.[.l7u...2.....L.kY6Vb.......7..9g.n...YmilW.j-..Rdr...fZ%A.....4p..UV...((.Fa...KneI..u.......k...K......:t.\.........3..5......[...?..u..NI..3l.C~.-....C.......W...{|.s+...A..=.q.o.q9e.....vW_q._a.|;~.?..c.[.....S...t?...85...3.......K...T$..F.1^_(..x^7..w.K D@E.+.QVPA%/yAE.:v.X...ZZ7qP:.u.Z...Q.+#.....b.....Vj.....3w.U.u.\.Q..@AN...IO..M.._.'.....6....Ql@.......X...D{...W.~.....mN#~.7...?'..y7.sC..s..s..s.X..9!o".<...#.n..Y..Ds..O...c......q..X.eB......W.?..7P.E*..a.#..:.&....dG3.7#....`..*\4\.PS......z-]......d ...p...@.Zk..f......F.lEmlM".....>...).........{..3.7v..-......>o.vo.2.y...f..Q.gQ`^..B4..N.n...y..&.H".e.......`..-...]./..v.2.....r..9.}fu....r.....:.S3w..A...1.0a.$....X....`.........}e.SGt....*.]..b.d......o7.....x......?.....K.C.5.!.f..o</3.0.c.c.o6....fwv.l.M*$ry...r.3...,.%Fa...)..D..e......[..2.f+.M.P.s.}W....T;.!......&IvF9 ...".F.f.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8190
                      Entropy (8bit):7.976921182095231
                      Encrypted:false
                      SSDEEP:
                      MD5:E99D06A3172C876AE31CF950D9681E86
                      SHA1:25A5B39E962E0120BE58F1BD4F8C429C465E5719
                      SHA-256:23B3937A0E99CBABB19F35377B4C018B667EA48AB1745C6FC054596B89DE49A9
                      SHA-512:408AB64C050548D340AFA5ED5BED68DE96ACFC25384BE8F13A5DF5133574BC6B265845DDB51361C238A1257CD72FF1CC4288E8DCC48C3870B6485CCBD0AFE9CF
                      Malicious:false
                      Preview:b.3.`. .e.....@(..F.l.....|q.......AU........P!p1N.j.......|..t]...].8.U..T.k...aBssSkp.[.jl.w..].>/m.....,.JQ.r..U(.|....R.RX..?.w,....\"Jw...@.......N8@...I.......)m..=:9JkJ-(.....\.........[Jqj.H[fco...9.>J.....xx`...u..... .X....R,....J.....<.../.i.......5...$a.g"l......O....0.o...*`I...P.....7.L..WTS....dc.Qzl..,.+....W.YZ^2=G..V....6.Sv.K..-hA.....}hCa....0N..E}.TU;........?+........]...V....8"..h.....c..<z.6Y@...M.A.#6.@..Xq...m..........*...?.(5.b..I...3x...T@..M..Mh ....l...p...Q......uvW.=L..wI....6....*..1@.f........2<Ld...'J.i!..h...m.hm.C..>rl.(....f..69&.1.@...kmJl..b?.$(.....@.a.-...%....ZAdPK...Plmv...S.(.pZ7 {\..#8.Y.....'..2..y#m..P...p7.v3...nv7......<.t.........=>....E..L.t..7.........:.y..m...........4X.............W.,......%h..P...pd.0.ud...."n.. .C.x(F..6.g.....a5#.*.,...m...I.P}...9...N..!../6c|.)..&"...%.bF17-....!f6.0....d."...bI02D.XBL.I.,@.....6-K.......".....X;.;....j1.Q...43.T0.w.{.)..'..L.^W...[...0......E"u
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):17997
                      Entropy (8bit):7.957218414935536
                      Encrypted:false
                      SSDEEP:
                      MD5:0A80B54CE0C55FC600DD46966E808F7B
                      SHA1:35D05BDF6F8A855AF54074B38E69FB5EA115C5D9
                      SHA-256:8B4079AEDA63923FD654BA607FFEC22219653703CAB4BBA37CC472948731E78E
                      SHA-512:363573E16459303B62B5BB32892E8B9B5E5488F1F070F3A2321A6A0D816C15C12B5450CC714CD5CD320DFE217C936D1B4B6DA90AD03BF0DE139D3A7C7AB22430
                      Malicious:false
                      Preview:S......v.|TAE(*r:.UG..|K......l.nCus....?b$B.8..I.+.......rR.Ci().*:..m..\.h.. q%2&7.-.+-......\..9C..UF..f..1v.CZ.K..P.|.....n...a........;.z. .v9.a.....z.....+vIA@..!..._.F..S..0..,..8..Q...;.....v..x....#...8.G.p...^o..7.G./=/.+.b.$|.?.....:..e...G....4..Z.18..D=.<]..w..\$%S.6*.4....|.)....4..7A.....`.6.w........#.*.zT}.$e...(.@..N...y..7...dZ.Q..F.DJ&.;....q_...y....~.V... .9............j.M......5............!2..kH.P.B..zfkjg....C. w....@..y..&..r..;NHG...Dq.....NQ...M._...D.......1.{.]..G[...'.E3..`'.J<...,.8.,:.?..!.!....r./`N$...7k.w<....+_4t.d.M.b~....zg.......z.....$$..i[..S..:...:..-&HI2*.."b...$.~..........C...~=]K.....4... ..a..V.F...9.......=N.pQ.D......./..x....K....#.....7G.C\~e..'X>.iPa._...7.+......v......(.Y..A.d.... .h.z...:..... .G_."...@7.L.:%].b....-.S.w.pr<..m.#..Y...K##..H.....<.....(.....=..k..5.'.....?.><......W4s%!.I]....U....X....U..R....q\q.c..t.uD]...`;.sE..%.].....y.&.....././...R.......a...DJ..E.T..;.f%...Mx....S#r$..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):18294
                      Entropy (8bit):7.985992431302906
                      Encrypted:false
                      SSDEEP:
                      MD5:C2DE32260E65D601BBBDB497203D1123
                      SHA1:7B69979A06A39FE87FEA64B57284611E35E96522
                      SHA-256:0DA050C111D514601091BC601EFF3F6152F94E59B92D1FB1A852FEEBF116E86A
                      SHA-512:ACE7266CD42CDAAB4FE778420C0E588BB2F7B5B8022BCD2CB0A8CAAD5A281B1887CA6F304035053F328B3AE7360BBE25DBE53C75301CDCB93ED90062E0F9E132
                      Malicious:false
                      Preview:....(.z.V......1V.f...A.8.=%.L..a=.D.H..$....g.._.X...H).<<.....{yI..).....M.1.....a.....T.(..O...^...-.......N.r....!<;..7...V......o.S......^Q.....o..W..1..Q.~+%....o..7.W5...p.(..y...87.=....^..IB^G..f..z?..;..(.(..h...RX\.. ..h...vq1.SN..,I8...yj...Z.?..z.+ap.x...S..W.|u.f..c[.L...hW.*:.7...z......jK.X.)...J....J.!D...;7.F!.......j.\....-sh..~..t.+=.0.T.Q.`xKXF..Y.M..m....h.J.......?2...\[.G.mt.U.B..!.i...l....H..1....@DD.H}..Xqo?.............`....(P.@...<...B..........Q.Z......h.H......(p....)Nv.....1...c.z...4.]x=L.......@w .....1k.....1v.k..@....T.$&J.4.N.0a.;...I....N..5....}...l.ta.....g^.....{..o...w..-..v.}<..d_....&2.MB..MBot.$")".,.&....|....pm..8.U7..Z$/P.K....d.....AF...!.D.. %d..C&.*d..CZ..2...9..,.2d.cCV0=d..C6.2d..Cv...u......p....[e.ur...Y..e......r.....'.......\.....y.P.t&..$.W.+.|.2\].........s ...AJF~......A......b.F[.>.....6.SSs}......5..@`= ...3..\.P.......T...d...@&.......O.'.6. .ATH.1!...;Q....^0&.S&Z.4..a.1.eKw..9..*
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8991
                      Entropy (8bit):7.968586760011495
                      Encrypted:false
                      SSDEEP:
                      MD5:CD0DBF95A622C6B5F4B88C337AA014D0
                      SHA1:3119E0CA50488875D875BB817A045C6B39BAF447
                      SHA-256:62277754B035A468B5F3A016DE00D0C108D57FDE72550ECB47C0720CD293660E
                      SHA-512:5E071FE7AD6A3FAD25F68D4497F3BEE0B9E141EA0E7CD4FAC72361C52ED6A3F995D139245CC363B3888E11CDAC354313D8682E05A41BDD8BE60655CBAF74D4B9
                      Malicious:false
                      Preview:..6.RQ..g.r.R+|./.".8.....~...L..Ph...X`&.t....x....-}$..<n..I.."A+F..h....21/...n......s....Z..c....|.%:.{'..8.~.m.;.a-..h"..P,....TB`...jQ..kV..RW...E..M...N.E.Ex%..../.f.....g6$B..o.9U..aI......X.5..{..7..JQ#..J#4......u...........j.Q:5....wK.6.O..{....K......^....t....@C.m ......p....-{.]_...L@.i....r.3....!g....z5...6.*.nh.W...@...6..#.D.#.`. 6.{....4Za..:...D#0q?.>g.'l..A..di.d!....}.H).....#S3S..f].{.ij...P.y5.......$SKh..+z......!.]..dc.>k.uD.x..'1h.Q@.K.@...2.3.,.(.C.@..&`N....`...@.~.............2!.....n.....@.\. ..K........@h.l...>)($.X......K..y..^IA.U...@y..h.K...?..f.f#.~...`x..xa..H...P.!.,P{V..44z6t{v.x.l...p..8>.........ol.DmlC..h.g......a`\.....g'../-......y..3.e_.)o...5hE...3.M.S.9eM...)g.8...(.(]..<....v.s.?,..9..e.y....ov.N..b.K.'.^.[..A_p. ..S.HRu.%....s?...J.*O... g....4.E.@B.*.4.=.LO....f.Q80..1.........c....f..w4.......#..i-....~mH...nyA......1...h.....K...RT2qL......I....IfR.Th.4&../.G.k.!G0y....0B...9.5}..../.<
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):705817
                      Entropy (8bit):7.992464684949763
                      Encrypted:true
                      SSDEEP:
                      MD5:B7B3D7FEFEC0380FA7AE34F380F48CC3
                      SHA1:57E340CF1A428DA8A926B03933381B059DF6ECE6
                      SHA-256:CB2BA6123A89E6122C627E3670BBA486ADE55B57ADE2F41A96FF0260C8FB2536
                      SHA-512:1AAB4089CF73862C6D2129FCBE2E6E3931F7ED8875C2943CA9D77AF102693E8D4A68AA4277AF07D3CE7E708365B53324B0E50AF6349C6D3FF338A6333A5F4438
                      Malicious:true
                      Preview:.=.C......m3.#eZ..).&i.......}.....cc.....,.!.D*....I.E..n....1m.=.i.!..........I~<......r.......^D.94i.Tk.4i.H.*.....F..b...oe..G.2.u...U2.....(.!J..h:...%.t.0A.....YB........F....'..K&j._u.,j..j..9|...Z.D..b.....-...QA..U......I....{.l.#.A#. .N..^.s.PV..ke..rcL..v.$.../:6t..'m:.....X..EO.f|{.A.bw..D.-s.Q@$.......$...B..%>.....<..P..o..../.>....W..X!...>.@.....5e.l...[&..+...Z0.MM....o..O.,\Q..{......:..`&&.....HUM.e..I".W......dJ.Z.aH.?.M..BN.7.4C#TW.%M..QRsc.6A....Z.\.i..e!D.zd.;Vl.+.f(...=%....j.....(...3&X}t2)o.$..b..h..).3LV...a.:G$X...!..t..<.]........r...A.i-..w3V....Y..43..Sn4n.....O.K.|.......rc.3fnn.afQ...*...|.....:..$[..ND..@.b..}+H..... k..f..s..x...8.....qH.Wx?.#...8#J.V...<HY:....~....D..M.1Y..M\h7...^...p.f.-....h8-...A...2.h..w.TK..I%.*.........**A.a/*..6.q..z....G...M.....sf...0r..0..a.Q.af...!:..1$"...3Al....5.7r[_..7..g~.....h.....5.71%..~LM.}...|..5........I.G+_..'1!....U.....:+..^H......B.B.X.....|.0
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):380481
                      Entropy (8bit):7.9975993106861
                      Encrypted:true
                      SSDEEP:
                      MD5:EA89FD703E5943F1DB2847C745E340E5
                      SHA1:1C6638866A328C5A39E5FA03D464AF1B98B575B6
                      SHA-256:F83DBBB4E3B63DAAD87E1B0E4BA3D4F522006752ED88E10C381C6C51A274936C
                      SHA-512:25F178EB00EF794716F11E0FFDACE9A8E79DF999FE9A214AD80A27E02E4E3688A4B9A0B014B003E1161E9C1ADCCC1D0571A0C37CECDFA444C8D2D8EB8A2F2D07
                      Malicious:true
                      Preview:.....2...@;.....5M..5lS.e..=..}].J..<..a+......9E..n4@M....H.......4..3V..u'.........R.0u...`....Q&.A.i\..97....$r..p>.t>.A...!9%..y...!.6......[q...L.s`........ 'G..)...(..*..3\T3.....<.:..`.K.?.L..a..\....v{..3.3..g&..T.;gF.T..XFi....!.V.RF..Y.TVc[I..H.._......}.`G(..EF.7.c....Bw...]....<On..{..f2.37!b...1jJS. ..?....`..4P.>..RjQG.+..`."..zUj......4E.,.yO.'Hmj.t..>j.......#..s...&#.H......ewkw...5..)b...(....u...A.Y7]d.a..k.....1.J.iT.d:$..WS.S...N..I.u..{$.Z;%.ml....)..).9..`.dj.. NU....-..ww....89P....C....>`.0.........u.y{Y..[g.....qu..\...n.C:D.no...M.t|.S....TBt..V:HX...........r@..............A,..........~..*.......#6.m.....h...<XCSi9......2@v......1..JZ..2..IShl...d.z."I.JqO....}Z.................HIQW..g>."...>B23.}fd......$.....W...!n.......nF..H.H/......_....g=<Zz..-KKh..>z.b..3TB.....v.W.ut.H.*]...JtH.......\...dQ..N...-Z....U1).B..o.O.......o..0.....p.P.Pg.IM.7....DTf3.f....2}.......}..hf....YP43D2..lD*.[....3C.[.6.i.%-..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):124390
                      Entropy (8bit):7.994415714697487
                      Encrypted:true
                      SSDEEP:
                      MD5:0B03D02224A696CBFCDA757E94FE74DE
                      SHA1:BB7B91AB9AFEE95C73B0EF890387C9F0AF59DE7A
                      SHA-256:BA70268D3D2C3CC68DE5A445594D60CFEBD4B85875A743E53EA10F8A2A45B7BE
                      SHA-512:23F46A3B32340DE46AEB70E03F655238CC931600D6E3BD3AB71718FF30C78E4465AB43323E47129641A42D8068952385077E21E7EF0FE3A253C2BA3D75BB5762
                      Malicious:true
                      Preview:W..x...<l.*<.7w..: .[..b.a)......J.m.J.m.....u.....1.G..R....4... ....R.R}.h...nM.u..M.`\.d... N.....^.......s....v.O..\z#..qQN..p.%....=...l....'^..q....d569.[s.KKv....+..MR6....H..b.T&.p.....X.J....R......[BB. E.I....p...p...........?.'.......x...amB)....^.r...C.?}uG*..u..J.*...,.....<|.....yV...9/........q....XN..;.0.V......3.4\G..%.......( .....a.vX......}....d...UC{.....yCP.n..D.-...`..0.b.........A...4..!.........kkp....%.W..M.s.o.%....B"..I.M.....2H0..M..#iz..:..Q.....*...SXg8...U.#.G...xq`.......@qpqP2....M.:.A.>...T$.H..V!..T&g....o.....g.Q...Yx/.......a.`g.Z/ap..Y,.....%y.H.3...C..F.!......uq..*.T.w............bt[*..."...$...+..Q1*....K;gb..X*.1~...21&......n..H....vs/....S..[k)V..[.kM...!...0...H:.....u...{........+.?B.'......"B6...ZX{#!$..Q....K..F..L...qX.&..X..mz..~n.c.)NB.5......q..c.a%...nM..9RB.\{c.x3..I...n.....P..?.U{......[T.*MK.....S:.....>.k.........)..p-b...L...."!.........P..E.. 2...cH.p.+.....O....y....g...ZA9
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):198952
                      Entropy (8bit):7.997464986181523
                      Encrypted:true
                      SSDEEP:
                      MD5:C4082F541D9ADDF874262203EEACC19E
                      SHA1:D0192C2A3B0BF6FB79B54B93F79B29E851029A51
                      SHA-256:070FE3518CCD24B356A16422A116B6D5AFB9DC9E8678D85412D64226CBDBECA9
                      SHA-512:E7905D785ED390B3A4E69EDBFB9A70DF255B4287A5313D9650D859BDDAD543C6EB4C9C226F8FFFB050314998799D405316F7741736A5427DCB5D3AB0E2E5306C
                      Malicious:true
                      Preview:W.o{$rw.L..@...K.Tld...=.Q=......).z.j+.D.......,.........N.....v...)..D..`&BI....[.k_ff....|.d.@0.s..y.f..t<.p[.=.10. ...F..*..z%..dd.".6g...;...Y...L...+a[p.S.cJ=..f2.Lc.Nl..$;!......lWX.......(2.....|...<.n.g+h.........TB...O..h\n....*a.J".'.O0j.......b...5P0g...c......ib.4$2.l.R.....S..N.M=...p2....4..v....&.X....._F.A.b.....Y?.............!).2....#...._.V_.....o...x.......G..|......kmZ.:W..U..u..g-!..E....Z9.C.q&...Z.ru....H.u.-].j.}>...w..H...5....L....q..3H...nGL.a{S....A.m....7......P..S.J...YE...)?>S....h..je.1.6..G...|I...G:Q.M....{....0[..~.]..WD..$..u.R...i..Wf...T/^.a..P....Iy.....G.sD.Y.,...<.M....e......w.0...f... Q. D..1.....I.odY$.&..TX.U.Ds......K.|..eg.'.z......VZ...%%!AYpI:N]H.@.....n...., .,.R..$....aQ.....uR.x.2u......U.`.-b..Om.....?.x]..X.a..3...)8y..F7..p..|........(."]-.."8.V+!.Sx&.....'.v".P._x.[.....y..tT.."$G.....y...hx.q>V......C......N....3N...3.8V..#..<C[1....q...Q..}&..4...8.....a-.4..^.B.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1741947
                      Entropy (8bit):7.998010904421685
                      Encrypted:true
                      SSDEEP:
                      MD5:7150CB1787389031B9BC9F406A31A815
                      SHA1:BA1A020D7AFE44566EB7ABDA1E45FAACB93D5B66
                      SHA-256:FFB4693DE68332E7AE3A78BCBDF9B6D0E3BA544798639ABBF38D26BBEEF5CDFB
                      SHA-512:1665A8FFE50621926EA938BED22D076B58198E0823C4D3E67B4FA38B3BA68F13006EA879321460179CE504E8FF528F5BB041CEA7C69541AA0E613EC997E70521
                      Malicious:true
                      Preview:. \x..5.U..2..D49.)"J.....{'.1....|v.p;.n....<Q............+x.......e....j..U......$................y.'M..w...V........(...........u.........O..j..(,..Z,.,WD..Z.....*.....D+N...%6.C.^..h..omS....5.th..F..q.N...L6.......G(,..8p.X..7...jg........W.9 ...z.....L...h.....3.Na.6.#Ap.X.q~.;.......Ow.t.5.n..e.\..o.l? ....Y-9.s-R..jP....e.P...UI..8.T.P...sp.......HV....*.....Q|.....ppp.a..Y....J..9'=&.75C\.UK.(.&.+...,..D.ED%.G.....'.b.}T.i....E.xe....5..Q...g..r...Du/.|.k......N....n4)...xI.l..._.....E......Y.......=S.mv.V.+=..........h....)t.U.d..{."...L..$bM...P0NF...md.1..C.r....t......n..u....r..Ev.sqO|[.Z..m{/H.C.$..UR...t.........;{....b...M1..'=L.. 7...$.."..bB.e*S.H..=...O).r..h."F..f.[..|..+s.....v....(...H.!....)G_[e.3.:a>.4........:...6h.o..{..w{..].{...{.G(+.....>[.....`..j.....?qy....b..\.G".h3...............Il."&......vZ9..==."?..a...g~>.2D.....H(.sC...R.v...X.. ;k_....E.e...E.3......J..C.HSu...n.X............._j..X.K......F...u.'
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):68928
                      Entropy (8bit):7.996431270665856
                      Encrypted:true
                      SSDEEP:
                      MD5:45B9BA8150EA507BA174B8A773D3ACC8
                      SHA1:74EC0B389070A6336CEA0C08D43B65A499F34E29
                      SHA-256:0E9D1829248A16E70DA0092FA35A4544C732FC9CE09E482722A009AAF3E0112C
                      SHA-512:1553023750D139075E920CE591C31AF68943A32C03F0B2657FCD4FB05567E86051945F78277249182BCAA4BDC5DC818F8AA6F32A39F0FE7D8184BAA3F3076BE0
                      Malicious:true
                      Preview:.....c....U.J...a9.v.....r..f..8...$q....p e.L.]...97.D.A1.JS.6,..BR. d.v.5]Z..R.X=.$%...!G..=.U..<... .gb.Yz..;z.s......v..2F..Fq...C.x.....R.P(_W..m.C.mL..#,...M.............@6@..d....A*.&H{=C. E.T..K......ZjT..rJj.....9.M....<|;.....&i..d..vC....8.o{...~.8p.T....!JH....`".U...(=....MqMqy..e...[..1.......{.V.6..P.N.FE...B...l...5o..e..P.=..u...MLD..U...'.E.T...1.L..Z...W..D..3!...E.....W..;.).H....lk...{l....}...5......^!(...u.....w.`....*....i.i.n9.............*P...=.H...u.Q.{....o.(o....3.x.v^......d.....M=.!.....U.Z.B..{..,@.`....`.....t...8....0.Ce..V.m..:.V.{.}$...X...OOT.......^ Kg...Z}..p....N.e*,.....K..}....6]..Z.R?.Q.....J..00.....).U.l.....O...C[..3w..`.o.R..R....Y.=...!..l..3.}U...S]...j....QH......a.l.C..8B..U...f...,v. D..[.J]:.1.G.5J....;wv#....w\GJ[!.....0...aJ.4.........'.eo3.5..l6J.2..W.e[..LU...f.f;5.\..h)_yg..0..l..7..T.d[._.zwA.^3.T.z.@[M.W..YD........x.{V...5...1E..AP. .(w02..L\.-B.....O:....-..+..e..Y....g....-=e..gp...h.$
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3782527
                      Entropy (8bit):7.998505254688968
                      Encrypted:true
                      SSDEEP:
                      MD5:3F3FECE0C75C723DBBEA8C70B340165C
                      SHA1:C44749F985F557A57D2F97116CA52525AE34575A
                      SHA-256:BD820D951EE56947E4BA057FC92BCD9B461591D326782F568C60E23A248F0B08
                      SHA-512:74F62325C6DBB6CFAE2FDE08A9332898B3667A465E23169F90F5CD3FBE6B9B1CEED3FB58A13B25DE16B9471DF7D546FEB5D649BEFB04DA270415065CFF0359E2
                      Malicious:true
                      Preview:...-}.....v.Y.v..R...M.5.QSx...]G2T.....c[.f.J....C.l~...A...I.H.FG..u....i......&w.k..OD(..-.@.L.......................d.|..T.{...4.43..f4:ftY.eK.e[B.:l..3...c..`l..C..`.b..B d.n..n.lv...@*(.`0S.Y..Fc.x.:\.R.e;....*i^,....R.L.0.=..T8X.b/x4.x..D....j..|e...`.`.g.q.h9....h.'.F} ...\.{.@=b.D^..:...T...).L#.1@.v.iWr&....J{..M.Y....6OM@.....k.|WV.......k;|y...v..........W.W.!G..!. <..7.......P(...F.n...x.....`.#....Q`.?..S..a.....y=. 8...Wh}/.7@.M.L.....#J}O.#...Q%....1v....")..;..O....sN>.C......Y>....B'.....a3.s.......%.x|Y.O...=.4..~(<KC....g!(..t....)~..V.g.6...z....zN..W^r...;..kW..\..Vx.'a.....Q..R.nvv........\.;..j.I..z..TW.UHF...&...\;6XX.6.]a7.@.=.>.h.o...8....../..6.......F.z.T.~.[nd.E......f ....f1...*..&.;.B.o.9...V{....OW.1Di.[-*Q.;2^.A.4J6......&F3.?.vOz...q.+....:.3.F..S.<..T.Z...%B..|........]..g.I6..)3Bl..s.j.#G.+.....V9.#tQu..f|...u...yg..J.fh.....U2......%..k.e(...7.V..R....f=9f4..(`.t.&t.).....^-..[.~....-.....w...G
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):584036
                      Entropy (8bit):7.996632276672276
                      Encrypted:true
                      SSDEEP:
                      MD5:104B5A95DBAF512102ADEF1839FBE491
                      SHA1:4A86CE9ECB77A78D90590A7C123F55B163DA2D4F
                      SHA-256:DDA24B086A24545CF41A6BEA74AACC35A603E0BDF902BD2F8A6C148DEDC15404
                      SHA-512:1F1B81A1C22E6A69AA17D84FE758769F7DEA5B1891EBD3D40F9AE098296C5F06E46D8F562CEB5F034A9A54934FDE98DAF83927E98D7CCDE1FD1DA7E789D6CFA6
                      Malicious:true
                      Preview:..."...r......^.u#...MZM...%........$..N.....P.u.=~.hq.../..1..N....7...........6.v......HB...rI.Vj.....a )<.DL..`.H...r........L;..<...O...y".pS.pa\.._.....2&-].....V..\xpP..i...[........ l..Aqw..)Hi.QF.(6.Z.6.]T....^S.F.(`N.d?.>.....EN.x2.}~.....u.m.u_...[.U..,y[6.Y... . .T.*..'......P#..}..q@+c.%.[Ps.(3..p.J..f9....~......@.|..r.7.n`.....X;=....o.G...N2....].....d.......Qd..W...%..Z..n.f."..OTl.j.7...+..L..2.@'.EX..]..b....\... ....Q.O.....t.......I......p.#*....lo..l.-.K.&.........KV....9...P...+..?...75Rk.f.v...iw..5..U..6....E!.n....A..j..n..,....&.v......9..c...ah.Us...).o6. .f."e......+..|7A.0_.f..f.AY.3.v...^k....M..ne%..........V.6._.9H....$..$z|...F.cKDf.lJ.|_....V.<{..(o.Pj..Q......^.Xwe.........k"9.......x..(w...hD2H.F.e../........7.. ...f....m.^.......E?.......@..Y>.....J..Y.XM../4vM,(_.fA.g...^:..b.].Z.E....c.w....L.Fd7..d...... d0...PU.Z.K..........Ov....u.7/.K.Ki$.J(.T.,-.BH..y.!jDJh.z.....".....G*pb..l@.`...."g.vB
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):66670
                      Entropy (8bit):7.993829605593431
                      Encrypted:true
                      SSDEEP:
                      MD5:096977662514D630731361ECD810DFC7
                      SHA1:D77D6A51969A8A8E45BC09C4EC7CABC5FF9D3A10
                      SHA-256:C47CF0A2F2A4DBAC973BF953C35BDDF9AF19AE1AD1C28DBC96B99A2901ED25AD
                      SHA-512:34A067B29F230D977B6D3B7D9CCDA7881DD6394BABACB959FEB420187862FD113895CEDFF4A1EA84648F7ABC7499D16C405038F4DE7C3F026BCDF0887CE0B650
                      Malicious:true
                      Preview:WG.X#.bQ.\mGU0..9.T....S........w.U...........\........ .Q+....n.g'..7...DN...lQ.a....l.C.%1..+eM.sG.*..A.E3.0.....?.`...Ub.+...{...}......Jn.....C...P.........5mY...&.JN`B...xl....:N<..y.....$.!..X...B....&L...S..S..d.........s...k.fm"..'..*u".$$$.4./....p...(~z.\X.L ..d<.......Re..]D.I).B..@...6*k.6.....2(..d:6...O.....i%.v.9.1...qV?Y."?TO83r.,F.m dD....{. r...F..0.2.z.6...H.L.....FJh...H..Ek7Uw........8?..&E.U...(..>...PW..-..+..uE.J..\.(e$..x...d..(...Y...N&'......?v.......R.J..`..r....db..S...L .i..@u.t%.r.k@...6......-L.X..../..$.<...A..]..(....}p#...f.V...]..fVA./W:s...F.dO.t....+....`.r..o..X...T.eI..k%...k0.W..'....H....[.m5l.<...F...>..W......`;..a,K..h..M.....X.h.l.&$3s}....UA.F.Kc@u...3d.....n@..|d..6./.A.R.b.,N_..A...m..I..._j..&..tQ.-..H3.2..N.EgM.DA.. .$....%{.'....M.W.b.1>...C...N...o......\9...6......h?F.s..E.[.E.J# ..M.M.i@p...#.(.V......p.w.+>....o-.l.%...f=.V..Gn..fv.)`.`.M!I.e....rW..'.#...._&.1.......P.OP......Dp
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):647996
                      Entropy (8bit):7.998004396713575
                      Encrypted:true
                      SSDEEP:
                      MD5:F3393E4C5F0D7F0C5CF3807207F7B5F5
                      SHA1:15587C541C5CD50C4B4F2E3FFF4B63E86C3DDF08
                      SHA-256:86B4DFEC6F48A5F72D6C6D75589354E20389BB7DE72D78BC412AD69327620C19
                      SHA-512:6238E10DC53B265882B4B0EAA14A243ABDB9341EE43DEE2C5B80BFCB33034CD6005325C3E245D1F77053E735D216B6C78380DF62E0E9B723A4DE717DCE3A8140
                      Malicious:true
                      Preview:.A..ID&C.k..Q..'1.m.~.....Q.lo.D.DF.^2T.Jhh...K.j...c.6..|(....>.... .5...<...j.......'...tvIfv..wp.~."&...j.6.)...(:A.D.=.:U.0L.1........J^P.....F.I33..[...|1..+o.z..v.n.*h.U..z[..........k..A.@....3..r*i..;.Q.b..=..../.]A$.%..I*.tT.S.I".~.7.9...f..+...9.F.LTd.._...s%ts.x..M..&.^...m.?Az7.z.=..F-.}...!....Z...../.?...>.Oo.w.?4.."y_~..ny....2{..DC..$.#...d...A..).X.......T.SMB...&.e.f)N......J2.'.$v.:..%i.......W...6.....z.6~?]A.A..@....P._.Z...W...rU....=NPo.'.As.......Kx.f..l....y.b.{Dz[.m..<"d...0a.~.S..iJ.R...8..{...p..B..@3!V.)6.....h.Z..~...O.=.3/..rX.....3.x.7.......s..t...t.f ...,..^....n.Z2....q.......+...!.7..\".\.0n.U...A.HH.@...I.@.)..=#).^..mT.G.O....O......A.%.........#.b.bTH.*.*.....Q.01&.......11...#_..x...y..7...."5} *".H......Bc..k\3.B.e...fe.Q...&..m.*....../...pIGC..y.s...CJ...^o....J!.#...e;...xM...q.L.U.?....m6t9.a}....9.....;....i.{~l../K.\...v......{......?...(t......r....w.......u...!......u..{...N.{..V.....k..%w.`
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3373071
                      Entropy (8bit):7.998601990968075
                      Encrypted:true
                      SSDEEP:
                      MD5:3CD0FA10F78341C23880508CBF1918AB
                      SHA1:54FB10BBD37AB9056D3CFCFC5A4FAFF5005A2AA9
                      SHA-256:FCDF89279CEE6831684A6FF44C4FEC3609BEA5C4CE47DFA536F1873C5C1E53B4
                      SHA-512:7FC2421158111B7523713224E42674692334F19D9D51313102AB94BDD1C29459F097FF6DD683A0D5535DA6432F75FABE71131CC05110C21A2B6820C1AABE02BA
                      Malicious:true
                      Preview:...7I.9.W%.. ,fBy!....M..Z.E`CZ.hs6.A.gj....6..Z.......b..\..:..O&fa.o.......d..g]..G.2..~I .0..#,.P..@.B~...'....+...PZX..2.....K-..lW...8I..g(JY..%|G.#..$.DO...u].b`7....6.m..h[a9.NRe.&.Q&.-....:'......c*...ho.=$kO&...... ...88.<..........*..$.'......e.s.G.F.*.D.......xu.........O...%>.L.._~U._{(....W(.a.=.....@....;..}w. ..).&[...a.LlJbP}/+ka%%..*XX....x...J..dk....O?.......B@.q.;...^".Cl.L.kH5=.A9>.D.....":<........x.;..x.c..T..fFr='r.+.39.s.!B..B.AHB1....".. w......M.Q.r..*.l...0...p...w...(QIv+5t.c$;.E..t.5......{dh.e.2..#.)....M.d.&...*.\......pE?..-B...Ee.....X.j..e..E....Y.s..G..a.*.a..GY....R..e...-.B..w....../....q......5(.rj..P.r.6.mG.8..6b......#.#......I...X......w.....x7...^......s.r..5,0^.....2egd.A..HJ.aW.en.b.R}/8.V.4.jS..`.Q.D.+z...Z\.].....E-..>....n.........%..}..%.=...$........C..L..Q.)r.H.........C.`.....c....6B;....H...9...*tk...x./,...#....x ....%i.A...K.)....c:VL....<.w.og4...P.q*. .......Wo.V.....TG.N2..1...5r..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):494506
                      Entropy (8bit):7.997711860061894
                      Encrypted:true
                      SSDEEP:
                      MD5:FF035AFCFC94B645CBE76E264A9A97D2
                      SHA1:33FE729C63FD2B2670C8C212F73BEA7576B348B1
                      SHA-256:42A86EEE49E9DC5B64FFE57E1CD34BC968593DDF6CEAD8E8AF7B283CA04A1577
                      SHA-512:73594AD5EE9383695925E8DAE25003B7DCA479675618C3F15CFB308C7FBBE6D1566943BEA0D138A71B30A1EF550C95BB010CE6D6F78E508D94C3A728E3783176
                      Malicious:true
                      Preview:..w .P6...[..A..).....{7.m.v.q%.c..>C .c..l....G...........,...R...........y.]..}..o.8.F.9.F..IL...`Z.*.t....VF4..m.....rs.3..<.2.b.t..U.R.f...k...x. i..2$/..L...i........tt.{%.q.U..$....o...[..v..].e..6o9.v....qAs'y..Gz.'...zO.p...../........*.4<^..o&.#A..c.c.v..`..+.@{M....q.z..B.`..;...}..>JD......+Ur"@......O..zu1#.).....z.8....Y)A").<>..;.o2A..I.eL.........".0M......Z....[..M:.........../E..%.Io.....4.0}=...ND.75U...,.=.l'B._&;mp:_.OD..\..S.5ut...Y.u.*.a2....XdPOc.$...d.NI.]..].)A.DD.-t..[..Ml..GS.*,&C^i.....5.!.f...!.a.>...F..R..Mh.C}.`...d.10.W$wI..M.F....u.....~#.0,,..&.v.........a-..F......m.0.....r.D..B..)C4.......?i.R"......W]5i.FA)..H..p./...|.w...>.e..lC&@.....+l.7;...p.{.g.B-..z..n>e8...D...3.M#.5.#.h)3..0t#rm.M...}.\-.D.e..%Ou..l.........Sx<..lkz.7.a...L..3.{..........n.p.....P?...l._..{..."....k....t..........I.T.C......xsb.H....CL.fb.w<.......?.& .hD...$...Fr.P.F...u..r.`.$..........F............._.RC..B..X.. ..\...m..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):787434
                      Entropy (8bit):7.997368943237761
                      Encrypted:true
                      SSDEEP:
                      MD5:B18C811910D191D62A31AD0B69441290
                      SHA1:5DC328AA1090552123A248756D4C49EEC00727FF
                      SHA-256:87F38B1B864E81D7FB5ED87C74DB550DACB827760311E3E0D08EBE681D42A9A4
                      SHA-512:CBEC8B1A7EA1D1C1C8E0BD009BF86AB152DEE9F6B5ECFBC806C486D48BD17ECDD4A7E8D51691E6193980CCC6EFE990DCF919794DB0EAD3CDC40343DAFCC2AFFB
                      Malicious:true
                      Preview:...2.<...:.;.`....m..)..~. ......'.&.G..r.$@K9U.|....Qb..m.....Hl.......g...<... .5(.J..^/......!...C...Cq(.E`[.x@^7m.2a.EA.h.iT..S!ri......S..A`.R.%..........Q$>Q<c.qb.a......'^......."..*..I....E=..|...`.Q%..iY..A|........b.^....-......5.n.y..A.+..vSF....G...1g..&0.;..#..-....Hor.....w*A....@...y#~w.>..*..^..+..<...|..M...%......V..2e........f...P...A.....o...v.i. ....E+.E....B..,.c....5...X(2......P{.M..e...~.@F..Kt.......[..-j.......4.r.UR)it. |.#H.T..05.....b$h9....ka<U.W...C]...s%?. ....#.to......b..uJCv.).).w....(..X.k...tnR.....TN....U....R).....d..~......1I."i-#...y.u..N*..H.e......C...H7.]..DF. ..p ag0.rw!..-a.*VY.v.Q.8.......8Vl.]....."].u..;.........}........cP..W..Y5.@..|.._..Ns.v'.......4.!..AgI.2C.f....$..`.2..f.1..q.[|.........(.Gg...x.....\b#&....><|...../b..IOv..TmLg..FVi.o..g.[...U.ku..4u.].....rt....c..HU.!..Zm.P#......Y..1...d..g........H].K...8K..&m.L X(I^..}.htG.X.`E.k_,.....V.m.`Y..c......}..r..........#..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6343524
                      Entropy (8bit):7.991592460480224
                      Encrypted:true
                      SSDEEP:
                      MD5:F9ECFB71DD45CDD5563263E1C308E44F
                      SHA1:9FDAA370D3BE3D758E05A47348D2F81B632D331C
                      SHA-256:45F9EED86D90805F2900839B777DF37724F72ABC0982D9BD8ADE39EABE78F024
                      SHA-512:48DEDE9E92CA244793A3B66E3C62A04E047D64FF0998A2ECB5615547F1561A40108FBF1C2C4F61E1C491869637E1C7664998B43355982BA62E0D385C739A8199
                      Malicious:true
                      Preview:...[...........a.~o.m?....a........q m.I..+....1...n........?.U}I[T...f..U0I.........W.@..8.o..W.......Fu."1B.......^...7.$.C.........................4..........{.B.2.a@..H..(.C.U@..Q...(....F...M..1.i&......~.7.s(.B.'.W.T......9U.......A6v.#.a.or.3$.-.......1..8..S.y<.'.6....$!%IF....j...i2..e..2.f......4..Y..r,.%o.vF.....Y.a....%."F)W..Z..6EE.....,T.>.Z..ZUu.N...5....y.(...Mh...o..wP.5.m9...V.e.-.vt8I..:;.d...co.Z....9..'i.........$.2(...R7./...S[N8IB.F....]....Q.$zsr...6.Pb3.+..%..=>^.P...o.0Pa..6.8.82i.lA)....@'...M..b....q...4[$=.d...g..f-...'w./..H....P*8y7.UDm.e..zV...h.....#..,............F[x.....p1}.T...]."...i:\}~zw$5K....h..=.t..h..XB.\).E*.7..Wp ....D..J;s...:jq.zj.Ii..y\...EZL.j..._q.lsG/O]..0.`u.*.....&1/{.J.M.a@.5.p.?.......r.Q..j9..A).9.(.k.gs...pa.C.V..........-....$.oQNf..7..c....G$.l..x.....C.:.QM.:...........Zav.......]..(..$..8wCQ..39gr...9.^..\M..d..&....?..D....Q..e.......b....#.aX...M#.-....eu...x..'....=....8..*.^...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1314871
                      Entropy (8bit):7.997461596245326
                      Encrypted:true
                      SSDEEP:
                      MD5:E439204FA3EB1B1A4858C0C3F3A1A3D6
                      SHA1:7757A3FB7BD594A9393957BFC50F9B18175A721F
                      SHA-256:B2D1175642BEFBB6EDCC1E99475BF0667D250610DD4E0608036C00AD6D6F32CD
                      SHA-512:0A62D6DB78A5DDA21A8931D7E78684C76682252515621A43524700C8791248DB74B5B9B479719CC390EDD9ED5EBDBA1E649502AC723D4A2FEFEC64DFD1AABC93
                      Malicious:true
                      Preview:..{..D.c...0....P.u.H......k5/.w..Q....8`.-.].....4.M.A&......@......n.......wR.'t...... $.&.f...n.7mZP.J.:..m...,z. .d.W.....Z.C4.).hdc.9.....h.i.T9.T.R..c:..)4E3RN.....Y....%..u......3n...".d..Z.R?Q.Z.."BWkP.".eY..G..PL..).....W.b~Z,...%.kqaK.Z1......[A..d.A.c._..^.7i.c..1.g.\$r..YY.w...E.n.",U.-..Vb....s.)...K..?.6.......J3...........t..$.g.=$.(.I....f.=...Dy]X.V..m..y...D~... f0.&`?......gU.....^+.Rd..j..5......v"h..fs..n.u. ......./....z..!...z.....^.3.].d......-3d..g...i._.pa:.....M..N..E...S.z?fH.~..;...U...w9.N..v....CP........c....k.._..T`....r.c.RS<...A#0+....W ..q.PT....Y...sF._.9."C.AC...X8C.1.6.'.^.....=..x...X........}2.A~{.N.S..-.G...5..k..Y.f1....8.tg.y.3K.NSL...#*..M..U....("..]..p....~.E.C.,`K.Q.ke.p...j.U..-.jU$..n.6.s....~..C.;....8.)...4...W...+...c..:.F.>u.G.N.h.Gw@.4Q..+..5),.`.iM+l.*..z..2..9....N.......&.+S|...y.._.:~.>/|=...=..gs..TnkeV...9=.A..0.....^lUB...3?...A...5...;.......].....9.J...V...\...%.....u....8n
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5034495
                      Entropy (8bit):7.991232950930853
                      Encrypted:true
                      SSDEEP:
                      MD5:C4689AC46BD886157AF1A7FE1BEFDC67
                      SHA1:6A35C44F44D3A239DC5276993ED9A32F5E578999
                      SHA-256:9B33E51044FAF8D623C914251DF6D8C93A1F3BD9514B08D559FD1BF206DEC3A4
                      SHA-512:10971661E4887E3BEDAEE99E56B798978C3E4D2E5289DE69932E2973D556978492353CD9D4E90FF37B1D4F86D3D07A62EF3E4018309CA5AA40C49A9CEA5DA63D
                      Malicious:true
                      Preview:...e.. K...i_?.....5.X...Yb...%\p^uJd..Ib...l.....L.u....%.......K\...w..CB.....'I..c..C.....b^U.kb.......C..Vl.t...................?&.y^...>..-'.@hRM ...]......"R.@.".T......X...cal.}f...f......s..dE..9...jy.gp.je(\.I.....K.>......RP...?...h..L..39gr....+2VU.......{b.n..mds*hr...B9.A.....<..jR."..+lv+...R...d.NW.H...3v.d...%..@|...srCI../?gO....}..K...-..LKL............Q...rF(3W......n8.V...h.K1[.[...r...m.$..~Q.....#\.t.w..u.G.m........Ag.........3E(cH..w.68F..b..5....:6 ..!.}.?...JU.x../.".O.A...SM.....KJd.....9.41......<.l.&...2...... ig.D8......Ai...9..R.g..Y<=..*.]...,!:..Q...K.4.....l+.A.....L^....)....9..K..XaR......a...ei._s...d...*e.f.=....JedOm.%...f..,.....X..W.:T,Z...........@q..h[C...I....:[.p.e..~#..t.$.....n.;.&..VX..2..wM....1..s.....W...w?.B... .!.][.T..\R%/C.EOp<Z..d8(3zftPe.. <.c.....>.......Gq...m.}.E.n...n.yNj...(.?.9:8..B%..!OF....3<<<...q.V....TW...B.u...!bL..........5p..+.c..47....X.....h....%u.|:..B[..t.K...,.'..^.7.28.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1370017
                      Entropy (8bit):7.997733977107482
                      Encrypted:true
                      SSDEEP:
                      MD5:2B0BF596C16038BD09E91DDA2E37F3EF
                      SHA1:8DC7632C284E8A2EE87C8DEE9563935A1BCF78C8
                      SHA-256:AF66FF7FE0CD9ADEF86724B27530CE4637725E20363246C725153965867C4C6B
                      SHA-512:2DA511C68C57B4DE9B6CCF40CB3DF4A9977662E19E70CD6C2DDF01B53EA5E0EE457B22A7DBCEB2381A0EC446C3405C1CCA7DECC46642353F662F5FBBF109AAE7
                      Malicious:true
                      Preview:.....M.......]....k.Zk..PWD....M.v........w....n.#.}IA.aL.Deb..........=..0..........g.y.!..@KH........9.r..-M@...A..M...Z.V1.[.. .c..x...i!.y1..J..*.^.P.i.....6f.Y...;#.JI.{~8..K..O...9..M..{\.~........H.{aZ.9]...._.E.6.p..Z......~..=.........>.t..R.......@.......s.%.....?..j.T..yM....g....Af..W..5*b$...c.g......d.........mjsJ\c..{...z.H..`3.N..`W.h<.....l...F.y...S$.D...l.3.r..Sd..x>.6..Q.K.}-.jM.1...&.?.,l..........8.~..~.)..u.....9.<F...3.!...GLt......:d..>....=.s......5.xhxCm.X..;J1.2[Q.<........)F..Udf.c.wX.e..i2.K7..U.d.M].[L.@qT28....mY..v..o.9.0M..a...T.8q..`...(N....>Q.g....\M.\...<. D. .X.....bA{[,......YrV*........7.....W.<..Z...t.L..^....}m..b.........!\..l.......tp.%.?Y..Q.k#..0..u..&..6.....T..C.#....q}Rv......Q2*.......j......2^..pkuVP....Q\.B.T.\.R9./...Y#....3... ..2...T!.(.R(.b......RE...D..........Kv........>...z....gh.!\....[8...^.eK..&j>.a?:.F.q.~..?@...^W...YF+..V+2..u..U.......Col.k..E....j.lqv..B
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6286164
                      Entropy (8bit):7.993399721452722
                      Encrypted:true
                      SSDEEP:
                      MD5:D79DB4A0364FDF2CD052A4BCD95185EC
                      SHA1:D5D14AAC31E62E262CC5B463DA9BF751E631A6D3
                      SHA-256:7A201E4B3B29C6C42455C71046C35C7A15122338C089E70882EB31E78B0F64D0
                      SHA-512:B88B08FAB9937F93FD715D21FFBF4CA384C3FEA6E13967B9CD5492B4A38A8D5F1BBFF99603B62224317F3FFA1DAD8AB5020436BC26FA830B8BB64BED02F43329
                      Malicious:true
                      Preview:...M.^".....?.~..r.4&.`.l..A.%D.V@LL...N2.........H..M..r%<1D.z8..)l......6.W..$....I.{...!..1.Kc..M..e.R...T.......VD.?..........................?....o.?...C.....BQ.BkR...EAQ.AD.Q..Q.+..E...N4.....Q.I4j...Iw.l.*.q,%/..8Q.y.c.J%U.%.`.A.%.-,E"[)b..lX...s[.o!s6PrPrL.cr...XvJ%..X...<...H'8.\...F.w.O....Q3Jo0.|..'.........~..BB..m.......c.qR<S.0.<c.."MJ...........j.g8e...*;.+=k...9N..+...bf....H.Bw^YT<V..%...s.....$..2Ow....aa1.\.)6S.O%eE..2...v8..F..n.#.rf.. @.eA....kf.j..j5s.B.yTI........L.Ex..$..T9...*..)..c5h.F.......lQDD.yK.I.R.\L...a.....Vd"S;l..X....]1GV6`..U....6...N.f.JI-.;&v.$,D..Q8...n=K..o.D*...l.B.5...Y..?..Y.......w.`.mq.j.N.(f(......6....f..........$.M.....@*v...>v.Z.kK.R..+...._'e.aWG....:.nwo ...1d.....[K.f.~v...X......P&..'......E....Mu.a..#d..K ...hn<.w...t"...8.....F.c...'.S...;qDU1[{.5...7i...]..N..\...}R....t.Z....B.r.*..M.-J..3.C..N.C$<..p.N..a..p._>..'/.|J5......|......v..:o..4.Q.+.\.`.:t...,.w/2/...r...d.a...j..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1358958
                      Entropy (8bit):7.997365648815771
                      Encrypted:true
                      SSDEEP:
                      MD5:76CDA941CA191F507BC9A682F3C2D76A
                      SHA1:FF1D69441BCF35EC5143030F0460AA3F2CE4D2C3
                      SHA-256:D62BFC8B3C090BAB3A84B27475BDCABAB4D30DFBE984BD0AF091532B159C4C51
                      SHA-512:87313ABD43DF3D879CB88BFA9C174C2D11FE87CD877DD74F0CE47A495A5220700148C0AD0DF27D9797A6871721BAB2E0FCD95FB142A15723AFA3ACA616B947C1
                      Malicious:true
                      Preview:..{..x....].P.HW.Nm.nD.....&...4q.....u;8...!2/$$.t...$"'.{.PB[uKu.0..R6.*.<..........;......9.......M.H.D..].%11.../..X.A$-g.`...8qz..(.'..$....A......$W.../.g5C.2j...?.S..F..bL.L..Yj5C-...L...bs3#.a.2=0RL..L9...eJF...|d...Tg.R.WH8.7./(...K.LX..F\m..e-ve...)..j.F....)......L..4.......$A....8.r.`G.b...."n..n>...}.+,{<T2. .c....px4...*@....,fN)....i.?.%c.x1p.gN.....`p..QF.....c!..|..R..BN4./...='.E..s9.#.. .3..L..._.,.....O.G......1}....../`XD....<*.....on..&.F.2d.....Y?S(H....>..!x/W.b...[|Q..b'.y....P..).u.2...w.%y.....t.6..z~.4..Q...:$~4.K...f.4+.c./.........4M.MdC4].Kc..r$..qv...!...w.{p.%A..'.I^.Y...`4.ET.*. .K....O.=W.G.E8om;7...S...D.E..E'.n.t`.w...u.../..Z.A..L05...Y..3}.._...[.........d...H.`Q.Nn.......]n..OE..M.<.E........<..Vr...n..<....m...Q....JC..V.2k.m.......v.....5......~..A....Q.J...../gC...:1G_.b.....V.....t....Xbi..c.B._g.fb.._.6..D.K,..W.P(..W.......*.?..C...r.{zu.X}.2.S.A.p......na...9.....}....bQ}...G.'c.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6179206
                      Entropy (8bit):7.986113982966964
                      Encrypted:false
                      SSDEEP:
                      MD5:F82BF10BF7AD4583121B714974EEA8D3
                      SHA1:442269D3025C88F87627135CF492E9BAA037313E
                      SHA-256:CDF2D8CDAC30AE03921E72D5EF5E208DCEB6404C6476DCCD8006EB033C2FB393
                      SHA-512:17389803F85FD2FC54D063AD2CC9A31C38DDD40E54B22446E09698CC7AE368A6FDD554291D306CA2093375C491D50D673719E170E350EDA26C070D3221754A04
                      Malicious:false
                      Preview:...a..?..}W~.v....;OkT...`.D..B.F..|..........v...|..'.d>.oZ....m...$...'.Ew..XY.Ps.]...uv..+.."..lcHU..T..Iz.....>.?.I.......BQ.UY.1....4E.......................................?.<on.9..{..M.$.d2i3...H/..F.........B.)= R......... ..."...6.......HfHa.3.j:.`zN.T.p.{2.......)>./...)b..Ork@.5(8..T0.C.8d.....yDdT42....C....Q.:.... .2B..THC...:6....q.f.......8..0I.yLF..h27/. ..........BRe.Y]C....C....[<l.....i.....K...E....46!...hF.\..c.[ .HO........7.@.Qe......`......GU'!;......)...L..D0p.v..ew..)....8cf.4..#z...h..&.;[Xp....".....@f....q..aBeY.\..$.Q.87.~...c..!.........G0.G.YFt ,\..B..Sm.SY.S..5..iUV1R,..p....`..'.c ....8.L"...3\..c..spN..E..=..{..-.y.L(2..8'...rN,]&...8..\....X..!S..K...^r.SEQ.E.O..G...@.......FLY.?yj...*M[.~...e..Sg"....F#eR..l.X.mDM.&..p;.(.r....D........j..6..-[.i..Vw.....;.`..b..1(....zA.w.u(2....c&4.........l..yp.....^:.J._.i.:%rU$.Cl.><.&>..C)...*a.;2..=.....g.D.;\P..z..'9.5...B...b.Fyv?.c...L.\..^.e...E04.e.2..)7V..J0O....W...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1873652
                      Entropy (8bit):7.996880126016157
                      Encrypted:true
                      SSDEEP:
                      MD5:D705DBDC726FD1C8A963F35EEB537CCD
                      SHA1:680EC566B4C193F1CEC2F07385A6C9B0F28A8FDC
                      SHA-256:A11262970F6E8B33C0E659240E93E16D10766CEBCDE8948624B3418B587F03F5
                      SHA-512:D30CB2A2EE56743A5577659315B79CEB43DF77B4D9B46E8A66D329BB96920A778123DA84ADAC951D49A060A05C8B069A481BADDD9931BC5FCFEA6AF6E97061BD
                      Malicious:true
                      Preview:..u....bl....)T.".X.sC....9..|..M#*.....{q1...?..Q.:...+.D......R.......M.................Z..Y..%.S"..TkVql....~%...A.....h..v.w.]{~qy..k{.......^t.r..D.@~V..,..)........).6._T......%.....hdM$.....R.4.....T.0.]LI...56..w...<.o....!U ....v.\...9.}|.#qr....9=.^..&2...w....lw..[C.]....._?.n..Xl..p..>.L..ZX.00........T..S.....,k.(.6.D`.b.T.....H....tA0...?O.!a.ee.....,.Y.._..L^*.H)I.2!)...M.+..w.._.o..W.mR.T}Kj. ..h.g.....Z..C.}......R}r...2..W.V..= ...s...s.#h).PW..q.+g{..............M7.;7..y..{..UTS...8.[.2..{....a..........#.....#.;.&C}.MR.~Z..5.Z....i..I..j.B8"Fh'........q0.. .U?.............%Z(|A.~N..N..,.(1:.[.........].[K..PR.J. ..JU.*...d....q.;`.iP7y.z..0.'.........?w....5.. .Wk{B.......G_...../JY..V.sa........+7.D.{.%b...{...3.7....*..0...S0\...(...{..&L.&;..........i..U.%.q..7..v.~.J..BJ.<.H.....OD.1..7..6.....w.......IIW....f....^.-..u.I$.#?.....y...Ud8E.a<'.q7C.N_........m.&..IO.q8. ...\8.L......V....i..J.)L.}!.......^......Z..U[{.H...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5973689
                      Entropy (8bit):7.991172843944183
                      Encrypted:true
                      SSDEEP:
                      MD5:B584AAE4361AEB8F3DCEE381B3288954
                      SHA1:DB27D0F66B744F4C87D7F34B068675885D238C48
                      SHA-256:B49718E73486604D92221C20040B423B9F53B25372DAC6CCA9CC5B31B01DC09F
                      SHA-512:0C383596D06F16D92D1345B214A644D3A5F9B0EDE4EB3E4C672FA5B383ED5E36D390A621B468E69DBC4DF45C1CCF7C0071114E3ADD6C41E916A2DD5BA6384661
                      Malicious:true
                      Preview:...o...X....../...v..H.H"@.Hd .JQ,(.t.:C"S/.6.f.......|C..?..fw....W"`?K..2.......t.h-F...N..?....E...Bd........0.~X2.C....6.a.................................s.=w.E..Li.......MJ...A......`T.....(.5.R.1..^..1Q.IL~....K.CV 1.W9C........@@."...C..A.&K.X...3.".Yz."...)..DqDB....d%F..S.B...u...X....$$..I..c#.fI.X.a..c..dWJ..X.W.2..^..L.,W..#.k.2"d_."........(.A.G1.yiYy....p.E.x...^U..K.u..P...3S..e.:5..*....)..O=.*.....k..........P.K+TUT6%.l..m...M.IKe^G.v.....`.v......eJ...........e..s..J.F.N....K...])J>.t...}.J...|E..l)\9..d.!1.W`..[.9.5..s.c.H!.t.L..........(..(..z..G!0V.e...\.@a.a.f...G.Q...L^j..L.h.*..&I.Tb~...[...!.P.8..!.LD]..rF.&\0..G.i.....4q/.u'zI..%%.Y..:qr...R.:U~.l..M.{....j.e..9P.idgA.o....87.<.M.[.R.a.......K......_`......R1C.=..+K...m.....T.X/.T..Z..&.a....._!.39gr...9.s...fy..X)yC...K.. ..5o....u.%...f.........5.7q...W.....d..l.`M.j.gQ..4.*fz..o.S,.\..".......b~n...DA.uv.nj.....z<.....r7xf...P....X.ur.5#jU%.Q^X/.-..w.X...:
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1535612
                      Entropy (8bit):7.99758668460467
                      Encrypted:true
                      SSDEEP:
                      MD5:15E190B2EB8FD6C2942A2AE7C9830DFA
                      SHA1:2726334E435A3AEC63999BD278FC4BBE3F87A7DA
                      SHA-256:C8549787A24F84CD83D67EBB0AE2FDF3B649C5ABD30C09ECA8A66FEA0E988BB1
                      SHA-512:F7CD44608BAD1B85B49A54AC57AECE453EEA539A6027E957E664708D61E1C7EFFA6DBAD9A1CF98DB6DBE882AC525FB4B498A651EC91D41867624137FF4E2CDC4
                      Malicious:true
                      Preview:._....).wI......1....W......3....Kg18.^...;K...s:.U.R....X....m.2..(............I.#j..*^U7.(..130.jT.D1&...?v..P.20#....h..{..z}3....60!.....I.B...X.. H]...`..\KeW.j>.Fs.Y,Wk.mJ...nAw...f-.j!.....J.[y.....AP.}...>}s..Wz....T*s..=)5.Bz......?......Epv......#.q...K...@+......>...l.'U.Hf...}...?.d!..R.|n..u.....Q.ng:...s.......LJ....s%.....B...)......:.z.,.x+..)....In.&...._...L.U...8.s.......7v....w.....#.i.. .(..w.4.B....0...B.-.@..m.].....x....wf.nD.d.ld.>.....r(.^....'lbd4.0cvMC2fvs..z.~.N..){.......`...;.....]}......p.<...?.....m`.bT.......0f..`..T...Q:....p.....L..,.l....6'..,C:e.Y.....?..F..v:........4..H...c.4..%../.2n*............$..d...<....,..K.....4*.4....,D.L1.~>.X...M...W.Gr..#...3.|.k.cA...N.Gl.5.l.7o./M.....|{X..>cy.g..i.*..F./...!.s.*A.k...>...-..y..:...}...E...L....X.6.g.@.[,S3..7.t...(..b..NU_V.N...Jm...rvg...E...?P.7Xh.....FO..L <Z.......&b.bJ..11...z....oY...YN.............(....f..M...h..fk7.Pp.......#J..v(K.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5554944
                      Entropy (8bit):7.991413120277236
                      Encrypted:true
                      SSDEEP:
                      MD5:4F373AFE3954F7588BEEB69A3F3A432D
                      SHA1:82575D9C1C74FC8B92EFA66BDD01D45573911F27
                      SHA-256:C4FBE9D3441306DFE55A8076A8BAA084EFE51111D216575F78DA25A0579F96AC
                      SHA-512:343C8A770E5C676177D91B1D6774981CF0366684C67557682E69CCA0EF0A2AB99459B0427521E56DDB21CF0EEF549D4FD894ADFBECA8072E66210A55CA1ED5C0
                      Malicious:true
                      Preview:...mM..~........o..w?-... ....T1AB..F%j..=lf........$.$U.}......1....e..).w.....F.../$)..0?:D........v....'..wnm.f]..].a'.|/B..I......mE..O...........................|....~..................Hi*.E@@.E....P. .T....X..1....j...dbb2...I..O..9S.D.K.!.\`(.j.9....VmgO.....':..*....U..l.e.@.H\.0...n..|.4.........?..Fo0......"..c.#D.E.\f.......A.]\|.U#&J....C.#...p'SE.b...T..332.Y.9Le....Iss.....'i,.vT./`..4.(*V...'...t.A.e......iz.TV..(......A......YY............rm.$...a.--..>.,//..^....D..7.BZ...Y+..U..%...U(.0[g.....Hr9c..-....Jk.N$M../.e.l..:..b..D.%..k. .R....Y...+Yv..........]......p..-.^...5..@..".`...3...H<W.$".....]'~m..V.k....&*DLp.nTS..>...I.jDj....[..1.x...)..(y..2.... .).....d.7;0..pZ.aBv.Qy*...#..Q$.nqw....DA.d.....9o...le.y."...!.VP..Lv6.o......(Xk.k......{h..7.u...I.....^q8b.....4...y...:..J..:.*...@...3.X%.).......\.a).$B.U"...".D.(.8*&....a...a.\.c..kb9.f*|"IR}..i.2.H....>o...6.(....F.DD.J...pt.1".Ay@8.B.j...O.....//.0>x.V{.t...Ug.H.8R6.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1769915
                      Entropy (8bit):7.99682253023193
                      Encrypted:true
                      SSDEEP:
                      MD5:3B65FC9E1C1431DEB1240B76F0061630
                      SHA1:BD28A51EF61C1DE95E13190E3069D8FD71C9E9C9
                      SHA-256:246D26C5E15F8BD629D195D8A302C7890CAEFA1C2F2EEE7C0CECE751B4BBBC9E
                      SHA-512:B50F2DE3BF7A3A7B8FDD893221F1F266AD625BC2A8B8A185269EAB805D4F5A1C73179278B9A5771E41C73091149E3017EDD25998D0CC647B004292AE293F52A2
                      Malicious:true
                      Preview:.+p..P*c.d-eJ."B'*.....;Uk......e.{..T....$!P.:{......uC8.O.uD3I...o...........X..z....jD<.....1&(*.h43..f..[..M..TkM.+,..j......?.....@....H.tj80U H.....$j.N...K...P5L....5...U....*H...'Z.~..(.........>\.>v>.......... .........86.UM.....Qlewi...n..X..3.O'...W. ..}.(.]......_...h.3.....q.N.$QgC.aF"...f.\=.....v../...F..FO..L."...A..;..m....%..o..h.s.a..(...h...wV....(..-.G..{.?.sYqnKSI.Y.*I>..6.+..?.!....../..'..S.I.@I...1Kf.)S...-r...M..>\.{.Kl{.g.."..o.8Hr.8O....f....u..7...E..^.....2M.)g.2b.....{L5G:..a.......WAbXje..9B..|XxXX.....j.v...'*.~.v.. ....D...>...W#'.....=...A.j.j..8....x..yoX.i'...i......Y.?K.P.J.!.Fx.....m...[.A...BgO.?..x...mHb..>5....22eA..}..C.....J...0..]...i....U.i.6h>O.'.....t.q0-6..IG.....75.SX..Z.....P.<J^....Mw.Z.......<#V.+.>b.).).By>1..<.g-.x2..-&.........W.<.. .D.BA...r....n.@......1.k..R.Y.s.n.1#.zvl...um.w#...ua,.oco.c.....b..fL.]1.2..d...]#V..7.... ..2E.P...rY.+.R.Z....-.......H.......n+...$..t
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6259750
                      Entropy (8bit):7.990458696470295
                      Encrypted:true
                      SSDEEP:
                      MD5:4D737311EEB25F685CBA357E8B141033
                      SHA1:ACF923F5511508E5BB88238EC358E5CB9B05679E
                      SHA-256:6C6056AD4698345401A0FC901E3F707808C8E417C951B8DAC93DF1B750375AA2
                      SHA-512:16F3FC1FFCE10E84499F8FA5C295470B099D2007136AC7DD156C23201E48B83A254A60041C515560CC6963D925190AEAC57D04E1A63305B0FB6A9C1EC326634C
                      Malicious:true
                      Preview:...[.......O..n........3z.X%"..?A.# .Q4Q..tLg.J/]".c.7.$..N.....O|...V2....$3).c..oc.3..UE....CD.A..8...E."S...C.,Z].. ....:..Y%! ...]..........................w..m...3.{..0C....J.R..J........A....+.`...b..11.&....$.......s...R..+MW..+Cp...0KH(n..5'.....:.m.).l....&xq&7..4........>.~..1*....Hp..E..........cb.....H............#3+:6[..x.a|.@^>...T...4........g..1.U..R..I.-S..]QYU=UHZ.M..T.....5.,..a..U..)y.E.2R?..h.V...4.AwPwI.S..^c..Rs....O...[.8.....-.....u......Nl..X..d(..o....z..+2....Cu6O[..`E....Jp.Qd.iZ...fqYC.hk...u...nf.u....k.+...J...P.$...o...{.f..dk..S.3m.$.V...[.[.n......m.q...!..x.Zf..,.....]1X..g...."i...&t..{.2W..........s......3.z.~..U3...e.e.h.g.ym..:...g....Q.Hd.I9.YG.k..:rp.$\..1..P..H..*>,5.3w....6a..D[h.Qp.o.....-.B..n...j.-I.........z.....9N....._.....I.)..M...8]4..Y.*.7..;.le. ;.U...&+VQj.......\|;J%.R.;..z...+W.p..>.x+...t.Z..ui..F.Nb..7.M...a.M{...L.....Y.AJ.sb....7(o...9$....t! 9........X.8.s...9....<..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1873442
                      Entropy (8bit):7.997088846174313
                      Encrypted:true
                      SSDEEP:
                      MD5:B8DFE000E0747D1B0EF5A4BD877744F8
                      SHA1:CE0D3FC838354DCEB9900050D86C95EEEC738ABB
                      SHA-256:E97E625B291DC61648B3DB1211A09366AEB72170E922D41B1FB1367A393A94AB
                      SHA-512:9CBD401F0F26F93C557B9179BE71E2776D086A47029B557D1560FBE042CB0567892CFFE445441B306A99DAB060A6C76F8C2D4AB743DC495C75E7341F9EDA7516
                      Malicious:true
                      Preview:..j.+x.D......n...3..(...W.$Z..#..Q.-}...!..;!........I.,.f.}....~...Gx................;=wf..?.$.d&...@E@D..[.n......Mj..4.g.#...y(..3...ux"OyH.)..R.w...0....U+....c...80....j...B.d ......Y(#.J...9.D.m.r....W..>..l| &<.~.3..;-eUQU..ye.X.)...rY.{...C...xD.aS.9n.w.K.-.JQ...U|....k^...H...U...K^..WEK.5.L-Z..d(....Z..4...)..T.ea.A.T..!.......W......Ue...A..*{Yf.N.~{.HD.4.....q...(N..&M.8.N....n.n....j.Ec1.u..k..H...E~"....4.....k..jq.r.B.b..u.+LVI..V....Z.9.....5..oOVF.B)c.Q.r.Pk.mh........Z.Z-.H...T..U..@ ~....Wg.?....-m [u.....[q..V.(..k.(?.........7...z..._....6..~..bu.M......d.O...d.11.DxE..S7@..w.....~..=....R>;c?...._<..f....x.2\...K.....Ux^...4.XQ>..+...........pzl/.....%....6}`I. T.z........GG....y9.....k8.VqFA..xfL..m.....@...)f..o..G..O.w?...$.Z......p.&.?.]Vo....3..........U(.}.EO....`@1.\ot..U...nQs;.~..&..KU.......x}..._u.....x.}>...:..5.m....U....".p.....}H.Mz.;..}.8...[.|..<'C<y...h..f....b.n...._.....b8l.j9.'.)..i..mpY.m.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:modified
                      Size (bytes):3770675
                      Entropy (8bit):7.9991751829788535
                      Encrypted:true
                      SSDEEP:
                      MD5:5A65557C648B75BDCD735D7DEDB01448
                      SHA1:27E58D5096BCAF564E443F33C1C790BE0785F74A
                      SHA-256:17B15074F703A39F38F5CAA293608B9CF5330FF355F33CF8600A3EE6AD06E296
                      SHA-512:B81795CB4742FC2C57DD75B7ABFF01B6D3B54D540B9D3E64DBC63B697F97EC8D1C6A76CC6AD2389A3BAA9A68E516E6337F24DE761C195679F1F77632927857F0
                      Malicious:true
                      Preview:...'.......m..b9......B5.G.Sws4......$.....c;.f....}.N...+.3......n.C.1H 0N..../.......mfb...d.(+.F4..e....w..................{..s..I.s.}.-...N.;[w.;...M.B..1...Q"....&.......Ag...2.#.. ::..8.l.yPB.S.`y...W.\..$"k^oD..Y.m&:....{&.F10(..GFKc..d.8.I..j.(...j... fV.p.V_SZ.n}-G..4..#.f.y.C....a`01%k.,3.=Wud`....Mw..z^k......B.D...ch.H..t........F7...M.C 1..A.-a....`.wLFqM...N...%...m.5}`z..K........}XL.HX.A..#5..3.J...L........Tn..!.n=.1.....~....(>.e.:G4...v..w.....p..i...fn.}...Y..<1....<.A..f........ ..T?.I..{...a{........t.......U..*.4..YJ.......!L....-..bj.]".nU..8..:...}. ..c;...T.?.a..DM8.k0.....3g7..5...'.I.)gA..?...G..#q..,.cz.^.O.?/IPy..fF......./..........{R..~.[._.Y>..b\~......m\..6..5YV.m.....!./.F.:..v.C..b.m....y.7.o ..6...E..R87U...VU....N..E.D.i.6..r.......-.....l.SNDd...'...O.{..=....O,$.#vN...\.....,....U...9X.]j.X1........0.s.lm0.4.k!....c..).s...,.J.9.L.&+..X........".._c...H..3t*..na$..|..^M..|....M.Y....I*$
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4651695
                      Entropy (8bit):1.5212889438960397
                      Encrypted:false
                      SSDEEP:
                      MD5:E7B6750082C41C0930C8696C7B79A91A
                      SHA1:20BD11D6D1ACB768E3B17FB9D31BF1E9039FCCC5
                      SHA-256:B96734A141662AFF1E03C328D9BBA3AE1338E2156C0153934794E534FBE6C35E
                      SHA-512:0862C16BD5081AEC1C75AFFB624A74918703B7BF3215BF8F125255E2372612A5C6C5E0DB3E07ABA7C648F788150647BAB91B99F4BBB8E4537F140E610FC3ADEE
                      Malicious:false
                      Preview:...Y}...z....e.5.....QQ1?.l>.!!I9N.L9]SI.to.vv.l....I..h.5....[...W97.Y..$........c..O....}w.t..1..w.C.T...V....oJ..Zu.[k................................s.....& u*.0.2..0.>....)U........X.P.h.Q.....h...&1.....D3.Pfi.. .R..4O.dr.....+..&...{P.${.$o)..`}(,.%../'(....l0...]4Z...0..38....M.D3.....8Jb|t4.1.5..X6.>.'&Ar.%5-Y).[m....92!..@...sX..<. %.t~Aa..*.(v.......U...R.j....... ..k...L...........M:-.j.5.I.&..6.....].,Rs.A..I[;.vuC..w.[.>r..G.0..4.l.&..............Z.z.hy?v..4{.r.i.G.........ux5l.OL..cg._.etl.8....LH'.P5_.w.4.W..-..I.@.M.$.`...P.P"....(.e.\....m.2..2.....}8F...`..d.......@GM..!v........"..1.f..<%.z&AN.&.&........[5..J.y.\..;`.....m...........Nh.N.....7~BB...$...G.W... .%..[....u..O..IX....8f.x7......s.T..Rt.....t.7...O..S..}`..Q...Y..H.*....GEN.....t./I.&Y..R[yy.FH7\.....eV..U..._.........T.(.x5..p.".30P....0.n.:...qSc..`.?..xKo.....{..4.k. 0..e...}w!.F...8|z.xj.E.p....2........^3Z<....|..r!....r... .{.C....-.B.dO.....t..aR9
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3848454
                      Entropy (8bit):5.925360452591405
                      Encrypted:false
                      SSDEEP:
                      MD5:E8ACB2C82F3B0CA6DFA85B319ECE8D98
                      SHA1:A54A8AB546055A92E3BD6C6E6ECAEDD35CB06563
                      SHA-256:D641FFD91A970305BCA2694FC3DC2FF80DE6E55D58FB1A1AD8F72B9472A3A852
                      SHA-512:453EAA95DC174ABAF0529A820EBCDDC39E4D806CB170A5E00C09F57ABA34A213572242226AB3CC00638E2E6E6BA9B93FFC4006FCF689979CBFC44B3B95CEE288
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......:.....V.......C....Q..:....Y@...............CAB-23bd0d22e3915228f7c6902a5bded1721.P../.....9..`.resS...}...........~.....2018.4.0f1......4...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8417324
                      Entropy (8bit):4.017065095760154
                      Encrypted:false
                      SSDEEP:
                      MD5:2607A8511F9471FC2CE63282AF888926
                      SHA1:CA0CE1FA1F0B5A66F650D317644015E23ED15A26
                      SHA-256:59861FBEDB9C151DB98B28FC584ACE3BA4874015A6E43F0E4F73E2E91ADBF822
                      SHA-512:237760DA82810B6B6E8B4582A06A880E344313AD52C6D2A8BF72A2356B5292B93629CC8E9393A75DDCFD5AC23F3A79B8D5A2C3BBB51C336F2E76B11FD752EE9D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......p,...S.......C....Q...o...Z@........o.....CAB-cd8ec9306f83d9d1855291361d62c3161.2......9..`.resS.......o.............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9646761
                      Entropy (8bit):3.384509243566755
                      Encrypted:false
                      SSDEEP:
                      MD5:7271155356A1ABCBC476E5E587BED198
                      SHA1:11E93A555D751612324E32E6C527B100F279023A
                      SHA-256:4C6B2EF960C67927759855761F0A47361CF06C882F203357E00A29FD5B4B52E4
                      SHA-512:4E9EC0746EBE2D8DE88FCB4C330517A97549490F90702281D919E340AD8590296158D0F63131D52C10C0B03D53E01D43D3815DF3302AF8DF794E42EC51B3C913
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......2....T.......C....Q...2$..Y@.........2$....CAB-52e6f08a688aca17f2b8bd674d9e2e981.2......9..`.resS....e..2$............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1394485
                      Entropy (8bit):4.161888353961818
                      Encrypted:false
                      SSDEEP:
                      MD5:ACDB3AD4E706EEBB767C9667DE8BECC5
                      SHA1:FB0957FF741CC09BDA1EE42AC3E071394FDC272F
                      SHA-256:2D8086B69A2B69E5D4B8559D96D8A101E333E712C5D790316B64FC952F91D8A2
                      SHA-512:9340B96FFB1F0DE8BA9A265D586BDC128EB79BF884303FD708A39C7BED6B1DE2A57B9503D579155539F9405DB5DCAE4299F03E9F0732BF3EBB2D48E3F54AF777
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......G5...T.......C....Q...F...Y@.........F.....CAB-73c6f4702c9ed910335d73379533bd001.2......9..`.resS....$..F........@....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1299332
                      Entropy (8bit):4.460620344615637
                      Encrypted:false
                      SSDEEP:
                      MD5:F8FBB80BEF850A25B212091090B326C5
                      SHA1:CD7AABE075749E6FBED15CEBD70D213EF35B28EE
                      SHA-256:5011C9389FF5D34D343CAA50EE10D299ACEFDD538739AC94868B4138191747D0
                      SHA-512:19DD25C5169927F036491016551D6F686B056F3BCDF95960DC88EBED8A5E834F11032052350183BCD21F5DB0C715E5DBFE3B446E6E56BD3D76BCDC67916867A6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........S.......C....Q.......Y@...... .......CAB-b897216d26bbcb41e8c97e790ff66cd41.2......9..`.resS................ ....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):260320
                      Entropy (8bit):2.818913951834682
                      Encrypted:false
                      SSDEEP:
                      MD5:8F1BA09EAF5DFFC86CDE10698AA7131C
                      SHA1:7AB001C129BE44074AEB6F52963219E32DE62917
                      SHA-256:E1F4E300E086780AA0D2C833BEE8085B5A8532A6D6352E710F2E698C119A2123
                      SHA-512:0D7DB685B203A3D8AE86D73F685488450B182925BCB2727CA275E701A12683B05D38032DA8A628E3B7DDF5D97C27158AA7849D6F094D1B897DD754E122923C65
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............@...[...C....Q....o...@.............CAB-89291e756b16b9e05dca759cef75caec....V...o.......p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:DIY-Thermocam raw data (Lepton 3.x), scale 1024-0, spot sensor temperature 0.000000, unit celsius, color scheme 1, minimum point enabled, calibration: offset -2306124484190404608.000000, slope 4951760157141521099596496896.000000
                      Category:dropped
                      Size (bytes):219917
                      Entropy (8bit):2.8098864787692155
                      Encrypted:false
                      SSDEEP:
                      MD5:76277390B439AA8E7CA5F982D9ECFA43
                      SHA1:375510AA1BBFA3EA1718B7C6A53CA67A41D58470
                      SHA-256:C46D207E37FA16B3801219679C6C61E3F226B57DDBCC80640E1734CA4DF26062
                      SHA-512:1CCC4E8BE05EBADBEFB320E370C5F5A90B60321628A073FE11BE9BF48F85C97B7E8886DFEAEFFC4E84C195B518CD1650E2DB4BF1895F0F85D6FE377D6528B305
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......[....@...[...C....Q...Z....@.............CAB-3be57c6825c94b1b2d98ec6101ce18de.......Z.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):22404
                      Entropy (8bit):4.522597416074183
                      Encrypted:false
                      SSDEEP:
                      MD5:3F61BF65861C26DDAAE7529FF6CD2C16
                      SHA1:0D2D04F127FC63EA4574FE06436FA64D7A8CE65A
                      SHA-256:C813166A78F7CB96C0B927C19F741C0AB7819A58968A0FA05559DC8A2B9DAEC7
                      SHA-512:4ABB65037499CADF3907D9693963DA00477378855303D27BBAC25514F5035129C0A022D841659D49465F14959AF2A1BB5FC6D6C6DE96F1B289FB1107335B94E0
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......W....?...[...C....Q...W....@............CAB-cd58007992e2f158093bc704a9d56c6f...1`..W.......1.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26805542
                      Entropy (8bit):3.6635362160922718
                      Encrypted:false
                      SSDEEP:
                      MD5:C989E0CF18670AEB5E747CEDA800A974
                      SHA1:149A20B96A84F1AE59DECDA2178C2B95D5198EB4
                      SHA-256:6D6A91D76EE88688D15887A0D0BFE92AA088743A76071CEF56C34E0BD11AB900
                      SHA-512:69FDFCE2E8D94E28C8D5C480DFD75BF3830FD750C61310B39BAE6C5CEF8F24A13DD65D13274120A2C276C3900C0B292B54ABEBC7B0A318E5B95E20A805700918
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........&...U.......C....P.......i.@...............CAB-053f48e5ba433e9253a589c55bd5954f1.2......9..`.resS...*M..........*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):108897
                      Entropy (8bit):5.042572868674783
                      Encrypted:false
                      SSDEEP:
                      MD5:9ED5861F412EAA1ECD7674B0BE6715DE
                      SHA1:7BCE2645DBF83C753D3A44C83AFE2AB8A989E00C
                      SHA-256:009D78FD4A28609C205FC90BCBE05C6C3EB3CC5CA1CE9AF97BF8181D5124701C
                      SHA-512:712AAA3832796241F498A54F22E64122D1A05C696EB0AE6521EBB04BEAB54916D958D5C98927B1C0C448F9ADA87BF6518B571575B05BB772C111557E6F53AEC4
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........a...U.......C....Q.......Z@........>3....CAB-d0c22b392f41894d1d0a85df98c862fc1.P...j....9..`.resS....r..>3............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1654351
                      Entropy (8bit):2.7486935443251275
                      Encrypted:false
                      SSDEEP:
                      MD5:AE9D7EF353865733C4D22165F66EA847
                      SHA1:D4CCA92D42F8DDF81630AF488AE412A19D4B0F36
                      SHA-256:8653BF5FB6CB407C4B5331B99C3857E51FE79323B892368DF8DC92DD9327461A
                      SHA-512:C14121B0F3E023A4393A9878F1638B19B74CD4DD11D3EBEBC81DCD74FDAA6AD3D2CB668CB7DBB2435668502FFF5BBAEAA939061D2F887C7FC2460E945A04262A
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......>O...S.......C....Q...=...Z@........=.....CAB-d5779aacdd4c04590c1d89a6f8e54a6b1.2......9..`.resS.......=.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):989806
                      Entropy (8bit):4.0648005991661815
                      Encrypted:false
                      SSDEEP:
                      MD5:B6B4914DA0CAD618DD311BE01E01ED13
                      SHA1:ED4662093417ECB97F1EC9DBA116B9F18D6949CC
                      SHA-256:90B35915FE43CB50E04EF3CD1F44A1F41BDFD51D7F21A4B218E0BCAD44BC5C74
                      SHA-512:C1286807AA8C94F1C3280308879FF5155D3FE5363F8D894918829F9882DF23F27318C7DDAF4178A0F23F056EC5E365EFA739891CDB97F40929A4AA9640328F20
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........n...U.......C....Q.......Y@...............CAB-4f39c242bc0356f8e6229c08f60edf811.A.......9..`.resS................ ....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7887905
                      Entropy (8bit):3.4491428769395927
                      Encrypted:false
                      SSDEEP:
                      MD5:BC343910B1A4E2CF924B3E2B0E8A12AB
                      SHA1:B68B7F7D198252957C45ABE4F81D2499C38B23D4
                      SHA-256:9D675A56087489B7AD2B74F1E167077BCADB43418899281DC59B345FF1F13E8B
                      SHA-512:E7421B727D602D02361427694707FB1FF2A678F7FD87781361CB697DF7078FB56F97ACF199A35B5BCBFACE3475D0F91FFD03A08544063102B0F78E4335F9B7F8
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......x\!...T.......C....Q..x[...Y@.........[.....CAB-eb4b74a29fb892ff6644169d6442f01d1.2..v...9..`.resS.......[.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47040
                      Entropy (8bit):4.726525385321518
                      Encrypted:false
                      SSDEEP:
                      MD5:CBE4FF436317D1C8F329339154574FC1
                      SHA1:BDA644F43C29D870C94C492E8991B5D0E991EFD9
                      SHA-256:142C748B6B8CB710F5A60D43C5978BDE4A6D5A1D236C0C948A8E72FEE1559E76
                      SHA-512:AFD626D89F9136AC24F535B0D29EE5A37BA58153CEC6A19D66FF16FAA7785ECF163F6D5AEA421107BDBC85D15FB8DC2FBA32910946B43E53AD62DB90FF546DB8
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............?...[...C....Q....P...@............CAB-313a665a3e2ea35032b355a6816e7364...v&...P......v@....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9468696
                      Entropy (8bit):2.8815398400511394
                      Encrypted:false
                      SSDEEP:
                      MD5:50387321D36C589CCD7CED305C80E1CB
                      SHA1:44D26C33971D6A0DDA89F160012AC2648B2C738D
                      SHA-256:720E9BC3DFA56586B37EFD000C9A9FF680FAF63EA8673C2803F2239082A3D3FD
                      SHA-512:E6908BF3EA23892AA207411EB60B5ED36A99BABE3590EE0433E140540C23302FE06B9E6FB14A16AC1F2D394823675CC6504B210DB5A34B62A5C61F9C59B6471F
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......{....S.......C....Q...z...Z@........z.....CAB-96672474746cced08c73dc1938e791521.2......9..`.resS....I..z........`....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11474159
                      Entropy (8bit):4.902497205270554
                      Encrypted:false
                      SSDEEP:
                      MD5:42B8E68C13C3D161D828DE14E66AC864
                      SHA1:8A71E14C8CB6689FEA9E3821EB937DC1683E5856
                      SHA-256:FD29320889A6ADFCF20F52545AB6989069E2B17C88F37C0933914E9E6CE5C87F
                      SHA-512:4756823F08959FE512CA389AC3BA2456F878107E249B4C69349B74CA7879F116F60ED92EE7E6652E9233654BDE55ECF1B03FAB909B853FF7333BA80925460D95
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............V.......C....Q....h..Y@.........-X....CAB-57183ab520e61f9c69518b48b9138ddc1.P........9..`.resS.......-X............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):40492
                      Entropy (8bit):4.638081447347549
                      Encrypted:false
                      SSDEEP:
                      MD5:3503C803132F1A76793FFB75884C8C25
                      SHA1:BCB2045A3ADE9BCF601272946D31B6CBCA04B4F6
                      SHA-256:4995B1C78076E9426511FE44B20215EE5F08CF4C93836684280B9223F0F01562
                      SHA-512:B111B1E592AAFD567E327B08ED659C104562468813BF9927C5AE2390F51DD2AC5C3B17F8F4030EB8EDCE239D3F8E93637A71A3AB4973CB102AC2D26AF2C9B4F3
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........,...?...[...C....Q........@............CAB-514f7a81038b1bfa60e3f427b34ee868...Q...........Q.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3309722
                      Entropy (8bit):3.94873247410025
                      Encrypted:false
                      SSDEEP:
                      MD5:A26C24D94849C31FB71CF4729499EB29
                      SHA1:C82F937AD8107569CD1289821E7D4067325597CB
                      SHA-256:7DA8468063EC71A349EF44AF713411AE0F4ACB49A04E448A17331DE497D1299D
                      SHA-512:215A0359BD9CE21C2EBF3881E24799D0EEC2093A8AB3BB77F72CFF52BF50933CAE939E5EB7DA96BA6E2072A002049958EC0C2E2C9F050284598E90AA6B4507B1
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......2.....U.......C....Q..2....Y@...............CAB-31c6d26cd7cd8b9473a2d3b251a143091.A..0....9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8942856
                      Entropy (8bit):3.9798315032741867
                      Encrypted:false
                      SSDEEP:
                      MD5:7F8002F94FB093F19A98E9F99E130652
                      SHA1:B85C1F8F1CF51F8923FAE278B58DFC9047C00F4B
                      SHA-256:3AA88E173EA67C095EA258CECEB91107AE15FCE1B1EC72FCDBFEBC0A97963F0D
                      SHA-512:D20716E89763EF6D5EAE7AF63BB47EAEF067E05CF736A083A2658A9C2F4CF7D3BADFFBA7DFD63B14E32D32215294CB264B820AD9AA8E59FC1B964D59BF0E18A6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......u....S.......C....Q...t...Z@........t.....CAB-2f0d6563d02cf6e62babb8e2c5834a011.2......9..`.resS.......t.............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1115792
                      Entropy (8bit):5.533017897106468
                      Encrypted:false
                      SSDEEP:
                      MD5:72F6F7F32491B060DA460DA0559CB2AB
                      SHA1:A69D01EABAC137EAD021E1B662091D8527CEF941
                      SHA-256:0A03488A48E3482BB852721BAD96598E318AC0AB7C89804CEACA13BAA8163CB1
                      SHA-512:F08C3CE7A11DE3B1BFD6CE51952140FC3002B7AA1C45AB7CBBBFC7C96B326FEA1D4ECE968992408FF0024819E37B10EB1ECBA5D913601AE643E4917B4F963039
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............S.......C....Q.......Z@..............CAB-0e1d49e82d0b5bd7f88530d9ac3797e21.2......9..`.resS...[q..........[.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9045065
                      Entropy (8bit):5.853506382231435
                      Encrypted:false
                      SSDEEP:
                      MD5:3D04CCBE60877EA37C325CF983B12394
                      SHA1:553048B7F098941886B2B746228464AA05D754C7
                      SHA-256:0049478809ADA1E209453D0518A95B0FAC5A7D0D172C3D7CB2AB115486A57AF6
                      SHA-512:D20FF7576780CCA45932F027470BE07CD970F27E3A3DF07E2D1CA886A4465B6862FF5C5641F0C986F277F680B980166D3AE021D293E341C892A975A4797E1836
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........I...T.......C....Q.......Y@...............CAB-c78d8358b7a9ce1023037c8be5e6e0861.2......9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26877026
                      Entropy (8bit):4.217729736118307
                      Encrypted:false
                      SSDEEP:
                      MD5:53D3A2598672C1189DC5E054A020CF6C
                      SHA1:7AFF4804629CED8902268A282C3B1DE918F020EB
                      SHA-256:4823512EF4001ACABF115090AF3A0080E4764E450A3529520F923C3F41DBF331
                      SHA-512:62310406764471BC77C5C6385B01085693FD8B8116018B02921E6BA12304D9F48EB7115A628A151AF99CBDBD9ECDEEDE91016D2219C9DDFE00829234D06F5B1E
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........b...U.......C....P.......i.@...............CAB-98bea7375c0e823b186eb2b218c03e9d1.2......9..`.resS...*M..........*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):983317
                      Entropy (8bit):4.222388482934303
                      Encrypted:false
                      SSDEEP:
                      MD5:19FE0B643C56291ED9A82FC047DFBC8C
                      SHA1:3BE07B1CA8E06398317AFD9F0741820A54BF8D0B
                      SHA-256:E44DF9B01566856E199FADBF540900B6BB9B1DA96EF7EB39AC16320958BDFF0B
                      SHA-512:6557992346F8FB8FEE04496BA43BBA3039D8156D4B9B39B20850ECB041B97216CAE15C06FF702C2241D3680A8E0B7FCF269E92726015F5833169AC62FF9B150F
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q.......Y@...............CAB-2cc4ae41bc19016639d9ec1d077e69431.2......9..`.resS.....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1241513
                      Entropy (8bit):3.342446878462921
                      Encrypted:false
                      SSDEEP:
                      MD5:AA8DA83653A9194FD3D413521AE5D223
                      SHA1:A4F97416262BA8FCEAF7128B5EFF80CFBF46754B
                      SHA-256:EF98B9A31C0A5CFC2FFAC35CF8BEE6318ED016D04F45DF60169599561DF83F89
                      SHA-512:2CC60258CA0C714C3AF9EA84CC273DCCAFC6803BBB469B0F2ED405BA8B706756108DF19E9EA9A492CC6494454CA23E81F828703BDC08530CCCC32690F8925E24
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........T.......C....Q....$..Y@..........$....CAB-a2ad7be13bbd049ca6ac1c69196b3abe1.2......9..`.resS........$............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26908914
                      Entropy (8bit):4.039617588290326
                      Encrypted:false
                      SSDEEP:
                      MD5:95518FDFCD7556CFDE734C099AEC1898
                      SHA1:DE7473D69ED7B09D418F217B2C17C9757F2A295E
                      SHA-256:A39BA041AA9DD67FBDAE6EAF2FF3B7E81778319892B13F1EAF2E8AB5ABB73426
                      SHA-512:62375115C7E09156DA0C90E98BB157C0DA90DA1F00982A8C93D5D44F97CD394A23DFF8F51D260FC02FD3C062CFFD3DEB014AC48F842C463598C3842A99C5DDE6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............U.......C....P....l..i.@..........l....CAB-74beadb11c188e5171c02b0c7121cdda1.2......9..`.resS...*M...l......*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):10519904
                      Entropy (8bit):2.970244927779966
                      Encrypted:false
                      SSDEEP:
                      MD5:7F58F5D3491B088CB9E0B95CE7CEBFD3
                      SHA1:7483625E5E71828634D68977C3B047AD07CEA005
                      SHA-256:403CE10684248FFC199E5FC46070F1692E45AF92EFF7521ACB2C2CEF8F861335
                      SHA-512:2C248F494271477E3CBC2E9FF8A0C0DE8A92E8B63AA5004C128E86F192D72650B2083DD32FB52035E26B3C0F9A465AF789D2B34E1D8B20255ED3FC3176323697
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........`...S.......C....Q.......Z@..............CAB-47b2f29f8e1f9f0ade99e80863b932391.2......9..`.resS....]................2018.4.0f1..................l@.})Q...OZ`.O]$...q.......j...7...................H.......................1...1............@..............................Q...j...........................................L................@..........+.......................3.......................<.......................P.......................`...................L...k...................L...x............@.......................@..................................................................................................................................................................................................................................!.......................2...................~...?............@..................................j...................J...X.......................e...........................................H...l....... ...........1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4223403
                      Entropy (8bit):2.96264075415929
                      Encrypted:false
                      SSDEEP:
                      MD5:E0D0D044A8251859E52B1020A711DD1D
                      SHA1:D7C6E87E9014ED2F10190EC545396C93A6029402
                      SHA-256:B2590B5C5498DABB0767C2DC70F62C29F20F2E6D9125B9C01668B4EF0254D326
                      SHA-512:C9711C10C064A99AA2B288E8A4B53BAF4FF914B55223CC8A68A1F26C5C1F41C7791354A980E6D2B8920081F1CA12322C2D298BF75930F236D4EB2A6EDCEC759F
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......@q....R.......C....R..@q(..J........q(....CAB-a525fc996d50aa1d1692eea6ef47adbc1.2..@...9..`.resS.......q(............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... .............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):390743
                      Entropy (8bit):4.757753053169112
                      Encrypted:false
                      SSDEEP:
                      MD5:BF517B6F2566B2A347D61D547F5A3010
                      SHA1:FD9D7BF39ED42F78E6E556FA0509D653980B1D2A
                      SHA-256:1E9EE45F5378BE6B0F36CAD0DB81A93B216ABDEB5AB1DE92D5E9ACE2788B6A32
                      SHA-512:F4392249E351341D22B407321FA0DF52F612D5ADBBFFEDC8E276A55EBA6B456BABFEA7FC4B0890300F0F08339BC3067A4C94652B38A3D40964CCFED5DB4D31E2
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........W...V.......C....Q.......Y@.........u.....CAB-0a0c11b0e439062c3220a782ff289a771.P........9..`.resS....*..u........@....2018.4.0f1......6...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):56777528
                      Entropy (8bit):4.663952448835111
                      Encrypted:false
                      SSDEEP:
                      MD5:712C940A6C7E1143F45B46A3C0144C47
                      SHA1:16414AD009E0FE1003B67E08EEFB79E6187D93C8
                      SHA-256:D2E9E83D02C1CE9BE2F9DD70552D2044DC967D545ECD8D45E70955F4632E94D0
                      SHA-512:496DABDD89FEFE40FAC193DAE53CC9890FC44A6ED6D70ED918B2011807BE07C0CADE04D5186B1EF27C887E8B279F738682DC3C6B772030D13B73159D11D4FB49
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......b[8...W.......C....P..bZ...i.@........!.....CAB-a62673ee17865bd44531d579bf7054d61.P..@q....9..`.resS......!.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):673338
                      Entropy (8bit):3.6816616482843227
                      Encrypted:false
                      SSDEEP:
                      MD5:174C2387445504037F7C7E2F3D02C873
                      SHA1:64A18221F3ADBA5ACD7E9B6527F5DC560674A6C4
                      SHA-256:8B2F58765947CE07CF7F2D7039085B6269A44338AC6E85B1F89BEF3A16D47A42
                      SHA-512:05F7EC433E80D1853238EB4075B7BF08C4398F2BC2154A4E5871992D31431F3DC089CA434ACD8BEE311D86373B00BCF875286AB1E2B6F178F31449D331FCD86A
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......F:...U.......C....Q...E...Y@.........%.....CAB-9354fa5e73ec3468b5428fc2a2b2b87c1.A... ...9..`.resS.......%.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9468684
                      Entropy (8bit):2.9824842201839834
                      Encrypted:false
                      SSDEEP:
                      MD5:6E97E24A64634AB59E1568363926FD7F
                      SHA1:E47369323D59C1A2661AB581147EF84D2E66EA23
                      SHA-256:0D02C289F03EFC3011977CAE86F51D0D3C02BE596488C25189E655AF58AE10FD
                      SHA-512:AE048CB41D961FB41587ED66DC65BCD65E164370080A2D0DB3B5AE4554381EF81D76F6283A475773F6876B4F4CF9BA8054B4EFC9C6759CD044DBCEBFA7FEB8E6
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......{....S.......C....Q...z...Z@........z.....CAB-86b6919f75670e9d14ba410afc0bacb51.2......9..`.resS....I..z........`....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1241117
                      Entropy (8bit):3.428596003902113
                      Encrypted:false
                      SSDEEP:
                      MD5:23F24B420167D84B99B6929BEDFBA2BF
                      SHA1:67911480B3FCC16AC3F10912ED442DEDDE770808
                      SHA-256:E5925DCEDF6E5648B0DE1C6D2B0219B140E1DE828D6E443891B9F4F6F453D2F7
                      SHA-512:9988569261B03BA7D18F26BFE4E96D6172028F95F54D684DE0EE59B420B4BABFA18B9CBB11D980618639198161D8188CF7029D902D6E5CD97028E1C4B4821683
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q......Y@..............CAB-d77ccebb33d084d12e347e6b2c1711b71.2......9..`.resS....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8363
                      Entropy (8bit):4.296487669823064
                      Encrypted:false
                      SSDEEP:
                      MD5:A1044162ED188507DB10235936188B79
                      SHA1:FB3AFEAA6BAA2665ED1AE1A3D076B16019E2A15D
                      SHA-256:EA8AFB823E55337D00759B753109B2341B52B70AED3793CE4763DEB9EDB7A76D
                      SHA-512:8B84DDA7E33BB9AE3691BD23D292E60EA6C2CD39C6D677C19F78DF9A8B2A95007CD0D2D8B689C61163329C4DF5E6EFD44E4D8421FCB16843AE327BDDD8A9DB0D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1....... ....?...[...C....Q... ;...@............CAB-3c1f85c07a60ada9ef43ca78ad4fc256....... ;............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1967938
                      Entropy (8bit):5.122252380883658
                      Encrypted:false
                      SSDEEP:
                      MD5:A02BC78BE76811E5A5BB8DAF23B7DA1D
                      SHA1:C1E59480E8BB8A03AB65362594CD7A6DEF9F4F95
                      SHA-256:3412A929102D568E961A85E59F1F9A51D4319684F9E8C66C270E3C87DDE619A3
                      SHA-512:EE130DB33F8744924644C9914E11AD1A7FFEDA79816BFC88FFDA41742ED534A7A6CD47613E2ADBF887590548CE0D53D1A7CA5692D554BAD3E57D552E44246493
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........B...U.......C....Q.......Z@.............CAB-744bb770c441702d00d3a9cba312bea41.P...=0...9..`.resS...*..........*.....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4397630
                      Entropy (8bit):3.0547149707603496
                      Encrypted:false
                      SSDEEP:
                      MD5:9F8614D8F25A238493A0B274A012AC72
                      SHA1:5EBA93815D11183A20A3BDD59AA232D4051E343E
                      SHA-256:771633F3D878E7828104D74F80A923484CCCA05A2A59235FC39F8404444B1BA2
                      SHA-512:2F21214093F22E3AC527A0DD632BFE11AE5875E8699455403D92DF4722C0618BA3FA87E36610E27E5F855696D2F066295F8A1757BEA719C59390C4BA9FFE36C2
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......C.>...U.......C....Q..C....Z@........A8....CAB-aed081d52bed71e807f7774623ab8e7c1.P..A....9..`.resS.......A8.......0....2018.4.0f1..........0........`.>....J6._.5.-...............7...................H.......................1...1............@..............................Q...j...........................................%...:.......................E...................1...1...........................................M...j...................H.......................1...1............@..............................Q...j...................H...`...................1...1............@..............................Q...j.......................n...................1...1...........................................H...j...................1...1............@..............................Q...j...............................................{............................................................................................................................... ..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2127768
                      Entropy (8bit):4.185018604479679
                      Encrypted:false
                      SSDEEP:
                      MD5:1EFB120D74FF820A07D0D41EFCC5FAE4
                      SHA1:0054FF322033A7270617DF75A765AC85165AAA63
                      SHA-256:467652BF4311DD82A5E85EE5D1BE275EFABD4FD4822B837CF4B594A0C9C63B00
                      SHA-512:322EB2DC2E1ADC645522E8DA552DAD3602E9C8158B2F7E5B66E7B09B932B80A5BFCA747C01FF43D9F8E343B75ACB2CF5FA61780BAE16D67E6AAEBDE01C95E150
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...... w....S.......C....Q.. w...Z@........w.....CAB-69af992d56e01a95aaa1c499eb1a9dae1.2.. ...9..`.resS.......w.............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):151014
                      Entropy (8bit):4.94268888679093
                      Encrypted:false
                      SSDEEP:
                      MD5:0626F50559090E8DA88D8F784B38AEE9
                      SHA1:6A17DBE50499BF360693A4D949F786A0D6946B54
                      SHA-256:EAD0A237E6AD5D33A8BAD91E87E9DEE3B9426BD707DD2440F62387DED963BF00
                      SHA-512:86A6955C0851A19EE2A93429F5072289B5BAABE101143A0D8D0870436F094B5CEA05EFB11EF0A3EA82E708B26FEB3202D1839C516E695B4245671E6D32783F78
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......M....@...[...C....Q...Mu...@.............CAB-7de1a6f5dd46fcbb291f906ea10c4230.......Mu............2018.4.0f1......'...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):572744
                      Entropy (8bit):2.946245072780572
                      Encrypted:false
                      SSDEEP:
                      MD5:46B2BA7DD966CF773A6EA0DE17CB2F78
                      SHA1:B46C00B3F2BF596543AD56F9A8353FE4285F9397
                      SHA-256:F2AC13B4399D9BBD1A17E0D3A5252FA065806E150A013794E7107FF629E2564E
                      SHA-512:C1163F89576E40EEF0142B11C5387928085D0C9BBA4B58F468808DEC3202595E2E7D8735F39C3C7E4DD245939417CE3891796BB84392FE65FFBECFB476B8551A
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........H...S.......C....Q.......Z@..............CAB-49b497df36deb5dbb092512c21923fae1.2......9..`.resS...|...........}.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):139849
                      Entropy (8bit):4.798487533593475
                      Encrypted:false
                      SSDEEP:
                      MD5:8C5B57A4095596A1D3CE2DE3396C3338
                      SHA1:0200A5D0D279CB9C302E2E4E8DE1C07B897B109D
                      SHA-256:A7572A731079D4B024BA04E03FEF9E742C962818C5FDABBF0882C0FF1CCD5E92
                      SHA-512:F7689D113FC5015F86C1F7B44DA0ADC1FCF06DB3DC99F38D696140D72FF109EFC043E7D958B1E78302C1DB6D25D5B3C4BF3E4C497DF928DC2BBE07550E58C920
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......."I...@...[...C....Q...!....@.............CAB-41f32f6003c347f50de89963e40c90c9.......!.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26650042
                      Entropy (8bit):3.957136876968476
                      Encrypted:false
                      SSDEEP:
                      MD5:A478836B51172D8A4A842FC7B87E6671
                      SHA1:7A31902BB81C92DA4E6DC598EF140BA43068C252
                      SHA-256:FC9FCC171714FA977A2B8BF1AD31E76783B6B169384D6E039E07CAA2B02F9993
                      SHA-512:693551B29CE99CE06EA00773F831CFCA4452291077AC54AC963E2D64A69BC407A47FEB70F43781FAD88E435FD66270A655D1E2E014C7DFB577E128796F4E89C9
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............U.......C....P....4..i.@..........4....CAB-e520187ced4a45e9e796f18c164190801.2......9..`.resS...Au...4......A.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):29798870
                      Entropy (8bit):6.898398087667104
                      Encrypted:false
                      SSDEEP:
                      MD5:A45A57A78281E263242A37C75BC00A95
                      SHA1:74EF68A6CE922DECB42BFE0D723DA7B88A3BEB46
                      SHA-256:CF8EC60BD2CF353A2ACF8620979CCADD12A96BD61F681E30FA05C0E7F1C951F0
                      SHA-512:7D742A1D3C4EA9E6CFD566BB2978320FE446FDD30003A8DA12D96778119E2EEE43001501A4036CAB6112DFF75781E89236AB0D8E073F0013D475AC57ADD88A35
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........U.......C....P...P..i.@........z.P....CAB-9785fd472b51ec16a0d72b18047b865b1.2..L...9..`.resS......z.P....... ....2018.4.0f1......4...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1052359
                      Entropy (8bit):4.404650983594886
                      Encrypted:false
                      SSDEEP:
                      MD5:9D180681FBF77A95E925BBD8377A6F72
                      SHA1:09E7C34C73A1C0A89ED00D95A240F0E289C71E80
                      SHA-256:242FD279CC3BEC645CD368F58A1120494CE6B55C211617F3C1CF1F4709CDB213
                      SHA-512:3AF18DA69E6B5A7957CF27B8B7D962CBA68666060E1AE17C066E444FEAC50B29C52FE4C7EE12DCA5BD15D2C77490AD8A513688D7602ADA509807BEB85395925C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............V.......C....Q....@..Y@...............CAB-8fa282e9b7a13da7405a65a8529978b31.P...UT...9..`.resS....Q...........p....2018.4.0f1......-...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):749540
                      Entropy (8bit):4.01683543994217
                      Encrypted:false
                      SSDEEP:
                      MD5:CCA326794444C2DC7E5446E72BC7B21D
                      SHA1:59AF728693B9AC3E59F7BD380290988C004E303F
                      SHA-256:7B3C4321DA803F92E872868118B3847CCAA191D1CF6373C653D8D536A331365D
                      SHA-512:47B771925E0D94AD506195261188BAE907A3339807CAE202B95723A0B115B9F48851459FAE121E1B874D6FC532DDEF0CEE0F2E0D2337678B15899072E5F40885
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......o....S.......C....Q...o`..Z@........o`....CAB-4164a6c7945961dddece268d38dfa6c11.2......9..`.resS....a..o`............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8421588
                      Entropy (8bit):3.140932751313066
                      Encrypted:false
                      SSDEEP:
                      MD5:8BC9FCE350C3BA5E71FE79FFE142AF56
                      SHA1:3733400AAFD40914B6219728AF8DA0DD4A212F46
                      SHA-256:01D3C0EF948A78B237749A75080776D6120345A174C09A90E92FEBEB6DDC48AC
                      SHA-512:7C3A7993E4997DF8A33A7F1F81CC5B56670C5F259C5D3027189F13E75F5C927195ED49F8872A4BB2BACC7D7CC5B0BB5E5F8152ACC057ECD9B41849F495C87D72
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............S.......C....Q....P..Z@.........P....CAB-e0b20f2b560013ca513f801b8a1b25e51.2......9..`.resS....5...P.......P....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):144741
                      Entropy (8bit):4.650007153996416
                      Encrypted:false
                      SSDEEP:
                      MD5:BAF64AEEA4A855B40D1C8E1E1BBB306A
                      SHA1:6D20E95681E3F1FE448843FBA4D4A5066C02B76A
                      SHA-256:930E4AB6F8D979EC9EA5CD3856FEC4971F9B080E008B7DE3E013D4572DFCE34C
                      SHA-512:BE1AF3472B3DFA8015DDA64CA4E9F1E09FABFC8244B2DBE226FCDD08DC76CCEC4FC27D8E5613A141C9702E694115086690D66507BE3DE2C1523B9A3BDC58414D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......5e...P.......C....Q...4...Z@........4.....CAB-7879df8f39ef95d0793454ddedc9f50c1..G..9..`.resS....E..4........`....2018.4.0f1..................l@.})Q...OZ`.O]$...q.......j...7...................H.......................1...1............@..............................Q...j...........................................L................@..........+.......................3.......................<.......................P.......................`...................L...k...................L...x............@.......................@..................................................................................................................................................................................................................................!.......................2...................~...?............@..................................j...................J...X.......................e...........................................H...l....... ...........1...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1403349
                      Entropy (8bit):4.251384546699185
                      Encrypted:false
                      SSDEEP:
                      MD5:DBB60C190C4BBDFB8CCFC3A6600E464A
                      SHA1:2B2411B659AF6B402D8B4BECC40F5566577EABC4
                      SHA-256:F1A7691E6D9DD674DB595B1E1CA84BF81B9664F69882232688F0646324B4C232
                      SHA-512:FBF4861FA8D17A34FC5868EECB6E32BE572E0B75D2CF6CC26B3A98B32D9B76E08C32BA103DBD316D847008EF62798A5DEB62A82915BCBA7FAF2595AE156E4EE1
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......i....T.......C....Q...iP..Y@.........iP....CAB-7b8ad44d29f1779cfadc0551713604a71.2......9..`.resS....t..iP...........2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):102869
                      Entropy (8bit):5.137931608196948
                      Encrypted:false
                      SSDEEP:
                      MD5:3CD01F8A84B7B95F445BAD69972BE0B3
                      SHA1:5A53CA26B81E217C62C41FD3D17129EB04C11B0C
                      SHA-256:6EACA75D6DEE29D8F43FD7A7C5884ED77901388102F186BCBCB8156DC1CD16C4
                      SHA-512:BBF88838CD1E2CAFACC2A34D30E4D97C7C714B935EF5287D94581444CD8E7B89EB3F3658401E1F7DD8D7D4214C62E213D211C700D5D32B0623B9235A27F5AD50
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............@...[...C....Q....d...@........d....CAB-cf66db178af08c7e0d384cec32b1d84c...k>...d......k`....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3823429
                      Entropy (8bit):3.671385896404096
                      Encrypted:false
                      SSDEEP:
                      MD5:F00D068A9596DF434DE1E8FCB661BAB9
                      SHA1:056E1C51BBF6AC77A776810581468BD6E10E3CF9
                      SHA-256:D4D33696FC0AFF0D5CCC8BD55A228EF6EA9C49B43BA3ED2E4B3AA98564EE54F5
                      SHA-512:876963BAFE9AE9F0E5C0B48CEE6EADFA41954471F9E3B61D92451D74E7E092598C4639A91E40EB2BF0C91CFB48C4955E3C08008641F12F30CD35F86E4C52560D
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......:WE...T.......C....Q..:V...Y@.........V.....CAB-382161dbb8521b4c4b37210d84aa10a61.2..8...9..`.resS.......V.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6313455
                      Entropy (8bit):5.122006314916257
                      Encrypted:false
                      SSDEEP:
                      MD5:9EF98034669BEE87DEC9C3E629C16F92
                      SHA1:828AF67A5F7907D1D9193BE50BB1D058CD2779CF
                      SHA-256:42A4306570DCDEC851F168582FE44F65356F225A2CD212E082E12AC07DB10810
                      SHA-512:71915BC36D9EC574AC084669360DB5061ECF896F0022AC327A4230760E207944B11EE8742103E6EFA7B42421C1DEB334260048A521DD716B2FE218792DA58D4C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......`U....V.......C....Q..`Uh..Y@.........>.....CAB-9b7e801201578cedeaddaf1a948a7dae1.P..Y.....9..`.resS.......>........0....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):200656
                      Entropy (8bit):4.9808687061304715
                      Encrypted:false
                      SSDEEP:
                      MD5:76BFC2BC1AD4FD8C9803DA0E18D4B330
                      SHA1:D8111AB65A34CD2D1E929BF4E4E172306EA3B3A6
                      SHA-256:C5788BE1EB07531C6A77A5AEC7E77BD27C10050278A9570C09F8FAA1444D4811
                      SHA-512:25D2762828188EE0F7D7BC7EED6A9812E620C7613E4969BC61EF4B808DB69027B144E60BE0FCAE0A5CA367215E4471BDA35995AA70D65C491921FE4FE948E1F3
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............V.......C....Q....I..Y@...............CAB-48915f4aa9732c05f4120c5af1dc9cf91.P....T...9..`.resS...p~..........p.....2018.4.0f1......6...s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1333569
                      Entropy (8bit):4.406715536363374
                      Encrypted:false
                      SSDEEP:
                      MD5:9CC5CEF87415C0927138D8CF869FC9B7
                      SHA1:B703FD071790F9294A23AB25B4FCDF8018F96C58
                      SHA-256:3B50B8741C378432D34FFBC4FC3365399D2AF88562C2CAC77BE0CB9FCF94FBB7
                      SHA-512:BA4E43191B8733E55EC17ADBC274B2A46823A63C14FA48B8AFDA66D0BA03E0A95F805DF02DBCFC4F0D4536D23F4677240855C7E62CBFFF4532228FDCCC83F61C
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......YA...T.......C....Q...X...Y@.........X.....CAB-01b416ee8078a7addc4e0bf7ee4909061.2......9..`.resS....t..X............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):82993
                      Entropy (8bit):3.1536080150175034
                      Encrypted:false
                      SSDEEP:
                      MD5:06FBA3137C6AD02FEC540D438F4943E8
                      SHA1:EE0B23446990B7F99FB525B829C8733D67D4F761
                      SHA-256:9A7FD51AE6962D7FA5CAF02FE830D9442EC323F6CE91A31F98C10297FFF2D920
                      SHA-512:2D4D9185A57348B4DC7E500FADC84A19AD86CA82B69139FAC481E26E2A576AA9DB5111A1DABF6F66B7AD3FDD048CEB1CED3FD418C0073331098B43F8B4459A45
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......D1...@...[...C....Q...C....@.......C.....CAB-95fcafa35f72558b5a8c79d39e617d14...g...C.......g.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26424102
                      Entropy (8bit):4.220925506166558
                      Encrypted:false
                      SSDEEP:
                      MD5:D5170DFAC8408287955AAB2603DF0F4F
                      SHA1:1BDC635511A96F5CD5CBA938708EC9C9C1C9C525
                      SHA-256:26CC6EDF604804604D9114A43EB276F0BCF383C19C19A8B5BC703469BF9FEAF6
                      SHA-512:276A7A2CFE4032DA28F00DDB550B46A979972F7B40B597EB31125D86280E91675204C7F2108EE0B8C5751C1BB289B1A348C866DC2B5FF4764F42996E309CB8BE
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......3&...U.......C....P...2...i.@.........2.....CAB-eeb1e46a2c62907cf86ea26c6488076b1.2......9..`.resS...*M..2.......*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26817083
                      Entropy (8bit):3.959558247595731
                      Encrypted:false
                      SSDEEP:
                      MD5:83E2B673B2631D87E65940062342D830
                      SHA1:9E5E57F0DB577EE251727AAB92D19C2FED43F3FE
                      SHA-256:AA2B3A3B3347A105E24B968C0D135244B9B5327E463CBE4D1048FB451123BA41
                      SHA-512:D82FD6CBCBD057EAD162718AB430F845C183AA79209B442CD025E9FD79238499A0B864205D3C68601F0B97E11C6BB1F4E751386A68CD53FE5284F1D90C94AA8B
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......2;...U.......C....P...1...i.@.........1.....CAB-f4497f334d1cddc1f17cfb3ae701c2511.2......9..`.resS...*M..1.......*p....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8940256
                      Entropy (8bit):3.9781928561120727
                      Encrypted:false
                      SSDEEP:
                      MD5:30F8D64AE75228F4D18961E7C093972A
                      SHA1:4A86A66F0BF4860D793CFA57F7B059F133FA14B4
                      SHA-256:14AD8ECC8CDA8150F5080E9104AF2292D7E51EC8658323268C9F04BF673C7C78
                      SHA-512:3D1F5A5CB28142510D78B4D4A1754A4016C6D8516B61E651B847D47E4F2F4B1E05B38D593126453492B95BBDC076557BFA084F3647F1B2589CA9D2B4BF9FEC96
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......j....S.......C....Q...j\..Z@........j\....CAB-1805b146efbc488330fe6c7f2b2987c21.2......9..`.resS.......j\............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1403669
                      Entropy (8bit):4.279607727559585
                      Encrypted:false
                      SSDEEP:
                      MD5:7013EE1EEC1292123B0DD11FBA1EBFBF
                      SHA1:29927FA710EC4ABEFA4E66DD5FFC5DFEA9AAA8AE
                      SHA-256:974B4BD7C7BE4CBC656851068A7502462743E9E724C6DB66EEA8BCD7EA553015
                      SHA-512:19F1CE0D637B71266D648B27DD7C3E9B14B44CA2F4D13CDDBB3FF44438A883997FCDBC4F86746AB80BEAB918371307C0D653F601F65DF631607FA787B53C7F96
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......k....T.......C....Q...j...Y@.........j.....CAB-b12af3065b0b4cf23a7f3917afa2ef691.2......9..`.resS.......j.............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1239613
                      Entropy (8bit):3.199107433005517
                      Encrypted:false
                      SSDEEP:
                      MD5:7F3B23A5724FEAEAEEA2CE6E70E735C1
                      SHA1:C62396BE96C1D404E2E5619FEC66D4304E6E423A
                      SHA-256:67A15783A70DC9F79094BF8ED3769F0EE17B3FF8EE310F0C7D77492B0113260C
                      SHA-512:979BA6CCBEA539B157CB0B7096CCC898A67C587C11894006947E8C1FBC4D816388FC7A5368C2C67AA8FF11D5CAFF2CF2753849AC209A8A89D51EF40FC192A927
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........=...T.......C....Q......Y@..............CAB-9e4c7385d513eee562d8dd49dd1f9a671.2......9..`.resS....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):751537
                      Entropy (8bit):2.3673813433941047
                      Encrypted:false
                      SSDEEP:
                      MD5:B7F4839BD69B903C258859707B7F690F
                      SHA1:B2DA7B1DA01D4A74BDB31FF4035F381D894BE98F
                      SHA-256:735E0539D787F175928959B4C51864809244C3F8BB1EF389A9CC83C8760CFF50
                      SHA-512:0346CD7D2153C56595FDF0F0D6C08B5B9C2563FC213FF6128F0EEBE4176B3560D2BF1AC5DE2CBCF9123186B33E0C5EED27ACE7AB58801CCE27BAF90E68E01A79
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......w....@...[...C....Q...w@...@.............CAB-0fb11575b56cfc7ebb0c50f9d7914a5d......w@............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@..................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1954541
                      Entropy (8bit):4.157336040176243
                      Encrypted:false
                      SSDEEP:
                      MD5:B10BC06A71F267593D4ED9FEC6E94EB3
                      SHA1:CE8BC1EC6184853E66A0ECBA05ACA9F965AA132A
                      SHA-256:CA58AD5D82EA53C79344F95955C0353E4D749009D2FBF3892FB2CB7EABCF4B80
                      SHA-512:C3B9AFE27D484FFAA0733AED7590EA28D8A5B571CC4D65D79809B00BA27734B4DEE59528A0718B94AE10B1947C3A0270004C3EA1554867C8AEA7882D5ACC5BD5
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1............T.......C....Q....h..Y@..........h....CAB-a14dcf19fddb3705e5086b11cd0f2fdc1.2......9..`.resS....9...h.......P....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):579224
                      Entropy (8bit):4.010049169603059
                      Encrypted:false
                      SSDEEP:
                      MD5:76822640B19874756EC989B15C44CF7D
                      SHA1:944DD75CC7B578177BEB251F39C67BC9CEA16296
                      SHA-256:BA4EB8020DD8A2211FB5A0120B0C44577C743A4A7AC6ACD3026862A865033519
                      SHA-512:77DC5FFFCA7FCFE62EBC952A9792DB7B29CEB628C24FB4185A113A522C2A5FE865C4CFB49103ED8182F159814BC1E9D81C01DE86B820D134CD67693BEFA0F164
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........S.......C....Q.......Z@..............CAB-1b76a9f7614e236d138c9e0ecdc705581.2......9..`.resS...}...........}.....2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2292716
                      Entropy (8bit):3.8014103143681357
                      Encrypted:false
                      SSDEEP:
                      MD5:BBBED8053E49716B105A4CC59B07575D
                      SHA1:AD2F57D346711365850137E620C6ACE1B35AEB56
                      SHA-256:FBBCFCEFEAC7E6498E3420BD3CF70212934684D3A2D47C334D94A7B81AB87EEE
                      SHA-512:19EDE0920A9F9C78667AD4805B4B254E99869FD9CDFB46D3ED8B81437B30D311760AE75B6259A2A3ED79ECAE621840B7702969D9E360CB111D9D9AAEA9637972
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1......".....S.......C....Q..".h..Z@.........h....CAB-175ae4f6a8fa1d641890315326b15b911.2.."...9..`.resS... Q...h...... p....2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... ............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1238325
                      Entropy (8bit):3.1961870774476533
                      Encrypted:false
                      SSDEEP:
                      MD5:440E85FCAA450F23DDEA3E3A18543A66
                      SHA1:A8A7487DFC1C16F8540306AC9827C1A8808CDAC1
                      SHA-256:6641997AD148A5D5942C2C0093AD6AD0FFF5AADD0D86D5036CA04272C5F542EC
                      SHA-512:05E6C20FBF8D56C5267F8D438A739DC98EE6179C808B3EEBE530E200350D75BADEFE0B273221208837F417127A311B6EA5A9D01330F35B2E073C26FEFDCAFD42
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1........5...T.......C....Q......Y@..............CAB-8f8785e5de105eae232a6b27357404c01.2......9..`.resS....................2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1338041
                      Entropy (8bit):4.246681462736214
                      Encrypted:false
                      SSDEEP:
                      MD5:229F961C1DA8EEAAF523301511D759FE
                      SHA1:FA5B101B60A30FD86D96BE0DF9D957BD3FC8602D
                      SHA-256:B3C4FDE9FD85511B69740781316628571B55BA006991E6D5FD9FC36C98EEC9DF
                      SHA-512:94BD83BCCC30883911BF7D0F744F61B5D0F93C7AAC52DC22B9F76EAB15DB717E0CDCA7995587F7396E27577AE0B652DE755D116BE2CFEEA9ED2AE3AB9C8BD760
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1.......j....T.......C....Q...j4..Y@.........j4....CAB-87d25a62e854e0525fe1224b607b66bf1.2......9..`.resS.......j4............2018.4.0f1..........s.......n.0..I?..'.B..#...............7...................H.......................1...1............@..............................Q...j.......................................................................*.......................3.......................<.......................E.......................N.......................W.......................`.......................i.......................r.......................{...................................................................................................................................................................H.......................1...1............@..............................Q...j...................H.......................1...1............@..............................Q...j...................H.......................1...1....... ....@......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1370301
                      Entropy (8bit):2.3600041795372313
                      Encrypted:false
                      SSDEEP:
                      MD5:86025B871726BA2360F86568A1A18F75
                      SHA1:367BDAB5327C345E4DC117A5DAC9FE0A2A426D99
                      SHA-256:DBA0F6F68645D3AC496D173DDC3A2AA1626A6C97AB520BF095946B34F6E6C081
                      SHA-512:C83EAB28BB6F9F467AF6B92812DD47DCAF60940A8893B99C9AABD4F0A54EDF16C39FE0B7FDE99D2CFFFEBD6B3D4CDCE38A423AB2A4DBF4109459FDCA48389721
                      Malicious:false
                      Preview:UnityFS.....5.x.x.2018.4.0f1...........@...[...C....Q....L...@.............CAB-1457626ee1715e49e1f0675a3b294745........L............2018.4.0f1.................1M..q68...b.c).b................7...................H.......................1...1............@..............................Q...j............................................................................................................................................................. ....................... ....................... .........(............. ....................... ....................... .........1............. .........3............. .........5.......................E............. ....................... ....................... .........M...................L...W............@..........c...............................................s.......................{...................................................................................................................1...1....... .......................!.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):14663
                      Entropy (8bit):5.000612535876868
                      Encrypted:false
                      SSDEEP:
                      MD5:FA6CDD95FC4BA5DC7C3F994CE70CEAFD
                      SHA1:CCA8F7257E2EFAFAE58EC30289D46E553246A1FE
                      SHA-256:218C0C4BB63EEB6FEE64118196E5536ACDFD32CC83CBCD834352D7961C328588
                      SHA-512:D57212EB884B7731C0A551CDDFC29EB2865EFBD05B935C8FE45BABF5551BD4B8BBB5D32D1546DA84AF092165BC3586FB955F6CDE18807B80283A5902E50A0225
                      Malicious:false
                      Preview:.9.............GiftPackageConfigure...GiftPackageConfigure2.9.............GiftPackageConfigure...GiftPackageConfigure3.9.............GiftPackageConfigure...GiftPackageConfigure4.9.............GiftPackageConfigure...GiftPackageConfigure5./...............ItemsConfigure...ItemsConfigure2...............w20076;20084;20093;20108;20128;20114;20117;20131;20134;20238;20079;20088;20102;20122;20139;20074;20082;20091;20106;20126..w20442;20443;20444;20445;20446;20447;20448;20449;20450;20451;20452;20453;20454;20455;20456;20457;20458;20459;20460;20461...............4006...4005...............4006...4007-refresh_activity_note...............4...0./.............TiroGuideConfig...TiroGuideConfig5.................20237|20238|20236|20235|20339|20077|20074|20075|20076|20078|20079|20080|20086|20088|20087|20089|20085|20082|20083|20084|20094|20091|20092|20093|20095|20102|20096|20104|20103|20097|20098|20099|20101|20100|20112|20122|20113|20124|20123|20115|20116|20118|20121|20120|20117|20114|20188|20111|20110|2010
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):74966
                      Entropy (8bit):3.7498578212040603
                      Encrypted:false
                      SSDEEP:
                      MD5:3650772F7DC927FC7DA675DDA2C9C6FC
                      SHA1:BC731815BEFE7804F9C7935462982A2AF8DB1C5B
                      SHA-256:7DE778DEF781C894925599D556B73A407667A78F3AFA732F6590FD4DF7F9A7CC
                      SHA-512:6720BE9E141E07FAD71905184857B82DBAAAE277620CE42C11539C3098AE4ED781C622A45B125B1C066D92E271064AC3F9CDEA90AF75949EBFFD2B47B87F3415
                      Malicious:false
                      Preview:.............................&RunEscapeNew/UI/Buff/increase_FireRate............. ..........................................................................................................RunEscapeG_buff_01....................................................................................................................................................................................................................................................................................................................................................................................................................................&RunEscapeNew/UI/Buff/increase_FireRate........................................................................................................................RunEscapeG_buff_01...................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):10846
                      Entropy (8bit):4.67705854573131
                      Encrypted:false
                      SSDEEP:
                      MD5:1204E213C1C7A8BBD48D3767735B8435
                      SHA1:DB3C65D25AF2A5B2DBD8AF17D1561F1C341C1A59
                      SHA-256:4F19FCB880A77D60055F0F5AB57E6C82C2A69C26AAF3AEBE67B96DEA67BEBF4A
                      SHA-512:46D93225BE24412CE00CB60DA3DB80B3C1DB6ED88EF3D6C16CA6269DCFEF65643985A982AB65329B2748A1BD82C4698E9412EFA7E1507B345FA532298462E573
                      Malicious:false
                      Preview:./..............-1...8...............-1...-1...-1.+..............-1...9......10393:1...-1...-1.1...............-1...10...............-1...-1...-1.2................-1...-1...............-1...-1...-1./.................-1...-1......10394:1...-1...-1.0..........d...-1...20...............-1...-1...-1.,..............-1...-1......10395:1...-1...-1.0..........d...-1...-1...............-1...-1...-1.0..........d...-1...-1...............-1...-1...-1.9.......................-1...-1...............-1...-1...-1.>..............guild_flag_text1...-1...............-1...-1...-1.>..........d...guild_flag_text2...-1...............-1...-1...-1.?...............guild_flag_text3...-1...............-1...-1...-1.>..............guild_flag_text4...-1...............-1...-1...-1.>..........d...guild_flag_text5...-1...............-1...-1...-1.?...............guild_flag_text6...-1...............-1...-1...-1.>..............guild_flag_text7...-1...............-1...-1...-1.W..............-1...-1...............4304:1...sy
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2114996
                      Entropy (8bit):6.045049452428627
                      Encrypted:false
                      SSDEEP:
                      MD5:EFD491698CD925A02FC290D46C70FC96
                      SHA1:4C29A570AB409A6AA4A230F2E42B770266E7952C
                      SHA-256:639E41CB9AD7F2AF4AE9127A5ED86EA1EF2D63B6452958D97F0A999871508B3D
                      SHA-512:5702FF9B42DEB0055DDAAF9021D5DDE5B7DC6167A298173759D23A64EC6EA9E5C56954D80773259901A90A7FD4474571D98EB75675E233035A0CD8714B759037
                      Malicious:false
                      Preview:.....N.....N...N.......N......activity_centre_title...activity_firstday_title2.........* * 0-0 * *...* * 0-0 * *......activity_firstday_text2...activity_firstday_text2........%Sprite/UI/GiftIcon/Gift_ActivityScore.. Sprite/UI/GiftIcon/Gift_FirstDay..-Prefabs/Controller/OpenService/UIFirstDayCell..*UIEffect/prefab/FX_Gift_ActivityScore_Ctrl.....................................N.....N...N.......N......activity_centre_title...activity_firstweek_title2.........* * 0-0 * *...* * 0-0 * *......activity_firstweek_text2...activity_firstweek_text2........%Sprite/UI/GiftIcon/Gift_ActivityScore.. Sprite/UI/GiftIcon/Gift_FirstDay...Prefabs/Controller/OpenService/UIFirstWeekCell..&Sprite/UI/Banner/ArtSet/Activity_login..*UIEffect/prefab/FX_Gift_ActivityScore_Ctrl.....................................N.....N...N.......N......activity_centre_title...activity_gold_title.........* * 0-0 * *...* * 0-0 * *......activity_ghost_note........%Sprite/UI/GiftIcon/Gift_ActivityScore..#Sprite/UI/GiftIcon/Gif
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1463636
                      Entropy (8bit):6.020831059416595
                      Encrypted:false
                      SSDEEP:
                      MD5:2313C6E1D48433C7F305FD0B069F1AC8
                      SHA1:6B2DDCDC90E32B1F33576A7243BD15FC923651CE
                      SHA-256:1051DB5D9AF0E93830525B4078B473B58B9338D8DFEB1FB95D055E10BBC04F66
                      SHA-512:2DDA502C2AD8B51C9D5D70A94DC8B2F4B817F34E120B18162FC330F6ED4EF1B09C089FEFDE1A3E46400D4FFD47E2C16CA16298C047AB0599CB786D999C5C179A
                      Malicious:false
                      Preview:.....N.....N...N.......N......activity_centre_title...activity_firstday_title2.........* * 0-0 * *...* * 0-0 * *......activity_firstday_text2...activity_firstday_text2........%Sprite/UI/GiftIcon/Gift_ActivityScore.. Sprite/UI/GiftIcon/Gift_FirstDay..-Prefabs/Controller/OpenService/UIFirstDayCell..*UIEffect/prefab/FX_Gift_ActivityScore_Ctrl..................................N.....N...N.......N......activity_centre_title...activity_firstweek_title2.........* * 0-0 * *...* * 0-0 * *......activity_firstweek_text2...activity_firstweek_text2........%Sprite/UI/GiftIcon/Gift_ActivityScore.. Sprite/UI/GiftIcon/Gift_FirstDay...Prefabs/Controller/OpenService/UIFirstWeekCell..*UIEffect/prefab/FX_Gift_ActivityScore_Ctrl..................................N.....N...N.......N......activity_centre_title...activity_gold_title.........* * 0-0 * *...* * 0-0 * *...........%Sprite/UI/GiftIcon/Gift_ActivityScore..#Sprite/UI/GiftIcon/Gift_LimitedGold..:Prefabs/Controller/OpenService/UILimitedGoldActivitie
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):137294
                      Entropy (8bit):4.105956141260782
                      Encrypted:false
                      SSDEEP:
                      MD5:208F0AF5434F21B4E91942B182D11BDF
                      SHA1:4B684E1D4AEC8C0CD7A03BD73DB240C142D830E5
                      SHA-256:6304F293C4738E812DE1F1ABBC47372942F6B5F01914A026FC4D5890BD8A2C1B
                      SHA-512:E754E240459BD646CFA00930FC842BA7789D58A7496750097C17C49FAC3A4AFCCC3642ECA97188FFCAD252C74BDEF7679B642A71953F10EDB3DFEA0FF2CC22EC
                      Malicious:false
                      Preview:............E..)1:2:3:11:12:13:21:22:23:31:32:33:41:42:43... ......... ......... .........................................................................................................E..)4:5:6:14:15:16:24:25:26:34:35:36:44:45:46... ......... ......... .........................................................................................................E..87:8:9:17:18:19:27:28:29:37:38:39:47:48:49:10:20:30:40:50... ......... ......... .........................................................................................................E...1:2:3:4:5:6:7:8:9... ......... ......... .........................................................................................................E...10:11:12:13:14... ......... ......... .........................................................................................................E...15:16:17:18... ......... ......... .........................................................................................................E..'126:12
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):299404
                      Entropy (8bit):4.136786484426222
                      Encrypted:false
                      SSDEEP:
                      MD5:55855EF76C897BDDF66575F3982ED2F0
                      SHA1:C6E7E394A469DDF72B7D6565190A5CA9F00B532F
                      SHA-256:F61EF4DF6B609FC16043E7EA0FDEB45584EA9F4371014CC8B4CF92FD14E86973
                      SHA-512:38B3D5FFB2D09FB778ED979251EE6EB9FD7705B96F191183019B3C0BC7A6CF86CF1E1EDADF1FA515BB908B75459D33F4170899369A86EAE280AC6B97131FC2E2
                      Malicious:false
                      Preview:............E..)1:2:3:11:12:13:21:22:23:31:32:33:41:42:43... ......... ......... .........................................................................................................E..)4:5:6:14:15:16:24:25:26:34:35:36:44:45:46... ......... ......... .........................................................................................................E..87:8:9:17:18:19:27:28:29:37:38:39:47:48:49:10:20:30:40:50... ......... ......... .........................................................................................................E...1:2:3:4:5:6:7:8:9... ......... ......... .........................................................................................................E...10:11:12:13:14... ......... ......... .........................................................................................................E...15:16:17:18... ......... ......... .........................................................................................................E..'126:12
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):101894
                      Entropy (8bit):5.321538367376154
                      Encrypted:false
                      SSDEEP:
                      MD5:0186B0406419E217ED994A352BD4CDB2
                      SHA1:F066538047DE2C71A16E3F160512F207AE009A19
                      SHA-256:076268F18F50259C3BF7854C8CB3283A1B77C750F9705871773CB1CEDEA9922D
                      SHA-512:5FDABB70AA035ECF46180B7F0428508D2AB8FB4DF7BAD4B45682FF8B8777ACA29A196FE40C15E3924E0794C20473C634292FFF17E59FBAD865776730932691AB
                      Malicious:false
                      Preview:.8..N.....N.....!1009:96;1623:147;949:113;9843:100.........8..N.....N.....!1009:96;1623:147;949:113;9843:100.........8..N.....N.....!1009:98;1623:149;949:114;9843:100.........8..N.....N.....!1009:99;1623:152;949:116;9843:100.........9..N.....N....."1009:101;1623:155;949:119;9843:100.........9..N.....N....."1009:102;1623:158;949:120;9843:100.........9..N.....N....."1009:104;1623:159;949:122;9843:100.........9..N.....N....."1009:105;1623:162;949:123;9843:100........9..N.....N....."1009:107;1623:164;949:126;9843:100.........9..N.....N....."1009:108;1623:167;949:128;9843:100.........9..N.....N....."1009:110;1623:168;949:129;9843:100.........9..N.....N....."1009:111;1623:170;949:131;9843:100........8..N.....N.....!1009:111;1623:173;950:71;9843:100.........8..N.....N.....!1009:113;1623:174;950:71;9843:100.........8..N.....N.....!1009:114;1623:176;950:72;9843:100.........6..N.....N......1010:57;1624:89;950:72;9843:100.........6..N.....N......1010:57;1624:89;950:72;9843:100.........6..N.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):96224
                      Entropy (8bit):5.383378575176814
                      Encrypted:false
                      SSDEEP:
                      MD5:D95092AB43C7EFFF4CA1CE4173ED7C3B
                      SHA1:97562AE3B5C53360362BAE2AFEFDA795AB13DC25
                      SHA-256:DD3AC810FFBD05164EA0BBD0E3CF578BC667C5803B2A1AC205D8E4BBD725DB3F
                      SHA-512:583FE9D0E3FCAAE18305B023B0A8DD4AA0D5EAE8AB6602F8AE53E795DC51D40C8DEB1951AC03F5CD68166794ABCAF712CA33E1A7EDB7533FF38CB3F20AA7FF83
                      Malicious:false
                      Preview:./..N.....N......1009:96;1623:147;949:113........./..N.....N......1009:96;1623:147;949:113........./..N.....N......1009:98;1623:149;949:114........./..N.....N......1009:99;1623:152;949:116.........0..N.....N......1009:101;1623:155;949:119.........0..N.....N......1009:102;1623:158;949:120.........0..N.....N......1009:104;1623:159;949:122.........0..N.....N......1009:105;1623:162;949:123........0..N.....N......1009:107;1623:164;949:126.........0..N.....N......1009:108;1623:167;949:128.........0..N.....N......1009:110;1623:168;949:129.........0..N.....N......1009:111;1623:170;949:131......../..N.....N......1009:111;1623:173;950:71........./..N.....N......1009:113;1623:174;950:71........./..N.....N......1009:114;1623:176;950:72.........-..N.....N......1010:57;1624:89;950:72.........-..N.....N......1010:57;1624:89;950:72.........-..N.....N......1010:57;1624:89;950:72.........-..N.....N......1010:57;1624:89;950:72.........-..N.....N......1010:57;1624:89;950:72......".-..N.....N......1010:
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):35940
                      Entropy (8bit):4.393949237207946
                      Encrypted:false
                      SSDEEP:
                      MD5:FB4668A144CED2FA3108D1698BE227DD
                      SHA1:28A0BDD70DD8FB6F707ABB5A4EC12D1944671B8B
                      SHA-256:667C86A806F30A0DBCCFF04778D3D90F7CC3F91D4C2960667E9D5EB246FCA103
                      SHA-512:454F0340ACCDC30A14C35ABB06A16E0A3208554CAC5CC8D4CE4927C89AD3182908804B6F31CCF183372FB957E0954CE418A5B692E253211EAB4580F7353CBCB4
                      Malicious:false
                      Preview:......................................................................................................................................................................................................2.............................................................................................................................................................................P...........................................................................................................................................................n................................L..d.............................................................................................................................................................................'.....................0........................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3343
                      Entropy (8bit):6.035535815713126
                      Encrypted:false
                      SSDEEP:
                      MD5:4C52B642CF1A74A696BCB2AB0DCCCE44
                      SHA1:2A0E4740732874994BC407C1AEB388A8511F5D30
                      SHA-256:831E4A4FF953021C5CA5CA5EA2D140F1549FE4CF244DD18912808AE44BC9C512
                      SHA-512:D771D6191C8A2ACF7E42DD1E2BE7C3A9839A0FE8B1FF3CCB073EC576A61C1F419A30FACCEB247213E13E03C6855101ADC6DE4F4BE2045C1FC5CFFFE9CEE0436D
                      Malicious:false
                      Preview:....................Sprite/UI/UIIcons/Icon_Carry...active_desc2_1.......................active_title2...active_note2...963:8;1626:8;1006:8.......................Sprite/UI/UIMenuIcon/menu_4...active_desc3_1.......................active_title3...active_note3...949:20;1626:8;1005:8.....................Sprite/UI/UIMenuIcon/menu_2...active_desc4.....................active_title4...active_note4...40:1;1628:3;1006:4..................Sprite/UI/UIMenuIcon/menu_6...active_desc5.....................active_title5...active_note5...963:8;1627:5;1006:3................Sprite/UI/UIMenuIcon/menu_24...active_desc7_1..(..................active_title7...active_note7...963:8;1627:3;1006:3................Sprite/UI/UIMenuIcon/menu_b...active_desc8_1.....................active_title8...active_note8...949:15;1626:8;1005:8..................Sprite/UI/UIMenuIcon/menu_23...active_desc14_1..*..................active_title14...active_note14...949:15;
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5099
                      Entropy (8bit):6.018197957658298
                      Encrypted:false
                      SSDEEP:
                      MD5:5CBA5EDFF3340B117432A748C54121A8
                      SHA1:FB415AD2406748EEF7942AC30AC8DD62496CC65B
                      SHA-256:EBD6739580871F14C6EA9F1A83A028B5DA74285022E4176CE5755F15791C5FCB
                      SHA-512:EB77F7AB405F126DF35F90AFE133A405C8B05909D81F1377A8D741E719287065480D4BB991B1BB02DA3C45D2E719D4A208893972FFCD83BE177C0F491CAF32A2
                      Malicious:false
                      Preview:................... Sprite/UI/Icon/Others/Icon_Carry...active_desc2_1......................active_title2...active_note2...963:3;1626:3;1006:3................... Sprite/UI/Icon/Others/Icon_Carry...active_desc2_1.......................active_title2...active_note2...963:5;1626:5;1006:5...................... Sprite/UI/Icon/UIMenuIcon/menu_4...active_desc3_1.......................active_title3...active_note3...949:6;1626:2;1005:2...................... Sprite/UI/Icon/UIMenuIcon/menu_4...active_desc3_1......................active_title3...active_note3...949:14;1626:6;1005:6.................... Sprite/UI/Icon/UIMenuIcon/menu_2...active_desc4.....................active_title4...active_note4...40:1;1628:3;1006:4................. Sprite/UI/Icon/UIMenuIcon/menu_6...active_desc5.....................active_title5...active_note5...963:8;1627:5;1006:3...............!Sprite/UI/Icon/UIMenuIcon/menu_24...active_desc7_
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3779
                      Entropy (8bit):5.7360050441753545
                      Encrypted:false
                      SSDEEP:
                      MD5:1F0C2573CAE825FB15E860C0B7F35A77
                      SHA1:8C452BE58F2372EFCB8AFF700DF86309FE5CB0C8
                      SHA-256:BB1072E33B4698D3CC09141729F8A306ED55E497F3F34BFE4ADD9548EFE8AC5B
                      SHA-512:25620C9BBB36CE6B1F6042B4B3D83C48A5539028D48AEADA693D24D85F1297284352CD5B09F321BB59BD7D9A417A2D118E54232773E9B600A1F9E392DEDA298B
                      Malicious:false
                      Preview:.<....................4967......Sprite/UI/UIMainUI/Base/menu_8.>....................4968..... Sprite/UI/Icon/UIMenuIcon/menu_d.D....................4972.....&Sprite/UI/Icon/Others/Icon_RotaryTable.G....................4979.....)Sprite/UI/Icon/UIGuildIcon/Icon_GuildRank.G....................4978.....)Sprite/UI/Icon/UIGuildIcon/Icon_GuildRank.?....................4976.....!Sprite/UI/Icon/UIMenuIcon/menu_26.>....................4969..... Sprite/UI/Icon/UIMenuIcon/menu_d.D....................4973.....&Sprite/UI/Icon/Others/Icon_RotaryTable.D....................4974.....&Sprite/UI/Icon/Others/Icon_RotaryTable.C....................4981.....%Sprite/UI/Icon/Resource/icon_gold_128.G....................4977.....)Sprite/UI/Icon/UIGuildIcon/Icon_GuildRank.>....................4970..... Sprite/UI/Icon/UIMenuIcon/menu_d.>....................4971..... Sprite/UI/Icon/UIMenuIcon/menu_d.?....................4975.....!Sprite/UI/Icon/UIMenuIcon/menu_26.G....................4980.....)Sprite/UI/Icon/UIGuild
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5648
                      Entropy (8bit):5.748718676516685
                      Encrypted:false
                      SSDEEP:
                      MD5:314F31EC1A1B63D961CE72D49A9B6DAE
                      SHA1:3B08D8EBE32925D2EEEB334ADEA163BF9D4B46B1
                      SHA-256:EC62198F82999FF9A7ABFE274A37F1A2D5EEFCCAFC5A7298A1132F3653637DDD
                      SHA-512:5102D10357B8050D06FC0465214735518FDADC8EA7F846ACA36E43B9D05FAB92F1B27828CAE92EFBB5779B5E118F3C1C281219A46B546432F5DD43A5CA4AC769
                      Malicious:false
                      Preview:................................alliance_banner_detail1...Prefabs/Map/castle_Flag...Sprite/Map/world_guild_flag.........alliance_banner...alliance_banner_des1...30.........1|2|3|4.........5|6|7|8|9........'Sprite/UI/Icon/UIGuildIcon/Frame_Manage..................................30.....".buff_type_1.....1|2|3|4.....".buff_type_2.....5|6|7|8|9.....".buff_type_3...................................alliance_banner_detail1...Prefabs/Map/castle_Guild...Sprite/Map/world_castle_guild.........guild_city_name...guild_city_des2...30.........1|2|3|4.........5|6|7|8|9........'Sprite/UI/Icon/UIGuildIcon/Frame_Manage..................................30.....".buff_type_1.....1|2|3|4.....".buff_type_2.....5|6|7|8|9.....".buff_type_3..........(.........&............alliance_banner_detail1...Prefabs/Map/castle_Guild...Sprite/Map/world_castle_guild.........guild_city_name...guild_city_des2...30.........1|2|3|4.....#...5|6|7|8|9........'Sprite/UI/Icon/UIGuildIcon/Frame_Manage..............................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1220
                      Entropy (8bit):4.796654145317839
                      Encrypted:false
                      SSDEEP:
                      MD5:BA4406FB7763E76750D18D3B20DC73A7
                      SHA1:790CD99BA7E00771F0FFB5DCAF8D4DA2290256D9
                      SHA-256:5F8B9A1E6BA2A809172FA3D8F4EE0538102F07A1BF226544B9029055C461762B
                      SHA-512:30E624D34974E2A173DE1D821274BCD8D2707F7AC87418EA896C9B9CD8162CE256AC8BD7389DBC9CF059BA26F0CDAA17C52C63B9B09377D1D54533BFE8D34A5A
                      Malicious:false
                      Preview:...........................d..............................d................"..d.......$..d...........................I..d................1..........0..<................1..........0..7................1..........0..U................%..........0..<................#..........0..7................%..........0..U..............................d...............-.............d...............................d..............................d...........................+..d...................d...........d................1..........0..K................1..........0..F................1..........0..i................%..........0..K................#..........0..F................%..........0..i................"...............d............................I..d.............................d..............................d...........................+..d................1..........0..Z................1..........0..U................1..........0..}................%..........0..Z...... .. ......#..........0..U......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1787
                      Entropy (8bit):4.564380207289168
                      Encrypted:false
                      SSDEEP:
                      MD5:AD4E293935ED9F218364AA06056A604B
                      SHA1:C6669F694B6A32C375EF51628C5B0EEB597BE082
                      SHA-256:B44B16006FD73196A4276E9BB59C035ED8A5D8759641EC5A13CF6AB860BFBA37
                      SHA-512:923E46A8B4A497733498A5E5CCF1DDDE78C328080FA1F3D5E478E0359E437F7F7A1C9F621C94382ECB5B6593A81272872A95ED2A8A667C8B7E450D834DA48CF4
                      Malicious:false
                      Preview:.c........<.............500|500|500|500|50|50|50|50|50............1:60;2:60;3:60;4:60;5:60;6:60.....d.i.................d...500|500|500|500|50|50|50|50|50...........$1:200;2:300;3:500;4:600;5:800;6:1000.....d.h.................d...500|500|500|500|50|50|50|50|50...........#1:100;2:150;3:250;4:300;5:400;6:500.....d.h........0............#300|500|500|500|500|500|500|500|500............1:10;2:15;3:25;4:30;5:40;6:50.....d.h........6............#300|500|500|500|500|500|500|500|500............1:10;2:15;3:25;4:30;5:40;6:50.....d.h........E............#300|500|500|500|500|500|500|500|500............1:10;2:15;3:25;4:30;5:40;6:50.....d.h........G............#300|500|500|500|500|500|500|500|500............1:10;2:15;3:25;4:30;5:40;6:50.....d.e...........d.....d..#300|500|500|500|500|500|500|500|500............1:4;2:6;3:10;4:12;5:16;6:20.....d.g...........d.........$300|500|500|500|500|500|500|500|1500............1:4;2:6;3:10;4:12;5:16;6:20.....d.i........'............$300|500|500|500|500|500|500|15
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):750
                      Entropy (8bit):5.433642651819536
                      Encrypted:false
                      SSDEEP:
                      MD5:AD65AD8990CB77A398C77140639FE9FE
                      SHA1:DF0D2931CC835BBC382CBA42C2709CD0C0AC5012
                      SHA-256:9730F47D714F3019C2A277C80454D3A8E718CB0B44AC380418CDF09ED5203280
                      SHA-512:E5F96F63536A069D9BE9460619EC07E33B30DF5FFBB6B596E3CD1356A49790ADCAC6E854D5709F1C5087756505567E508B4A45A3D12BAA8102713895F77A64BA
                      Malicious:false
                      Preview:..................................................alliance_storehouse_title...alliance_storehouse_detail2...alliance_storehouse_detail1...Prefabs/Map/warehouse_Guild.. Sprite/Map/world_warehouse_guild.."Sprite/UI/UIGuildIcon/Frame_Manage..d...............w....w....w....w...........................alliance_storehouse_title...alliance_storehouse_detail2...alliance_storehouse_detail1...Prefabs/Map/warehouse_Guild.. Sprite/Map/world_warehouse_guild.."Sprite/UI/UIGuildIcon/Frame_Manage............................................G.....G.....G.....G...alliance_storehouse_title...alliance_storehouse_detail2...alliance_storehouse_detail1...Prefabs/Map/warehouse_Guild.. Sprite/Map/world_warehouse_guild.."Sprite/UI/UIGuildIcon/Frame_Manage....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1030
                      Entropy (8bit):5.282896469076475
                      Encrypted:false
                      SSDEEP:
                      MD5:B8885D434004AC0C17923009F422E8FD
                      SHA1:8507ECCEC29A5A59C073FC5022783EDCE77C6DCC
                      SHA-256:6E5ED96F0A86020E23F7F9A95E53E97C4A69071D5963CC56FE40C81C73CA1929
                      SHA-512:51CEC6037A648188C0CB6264AC1AB79A706CBDE8FDBAE2329C3FE9F8CBCB56725779364B2B3C70870C6448AED15CF1FCF27EE786F1BB65FC3C64A0B4E108C7C3
                      Malicious:false
                      Preview:.....................1625:40;963:40......alliance_treasure_activity...Sprite/UI/ItemsIcon/treasure1......alliance_treasure_activity.....................1625:40;963:40......alliance_treasure_activity...Sprite/UI/ItemsIcon/treasure1......alliance_treasure_activity.....................1625:40;963:40......alliance_treasure_activity...Sprite/UI/ItemsIcon/treasure1......alliance_treasure_activity.....................1625:40;963:40......alliance_treasure_activity...Sprite/UI/ItemsIcon/treasure1......alliance_treasure_activity.....................1658:40;951:40......alliance_treasure_activity...Sprite/UI/ItemsIcon/treasure1......alliance_treasure_activity.{.................3161:250;3036:250......alliance_treasure_miracle...Sprite/UI/ItemsIcon/treasure2......alliance_treasure_my.{.................3161:250;3036:250......alliance_treasure_miracle...Sprite/UI/ItemsIcon/treasure2......alliance_treasure_my.{.................3161:250;3036:250......alliance_treasure_miracle...Sprite/UI/ItemsIcon/treas
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1200
                      Entropy (8bit):5.42927399483733
                      Encrypted:false
                      SSDEEP:
                      MD5:37020A7A9FD08BE05098A93131154607
                      SHA1:9351A4F85B43A44B30E78FF66A79BF9C55F0717B
                      SHA-256:1D83B11042E2EAC532DBC962867763A657D5216C05BDA03AB0B21E64B2FCF610
                      SHA-512:949C34AD9680B9B4DB33702AE347D4FC8CF7140709138972258D365460398789C839D61498173F597F3726FADAF4C999FC6DDB34951EDD4A587F368ED328BB72
                      Malicious:false
                      Preview:.S........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_48.......1;5;9;13.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_49.......2;6;10;14.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_48.......2;7;11;13.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_49.......1;8;12;14.............S........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_48.......1;5;9;13.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_49.......1;6;10;14.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_48.......2;7;11;13.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_49.......2;8;12;14.............S........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_48.......3;5;9;14.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_49.......3;6;10;13.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_48.......3;7;11;14.............T........ArenaGuard..#Sprite/UI/UIMainUI/RoleIcon/icon_4
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3208
                      Entropy (8bit):4.884013034050262
                      Encrypted:false
                      SSDEEP:
                      MD5:9B32CC801BD30FBFFD181CDB27E36014
                      SHA1:43B39EB226CA04FA950901346AF62E83D9C2D19A
                      SHA-256:1650B48DC4B38A34185A740EB8D7CE0A657EB7DA95CE492261BD450D64A34DB9
                      SHA-512:A223E67955F27CD5A2F0E3386ECCF1C4FE9003DB1CAD9926C8D4A18F953C8CD052ABF3DE65E0FFC8D8B7BD99D4AF55806E2B7C32CAF356AB51F0A60C7EE21D46
                      Malicious:false
                      Preview:...............................[....[...0...0...180:5000;181:10;182:10;183:10.....10..........11..........12..........13..........14..........15..........16..........17..........18..........19..........20..........21............z...............................[....[...0...0...180:5000;181:10;182:10;183:10.....10..........11..........12..........13..........14..........15..........16..........17..........18..........19..........20..........21............z...............................[....[...0...0...180:5000;181:10;182:10;183:10.....10..........11..........12..........13..........14..........15..........16..........17..........18..........19..........20..........21............z...............................[....[...4...4...180:5000;181:10;182:10;183:10.....10..........11..........12..........13..........14..........15..........16..........17..........18..........19..........20..........21............z...............................[....[...4...4...180:10;181:5000;182:10;183:10.....10
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):296
                      Entropy (8bit):4.413939123510839
                      Encrypted:false
                      SSDEEP:
                      MD5:0D95EFADB86DA7B5E7436E11BF869738
                      SHA1:8745C910AA102CE8F8D180B94C196728E3090712
                      SHA-256:57F2C306EBC03B8496EAE60C90DB6A271FF1773419D583E6ADEFCA784FD9C206
                      SHA-512:2BC27994D7D06F2B55E9DF36DD01BD66E8C0BDF856DA5FF3790D72C2B2339EF201FA562602BD95D170B093079B6D5896EA67D1A98A2BE5FA8C36EE4A047C4418
                      Malicious:false
                      Preview:.....................>..........]..........}............................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):467
                      Entropy (8bit):4.739461524812042
                      Encrypted:false
                      SSDEEP:
                      MD5:31FE012C2D2BF7E9A0362187EE161A53
                      SHA1:FCB045380E52CA5FBB0EF59072DA29B3D831AC09
                      SHA-256:659E0DEDF61DCD71C805CFB2C4339BAE3DF3AC74657FF8695342E802B75A8B38
                      SHA-512:BFD87BAF9901118082D650543A5C8C412676F9DCA6A38CB908ABF3D5BDAFDB5B33817B839EE2B20411CAD5269517A968D00515CEC328347280151463EF00810D
                      Malicious:false
                      Preview:......................................................"..........+..........5..........@..........K..........W..........c..........o..........}....................................................................................................................................................................................................................... .. ........!..!........".."........#..#........$..$........%..%........&..&........'..'.......(..(.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):229365
                      Entropy (8bit):5.657509793590753
                      Encrypted:false
                      SSDEEP:
                      MD5:920488CC579A8153666D8C5BC97236E9
                      SHA1:25ADAAE9C8BDA812D7DE02C53DC47CDC88DCD492
                      SHA-256:9C1B39074629E434957A9D8B3DC15EF801C842B88C862A18049197FEB757563A
                      SHA-512:7FB16904B907C395D422C1B71441393B207D489CD4783D834A14A3CAC129222E50CFBA135B12E0831B805C8EC940A4807B09C72663216DAEE8D9FC72BC7826DA
                      Malicious:false
                      Preview:................troop_name_1...-1...-1........d..........2........ A....L>.........................................................................@.....?.....................................................B.....B.....B.....B...........B.....B.....B..-Sprite/UI/ArmyModel/Evony1/Army1/Army_Model_1..*Sprite/UI/Icon/ArmyIcon/Evony1/Army_Icon_1..-Sprite/UI/ArmyModel/Evony2/Army1/Army_Model_1..*Sprite/UI/Icon/ArmyIcon/Evony2/Army_Icon_1..-Sprite/UI/ArmyModel/Evony3/Army1/Army_Model_1..*Sprite/UI/Icon/ArmyIcon/Evony3/Army_Icon_1..-Sprite/UI/ArmyModel/Evony4/Army1/Army_Model_1..*Sprite/UI/Icon/ArmyIcon/Evony4/Army_Icon_1..-Sprite/UI/ArmyModel/Evony5/Army1/Army_Model_1..*Sprite/UI/Icon/ArmyIcon/Evony5/Army_Icon_1..-Sprite/UI/ArmyModel/Evony6/Army1/Army_Model_1..*Sprite/UI/Icon/ArmyIcon/Evony6/Army_Icon_1.............................-Sprite/UI/ArmyModel/Evony7/Army1/Army_Model_1..*Sprite/UI/Icon/ArmyIcon/Evony7/Army_Icon_1.....?.....?.....?.....?............................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9416
                      Entropy (8bit):4.799750773295187
                      Encrypted:false
                      SSDEEP:
                      MD5:A80186FCA75A59B69127086759BAD08A
                      SHA1:5F05117E82E4EB981E3FF1C7EB77E059723B6DF2
                      SHA-256:86AD98BBE4F7ABBCB481A4F73A58A670F649BFEAFBA2D1666CC549FE1E0CE511
                      SHA-512:443E4664AB8F449B212E0B3DE972CAEE8411B1669B9B48AC5A011F184AC0EC44E9178A8EFEF33C49DA5AFB298FA8C3537BCF43135A6806E4ADEB7C0D56275D3E
                      Malicious:false
                      Preview:.L......................102:1:10;103:1:10.......4489:10;4481:1...1000;1500.....L......................102:1:10;103:1:11.......4489:10;4481:1...1000;1500.....L......................102:1:10;103:1:12.......4489:10;4481:1...1000;1500.....L..................>...102:1:10;103:1:13.......4489:10;4481:1...1000;1500.....L..................N...102:1:10;103:1:14.......4489:10;4481:1...1000;1500.....L..................]...102:1:10;103:1:15.......4489:10;4481:1...1000;1500.....L..................m...102:1:10;103:1:16.......4489:10;4481:1...1000;1500.....L..................}...102:1:10;103:1:17.......4489:10;4481:1...1000;1500.....M......................102:1:10;103:1:18.......4489:10;4481:1...1000;1500...#.M.......................102:1:10;103:1:19.......4489:10;4481:1...1000;1500...'.M......................102:1:10;103:1:20.......4489:10;4481:1...1000;1500...*.M.......................102:1:10;103:1:21.......4489:10;4481:1...1000;1500.....M.......................102:1:10;103:1:22.......4489:10;448
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5405
                      Entropy (8bit):4.4737858139457405
                      Encrypted:false
                      SSDEEP:
                      MD5:ED283850A4CE673FD46D9B42BBC12A8A
                      SHA1:F347344C835EBAED63C6D43D1C7AB4ECC4F04964
                      SHA-256:461528E07AFEED8FB40A6DF819BDA0055D2CF34E7DD98640667A6F56AD51E230
                      SHA-512:83709D033307D116DE770EECA12BAF3A537547CDBC0B43C4C1907561EFB2A851FECA097827F00247DF3D3C6E65A9FD8F819788C7CF702012790B268473AC9AC4
                      Malicious:false
                      Preview:.$..................5351...5352...5353.$..................5354...5355...5356.$..................5357...5358...5359.$..................5360...5361...5362.$..................5363...5364...5365.$..................6026...6027...6028.$..................7867...7868...7869.$..................7932...7933...7934.$..................7997...7998...7999.$..................8062...8063...8064.$..................6029...6030...6031.$..................7870...7871...7872.$..................7935...7936...7937.$..................8000...8001...8002.$..................8065...8066...8067.$..................6032...6033...6034.$..................7873...7874...7875.$..................7938...7939...7940.$..................8003...8004...8005.$..................8068...8069...8070.$..................6035...6036...6037.$..................7876...7877...7878.$..................7941...7942...7943.$..................8006...8007...8008.$..................8071...8072...8073.$..................6038...6039...6040.$..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):32
                      Entropy (8bit):3.3125
                      Encrypted:false
                      SSDEEP:
                      MD5:66BE9E4C493958F0E1E841BC7489B9E6
                      SHA1:D67D0C878317CA051407F1C6290A6A9A8176AF86
                      SHA-256:368F4442405F5D877E89EEC17F59C1FC6E4F354AAF10677E149D25124BFE096B
                      SHA-512:B5100B1E4A87370A742AA9650DD8A12E546033128A9C0194015274B95317FF0726CAF9DB79FFDA48D6830A553B3563D1D96875B602717E4952585EA65E331C5F
                      Malicious:false
                      Preview:................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6125
                      Entropy (8bit):5.308044818458639
                      Encrypted:false
                      SSDEEP:
                      MD5:6436800114402F103BADDCE39501BA81
                      SHA1:20BFBE3C288BBB1715D7A953498B4DC9EE18102F
                      SHA-256:45C5A1791C21ED358922764DBECC9A803369F4674660D9B40DE68FD7E017C98D
                      SHA-512:23052C0167422F71CB97FC1E379823650DCF9E7080C0AA8F82871A466ABD9A456ACC9DE284B993CF8580CE1BED61BC0AACCDD2D3BD734E07C9DDCCD8396FFC97
                      Malicious:false
                      Preview:.h.............arthall_exhibition_title1......3219:20;3220:20;3221:20;3222:20...967:1;5:1;983:2.........-1.h.............arthall_exhibition_title1......3219:60;3220:60;3221:60;3222:60...967:2;5:5;983:5.........-1.n.............arthall_exhibition_title1.....#3219:200;3220:200;3221:200;3222:200...967:5;5:15;983:15.........-1.j.............arthall_exhibition_title2......3223:20;3224:20;3225:20;3226:20...3161:10;4:1;964:2.........-1.j.............arthall_exhibition_title2......3223:60;3224:60;3225:60;3226:60...3161:20;4:5;964:5.........-1.q.............arthall_exhibition_title2.....#3223:200;3224:200;3225:200;3226:200...3161:100;4:15;964:15.........-1.h.............arthall_exhibition_title3......3227:20;3228:20;3229:20;3230:20...32:1;9:1;1609:2.........-1.h.............arthall_exhibition_title3......3227:60;3228:60;3229:60;3230:60...32:2;9:5;1609:6.........-1.n.............arthall_exhibition_title3.....#3227:200;3228:200;3229:200;3230:200...32:5;9:20;1609:20.........-1.i.............arthal
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):243
                      Entropy (8bit):4.193576218165909
                      Encrypted:false
                      SSDEEP:
                      MD5:BE447543BD194BA31FA9A3F0C522A29E
                      SHA1:DE3999BF51F546CC5FFCB71B59B3B3F6BEAD397C
                      SHA-256:EAB23F9589AC9DC05DA0418AD1F937D17BCE6FC4E5ABD37E700723EC584D9D7F
                      SHA-512:EDA9743AA55751F721F58E3C83E96C2D82499E7F4005EFCED8A21C5DBEECD744842E23312E6010CF127A51E0669CAB0CD16D2F61C0E00AA22FA7F76F634329CC
                      Malicious:false
                      Preview:.......X...................0......................................................................................................X...........................................................H..<................"..d................'............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):242
                      Entropy (8bit):4.332674900230959
                      Encrypted:false
                      SSDEEP:
                      MD5:1838F35F2EA233809F5568D79917BC8C
                      SHA1:000C5CED3A87A39BADD9248503777618CA08F7B6
                      SHA-256:CA371D2A8DFDABB0B6FEAF03D2412C58BF72C1F543FA541B0F6591388543D5E4
                      SHA-512:0324603490C80422AEC3F723F15F9D43F0FA22888281FA46BC2149ECA10BD2520F576E1D3DAAB3C7B8D42968472428956ACF22B261CFED5369C6BF9318FA2ECF
                      Malicious:false
                      Preview:.......I...................0...................6................................................................................I..........................................P....................................."..<................'............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):281
                      Entropy (8bit):4.588570577858859
                      Encrypted:false
                      SSDEEP:
                      MD5:4AFA0EE018704E3D6124A63CF7D540C8
                      SHA1:22CD1C8840F3AF7AD32E1237F7CB78CF89199A18
                      SHA-256:07BD36AD8996F54D7742F25A4D2D55DFCAB5AE76E34B81D2F4E7FDBCB5838BA4
                      SHA-512:84E9B374F7B89D2D8BA0212B7F5D83E6C5E37E56D1A31B7147B9D0FADDAD0608ADD9AC5CA27B941929CB1D84A118368DD39FFEFDC998D14EB029E76C0DC33258
                      Malicious:false
                      Preview:.......0................350|480.......0........d...............................0................0|40................2...................2..........0................50|110.......'..................."..2................0................150|250..........d.........................2...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):278
                      Entropy (8bit):4.573658047107211
                      Encrypted:false
                      SSDEEP:
                      MD5:F2AD2C9F75BE4EFD61F4694DD0440915
                      SHA1:283C4B9146297468445B6EC3B0BE203A21F2E319
                      SHA-256:9E43A8E314C0F32F99CC392C0618A4F22237A84671383E1564782337C0A609D8
                      SHA-512:6D1F678B30A33A1C6C6F68B098D82125E0814DD7A1A02B3E623D09D8CA7C32890EA197917B6C55E6DFCB8D5DA5292BD17A871B08FE3B14D1221DC7DE01E667BB
                      Malicious:false
                      Preview:.......(...............450|600.......0........d...................d...........................0|300......."........d..........6........2..........(...............0|100.......E........2...................2...........................200|550................2...................d...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):278
                      Entropy (8bit):4.573658047107211
                      Encrypted:false
                      SSDEEP:
                      MD5:F022CCA9CD213CA882E45D6874DF1EE3
                      SHA1:7EF4680F66F572FBA76E0A3E710058430C590446
                      SHA-256:95CD36A2516812B39F955083D2CD7A85E8A0A467E81CCBB0915C698AA07D8FA6
                      SHA-512:3FF367C99385AFF60B669036D31044CF733A42934AD4F0940165E0DB2A0FCDB149BA12EA76CB1B20CB076115113F4A074402AF0AF152D123D2BD77972D251E92
                      Malicious:false
                      Preview:.......(...............450|600.......0........d...................d...........................0|300......."........d..........6........2..........(...............0|100.......E........2...................2...........................200|550................2...................d...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):278
                      Entropy (8bit):4.566463802502895
                      Encrypted:false
                      SSDEEP:
                      MD5:C96A1D44E3752D627DC3107F5DA03EFC
                      SHA1:07D2D36BABC7A0D23BE17D56A6CE3DE155BCDCF8
                      SHA-256:E64FC2467527D88C128ED92AD7F1F24F959DEDCA000BE431F5E03225442F8AB6
                      SHA-512:33947F39F78D5E0235BB1FB67299B8D115F8733B1E12D3B5EBDFFCE07B77ACB3DCFE44A806E24A0D30040980441CE382FD00E0DBB9F6A254DEFE02452AEFF286
                      Malicious:false
                      Preview:.......(...............450|600.......0........d...................d...........................0|300......."........d..........6........2..........(...............0|100.......E........2...................2...........................200|550................2...................d...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):281
                      Entropy (8bit):4.566241805807202
                      Encrypted:false
                      SSDEEP:
                      MD5:333AD92D08BFC65455B540FBB190C647
                      SHA1:87806BFE7E10FF20A7C2C69DDE3685510C6F48CD
                      SHA-256:6EDA879F264A0195D5AE6AF0BA18EAFA46062DDB19A79B8ECD5094717750B644
                      SHA-512:30BD0E0D5A6F40AEA2D4FF549044B85930F301B0D9F118D42B8C301A7AA47F503EB88811C85504F744C6CBF390FD1CE23C534E8DCFF82B7C309CA2094EF8414F
                      Malicious:false
                      Preview:.......0................350|480.......0........d...............................0................0|40................2...................2..........0................50|110.......'..................."..2................0................150|250..........d.........................2...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3516
                      Entropy (8bit):5.463221149585076
                      Encrypted:false
                      SSDEEP:
                      MD5:69E1F35878490A72BC1342A6B9D4D756
                      SHA1:8194248A60C39B771337BA31EAC68A5E84B4B763
                      SHA-256:46F6497585091AE6EDDE94022DFCFAF68BA2B249C4E2AE33E19EFA4E5DB09B5F
                      SHA-512:866DF8C0A508F9427C93379A5F3FB21AFB24E51EB51853F914CE34C2F393146C2AB31AB33FEE999C41EAE72E6E8797FFC41C90EEDE58681C8E0B95FA21E20926
                      Malicious:false
                      Preview:.3.............!..........F...........d...-1..........3.............!..........F...........d...-1..........3.............!..........F...........d...-1..........3................................}..P...-1...........3................................}..P...-1...........3................................}..P...-1...........3................................}..P...-1...........3........................:...........d...-1..........4........................#..........d...-1...........3........................:...........d...-1..........3........................J..........d...-1..........3................(.......J...........d...-1..........3........................J...........d...-1..........3........................J...........d...-1..........4.........................F...........d...-1..........2............ ..........U...........2...-1..........5........................N...........P...-1.......N....5........................N...........P...-1.......N....5........................N...........P..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1118
                      Entropy (8bit):5.3518163373008605
                      Encrypted:false
                      SSDEEP:
                      MD5:48F5731D738BA7EBB866B37F93C90058
                      SHA1:DDA3BACBD3E2E72C5D02B4F8B9491957334D962C
                      SHA-256:8CEE4B0BD06F30B7022AD7DA753A0D4E2A4E304EE90DC3327E9C2C2AB2A9DB27
                      SHA-512:D3D03C78119949AD6C5E504207B136079243542272439B6E0D58C111E5283861C94F48EEDA839E6EA9B8A86D98CCD88831F50EAD0EA48D5F6566B3FCF25158AF
                      Malicious:false
                      Preview:................avatar_4...dress_activity_details..#Sprite/UI/UIMainUI/RoleIcon/icon_48...aicon_1001..........mail_event............................avatar_5...dress_activity_details..#Sprite/UI/UIMainUI/RoleIcon/icon_47...aicon_1002..........mail_event............................item_name_key5204...dress_activity_details..#Sprite/UI/UIMainUI/RoleIcon/icon_54...aicon_1003...........mail_event............................item_name_key5205...dress_activity_details..#Sprite/UI/UIMainUI/RoleIcon/icon_55...aicon_1004...........mail_event............................item_name_key5318...dress_activity_details..#Sprite/UI/UIMainUI/RoleIcon/icon_58...aicon_1005...........mail_event............................item_name_key5319...dress_activity_details..#Sprite/UI/UIMainUI/RoleIcon/icon_59...aicon_1006...........mail_event............................item_name_key5441...dress_activity_details..#Sprite/UI/UIMainUI/RoleIcon/icon_64...aicon_1007...........mail_event............................item_nam
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):23082
                      Entropy (8bit):5.553990912555438
                      Encrypted:false
                      SSDEEP:
                      MD5:3356161D54C8565BF04B4AD8869E7824
                      SHA1:A4041A17DAB53C5D5079F836A6B85ECC9FDB7CBB
                      SHA-256:68081949B03B769C31874A4F305EE48AE4FE763BE6C9466437559D0359A4E70B
                      SHA-512:B5527D170776E6AB32038F9230F102010C13544F6FDA7E378CA350C9A62D8524A08EFA3F1D923A66E2BE3D8DD0F1B8E88078F5EEFAFD9611F8ED1E1419CA1B4E
                      Malicious:false
                      Preview:.r....................Sprite/UI/UIAvatar/frame_base_0......christmas_chat_details......christmas_chat_text1..................._...Sprite/UI/UIAvatar/frame_base_1.. Sprite/UI/UIAvatar/frame_graph_1...............profile_change_tips8......avatarframe_name01.....................a...Sprite/UI/UIAvatar/frame_base_2.. Sprite/UI/UIAvatar/frame_graph_2...............profile_change_tips1......honor_name2.....................e...Sprite/UI/UIAvatar/frame_base_3.. Sprite/UI/UIAvatar/frame_graph_3...............profile_change_tips1......avatarframe_name03............n....................Sprite/UI/UIAvatar/frame_base_4.. Sprite/UI/UIAvatar/frame_graph_4..................................b...Sprite/UI/UIAvatar/frame_base_5.. Sprite/UI/UIAvatar/frame_graph_5...............profile_change_tips1......honor_name6.....................f...Sprite/UI/UIAvatar/frame_base_6.. Sprite/UI/UIAvatar/frame_graph_6...............profile_change_tips1......avatarframe_name06.....................`...Sprite/UI/UIAvatar/fra
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):21683
                      Entropy (8bit):4.916338413469448
                      Encrypted:false
                      SSDEEP:
                      MD5:34CB80F4FEFB34F182AAE4C59A70FB5D
                      SHA1:5AE50942ED16B93510C98791FD38CAAD92C94DBC
                      SHA-256:2D1F59BC0672C8BF69FF0DABCF0AC6355BEEEBCC2CB79C4A88985D557B5DA87A
                      SHA-512:D68C6015E18DD1BF0CF989F3546F5AF16524DC173527B29C893EE9B12C4420680FCD906B2A80F51BD3087CF28CB6E3B8A2731E427080E35B15172C1551CB9F74
                      Malicious:false
                      Preview:....e..e...........810|13|16|19:0:1000;12|15|18|21:0:1000;11|14|17|20:0:1000...4:3000...24:3000...14:3000...34:2500...4|24|14|34:500..Z..n..d......1;11;21;31..P..x..................10|13|16|19..........12|15|18|21..........11|14|17|20.......54:3000;24:3000;14:3000;34:2500;1:10;11:10;21:10;31:10.........@.............f..f...........810|13|16|19:0:1500;12|15|18|21:0:1500;11|14|17|20:0:1500...4:5250...24:1500...14:2250...34:8250...4|24|14|34:750..Z..n..d......1;11;21;31..P..x........$.........10|13|16|19..........12|15|18|21..........11|14|17|20.......54:5250;24:1500;14:2250;34:8250;1:10;11:10;21:10;31:11.........`.............g..g...........810|13|16|19:0:2000;12|15|18|21:0:2000;11|14|17|20:0:2000...4:3000...24:2000...14:11000...34:7000...4|24|14|34:1000..Z..n..d......1;11;21;31..P..x........*.........10|13|16|19..........12|15|18|21..........11|14|17|20.......64:3000;24:2000;14:11000;34:7000;1:10;11:10;21:10;31:12........................h..h..........810|13|16|19:0:2500;12|15|18|21:0:2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1240
                      Entropy (8bit):3.9398914141870964
                      Encrypted:false
                      SSDEEP:
                      MD5:BEBDD09B42970DEE4E8812D301FD3DE9
                      SHA1:3A78F595886AE40CD60AA3E942B1AF5652A0C432
                      SHA-256:6F13055B9EAE5D3ADA229C170999B4662F4A36CB003283C02375B1873E152CAA
                      SHA-512:A31BDF9886ED1702C27A852A54789DFE5883A6A47A253CFD972EF75AC84E194971A92E06C57A1E997EBAAAB4344CF0CDC817FC02BDA0F633559B9CF8FA6EC469
                      Malicious:false
                      Preview:............B.....B.....B.....B............B.....B.....B.....B............B.....B.....B.....B............B.....B.....B.....B............B.....B.....B.....B............B.....B.....B.....B............B.....B.....B.....B...........hB....hB....hB....hB...........PB....PB....PB....PB...........8B....8B....8B....8B........... B.... B.... B.... B............B.....B.....B.....B............A.....A.....A.....A............A.....A.....A.....A............A.....A.....A.....A........... A.... A.... A.... A............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............@.....@.....@.....@............?.....?.....?.....?............?.....?.....?.....?... .. .
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):62360
                      Entropy (8bit):5.476262823846795
                      Encrypted:false
                      SSDEEP:
                      MD5:B6DECBD4A0331F27C6D961FE6B44A9D7
                      SHA1:8A2C988BD5B5451CF9DB5BC2F9BE26C0502C03B1
                      SHA-256:4A87075F99B6669BC3D78E1234263813DB8C72691410AFEB25486BCAB2FA85FB
                      SHA-512:E2C760E547DD9BD71EBDC2F6B34FAFB763EF42DD3B77407582919D3F01A1E0F9F734C4378549401B9182B941E177CA1074A8C83F79983A22EC26631F59FFCD30
                      Malicious:false
                      Preview:.$..>.....>......#..d...2:10...3:5;8:5.,..>.....>......#.......1010:12...18:10;13:10.$..>.....>......#.......983:1...984:1./..>.....>......#.......1005:30...1006:30;2489:1.)..>.....>......#.......7:30...36:20;40:20.'..>.....>......#.......963:10...1638:15.+..>.....>......#.......17:40...27:30;2489:2.)..>.....>......#.......1628:7...4:20;9:20.*..>.....>......#.......12:40...19:25;14:25.&..>.....>......#.......31:30...3261:20.&..>.....>......#.......36:18...1638:25.*..>.....>......#.......40:18...34:50;38:50.&..>.....>......#.......1625:30...32:30.)..>.....>......#.......27:30...947:8;46:4....>.....>......#.......30:50...1597:25;1600:25.*..>.....>......#.......1628:20...4:40;9:40.+..>.....>......#.......1556:8...19:40;14:40.,..>.....>......#.......3:40...1008:20;2492:3.%..>.....>......#.......8:40...2858:12.'..>.....>......#.......3161:60...4496:1.'..>.....>......#.......18:50...3036:250.%..>.....>......#.......980:15...32:40.'..>.....>......#.......13:50...3161:200.0..>.....>......#....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):22519
                      Entropy (8bit):5.314196260442093
                      Encrypted:false
                      SSDEEP:
                      MD5:7A0018D593B88F83E7923F61209C9ADF
                      SHA1:3B43C12C54981FAFF7B656842C0AA36EC37B10F9
                      SHA-256:60F82C6BCB14C580F6390E48DD32A8C0773E7035C6002BB49476AFEEB5C8AE56
                      SHA-512:4163CE6E4A5C11D2405E6526ED0D600873105E3B6EB8E0ED0D6E60E67AB94341594B0DBA6829EFF4151A3F845CE1470132C3056EEAC371C828982CF2B304F1AE
                      Malicious:false
                      Preview:.$..>.....>......#..d...2:10...3:5;8:5.,..>.....>......#.......1010:12...18:10;13:10.$..>.....>......#.......983:1...984:1./..>.....>......#.......1005:30...1006:30;2489:1.)..>.....>......#.......7:30...36:20;40:20.'..>.....>......#.......963:10...1638:15.+..>.....>......#.......17:40...27:30;2489:2.)..>.....>......#.......1628:7...4:20;9:20.*..>.....>......#.......12:40...19:25;14:25.&..>.....>......#.......31:30...3261:20.&..>.....>......#.......36:18...1638:25.*..>.....>......#.......40:18...34:50;38:50.&..>.....>......#.......1625:30...32:30.)..>.....>......#.......27:30...947:8;46:4....>.....>......#.......30:50...1597:25;1600:25.*..>.....>......#.......1628:20...4:40;9:40.+..>.....>......#.......1556:8...19:40;14:40.,..>.....>......#.......3:40...1008:20;2492:3.%..>.....>......#.......8:40...2858:12.'..>.....>......#.......3161:60...4496:1.'..>.....>......#.......18:50...3036:250.%..>.....>......#.......980:15...32:40.'..>.....>......#.......13:50...3161:200.0..>.....>......#....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):22472
                      Entropy (8bit):5.311508737127862
                      Encrypted:false
                      SSDEEP:
                      MD5:FE498D26FFE3E8B3D269564A54A2C166
                      SHA1:88A0E968BB1E3E69264E3BEACB72FFC8BF976F38
                      SHA-256:4573EE2B45D0790AC3AF93EA1FC85F3AA53C0D853E5D59BF612F8C6B00C20FEC
                      SHA-512:99A850BA0C3A2CA2316520738CB408AC41F892DBC81DB1F674869A5D002723CD8551CA303408B673BA26C30DF7366D54695E9B3BB6346CC4F88B1BE200AEEF09
                      Malicious:false
                      Preview:.$..>.....>......#..d...2:10...3:5;8:5.,..>.....>......#.......1010:12...18:10;13:10.$..>.....>......#.......983:1...984:1./..>.....>......#.......1005:30...1006:30;2489:1.)..>.....>......#.......7:30...36:20;40:20.'..>.....>......#.......963:10...1638:15.+..>.....>......#.......17:40...27:30;2489:2.)..>.....>......#.......1628:7...4:20;9:20.*..>.....>......#.......12:40...19:25;14:25.&..>.....>......#.......31:30...3261:20.&..>.....>......#.......36:18...1638:25.*..>.....>......#.......40:18...34:50;38:50.&..>.....>......#.......1625:30...32:30.)..>.....>......#.......27:30...947:8;46:4....>.....>......#.......30:50...1597:25;1600:25.*..>.....>......#.......1628:20...4:40;9:40.+..>.....>......#.......1556:8...19:40;14:40.,..>.....>......#.......3:40...1008:20;2492:3.%..>.....>......#.......8:40...2858:12.'..>.....>......#.......3161:60...4496:1.'..>.....>......#.......18:50...3036:250.%..>.....>......#.......980:15...32:40.'..>.....>......#.......13:50...3161:200.0..>.....>......#....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):64103
                      Entropy (8bit):5.702346648716723
                      Encrypted:false
                      SSDEEP:
                      MD5:66C597AB65D1D307BCAC32D9D74E279A
                      SHA1:712CF67D49E3AF511A96C98993D0638F25ED9225
                      SHA-256:15A4E589B0FFBE539B9EC0B9DC85E8E71BDF7858DF20495460DEB12AE31E486A
                      SHA-512:BFB18105A4A9DF0F79621DA0DCD1F8A16D824F6CB9810C92FB4C40F76B28D9B37BD0189766496D8847682F8D080C3A6542ABE4E5BE48105D48CF8E93DF2E605B
                      Malicious:false
                      Preview:...........................10|11|12........d...pve_battle_buff45...mail_solider1...pve_battle_buff49..'Sprite/UI/Icon/ArmyIcon/Common/infantry...........................13|14|15........d...pve_battle_buff46...mail_solider2...pve_battle_buff49..%Sprite/UI/Icon/ArmyIcon/Common/Archer...........................16|17|18........d...pve_battle_buff47...mail_solider3...pve_battle_buff49..&Sprite/UI/Icon/ArmyIcon/Common/cavalry...........................19|20|21........d...pve_battle_buff48...mail_solider4...pve_battle_buff49..+Sprite/UI/Icon/ArmyIcon/Common/SiegeEngines...........................10|11|12........d...pve_battle_buff16...mail_solider1...pve_battle_buff49..'Sprite/UI/Icon/ArmyIcon/Common/infantry...........................13|14|15........d...pve_battle_buff23...mail_solider2...pve_battle_buff49..%Sprite/UI/Icon/ArmyIcon/Common/Archer...........................16|17|18........d...pve_battle_buff30...mail_solider3...pve_battle_buff49..&Sprite/UI/Icon/ArmyIcon/Common/cavalry........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7499
                      Entropy (8bit):5.643752671380234
                      Encrypted:false
                      SSDEEP:
                      MD5:E2CB6B342D54415585F742D713FDF221
                      SHA1:998E75649CAFD7155508326BB6BD609CA862F241
                      SHA-256:29EEEF19308DD4FCAB102767294453AE59A364A52D179307412A281EDF95428F
                      SHA-512:A0A89549CAAF44B12F836806B3EB99939B46E1171308C824986B6EE3845D2D40EE9F10B3BF63D64CBF5F82564AA306BE177C7B90B05ABE9CC52E90DAFE8B0A62
                      Malicious:false
                      Preview:...........war_building6...............-1.........-1...........(......Prefabs/Map/Battlefield/Portal.."Sprite/Map/Battlefield/Portal_icon.."Sprite/Map/Battlefield/Icon/Portal..$Sprite/Map/Battlefield/Icon/Portal_1..$Sprite/Map/Battlefield/Icon/Portal_2.....$Sprite/Map/Battlefield/Icon/Portal_3..$Sprite/Map/Battlefield/Icon/Portal_4...-1.................war_building1...............-1.........-1....................................Prefabs/Map/Battlefield/Crystal..#Sprite/Map/Battlefield/Crystal_icon..#Sprite/Map/Battlefield/Icon/Crystal..%Sprite/Map/Battlefield/Icon/Crystal_1..%Sprite/Map/Battlefield/Icon/Crystal_2.....%Sprite/Map/Battlefield/Icon/Crystal_3..%Sprite/Map/Battlefield/Icon/Crystal_4...-1.................war_building2...............36....pB...-1...................................#Prefabs/Map/Battlefield/MedicalHall..'Sprite/Map/Battlefield/MedicalHall_icon..'Sprite/Map/Battlefield/Icon/MedicalHall..)Sprite/Map/Battlefield/Icon/MedicalHall_1..)Sprite/Map/Battlefield/Icon/Medic
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9012
                      Entropy (8bit):4.436352029843361
                      Encrypted:false
                      SSDEEP:
                      MD5:C8702148C8891E51479190895E1BCC3E
                      SHA1:385F23156D3733A90905FB91CCF4AD1EC494CC96
                      SHA-256:F02C52532067D08E96B15669287E4907C0E74699BE56F85139DDD57E0134E31D
                      SHA-512:E8991D986F1806F15A41747DC1053A3D464442641C072B9CA007E75FD19259797AC5121C228C0945FC0EA9CA3DD171240127084CE25F4E0B92BD6FF3EBA63A33
                      Malicious:false
                      Preview:.D........................500|500|500|500|500|500......................D........................500|500|500|500|500|500......................D.................(......500|500|500|500|500|500......................D.................n......500|500|500|500|500|500......................D........................500|500|500|500|500|500......................D........................500|500|500|500|500|500......................D........................500|500|500|500|500|500......................D........................500|500|500|500|500|500......................D.................<......500|500|500|500|500|500......................D.................<......500|500|500|500|500|500......................D.................<......500|500|500|500|500|500......................D.................<......500|500|500|500|500|500......................E.........................500|500|500|500|500|500......................E.........................500|500|500|500|500|500......................E................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):86842
                      Entropy (8bit):4.334620587814241
                      Encrypted:false
                      SSDEEP:
                      MD5:DD23845D8B183C9ADAB9172C8A281AFC
                      SHA1:3EEA2A213914EDCB4A7C21237E373A21021FE053
                      SHA-256:E17E7ADDD6D85E059DC8243493FBCC4E0124E5E405FDBA9E6385C3C548B5472B
                      SHA-512:766755D6A1D9B39C098AD4FB58DAB429175B389C9FD7F134FF3DB72A3C2279B7F66D4D83337C0E9EB8388DFE30066A96C95E67FB367E374684807304C05A70EC
                      Malicious:false
                      Preview:................................510|13|16|19:1:210;12|15|18|21:1:210;11|14|17|20:1:210...4:120000...24:120000...14:60000...34:300000...4|24|14|34:90000..P..x..d......15770:5;4717:10;949:10...85;85........k1:600;21:600;11:600;31:600;2:600;22:600;12:600;32:600;3:600;23:600;13:600;33:600;4:600;24:600;14:600;34:600..P..x...-1.......2000;1200;800;600;400;200...15770:5;4717:10;949:10...........18983:5000;19071:5000.................................510|13|16|19:1:220;12|15|18|21:1:220;11|14|17|20:1:220...4:66000...24:66000...14:330000...34:198000...4|24|14|34:99000..P..x..d......15770:5;4717:10;949:10...70;81........k1:660;21:660;11:660;31:660;2:660;22:660;12:660;32:660;3:660;23:660;13:660;33:660;4:660;24:660;14:660;34:660..P..x...-1.......2000;1200;800;600;400;200...15770:5;4717:10;949:10............18984:5000;19072:5000.................................510|13|16|19:1:330;12|15|18|21:1:330;11|14|17|20:1:330...5:180000...25:180000...15:180000...35:180000...5|25|15|35:108000..P..x..d......1577
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):38242
                      Entropy (8bit):6.040888062978425
                      Encrypted:false
                      SSDEEP:
                      MD5:9DB05EEF682D25629506C2F1A86DAF9D
                      SHA1:8915FE7B8FDE32523E137238EAB66311EFB6E6A1
                      SHA-256:E374CB42E1E86F94D5CC68BE39A9C3E9583894B22B90A354950F8D8A054D82AB
                      SHA-512:1038E01BD773958622048BE8AE2DCC8F70DD4822A51DE8F76E7A4DC28183121057762817653A79BD2F611DA9089E73DA343B01984F514B365839DF8253BA14AE
                      Malicious:false
                      Preview:...................&........0......new_battlepve_skill_desc1...10...new_battlepve_skill_desc1...10.....658........15146:200...new_battlepve_skill_desc1...10...................&........1......new_battlepve_skill_desc1...10...new_battlepve_skill_desc1...10.....658........15146:500...new_battlepve_skill_desc1...10...................&........2......new_battlepve_skill_desc1...11...new_battlepve_skill_desc1...11.....658........15146:2000...new_battlepve_skill_desc1...11...................&........3......new_battlepve_skill_desc1...12...new_battlepve_skill_desc1...12.....658........15146:4000...new_battlepve_skill_desc1...12...................&........4......new_battlepve_skill_desc1...13.5...new_battlepve_skill_desc1...13.5.....658........15146:8000...new_battlepve_skill_desc1...13.5...................&........5......new_battlepve_skill_desc1...15...new_battlepve_skill_desc1...15.....658........15146:16000...new_battlepve_skill_desc1...15...................&.......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3243
                      Entropy (8bit):5.841696073111259
                      Encrypted:false
                      SSDEEP:
                      MD5:12FD3C19C221C81ECEEC1CBACCF5B9AB
                      SHA1:5DC980A3F3F659C779B203D2DF835DB8E61EDB98
                      SHA-256:97CD7E9F9485367239F48B76931D5DFD71633C55B85226F1155F05FC5D21E63A
                      SHA-512:3149535D5DC47B58D6F45F19C703D56D1CDFABE22DA580ADE9FEF07ED041828C4C0539FB8F8DCD055BB1096E319B63ACA78394A74FAFB808BB530A15514AB1FE
                      Malicious:false
                      Preview:..............beauty_skin_blue1..;beauty_skin_text106;beauty_skin_text107;beauty_skin_text108....{H.....$Prefabs4/BeautyModel/BeautyModel_1_2..................34.....".buff_own.....79|83.....".buff_use..9Sprite/UI/Background/Activity/BeautySkin/BeautySkin_head5.....................................activity_outfit_scene2..cbeauty_skin_text101;beauty_skin_text102;beauty_skin_text103;beauty_skin_text104;beauty_skin_text105....{H......Prefabs4/BeautySkin/Helen_1..................176|177.....".buff_own.....26.....".buff_use.....105.....".buff_use..;Sprite/UI/Background/Activity/BeautySkin/BeautySkin_head005.....................19731:1.................item_name_key5257....{H.....'Sprite/UI/Background/Beauty/bg_beauty17..JAssets/PackageRes/Raw/UIEffect/prefab/Event/BeautySkin/Helen/Bg/Helen_Bg_1...............'Sprite/UI/Background/Beauty/beauty_bg08.....................19756:1...................................christmas_chat_text1...........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Bac
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):20331
                      Entropy (8bit):5.054334576587554
                      Encrypted:false
                      SSDEEP:
                      MD5:6B5AC2C1D80D7A8AA3BFD3CEFA9221FE
                      SHA1:08E33E51B6C1292184E13AA3ECD26BB10780D38A
                      SHA-256:CDC5C840BE720AACB2815AB885B6C920A3FC6F8A716EDC567E736EA3119D0177
                      SHA-512:0F5FA514E0441C6377A25868C26A2EA8FC7A38FA4F013D12430C12B8EEEC645E011B54768D36BF21C56C58E17504E61E5878550E69E88006B625654D20C3AED7
                      Malicious:false
                      Preview:.r................965:1;6244:1;4365:3...u...6......10001;10002;10003.............965:1;6244:1;4365:3|7737:1........<.....................967:3;2485:1;6244:2;4365:5...u...6......10001;10002;10003............!967:3;2485:1;6244:2;4365:5|7742:1........<.................I...967:5;2485:1;6244:3;4365:10...u...6......10001;10002;10003............"967:5;2485:1;6244:3;4365:10|7738:1........<......................967:7;2493:1;6244:5;4365:15...u...6......10001;10002;10003............"967:7;2493:1;6244:5;4365:15|7743:1........<......................967:10;2493:1;6244:7;4365:20...u...6......10001;10002;10003............#967:10;2493:1;6244:7;4365:20|7739:1........<.....................1563:6;2493:1;6244:10;4365:25...u...6......10001;10002;10003............$1563:6;2493:1;6244:10;4365:25|7747:1........<......................1563:8;2493:1;6244:15;4365:30...u...6......10001;10002;10003............$1563:8;2493:1;6244:15;4365:30|7740:1........<......................1563:10;2493:2;6244:20;4365:35...u...6..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):56739
                      Entropy (8bit):5.579417320342093
                      Encrypted:false
                      SSDEEP:
                      MD5:7FCE5C02E778632C1E6E1C5D59EC4121
                      SHA1:3C14FB44FC41026577F3CF2630E1A235B38C1DDF
                      SHA-256:071BCCCFA9A9C2B3E22D28AC78AF1458299BC0D764E141E0A934FD661C8369B8
                      SHA-512:92CD3EE2AE71BC05483FCD9BCBE5AE79B267058BC49AB4666FBCD1201392C6BBF156D6937021B7552939E90DF93BF4A9A63948B03EE50DDAADA695657E0E9E73
                      Malicious:false
                      Preview:......................beauty_system_plot1.......5046:200;5067:15;5068:30.......5046:200;5067:15;5068:30...beauty_system_plottitle1..$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.t...................beauty_system_plot2........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.t...................beauty_system_plot3........$Prefabs4/BeautyModel/BeautyModel_1_4...Sprite/UI/Background/bg_beauty.t...................beauty_system_plot4........$Prefabs4/BeautyModel/BeautyModel_1_4...Sprite/UI/Background/bg_beauty.t...................beauty_system_plot5........$Prefabs4/BeautyModel/BeautyModel_1_4...Sprite/UI/Background/bg_beauty.....................'beauty_system_plot6:beauty_system_plot7........$Prefabs4/BeautyModel/BeautyModel_1_4...Sprite/UI/Background/bg_beauty.....................(beauty_system_plot12:beauty_system_plot8........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.....................(beauty_system_plot13:be
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):56739
                      Entropy (8bit):5.579055346942034
                      Encrypted:false
                      SSDEEP:
                      MD5:C3012DE7AD9ED201F4017D6A077C3D1E
                      SHA1:DAD4311050F8624720B601A2DCF59F0655489A4F
                      SHA-256:F7799336575749ED684732CFD83B18ADAEF8787743BEC4506DA04C4427555C9D
                      SHA-512:15BA609C29FD2CB0BEA7E37A7D682BEBB88B7E0B8BE06A44F714BB7A28493724CA16D3405AA7479D63829CE07324FCEBF627C4FD789A9FD381D5FB496978A398
                      Malicious:false
                      Preview:......................beauty_system_plot1........5046:200;5067:15;5068:30........5046:200;5067:15;5068:30...beauty_system_plottitle1..$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.t...................beauty_system_plot2........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.t...................beauty_system_plot3........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.t...................beauty_system_plot4........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.t...................beauty_system_plot5........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.....................'beauty_system_plot6:beauty_system_plot7........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.....................(beauty_system_plot12:beauty_system_plot8........$Prefabs4/BeautyModel/BeautyModel_1_3...Sprite/UI/Background/bg_beauty.....................(beauty_system_plot13:be
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3541
                      Entropy (8bit):4.719815884338627
                      Encrypted:false
                      SSDEEP:
                      MD5:3FFABD9A90CF65BFA4959393DCDB8F5A
                      SHA1:77602D71FF2184AA3372F55B471E04AEFF013B9F
                      SHA-256:A4CE7C51CFFFA2117017B6E951C8690FF4D7C70EA38502E437667BD04E489ECC
                      SHA-512:A77C27DE8E1DC0128479F21B87FCC409A9F55CA512B9ECDB871ACCB93D2DB0E3FCB6E0626C2FB2D067CCEC100782108B8DA219F51964A96DEF8559C50F1A68DD
                      Malicious:false
                      Preview:...........beauty_system_girltitle_1...beauty_system_girl_1......11...war_join_text5..ebeauty_system_text3;beauty_system_text4;beauty_system_text5;beauty_system_text12;beauty_system_text13..wbeauty_system_interact1;beauty_system_interact2;beauty_system_interact3;beauty_system_interact4;beauty_system_interact5...beauty_system_ministory_1...beauty_system_story_1...beauty_system_unlock1...beauty_system_text2..............beauty_system_girltitle_2...beauty_system_girl_2......11366:1...beauty_join_text1..mbeauty_system_text2_1;beauty_system_text2_2;beauty_system_text2_3;beauty_system_text2_4;beauty_system_text2_5....beauty_system_interact2_1;beauty_system_interact2_2;beauty_system_interact2_3;beauty_system_interact2_4;beauty_system_interact2_5...beauty_system_ministory_2...beauty_system_story_2...beauty_system_unlock2...beauty_system_text2_12...Sprite/UI/Icon/ItemsIcon/11345...beauty_system_item_1...beauty_system_item_7..............beauty_system_girltitle_3...beauty_system_girl_3......1579
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1864
                      Entropy (8bit):5.173336994823667
                      Encrypted:false
                      SSDEEP:
                      MD5:90C64C497191A7521F455856852EF9F8
                      SHA1:8822BD5C01505F14A21294E4A84305E9B21F5842
                      SHA-256:9CEF19C786E06630F92E07BA8A7B2DEDC6E7E0595D922CB1D55D97578D2AA086
                      SHA-512:4F30566AF6BC0B8D098CD105D371C8B0E1127218A92C71C2FF83A320BBFDA67BB0289D4FB2730BDDEC81A57E7297D044BFA255FA386DDB01FFE9F878AC620AB3
                      Malicious:false
                      Preview:..........$Prefabs4/BeautyModel/BeautyModel_1_3..&Sprite/UI/GeneralModel/Model_19/Art_19...Sprite/UI/GeneralIcon/Icon_19...Sprite/UI/GeneralIcon/Icon_19...Sprite/UI/Background/bg_beauty.. Sprite/UI/Background/bg_beauty03..(Sprite/UI/Icon/Others/icon_beauty_Helena..........$Prefabs4/BeautyModel/BeautyModel_5_2..&Sprite/UI/GeneralModel/Model_19/Art_19...Sprite/UI/GeneralIcon/Icon_19...Sprite/UI/GeneralIcon/Icon_19.. Sprite/UI/Background/bg_beauty05.. Sprite/UI/Background/bg_beauty04..(Sprite/UI/Icon/Others/icon_beauty_Cissie..........$Prefabs4/BeautyModel/BeautyModel_3_2..&Sprite/UI/GeneralModel/Model_19/Art_19...Sprite/UI/GeneralIcon/Icon_19...Sprite/UI/GeneralIcon/Icon_19.. Sprite/UI/Background/bg_beauty06.. Sprite/UI/Background/bg_beauty07..%Sprite/UI/Icon/Others/icon_princess03..........$Prefabs4/BeautyModel/BeautyModel_9_1..&Sprite/UI/GeneralModel/Model_19/Art_19...Sprite/UI/GeneralIcon/Icon_19...Sprite/UI/GeneralIcon/Icon_19.. Sprite/UI/Background/bg_beauty09.. Sprite/UI/Background
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):18904
                      Entropy (8bit):5.697395255328987
                      Encrypted:false
                      SSDEEP:
                      MD5:BE5107200A592F4EE90B2CF207D0107E
                      SHA1:45B185021AED707164BA2656905C2D2176D5A6BE
                      SHA-256:507D4455E2668E8BD4EFE61037F18F0F34A1E3A63496DE6BD0886AEECAF122F8
                      SHA-512:89170C012ECFB0A153B04E39A2E029B404DDA685916606DD64B8155D26C515C9AA9CFDABBBBD7B0D52530AC794850F5C1F3860A6769D69A206A2A9E66E474110
                      Malicious:false
                      Preview:.|.....................1...beauty_system_skill_1_3.....195........Sprite/UI/Icon/ItemsIcon/7747...Sprite/UI/Frame/Square/type2.|.....................3...beauty_system_skill_1_3.....195........Sprite/UI/Icon/ItemsIcon/7747...Sprite/UI/Frame/Square/type3.|.....................5...beauty_system_skill_1_3.....195........Sprite/UI/Icon/ItemsIcon/7747...Sprite/UI/Frame/Square/type4.|.....................7...beauty_system_skill_1_3.....195..*.....Sprite/UI/Icon/ItemsIcon/7747...Sprite/UI/Frame/Square/type5.}.....................18...beauty_system_skill_1_3.....195..N.....Sprite/UI/Icon/ItemsIcon/7747...Sprite/UI/Frame/Square/type6........................2...beauty_system_skill_1_2.....128|131|134|137................Sprite/UI/Icon/ItemsIcon/7742...Sprite/UI/Frame/Square/type2........................4...beauty_system_skill_1_2.....128|131|134|137................Sprite/UI/Icon/ItemsIcon/7742...Sprite/UI/Frame/Square/type3........................8...beauty_system_skill_1_2.....128|131|134|137....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26380
                      Entropy (8bit):4.996330805685555
                      Encrypted:false
                      SSDEEP:
                      MD5:9FFE43EC8C218E29A7906915E6962A44
                      SHA1:5B917467B3161EDB186A5ACE9981DE9B20254CE1
                      SHA-256:5B6794A131E03EFFAF90C6A30D43099F7D3EDAA1BE1F394AFBEF8BF374F04512
                      SHA-512:C7FEC282A10555F51857E15E8A9E5EABC6D3BD789ADC8CE467D13A07DAA323840D3AEE8CD6D8B417A5DEA65B3523B8BDFB0A7A6F86DA977755822D7D505FD88A
                      Malicious:false
                      Preview:.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..................6...........................1800|1200|600|420|240|120.D..................m...........................900|600|300|210|120|60.C...............................................360|240|120|84|48|24.B...............................................180|120|60|42|24|12.H...............................................1500|1000|500|350|200|100.F.................m...........................1800|1200|600|420|240|120.D..............................................900|600|300|210
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):28138
                      Entropy (8bit):4.987123130408246
                      Encrypted:false
                      SSDEEP:
                      MD5:250EAADBA96D622079D842323DF72025
                      SHA1:71C35414E7409F9A3E2F1B03CD684A3706F64EF2
                      SHA-256:79CAFF663FB00FDFD17AF2C3A1C1D3273771923EDDBEE9102A2E16033606B868
                      SHA-512:8889BD0EEE3791AA21B1053418C1096A3D85A0160B40AC5C57A55955937BA62ADC1C57C47654C6470B444637C1B6B60813D81D8DD9135B0CEE20240D5FD12320
                      Malicious:false
                      Preview:.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..............................................1500|1000|500|350|200|100.G..................6...........................1800|1200|600|420|240|120.D..................m...........................900|600|300|210|120|60.C...............................................360|240|120|84|48|24.B...............................................180|120|60|42|24|12.H...............................................1500|1000|500|350|200|100.F.................m...........................1800|1200|600|420|240|120.D..............................................900|600|300|210
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2690
                      Entropy (8bit):5.124550580595519
                      Encrypted:false
                      SSDEEP:
                      MD5:122BBB39D63B0EADCF9898421BC8A09C
                      SHA1:FB4DA00542565555A8C230BFEB8D8B5C678224EE
                      SHA-256:184353E3BC94EFA3B73379D15889159DE42AB7C2346EC51867BAE52FC4B0A457
                      SHA-512:EAF0D9A9338A82FB021FA86AB41BDB9C0BD3681B0A7C16A09046243D8FCF574A733F3CABA1EDED74D62451BB0E2EE0D50DE033F82ED306CAEB135DEE348EAD71
                      Malicious:false
                      Preview:.m........board_icon_event.....'Sprite/UI/Icon/Others/icon_beauty_story..%Sprite/UI/Banner/Event/Activity_Case4.n........board_icon_new.....$Sprite/UI/Icon/UIIcons/icon_integral..+Sprite/UI/Banner/Event/Activity_celebration.h........anniversary_tips4....."Sprite/UI/Icon/Others/Icon_General..$Sprite/UI/Banner/Event/Activity_1USD.q........board_icon_versionup.....'Sprite/UI/Icon/Others/icon_beauty_story..%Sprite/UI/Banner/Event/Activity_Case4.k........board_icon_sns.....$Sprite/UI/Icon/Others/icon_community..(Sprite/UI/Banner/Event/Activity_currency.v........board_icon_match.....)Sprite/UI/Icon/UIGuildIcon/Icon_GuildRank..,Sprite/UI/Banner/Event/Activity_BattleField3.h........board_icon_survey......Sprite/UI/Icon/Others/Icon_Log..(Sprite/UI/Banner/Event/Activity_Recharge.o........board_icon_version.....'Sprite/UI/Icon/Others/icon_beauty_story..%Sprite/UI/Banner/Event/Activity_Case4.k........collection_type_other..... Sprite/UI/Icon/Others/icon_other..%Sprite/UI/Banner/Event/Activity_Case
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):759
                      Entropy (8bit):4.77947591362298
                      Encrypted:false
                      SSDEEP:
                      MD5:27FD3D2ED448022AFC28DB8ED5525759
                      SHA1:5FBF3E8CC93269FF0EC552EB3BAE95B9B44679B6
                      SHA-256:788F881F4D2D65EBF29EBAB0632A4398E5B5EE92A268B0FE33993EDCB9B48B6A
                      SHA-512:4DE313D668A63CB1C9CC57BCEB1EF7D20261591BA17B484FC4C07AF1F3B4D9E765EDD914D1BB5638D6819102B872D6784AFECF3402D03D3584533EB9ADDE29E3
                      Malicious:false
                      Preview:.........................(.....?.........<.....?.........P.....@.........d.....@.........x....@@...............@@................@................@................@................@................@................@................@................@................A................A................A................A............... A...............0A...............PA...............pA................A................A................A................A................A................B................B................B... .. .........B...!..!.........B..."..".........B...#..#.........B...$..$.........B...%..%.........B...&..&........ B...'..'........ B...(..(........ B...)..)........$B...*..*........(B...+..+........,B...,..,........0B...-..-........4B
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):122108
                      Entropy (8bit):3.991761153741911
                      Encrypted:false
                      SSDEEP:
                      MD5:6676F2BD44371BBB4EB23F8C886340FB
                      SHA1:0C1DCC03A6E5794E3FF567DEBD6B970B1DD4B1C4
                      SHA-256:C51F9805D344A2F1FCE803E28B5C7DD9AF41E3121C74BBF412560563E3286D52
                      SHA-512:AB2C9AFB1603F5B64A5CAECBE0C5E926507BFFF0A5B1975FD54DCEAFF0E96A1332B2BB5B527B916B626C694A988108E42FF279741D0F40552C458C7DA3FD794B
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6514
                      Entropy (8bit):5.663842021808474
                      Encrypted:false
                      SSDEEP:
                      MD5:CBB87B141AB0247352BAA30BE10FE342
                      SHA1:79A3EC6C72AE09BA642F03D0122D5B7E69896FA6
                      SHA-256:033CC5697F6B77C55D41856A5DED6B23D16ADED24E2B92F9E1F9C6FFE21A3F2F
                      SHA-512:DB4CCD2829EAA58BEE07198317C63C6413BE1B4EBB6C3BAE37FA658E4A18EB0A2DBDE06EC5A4823C354E04420A46D88A623381F9998528F975240AA3BCF6D8AE
                      Malicious:false
                      Preview:........keep...keep_des...keep_upgrade_des_n.....-......................................... Evony{0}/Effect/Kingdom_Townhall....................shrine...shrine_des...shrine_upgrade_des_n.....-..........................................Evony{0}/Effect/Kingdom_Shrine....................training_field...training_field_des...training_field_upgrade_des.........................................................Evony{0}/Effect/Kingdom_Drill....................market...market_des...market_upgrade_des_n.....-..........................................Evony{0}/Effect/Kingdom_Market....................embassy...embassy_des...embassy_upgrade_des.....-..........................................Evony{0}/Effect/Kingdom_Embassy....................great_hall...great_hall_des...great_hall_upgrade_des.....-.........................................#Evony{0}/Effect/Kingdom_Warbuilding....................watchtower...watchtower_des...watchtower_upgrade_des.....-................................$Evony{0}/Effect/Ki
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6387
                      Entropy (8bit):5.7145767787040045
                      Encrypted:false
                      SSDEEP:
                      MD5:2648C3D0D9D751CE02BCAB3308884A42
                      SHA1:0DEFAB481ABE38C8F7035E83B92FE066E504AA2D
                      SHA-256:25D41EA1975735ACD1F61205135FB77FA242C47CF9652BCCD6D00E5B138E31A9
                      SHA-512:D758DDF346DAFA9679D508EF56D56C61AB6D8520757CA8FA9CE8741A10F4496931924201A6A82B19C122EBFC39373EE81A4780BF663CFA09451815B32791DF59
                      Malicious:false
                      Preview:........keep...keep_des...keep_upgrade_des_n.....-......................................... Evony{0}/Effect/Kingdom_Townhall....................shrine...shrine_des...shrine_upgrade_des_n.....-..........................................Evony{0}/Effect/Kingdom_Shrine....................training_field...training_field_des...training_field_upgrade_des................................................Evony{0}/Effect/Kingdom_Drill....................market...market_des...market_upgrade_des_n.....-...........j.....................Evony{0}/Effect/Kingdom_Market....................embassy...embassy_des...embassy_upgrade_des.....-...........i.....................Evony{0}/Effect/Kingdom_Embassy....................great_hall...great_hall_des...great_hall_upgrade_des.....-...........h....................#Evony{0}/Effect/Kingdom_Warbuilding....................watchtower...watchtower_des...watchtower_upgrade_des.....-................................$Evony{0}/Effect/Kingdom_LookoutTower..................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6496
                      Entropy (8bit):5.673488721843831
                      Encrypted:false
                      SSDEEP:
                      MD5:4D347DC1A37DDE83B551B6EA5FA4CCB7
                      SHA1:86CB90472423AC3A5B8A2BADA0A199AA5FEED03B
                      SHA-256:FBC13C7A21ED1FB14099FAFC7032177929A9357CE05CF1E8434695872A0B3024
                      SHA-512:F9C679A65DF9059993A49BBCCF54A581CF1090ABF6C61E574C56C0363BC49063FE099E55DD75F9A6F9C1D01E06F9841FFAA00A9E9E1DB5E0A466842B9D32C293
                      Malicious:false
                      Preview:........keep...keep_des...keep_upgrade_des_n.....-......................................... Evony{0}/Effect/Kingdom_Townhall....................shrine...shrine_des...shrine_upgrade_des_n.....-..........................................Evony{0}/Effect/Kingdom_Shrine....................training_field...training_field_des...training_field_upgrade_des.........................................................Evony{0}/Effect/Kingdom_Drill....................market...market_des...market_upgrade_des_n.....-..........................................Evony{0}/Effect/Kingdom_Market....................embassy...embassy_des...embassy_upgrade_des.....-..........................................Evony{0}/Effect/Kingdom_Embassy....................great_hall...great_hall_des...great_hall_upgrade_des.....-.........................................#Evony{0}/Effect/Kingdom_Warbuilding....................watchtower...watchtower_des...watchtower_upgrade_des.....-................................$Evony{0}/Effect/Ki
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):256633
                      Entropy (8bit):4.013162125954196
                      Encrypted:false
                      SSDEEP:
                      MD5:57FDC0D7BCE7E4FCADD6E81C8E2F7541
                      SHA1:1BDB8F78C28C5A57496FCEAAEA7C208C526B9963
                      SHA-256:ED7666A498CE37BD3361E604549E067831BACC3E77214B210D73D7C6CF287FE5
                      SHA-512:FBF702E57F4155FE6AD75EB68B65CFF3F0BEA824E590C0C07A1F12C7FB9C9DC962EFD0C31092C204E404FBB0CF65A81C6A6EC8CAB495803619AA899CCC6718D1
                      Malicious:false
                      Preview:..............................................................................................................................................................................................................................A............................................................................................................................................................................................................B...................................................................................................................#...#........................................................4B..(..................................................................................................................................................pB..<.....................................................................................T...U...................................................!.....B..P.........................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):256627
                      Entropy (8bit):4.012961641286286
                      Encrypted:false
                      SSDEEP:
                      MD5:303DCD922503D80740D9DA89DE073864
                      SHA1:3455693F9CAC3E84CCEC1D69EEA736A201A2C325
                      SHA-256:8E8D2F5D600EE05DFF9B0627A321D4FBE0D47BD4EDCA73311B36A89010D9516A
                      SHA-512:45063841D216C646A3573661D96486FE48C227E03E7F809A987DF0CBCB166D9DB97FD5EAA3B2565353293794A38A5665A1FBD4B564B870751B298A49D85C209B
                      Malicious:false
                      Preview:..............................................................................................................................................................................................................................A.....................................................................................................................................................................................................<.....B...................................................................................................................#...#........................................................4B..(..................................................................................................................................................pB..<.....................................................................................T...U.........................................................B..P..........................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):12741
                      Entropy (8bit):5.284134133053453
                      Encrypted:false
                      SSDEEP:
                      MD5:80E25A9007233C1F51E3D2C29E7838D7
                      SHA1:7D3EF44F02E208220A044BD95F5FECCA3B96D1C4
                      SHA-256:29B7C0317F057252B21E8A7BFA7ABAF8FB87ACDF1CEEA755E9B196BB02AA3473
                      SHA-512:2552D63D504A180AF99CF982B98A32C13F2B325B9F5454F28266062B663C31B5811E3800721352857CE86B034AF3E7079C614580F614A6FDCCF33B6A54AA9399
                      Malicious:false
                      Preview:.?.....building_menu_detail.. Sprite/UI/Icon/UIMenuIcon/menu_1....@.....building_menu_upgrade.. Sprite/UI/Icon/UIMenuIcon/menu_2....@.....building_menu_speedup.. Sprite/UI/Icon/UIMenuIcon/menu_3....=.....building_menu_reap.. Sprite/UI/Icon/UIMenuIcon/menu_4....>.....building_menu_train.. Sprite/UI/Icon/UIMenuIcon/menu_5....C.....building_menu_technology.. Sprite/UI/Icon/UIMenuIcon/menu_6....>.....building_menu_forge.. Sprite/UI/Icon/UIMenuIcon/menu_7....?.....building_menu_cityinfo...Sprite/UI/UIMainUI/Base/menu_8....B.....building_menu_look..%Sprite/UI/Icon/UIMenuIcon/Icon_detail....E.....building_menu_dismiss..%Sprite/UI/Icon/UIMenuIcon/Icon_detail....@.....building_menu_repair..!Sprite/UI/Icon/UIMenuIcon/menu_14....B.....building_menu_prisoner..!Sprite/UI/Icon/UIMenuIcon/menu_12....G.....building_menu_surrender..%Sprite/UI/Icon/UIMenuIcon/Icon_detail....>.....building_menu_heal..!Sprite/UI/Icon/UIMenuIcon/menu_14....F.....building_menu_daily_supplies...Sprite/UI/UIMainUI/Base/menu_1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4677
                      Entropy (8bit):5.355360669902562
                      Encrypted:false
                      SSDEEP:
                      MD5:72711C5DE47FC1DF5FBF3B021C1B08C7
                      SHA1:D7D4040B351C19CCC6B6C00DEFE9CA06FCD763DB
                      SHA-256:C49DA5C23B58E7557517B4C51A20C848D1288F03134B23FA7474C8CBFA678C3B
                      SHA-512:2F245A5583BE23FED03FA18B21079F606ADD0894F9A7BA781003FDA59104B35BD27482D6AB541D183D4696DF70D09ECCBC3FE2C8CF31F3F51F9D5D1D16AA2CC5
                      Malicious:false
                      Preview:.o............1...........................................1.....(Sprite/UI/Icon/Battlefield/icon_PVPfalg7.o............2...........................................1.....(Sprite/UI/Icon/Battlefield/icon_PVPfalg5.o............3...........................................1.....(Sprite/UI/Icon/Battlefield/icon_PVPfalg8.o............4...........................................1.....(Sprite/UI/Icon/Battlefield/icon_PVPfalg6.o............5...........................................1.....(Sprite/UI/Icon/Battlefield/icon_PVPfalg3.o............6...........................................1.....(Sprite/UI/Icon/Battlefield/icon_PVPfalg4.o............7...........................................1.....(Sprite/UI/Icon/Battlefield/icon_PVPfalg2.o............8...........................................1.....(Sprite/UI/Icon/Battlefield/icon_PVPfalg1.L.............1...........................................2......-1.L...........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):328869
                      Entropy (8bit):5.206400452470977
                      Encrypted:false
                      SSDEEP:
                      MD5:5777875633FD557BEBDD7E9623629E10
                      SHA1:12AEB7BAA7AEE5E996C48E31A4A2554E81A5CAC3
                      SHA-256:64AA2AECBDCEC3BC99340B5FAFE23987678F1E13799D2D337853FE6362260B55
                      SHA-512:41C5EF6DEC34BBC2D2EA5E2B67B5A6A13820BB0D78884E9416621D610F37DF42BC8B96DAFE14C5A6FA3C1E363D5E8A96213BADF24090E72F2DFA15474E9DC409
                      Malicious:false
                      Preview:.s...............Sprite/BuildingList/Evony1/Age5/buildingList_1..3Prefabs/BuildingModel/Evony1/Age5/UIBuildingModel_1.s...............Sprite/BuildingList/Evony2/Age5/buildingList_1..3Prefabs/BuildingModel/Evony2/Age5/UIBuildingModel_1.s...............Sprite/BuildingList/Evony3/Age5/buildingList_1..3Prefabs/BuildingModel/Evony3/Age5/UIBuildingModel_1.s...............Sprite/BuildingList/Evony4/Age5/buildingList_1..3Prefabs/BuildingModel/Evony4/Age5/UIBuildingModel_1.s...............Sprite/BuildingList/Evony5/Age5/buildingList_1..3Prefabs/BuildingModel/Evony5/Age5/UIBuildingModel_1.s...............Sprite/BuildingList/Evony6/Age5/buildingList_1..3Prefabs/BuildingModel/Evony6/Age5/UIBuildingModel_1.s...............Sprite/BuildingList/Evony7/Age5/buildingList_1..3Prefabs/BuildingModel/Evony7/Age5/UIBuildingModel_1.s...............Sprite/BuildingList/Evony1/Age5/buildingList_1..3Prefabs/BuildingModel/Evony1/Age5/UIBuildingModel_1.s...............Sprite/BuildingList/Evony2/Age5/buildingList_1.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):174
                      Entropy (8bit):4.7171802632278625
                      Encrypted:false
                      SSDEEP:
                      MD5:EB4D7E0573B4FC42DB6188692E18627C
                      SHA1:5E1C68FAFC43E450CCA44DC631FB90E0305F5ADC
                      SHA-256:760BA14976D9030C11E1C31565F03B22B0C4119902273BE02F8B16C95A9EAD4D
                      SHA-512:CAA5ECA18061F2E86EFF19B7E99AB21AE21E83B6BF4ED361BF332DD8CA6F6D22314E12C6E623748A41ECADF4584F101A45E964B51633C29A47FADB6C9ECB0D95
                      Malicious:false
                      Preview:...1..1.................9......0..0..(......................,..,..A.....................-..-..A.....................7..7..d.....................8..8......(...../.........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3917
                      Entropy (8bit):5.31417711542824
                      Encrypted:false
                      SSDEEP:
                      MD5:8485CB1EDF96CAF6B222CD7F493F77D5
                      SHA1:EFA32534E498433B769DB75086706D300541995B
                      SHA-256:F6C3709542AF80F86725BAD8E8CE7EB181A6F63B7D11A59ED3D001EBE05C7B68
                      SHA-512:4625569ABF23F4B6FD31FF7960DE8B4EDF0BC99812935BFEF45BA8F505D746F88E8A6AB2E9D0E3E8F6E68F6FE02889DECF5719EE6C7559C4A8CCB1D2490DA0CF
                      Malicious:false
                      Preview:.,........a100a...Sprite/UI/Icon/ItemsIcon/531.,........b112c...Sprite/UI/Icon/ItemsIcon/549.,........d231b...Sprite/UI/Icon/ItemsIcon/645.,........s656s...Sprite/UI/Icon/ItemsIcon/675.,........e888s...Sprite/UI/Icon/ItemsIcon/693.,........f511d...Sprite/UI/Icon/ItemsIcon/735.,........r556f...Sprite/UI/Icon/ItemsIcon/795.,........c333d...Sprite/UI/Icon/ItemsIcon/801.,........i559d...Sprite/UI/Icon/ItemsIcon/813.,........q666p...Sprite/UI/Icon/ItemsIcon/873.*........Qefj...Sprite/UI/Icon/ItemsIcon/33.*........BopH...Sprite/UI/Icon/ItemsIcon/45.*........V7D7...Sprite/UI/Icon/ItemsIcon/46.*........FKwm...Sprite/UI/Icon/ItemsIcon/47.*........LPgG...Sprite/UI/Icon/ItemsIcon/49.*........VaEz...Sprite/UI/Icon/ItemsIcon/50.*........eqiw...Sprite/UI/Icon/ItemsIcon/52.*........2ndl...Sprite/UI/Icon/ItemsIcon/54.*........NBbE...Sprite/UI/Icon/ItemsIcon/56.*........iN5h...Sprite/UI/Icon/ItemsIcon/60.*........7p2e...Sprite/UI/Icon/ItemsIcon/73.*........KhHo...Sprite/UI/Icon/ItemsIcon/79.*........FL
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):120675
                      Entropy (8bit):6.185345042362435
                      Encrypted:false
                      SSDEEP:
                      MD5:61DBF18123924CEAF729030F0463477D
                      SHA1:C2FADF05E65A7B7C3E98B4531A74785B2FE77617
                      SHA-256:239917BE411CC01F3A395ADEFDFB30F4A513CD95259E2F7C8FA5B33B99584FB5
                      SHA-512:9A3AF397E3791432B02DC1CFC349FFF829CBA86E90DE1F6F2EF26E5F1526CC4181884191FBDBC3F8921514B658F7AC95E9A7C61CCE8141BF0D5CF99C9BDC38C2
                      Malicious:false
                      Preview:.d..................300......Prefabs/Army/Common/snowman.........h............................................................Prefabs/Wing/UI_Wing_cbb...Prefabs/Wing/FX_Skincbb..............Sprite/Skin/UITabIcon/c1............................................................Prefabs/Wing/UI_Wing_cbf...Prefabs/Wing/FX_Skincbf..............Sprite/Skin/UITabIcon/c1............................................................Prefabs/Wing/UI_Wing_cbr1...Prefabs/Wing/FX_Skincbr1..............Sprite/Skin/UITabIcon/c1............................................................Prefabs/Wing/UI_Wing_cbw1...Prefabs/Wing/FX_Skincbw1..............Sprite/Skin/UITabIcon/c1............................................................Prefabs/Wing/UI_Wing_cbw2...Prefabs/Wing/FX_Skincbw2..............Sprite/Skin/UITabIcon/c1............................................................Prefabs/Wing/UI_Wing_cbz...Prefabs/Wing/FX_Skincbz..............Sprite/Skin/UITabIcon/c1........................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1667
                      Entropy (8bit):6.110342291641294
                      Encrypted:false
                      SSDEEP:
                      MD5:3ED9BD4D8D438D3ED35FE98360358387
                      SHA1:BF661660243473E6040BC76A8155F26C18D57D26
                      SHA-256:8DD9EB61A244FDCEC953D85E27ADC14E46D3364DA380ECB9EAD95C482DB13907
                      SHA-512:11A137D9F4FFB9E525B15E89453F84203A449FAE1F72BBE4C8937AD70555FA78A7DF21AF01F46BB1E50D209531A3DC6D15D09C07E5A241F31EFC9D83C594F7C1
                      Malicious:false
                      Preview:.)...;.....;...........M...7794:50....K...M.....M..)........................7794:300....J..............).................................1..................1...........15991:15....1..................2...........15991:25.......................3....................^...................-............15158:30.....$dress_tiger_unlock;dress_unlock_fail.z......................-......................;dress_tiger_upgrate1;dress_tiger_upgrate2;dress_unlock_fail.2..............................18358:15....2..............................18358:25..../.......................................?...................11...1...........18606:15....?...................11...2...........18606:25....<...................11...3....................;.................................19587:15....;...................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3086
                      Entropy (8bit):5.867472212133167
                      Encrypted:false
                      SSDEEP:
                      MD5:2ABF94A93E6D21CAD5D7173536C3AE68
                      SHA1:D3D2A884572CEBE8BC8AF2D4B13AC136F4888186
                      SHA-256:7077055BA9562F97A25BC7A41EF519E861C603ADEA4350D91A1891CDE1594AA7
                      SHA-512:93A750411C09E98535D1E7FCD388319018AB7A374330FD20212BB66FF27508EAC1C06F772E05F2E0B22574B8A34D9DEE528A896914465630B0CB5ED6A6338562
                      Malicious:false
                      Preview:.7.................................=....=....=....=.7.......................................=....=....=....=.7.......................................=....=....=....=.7.......................................=....=....=....=.7......................................=....=....=....=.7.......................................=....=....=....=.7.......................................=....=....=....=.7..................................=....=....=....=.7.........$....$....$....$....$.........z....z....z....z.7........./..../..../..../..../........z....z....z....z.;.........:....:....:....:....:..............................;.........E....E....E....E....E..............................;.........P....P....P....P....P.............................;.........[....[....[....[....[..............................;.........f....f....f....f....f....$.....................;.........q....q....q....q....q....*.........................;.........|....|....|....|....|....0...../...../...../...../.@.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5896
                      Entropy (8bit):5.45126409878636
                      Encrypted:false
                      SSDEEP:
                      MD5:F7E0E0A30A2537DE894526679D7C400C
                      SHA1:51FB954887188C296E59CDC2A9E04B00C2279145
                      SHA-256:1040AB9D6165979446B726353650AB3F4EB483DDE44E29ECFE8830810DCCD6E2
                      SHA-512:B3FA75041F60ABA707994B8B259308C26E1225AEB14A2D9C9F50A6D5A01AA716E5D2A4AF3171DA247308A51781EAB6815DC1D8DCE22A22E26A54B7918B22560F
                      Malicious:false
                      Preview:...........civilization_preface_text2...share_tips2........<http://emggcdn.ucimg.co/android/UploadBundles/LuEM-NEW-1.mp4...LuEM-NEW-1.mp4........!https://m.evony.com/images/n1.jpg...n1.jpg..<http://emggcdn.ucimg.co/android/UploadBundles/LuEM-NEW-1.mp4...LuEM-NEW-1.mp4...........civilization_preface_text2...share_tips2........<http://emggcdn.ucimg.co/android/UploadBundles/LuEM-NEW-1.mp4...LuEM-NEW-1.mp4........!https://m.evony.com/images/n1.jpg...n1.jpg..<http://emggcdn.ucimg.co/android/UploadBundles/LuEM-NEW-1.mp4...LuEM-NEW-1.mp4...........civilization_preface_text2...share_tips2........<http://emggcdn.ucimg.co/android/UploadBundles/LuEM-NEW-1.mp4...LuEM-NEW-1.mp4........!https://m.evony.com/images/n1.jpg...n1.jpg..<http://emggcdn.ucimg.co/android/UploadBundles/LuEM-NEW-1.mp4...LuEM-NEW-1.mp4...........civilization_preface_text2...share_tips2........<http://emggcdn.ucimg.co/android/UploadBundles/LuEM-NEW-1.mp4...LuEM-NEW-1.mp4........!https://m.evony.com/images/n1.jpg...n1.jpg..<http:
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):585
                      Entropy (8bit):4.779306707021956
                      Encrypted:false
                      SSDEEP:
                      MD5:4E593FF51CC4DE855081794178DAA5EB
                      SHA1:30F962630DD372494D967899433494E25CE3EBC2
                      SHA-256:A170716EC79AB64656089E3AA7B0C21D50BC73A3233175F96279BE1EB44747BF
                      SHA-512:D4806CF79E2B3307A9AB4CE1732AEEE2FE1B14ACB872BEA9C2BF50787EFA2427616FF05368930ABD873FC3546E94EEE0AF1E8777BC7FB8FA404ACD466C4F8E16
                      Malicious:false
                      Preview:............>...........L?............?............?............@............@.........333@...........L@.........fff@............@...........@............@.........ff.@.........33.@............@............@............@.........ff.@.........33.@............A.........ff.A............A.........33.A............A........... A.........ff&A...........,A.........333A...........9A...........@A.........ffFA... .. ....LA...!..!..33SA...".."....YA...#..#....`A...$..$..fffA...%..%....lA...&..&..33sA...'..'....yA...(..(.....A...)..)..33.A...*..*..ff.A...+..+.....A...,..,....A...-..-.....A
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):815
                      Entropy (8bit):5.082009518088546
                      Encrypted:false
                      SSDEEP:
                      MD5:E42345C8BBB8E85C36F1F99C9D26CBBD
                      SHA1:D1C47D7A337E4720F5AA6E3A79137C523769BA23
                      SHA-256:4BF9AB1056A77E76D2C70CC479F38B5F37120BB55FBA20CD413A579B807B180D
                      SHA-512:5BB5DCFFF66E911FE8F902B5B24B08A5A46F4F0036E1E254C48275E1C458B618E132CB5EEE3ADC2BFB3E802C225CBE113E2E1C6BD18E5B41F7512EBDF681FDB5
                      Malicious:false
                      Preview:.?........keep...keep_des...keep_upgrade_des........-.............U........rally_spot...rally_spot_des...training_field_upgrade_des........-.............K........barracks...barracks_des...barracks_upgrade_des........-.............B........range...range_des...range_upgrade_des........-.............H........stables...stables_des...stables_upgrade_des........-.............c........military_academy...military_academy_des...military_academy_upgrade_des........-.............?........farm...farm_des...farm_upgrade_des........-.............H........sawmill...sawmill_des...sawmill_upgrade_des........-.............E........quarry...quarry_des...quarry_upgrade_des........-.............?........mine...mine_des...mine_upgrade_des........-.............B........walls...walls_des...walls_upgrade_des........-............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):14383
                      Entropy (8bit):5.74795400344236
                      Encrypted:false
                      SSDEEP:
                      MD5:39BAFDE0DC7F8B4BA980FC7AD939424F
                      SHA1:6E1E50B0C00929B19E375210542B094F4B28413D
                      SHA-256:B37814B4CB9338342050A7F31F397A847938A7CABB197F89378F50BCF1A9D9D3
                      SHA-512:78955FFB821019667EC4F4553A60F7FA2CF44267292ED1CE047838B4828DCC3D37169DC457F9473DFD9CDC5B50E9DF495BF91CFFFC7397E1446A35B60B5494D2
                      Malicious:false
                      Preview:............./............................u........(..<..P..............d............$..d......3993:75;4035:75;4049:5;1600:1................-1.......................................-1...................................1|1|1|-1|1...2|1|0|5...10|20|40;10;10;10;10...N............./......................................(..<..P..............d............6..d......4007:125;4035:125;4049:5;1600:1................-1.......................................-1.....................................1|1|1|-1|1...2|1|0|5...10|20|40;10;10;10;10...]............./.......................................(..<..P..............d............I..d......4021:150;4035:150;4049:5;1600:1................-1.......................................-1.....................................1|1|1|-1|1...2|1|0|5...10|20|40;10;10;10;10...m............./......................................(..<..P..............d............[..d......3993:175;4035:175;4049:5;1600:1................-1.......................................-1...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):14383
                      Entropy (8bit):5.74795400344236
                      Encrypted:false
                      SSDEEP:
                      MD5:39BAFDE0DC7F8B4BA980FC7AD939424F
                      SHA1:6E1E50B0C00929B19E375210542B094F4B28413D
                      SHA-256:B37814B4CB9338342050A7F31F397A847938A7CABB197F89378F50BCF1A9D9D3
                      SHA-512:78955FFB821019667EC4F4553A60F7FA2CF44267292ED1CE047838B4828DCC3D37169DC457F9473DFD9CDC5B50E9DF495BF91CFFFC7397E1446A35B60B5494D2
                      Malicious:false
                      Preview:............./............................u........(..<..P..............d............$..d......3993:75;4035:75;4049:5;1600:1................-1.......................................-1...................................1|1|1|-1|1...2|1|0|5...10|20|40;10;10;10;10...N............./......................................(..<..P..............d............6..d......4007:125;4035:125;4049:5;1600:1................-1.......................................-1.....................................1|1|1|-1|1...2|1|0|5...10|20|40;10;10;10;10...]............./.......................................(..<..P..............d............I..d......4021:150;4035:150;4049:5;1600:1................-1.......................................-1.....................................1|1|1|-1|1...2|1|0|5...10|20|40;10;10;10;10...m............./......................................(..<..P..............d............[..d......3993:175;4035:175;4049:5;1600:1................-1.......................................-1...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8525
                      Entropy (8bit):5.0941113498037005
                      Encrypted:false
                      SSDEEP:
                      MD5:69E3A139864E1E1435ED2D10469C67F0
                      SHA1:F7DB598DC28195B8B5C5E7B99126B275BA0B0EBA
                      SHA-256:C0C8C89B02B9F5965EEA1A640E9B6E94629B2ACE90651857168D0521876249BE
                      SHA-512:B01EE459145CB707A5EF3888409E1D890CD1105985C811B6B110244F498422E4C031B70F6FBEEF6355F62EFDC219A5E3E6E08B782A3D03C0DA095BB17E0C4A9B
                      Malicious:false
                      Preview:..............................................................................................................#...............8...............Z.......................................................................................................................................................0...............M................{................................................................................................................................................................................................ ..... ..... .....$.....!.....!.....(.....".....".....,.....#.....#....0.....$.....$.....9.....%.....%.....B.....&.....&.....N.....'.....'.....Z.....(.....(.....f.....).....).....r.....*.....*.....~.....+.....+............,.....,............-.....-.....................................................................................................................................................2...............P.........................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):98
                      Entropy (8bit):4.403562687519536
                      Encrypted:false
                      SSDEEP:
                      MD5:08AD47EC7000DF355D055E225861647F
                      SHA1:FB6B582BED748809A3B3D124E18B36BA1FB2E4F6
                      SHA-256:E995E3592307F032861F3AC048AE28F2654C3D907A959E0362278E11948B991A
                      SHA-512:248DD5450B34CAC180797596449E164DD7C4FA2976612679F7F4F5B8A1996921DD336EA6E6158B2DF5AA47B8B393F3F17AB240A9A08CB87A22AB6CCB7B861EF5
                      Malicious:false
                      Preview:.`...........2.........................2../.................%10:5000;15:50000;20:500000;25:2500000
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):134
                      Entropy (8bit):4.722951733207101
                      Encrypted:false
                      SSDEEP:
                      MD5:686CA2CB9CF19EB97DDB0B8FDEEA3E2E
                      SHA1:D138C2676F629D81A91904998C2E3407C7061755
                      SHA-256:D31E81F5629E16366281D546DC7659D8D64910EBEA4E8CFA3147658EE8BD347A
                      SHA-512:0804F9A87ADD9292693D84AAA1BE8DB2CEB19D4C565611138014DC8EC890336AC290F7487A4A4C9C1A4618E0B1F6F94A6FDBF44DFA28844C55670B301A5CE382
                      Malicious:false
                      Preview:.&........city_development_balance.......+........city_development_war................/........city_development_economy...............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):70052
                      Entropy (8bit):5.823993689040937
                      Encrypted:false
                      SSDEEP:
                      MD5:99531789F4363AE4CE07A75C22238FE4
                      SHA1:3449C5E0095C4825576EFE9F60BF981E08A70BFA
                      SHA-256:A2F4350B3CEA266847478C961F45E3B75F3A917EBA374BC820623C3E44CFF5A9
                      SHA-512:D86B883A05BF761FA9E0A0265B517DBEED29E6BC93D37FB7EF72D1675AE04D674EE297027682EB4C93D050E1458E844F5F004E8B3BE257AEACBD69AEC3D45939
                      Malicious:false
                      Preview:...........hero_name70...opinionBox_npc_name_14...........686.......NSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/12head_Farmer_Happy..NSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/12head_Farmer_Angry.............20751:1......Sprite/UI/Guide/NPC/04/Farmer.................hero_name68...opinionBox_npc_name_14...........686.......NSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/12head_Farmer_Happy..NSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/12head_Farmer_Angry.............20751:1......Sprite/UI/Guide/NPC/04/Farmer.................hero_name45...opinionBox_npc_name_14...........686.......NSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/12head_Farmer_Happy..NSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/12head_Farmer_Angry.............20751:1......Sprite/UI/Guide/NPC/04/Farmer.................hero_name75...opinionBox_npc_name_14...........686.......NSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/12hea
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):473
                      Entropy (8bit):2.7725093082187033
                      Encrypted:false
                      SSDEEP:
                      MD5:C8866889BB20E144CF4500DEB19E1AC9
                      SHA1:09971EDD7600E259FE167E2F471C36BB2EA60B42
                      SHA-256:B2FEDB51FEAF2867763D782E3080FA24A4A3471E6251BBB938FA02A182F9EDE8
                      SHA-512:3FFD728AB9D0BDF97C18FA06C3C1146870D02865BE3E1837204E1D1EC7AF5A4AFA9D072B733FC2BE8CEC4A6CEF7CE4C8C836D7BE5262701539C7A39632B6C5C9
                      Malicious:false
                      Preview:.8.........................................................8.........................................................8.........................................................8........................................................./................................................A..................................................................A..................................................................8........................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):15153
                      Entropy (8bit):4.717229815783929
                      Encrypted:false
                      SSDEEP:
                      MD5:9470EB116DF6194597E119A0A860EAE0
                      SHA1:F5914BE357A7B6A40308BF2ED0826C93D86460E2
                      SHA-256:48A0CD71B73B77806170B1A6A75BF30F4E9D5822059B6A82E13E74B92936439D
                      SHA-512:F23E2FF0E4C0EABE366DF36184BB896009FAA3CAD70048FF03C9EF523D4EAEFE00E0D51A1CC6688E1A9CFB64E0B820C1088FC7B9C79120BACDA59BE1EAF7D32B
                      Malicious:false
                      Preview:..................C.........................D.........................E.........................F.........................G.........................H.........................I.........................J.........................K.........................L.........................M.........................N.........................O.........................P.........................Q.........................R.........................S.........................T.........................U.........................V.........................W.........................X.........................Y.........................Z.........................[.........................\.........................].........................^........................._.........................`.........................a.......... .. ...........b..........!..!...........c..........".."...........d..........#..#...........e..........$..$...........f..........%..%...........g..........&..&...........h..........'..'.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):76
                      Entropy (8bit):3.738162258938692
                      Encrypted:false
                      SSDEEP:
                      MD5:646016A64866C13AA6B9D0D2DAA6B8F4
                      SHA1:D1B28405D83FA2839287651B3C4DA14C8DD7C035
                      SHA-256:BB59EC74FE5AF07AD0A0D93B1892CF88961173DA5D5591E2B5D16711845A8A5B
                      SHA-512:740C9055B108FDA0F48AD16DD8DB9F37626CCC8667BDD34D93F6C564209CB96A4A64F3E41C0B6D0FC87479EDDA293F7382FE5862DABBE44B2A218C5AB6C41AC7
                      Malicious:false
                      Preview:...................................x...........P..P.........x..P..P..P......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):18685
                      Entropy (8bit):5.230469052321215
                      Encrypted:false
                      SSDEEP:
                      MD5:37EEDA7DA8BC2613F9655FEFA4CDFE78
                      SHA1:FCD23E4655EF3C021D4506648664279B9538072C
                      SHA-256:23284C0AB51B8B6662B1554085EC6FB3DB13C987AB946BA5437C42447349F74E
                      SHA-512:6241B323BDE0827C877185BC02361450BB8A5925978075A1E8E53D83AF09B6B3495D5E5C8794B3FFA7A3784940D98EDF674EECB812E242872FFADC60CD6155DF
                      Malicious:false
                      Preview:.&........................686....6...2;1.&........................686....7...2;2.&........................686....8...2;2.&........................686....9...2;2.&........................686....;...2;3.&........................686....<...6;2.&........................686....=...6;4.&........................686....>...6;4.&........................686....?...6;4.&........................686....@...6;6.'........................686....A...10;3.'........................686....C...10;6.'........................686....F...10;6.'........................686....H...10;6.'........................686....J...10;9.'........................686....L...16;4.'........................686....N...16;8.'........................686....P...16;8.'........................686....S...16;8.(........................686....U...16;12.'........................686....W...24;5.(........................686....[...24;10.(........................686....`...24;10.(........................686....d...24;10.(....................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):224
                      Entropy (8bit):3.895611913171987
                      Encrypted:false
                      SSDEEP:
                      MD5:6903DFFB499C58528468F1FC6F071E28
                      SHA1:2AF64FDD5EB02C529034A6F05244087B14C3F284
                      SHA-256:DAA48ECA67BA85887E1FC05EC2E5A9B4FFFF72C8AE7324791FB893A7B7E3CDA9
                      SHA-512:75093BA786D6299989A729BC997D5DF52D0189AD7EBF1EB06AA613ED222746241C37A49B10D1EF8E047DB631A6109746B7C117BE5C1FB1EFBDB8359619081C6B
                      Malicious:false
                      Preview:................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):642
                      Entropy (8bit):4.889606705991042
                      Encrypted:false
                      SSDEEP:
                      MD5:61E33FB0EADCDA7E34A228B6B4FCECE6
                      SHA1:9B06D263780B0D617BFF4255991B9AAD5068152C
                      SHA-256:BA444B7F0C491ECE1E972643E8DA7115D5C7BBBECE5BDC3378C588740A5C6EA0
                      SHA-512:7F20E632CA8761F6B76D97C4C6DAA9B5747489413D46C9AE3367F6623C6E06E2A525D4ACD6E40B1B88D9CC38353217F7C441DD5575B80A82587A4A64B2B56D02
                      Malicious:false
                      Preview:.[........cityname_1..d...&.....A.....A.....A.....A.....A...#fffcd8........A.....A............[........cityname_2..x.........A.....A.....A.....A.....A...#14ea0a........A.....A............\........cityname_3.............A.....A.....A.....A.....A...#33aeff........A.....A............[........cityname_4............A.....A.....A.....A.....A...#e167ff........A.....A............[........cityname_5............A.....A.....A.....A.....A...#ffee0f..2.....A.....A...... ...8.N.............................................#d32a2a..2..................#...p.^........subcity_tab2........................................#d32a2a..2..................#.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):450
                      Entropy (8bit):3.6713187284578797
                      Encrypted:false
                      SSDEEP:
                      MD5:C209157266062856443A114FE61E5263
                      SHA1:B27ED8A175D1BF5A7F405FB8E9B99897A1AF4498
                      SHA-256:9CB05F07509C1C1C4C4DAF5F2A9A00C599A771395BD8B007A4DBF842CB4B4C39
                      SHA-512:2CF5D79670B2EBC8C486D47313E7C641EF77BA51509252AED45B084AB5FB210DA33EE6CE3D6334706C724C00867781E1C5CD4FAB7F3C25C4070578CDCFC6E039
                      Malicious:false
                      Preview:.0........age1.....................................0........age2.....................................0........age3.....................................0........age4.....................................0........age5.....................................0........age6.....................................0........age6.....#...............................0........age6..$..(...............................0........age6..)..-..............................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):704
                      Entropy (8bit):5.06158515888802
                      Encrypted:false
                      SSDEEP:
                      MD5:059D06AA98BE5D9730808AF7D0EC8228
                      SHA1:39AEC8B2DDEDAB75BE7E084F0DEAB7D6181E5474
                      SHA-256:90989B5649DC447EC3724885653DF661E2A728798A62B6329454A3012BCB5876
                      SHA-512:1785C58A0449CD7FC231A5ACA707C0183D4B21188DB4F3F29D723DC45A2262053370896B4134F1060626F248F6DC3C90C7CD3961FDC21C0356B89DDA8C4E88F7
                      Malicious:false
                      Preview:.........d.............x................................................ ..............'..............1..............:..............C..............N..............X..............b..............m..............y................................................................................................................................................................................................................................................................................ .. ............!..!............".."............#..#............$..$............%..%............&..&...........'..'...!........(..(...$........)..)...'........*..*...)........+..+...+........,..,............-..-...0.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):347
                      Entropy (8bit):4.512079282177329
                      Encrypted:false
                      SSDEEP:
                      MD5:22C6C1D71526513ACC3B078FF941EDFE
                      SHA1:4A76AF9D7A1C0E2B61AA373C910FF5593BEB1F82
                      SHA-256:B8DD89F6C8596B33F69F49A48D9B58F594D420EA4E4AD0661D8438B24CC3DC39
                      SHA-512:B0573732A2233BB93128351B8AFAECD30A5E7C8D6DE1B4B6CB5E41DD6D7D80270E0C0E0E2DC5DCFFDAC1C179D4580A5EF4C7EA52AED65A88B896A369EAAFB662
                      Malicious:false
                      Preview:........W...........-................................................................................................................................................................W.....................................................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1794
                      Entropy (8bit):5.633463174459497
                      Encrypted:false
                      SSDEEP:
                      MD5:5F19B6E988B498E8E6E562CBB7F96A9F
                      SHA1:E3F8C5A96DDFFE3A6EC1A33A561D3E7498AD90ED
                      SHA-256:08FA5A9A9E2DC970B115296F771852E9347CAD3F93BBF7244378A90F8522B587
                      SHA-512:1ED5EC5E9C0EAACE0F00AB7465E50EC9A5834DBBBB5765905142CDF8BF236B1B5EE93D87F105FF86340A816FB6DA7863C54E88B85E95E8AD0053C6B46FBEA210
                      Malicious:false
                      Preview:.....................clash_info1...clash_info4...clash_info5..1Sprite/UI/Banner/PVPTeaching/PedagogicalDiagram_1...2...946:2;2754:2;949:5........................clash_info1...clash_info6...clash_info7..1Sprite/UI/Banner/PVPTeaching/PedagogicalDiagram_2...15...46:2;965:2;949:5........................clash_info1...clash_info8...clash_info9..1Sprite/UI/Banner/PVPTeaching/PedagogicalDiagram_3...-1...2967:1;2754:2;949:5........................clash_info1...clash_info10...clash_info11..1Sprite/UI/Banner/PVPTeaching/PedagogicalDiagram_4...-1...2968:1;965:2;949:5........................clash_info2...civilization_clash_rise_ui6...clash_info12..1Sprite/UI/Banner/PVPTeaching/PedagogicalDiagram_5...30;150;150;150;10;5;3000...2969:1;2754:2;949:5........................clash_info2...civilization_clash_rise_ui9...clash_info13..1Sprite/UI/Banner/PVPTeaching/PedagogicalDiagram_6...20;100;100;100;5;1500...2694:1;965:2;949:5........................clash_info2...civilization_clash_rise_ui12...clash_info14
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):905
                      Entropy (8bit):4.856666870405585
                      Encrypted:false
                      SSDEEP:
                      MD5:07F221542FD3D82B3544BD72D25275A6
                      SHA1:F95B8F365ACB574A6A65359E3AF196274619001F
                      SHA-256:0A5A4FDF6DFD88660E00DD1FC943F764F4CE470FF7C2484ED391497FFC4F0105
                      SHA-512:0BA106BEFCAF13FCC1E453EF8B2208EDF0A5A2A12451DCA79C7D162A99A58C6D143D1B665E94742B84EE9FD9FE6FBCB949FAB8EE90A41A145A586F1D9F4F0E7B
                      Malicious:false
                      Preview:............N...............N...............N...............N...............N...............N...............N...............N...........................................................................-...-............-...-...].......-...-...>.......-...-...........E...E...........E...E...........E...E...........E...E...........E...E...........E...E...........E...E...........V...V...........V...V...........V...V...........V...V...........V...V...........V...V...........V...V...........V...V...........V...V...........V...V...........V...V...........V...V...........V...V...........n...n...................'.........................................................................................................................................................................................................................N.................'...................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2413
                      Entropy (8bit):5.642157240727432
                      Encrypted:false
                      SSDEEP:
                      MD5:91FEC3DC9FBB0E0B047456BDAE183A8F
                      SHA1:043C8F100437527E8BA1F1B159162B86E160B613
                      SHA-256:A909A2955458995A36C67E15AB37E9E97FFA266D1AD8621AFE0D221FF3BE38CB
                      SHA-512:34F93778D3CC48B280A77AC1C935AA354C58883C3CA45F7FC8133017F29161CF1ACF51170A0EC0543FA11B1321AD553743E0B5B72F22C6E58EBA89829CE25312
                      Malicious:false
                      Preview:.V........178;186...combination_handbook_05........80|84..........43........9259;9947...._........153|154;217...combination_city_01........78|82..........5|6|7|8|9........10033;13622....Z........237|238;239...honour_Godzilla_1........233..........42........14168|14169;14212....P........3;4...general_skin_set_name........239..........42........15744;15745....W........179;185...treasure_description61........106|112..........46........9382;9805....Y........231;232...treasure_description62........103|109..........39........14077;14078....Y........255;256...treasure_description67........107|113..........40........15835;15836....L........145;262...triumph_text23........78..........232........7142;15975....e........257|258;251...combination_city_12........242..........57|58|59|60........15888|15889;15819....j........206;207..#kingkong_exploreactivity_introduce2........80..........57|58|59|60........10977;10979....]........280|281;284...combination_city_13........240..........233........17963|
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5962
                      Entropy (8bit):5.139339516708901
                      Encrypted:false
                      SSDEEP:
                      MD5:C0C3686E9F3422B10AA1DFF1A2AB8C34
                      SHA1:2A62DBA82C0A5589F196AFE1A49A336D246D4C8E
                      SHA-256:634C118DE233A0A78254C002FD71DBC577E40F0B5093F7BC9AA1041A316A43B9
                      SHA-512:6BEC43EA6E7EE27F54C02D36DBB8012AA9BC7D8D7908D1CD877C36B53B9853804C44649758EE667FFD79861050465D6DAF97B47E944410B7E4BF99F2186084D3
                      Malicious:false
                      Preview:.(.............7......{....................(............."......{....................(....................{..<................(.............L......{....................(.............L......{....................(.............L......{....................(.............L......{....................(.............+......{....................(.............+......{....................(.....................{.....2.............'.............W......{...................'.............W......{...................'................d...{...................'....................{...................'....................{.....2.............'................d...{...................'....................{...................'....................{.....2.............'................d...{...................'....................{...................'....................{.....2.............'................d...{...................'....................{...................'....................{.....2.............'....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9354
                      Entropy (8bit):5.91826419447322
                      Encrypted:false
                      SSDEEP:
                      MD5:EFB72781712CF80FA12262BAD56E4754
                      SHA1:445AF928B357F52305CA2D1762320BEE548FDB95
                      SHA-256:8D13877FD3069F527470E8F545A13E06B3F5010061924F20E4E3CD7A3AC70C58
                      SHA-512:BC01FB324B3ADE0A3DD8806EFADE8DC00357B87EDAB8309F70B6E76262EC2D676A91CE0BA1D7E44929B5302CB67778B63AF4245FDFA6E1715F1D2413D470C4C4
                      Malicious:false
                      Preview:....................sum_recharge_packet.........1/6/2016 6:00:00 AM...2/7/2026 6:00:00 PM......"Sprite/UI/UIStoreIcon/icon_Mystery....................................sum_recharge_packet.........1/6/2016 6:00:00 AM...2/7/2026 6:00:00 PM......"Sprite/UI/UIStoreIcon/icon_Mystery....................................sum_recharge_packet.........1/6/2016 6:00:00 AM...2/7/2026 6:00:00 PM......"Sprite/UI/UIStoreIcon/icon_Mystery....................................sum_recharge_packet.........1/6/2016 6:00:00 AM...2/7/2026 6:00:00 PM......"Sprite/UI/UIStoreIcon/icon_Mystery................................6...sum_recharge_packet.........1/6/2016 6:00:00 AM...2/7/2026 6:00:00 PM......"Sprite/UI/UIStoreIcon/icon_Mystery................................N...sum_recharge_packet.........1/6/2016 6:00:00 AM...2/7/2026 6:00:00 PM......"Sprite/UI/UIStoreIcon/icon_Mystery................................u...sum_recharge_packet.........1/6/2016 6:00:00 AM...2/7/2026 6:00:00 PM......"Sprite/UI/UIStoreIcon
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):130
                      Entropy (8bit):4.25788168885155
                      Encrypted:false
                      SSDEEP:
                      MD5:8284CE37A753741BC8480905C8EA60A9
                      SHA1:4E6241EE4FCF66DB1E2271905F985241394CE9D5
                      SHA-256:4B7D4F8430C4CC81DE67C8A5D5816AA06318FEAF2287AB3F072E31B3A54A05E7
                      SHA-512:CE573EC3CA75322604B9F8AA4FC63191DFBE5C4B66D56F9C0B3285A321DC43CD2A9E2C706463FD22CFA0893FBD753F9A213B8BCFF320663149F3BDCD9F0E4D5E
                      Malicious:false
                      Preview:.................5:6;10:6;15:6.................5:6;10:6;15:6.!...............5:6;10:6;15:6;20:6.!...............5:6;10:6;15:6;20:6
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):100113
                      Entropy (8bit):5.8310072580951955
                      Encrypted:false
                      SSDEEP:
                      MD5:7FA0BEBE5FF2FDB6168ABC80D6C2BECE
                      SHA1:E039822EBEE54944A6B84BE99557621AFC286C14
                      SHA-256:6CDEB591CBA2BBC3472D8026DB02370953218521D887762DC90F114B1CC95BFE
                      SHA-512:51CAAA2D3E64A6D733887A86616D7D4ED32F29DAE2128E8925BAA0A5D34A3AAC46F68AD8A2E2232BAD5995ECB2BCD22EBCF6C457CC754A2B83B5CAE7635B528F
                      Malicious:false
                      Preview:........................1:5;2:5;3:0;4:0........107|113..........102........16490:800...general_office_position1.."Sprite/UI/Icon/Council/Position_01...........................1:8;2:8;3:0;4:0........105|111..........105..........107|113........16490:2000...general_office_position1.."Sprite/UI/Icon/Council/Position_01...........................1:11;2:11;3:11;4:0........107|113..........105|111..........428|429|430|431.....".minus...16490:4000...general_office_position1.."Sprite/UI/Icon/Council/Position_01...........................1:14;2:14;3:14;4:0........103|109..........108..........111........16490:8000...general_office_position1.."Sprite/UI/Icon/Council/Position_01...........................1:18;2:18;3:18;4:0........102|105|108|111..........107|113..........111........16490:12000...general_office_position1.."Sprite/UI/Icon/Council/Position_01...........................1:22;2:22;3:22;4:22........106|112..........105..........130|133|136|139................16490:20000...general_office
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4546
                      Entropy (8bit):4.6565260152392405
                      Encrypted:false
                      SSDEEP:
                      MD5:172DB84A43ECE54DD7394BB18836C587
                      SHA1:8F0BAC97FDE02FED49BF237B910CEC6CFF2D88BD
                      SHA-256:385E3B7B3515DB0DC67FDF2BA8B909350A7E242AF81C99BB3D529B9280CA9099
                      SHA-512:742D122EE6A4E1C2F8B78BAF525F38A4AD95083A2206DB6859F7CFA1657DBC2562C7B233133A4DF8B655DF913D1049786C5E66B83B4CE029486A9F5D08FA8109
                      Malicious:false
                      Preview:......................103...........................240...........................84...........................102......(....................239|240|241|242...........................10...........................109...........................242...........................78...........................108......(....................239|240|241|242...........................16...........................106...........................239...........................82...........................105......$....................78|80|82|84...........................13...........................112...........................241...........................80...........................111......$....................78|80|82|84...........................19...........................104...........................79...........................242...........................103......(....................239|240|241|242...........................10...........................110...........................83....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9900
                      Entropy (8bit):5.57284392441455
                      Encrypted:false
                      SSDEEP:
                      MD5:0C1F368B3AA707644890D7C74BCC8152
                      SHA1:0B7C45E6411433C4FCECF6E4CCCD9065AFBC9AE0
                      SHA-256:6F5684E69EE15CD44C0CEC75591C3BBB6CEF314956484627D404A2FF7E2FBFF2
                      SHA-512:3547C771AABA5C2BE6FE9487D1BD90998F4EC7C524DC4F0EC0C618641554AE26C307B60DB6FD22510B8000C660E5B076CCA81F078234B55ED0009AA9E33B9499
                      Malicious:false
                      Preview:.,.......Afghanistan...AF...Sprite/UI/Flags/AF.(.......Albania...AL...Sprite/UI/Flags/AL.(.......Algeria...DZ...Sprite/UI/Flags/DZ./.......American Samoa...AS...Sprite/UI/Flags/AS.(.......Andorra...AD...Sprite/UI/Flags/AD.'.......Angola...AO...Sprite/UI/Flags/AO.).......Anguilla...AI...Sprite/UI/Flags/AI.+.......Antarctica...AQ...Sprite/UI/Flags/AQ.*.......Argentina...AR...Sprite/UI/Flags/AR.(.......Armenia...AM...Sprite/UI/Flags/AM.&.......Aruba...AW...Sprite/UI/Flags/UN.*.......Australia...AU...Sprite/UI/Flags/AU.(.......Austria...AT...Sprite/UI/Flags/AT.+.......Azerbaijan...AZ...Sprite/UI/Flags/AZ.(.......Bahamas...BS...Sprite/UI/Flags/BS.(.......Bahrain...BH...Sprite/UI/Flags/BH.+.......Bangladesh...BD...Sprite/UI/Flags/BD.).......Barbados...BB...Sprite/UI/Flags/BB.(.......Belarus...BY...Sprite/UI/Flags/BY.(.......Belgium...BE...Sprite/UI/Flags/BE.'.......Belize...BZ...Sprite/UI/Flags/BZ.&.......Benin...BJ...Sprite/UI/Flags/BJ.(.......Bermuda...BM...Sprite/UI/Flags/BM.'.......Bhuta
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5115
                      Entropy (8bit):4.7756225228741584
                      Encrypted:false
                      SSDEEP:
                      MD5:5BCDEFFBAD256F035B758C09C849CCAB
                      SHA1:425F28EDD442FA367C184631BBC815335E930039
                      SHA-256:1AB41B02CE31A6A2F468C4EA4603606353A4C20783B201C1CF9E0DE8CA289B5B
                      SHA-512:31F699B3C240B25422A1B64283287E2EDFECACEEA197527DAFF640C59465139F0CB41B2F993B3DDA409594498CD8C1C77F8A8E4A124EF023F81663F8526CF7A3
                      Malicious:false
                      Preview:............#.............................#....................................................................2......"...............................#..........$........d...........................#.............................#....................................................................2......#...............................#..........$........d.......................... ................................F.................................................................2......................................#..........$....................................#.............................#....................................................................2............................d........#..........$........d...........................#.............................#....................................................................2............................d........#..........$................................... .............................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5115
                      Entropy (8bit):4.776054764262522
                      Encrypted:false
                      SSDEEP:
                      MD5:3C4950581C4B451BCA32A22F5E39464F
                      SHA1:C3C33A2B340C48356D56B6CB5939BAA96DE58AFE
                      SHA-256:015433FDC1421A879032AE2A150E3EB4ABE9CD3582E72ED2BEE84A4BBFA5896B
                      SHA-512:995EECBE598867906E16130E476F0222423E4C41E141AFD79031E4E5F14F9CC30D6C4E7C493DBF98D16312102FA1DB51E6578BFF0E5EAE295414389DD989D177
                      Malicious:false
                      Preview:............#.............................#....................................................................2......"...............................#..........$........d...........................#.............................#....................................................................2......#...............................#..........$........d.......................... ................................F.................................................................2......................................#..........$....................................#.............................#....................................................................2............................d........#..........$........d...........................#.............................#....................................................................2............................d........#..........$................................... .............................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1688
                      Entropy (8bit):6.41061974400109
                      Encrypted:false
                      SSDEEP:
                      MD5:47495C116FE20A0FE8826961714CFB98
                      SHA1:695BC0EA47D2706E1FAF55420C833E32DBFEC79A
                      SHA-256:A9AF458491C4AEEDC58819AF1284902874C62DE33D5888A0CF624E57B7319A85
                      SHA-512:742E85AF9D0DD95BF24369C6474D0239DFDA3C0525D678ADB919D69579C3E6D32CAD67B4FE34F1CC41FA6E4B973CCC3AED764F19CF5E230A216EFBD952667754
                      Malicious:false
                      Preview:.<.....................(-6|-5.6|-14|0)...1.......N..........1 .......,Prefabs/Guide/Common/UIGuideAntecedentWindow.......O..........2 .......-Prefabs/Guide/Common/UIGuideAntecedentWindow1.......Q..........3 ......./Prefabs/Guide/Common/UIGuideAntecedentWindow2_1.......T..................new_guide_talk1.."Prefabs/Guide/Evony{0:D}/General_1.......Q..................new_guide_talk2...Prefabs/Guide/Evony{0:D}/Lord_1.......K..................(Prefabs/Guide/Common/UIGuideWarArtWindow.......'...................fire.......&..................attack.......R....................)Prefabs/Guide/Common/UIGuideVictoryWindow.......,....................attack............................inToCity.......=......................(2.6|-0.54|-14|6).......X....................new_guide_talk26...Prefabs/Guide/Evony{0:D}/Lord_1.......Z....................ne
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):527
                      Entropy (8bit):5.590436068478961
                      Encrypted:false
                      SSDEEP:
                      MD5:F8D93E6D65171979A223E46A3CE53BEA
                      SHA1:244FDD95F1C07753B76E37DF53538D28DFD31CBB
                      SHA-256:53E18799964ADBAF01592180B8B77E5CFB562434031B0A9E3D440BE1CFDDC53D
                      SHA-512:61ED97555009536C90361DE3DDAA41C4C88E8168A9C40E51F6B9A1A6B04C6B25F133A7A90C6C446E4F30668FD239CD7620B0B4E53DD97A948E6157F3C2B198F2
                      Malicious:false
                      Preview:.G.....200.......-1.........................................967:1.I.....1....*3...-1.........................................11296:1.E.....60..VIP...-1.........................................4582:10.D........*5...-1........................................987:100.G.............-1.....-................................1566:200.J.....8.........-1.......................................3369:2.W.....1000.....-1.........................................4016:100;11297:15;6244:100
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):525
                      Entropy (8bit):5.597336777566824
                      Encrypted:false
                      SSDEEP:
                      MD5:FE0F60866F025B6D3B8A9AA395879C90
                      SHA1:4CFC8C4AD851591A3023270C66805B63026AC5BE
                      SHA-256:D707EBF91233DF8440AA46056C6E3C1A0A08FB99AEBEAC2AE69B890C26A96EA1
                      SHA-512:52A5C749D041754306D331C0173D735AE45953026D3B6527A9113AB2885DD93EBF2772F15E1E9AF9442942E1BC914104CAF0339664AE845E237D96A8469902B2
                      Malicious:false
                      Preview:.G.....200.......-1.........................................967:1.H.....1....*3...-1.........................................4145:1.E.....60..VIP...-1.........................................4582:10.D........*5...-1........................................987:100.G.............-1.....-................................1566:200.J.....8.........-1.......................................3369:2.V.....1000.....-1.........................................4016:100;6260:15;6244:100
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):58311
                      Entropy (8bit):5.890799580018043
                      Encrypted:false
                      SSDEEP:
                      MD5:57B37C9E78EE0F24F0AE85048A3391E0
                      SHA1:094FAD03A57FED03EB6B408C14A7234A7775B696
                      SHA-256:9CCC9B1D8822318274E0EFA885D7C436D34BD25515B2191FC1FC6DD8481B991A
                      SHA-512:3C095A07C09F8FBCB260B5364EF54C9169B396BDB396C13A0B48A2795DC3D52BD7B455F1EE6D6A5094D4C2EB1C857B5B5D5B9898D46C54FDFBBA5B3548D6BC5D
                      Malicious:false
                      Preview:................1......-1...dailytask_description12...2.................................................. Sprite/UI/UIBaseIcon/Icon_hammer..............................................1.........-1...dailytask_description13...2...................................................Sprite/UI/UIMenuIcon/menu_6................................5000....-1...dailytask_description31...2............'.......................................Sprite/UI/UIMenuIcon/menu_4..................................................5000....-1...dailytask_description30...2............'......................................&Sprite/UI/UIMailIcon/mail_collection_1................................................1....-1...dailytask_description9...2...................................................Sprite/UI/UIMenuIcon/menu_39..................................................100....-1...dailytask_description21...2...........d.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2214
                      Entropy (8bit):5.794003442353118
                      Encrypted:false
                      SSDEEP:
                      MD5:FAD5E0BD463ED45B72BF65356A822A30
                      SHA1:F6E5C31480E31476E8C302763A02370A0A7AB7A9
                      SHA-256:05A6E856961BB153781D68A7B0DC06C0222DD54FDEA53488F392EFD86BE959A7
                      SHA-512:0344217FC933E0634C7122622839B4B2C0904D6978621FD472057836D4C4A1C35BA01B5B8F973A5035086A6169F1D0671F28DDE7E0E37C5F1AAFA0A649AE2FCB
                      Malicious:false
                      Preview:....e..e...........11|14|17|20........................414..'UIEffect/prefab/Scene/Fx_chengbao_chufa..'UIEffect/prefab/Scene/Fx_chengbao_chixu...skill_castle_1...skill_castle_2...skill_castle_3..$Sprite/UI/Icon/Others/castle_skill01........f..f...........11|14|17|20.......................*UIEffect/prefab/Scene/Fx_chengbao_changzhu...414..'UIEffect/prefab/Scene/Fx_chengbao_chufa..'UIEffect/prefab/Scene/Fx_chengbao_chixu...skill_castle_1...skill_castle_2...skill_castle_3..$Sprite/UI/Icon/Others/castle_skill01.........................12|15|18|21........................442..%UIEffect/prefab/Scene/Fx_Athens_chufa..%UIEffect/prefab/Scene/Fx_Athens_chixu...HeavenlyFireCeremony_37...HeavenlyFireCeremony_39...skill_castle_3..$Sprite/UI/Icon/Others/castle_skill02.........................12|15|18|21.......................(UIEffect/prefab/Scene/Fx_Athens_changzhu...442..%UIEffect/prefab/Scene/Fx_Athens_chufa..%UIEffect/prefab/Scene/Fx_Athens_chixu...HeavenlyFireCeremony_37...HeavenlyFireCeremony_39
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11728
                      Entropy (8bit):6.013560594508475
                      Encrypted:false
                      SSDEEP:
                      MD5:4593B75A2510B191E5C3852C30999641
                      SHA1:47D99338727DE88216B3C3625F99F8C6EAB70B06
                      SHA-256:3EE2EB60A4E4831BCF55B142B13070DDFEB820FE942D7C557F7445D2B6B1E3FD
                      SHA-512:D4CD412CB012434EA04221DA5138E7C0542FADF8739D8D0374FA7BD55BBD10EA1A32E8EF20B5C8F5479C5FF03C11963C361842A9AA81A4E5CC8E6C72D3740481
                      Malicious:false
                      Preview:....)....)........433.d.......39..........46....... 1658:50;980:100;3036:100;4365:10...y...2|3|4|5|7........2|4|6|10|16.......50|100|200|400|800...............-1...............-1...column_history.."Sprite/UI/Icon/Others/Icon_General..$Sprite/UI/Icon/Others/Icon_Kills_128.."Sprite/UI/Icon/Others/icon_kingdom..8Assets/PackageRes/Raw/Sprite/UI/Banner/BG_Trajan'sColumn..:Assets/PackageRes/Raw/Sprite/UI/Banner/BG_Trajan'sColumn01..3Sprite/BuildingList/Evony{0}/Age5/buildingList_41_1..8Prefabs/BuildingModel/Evony{0}/Age5/UIBuildingModel_41_1....)....)........433..........39..........46....... 1658:80;980:120;3036:200;4365:20...y...2|3|4|5|7........2|4|6|10|16.......50|100|200|400|800...............-1...............-1...column_history.."Sprite/UI/Icon/Others/Icon_General..$Sprite/UI/Icon/Others/Icon_Kills_128.."Sprite/UI/Icon/Others/icon_kingdom..8Assets/PackageRes/Raw/Sprite/UI/Banner/BG_Trajan'sColumn..:Assets/PackageRes/Raw/Sprite/UI/Banner/BG_Trajan'sColumn01..3Sprite/BuildingList/Evony{0
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):56791
                      Entropy (8bit):5.368892496323442
                      Encrypted:false
                      SSDEEP:
                      MD5:B148FF4CF1CB9F530AB2CA112D0B82E5
                      SHA1:25A3A8EDBB1658965CEC89421AD04879A104975D
                      SHA-256:940355176404188196EF47D54AF80F65813FBF25C2B1E39114E7E11ED3FDDEAB
                      SHA-512:B4BB70BAC6928F1899C2D1F88F072F80F6B8811BCBB98D1F291D6E6B9316DDF73CC8E9E8FC3B725D338DA3667A7146005AE52B469465073AE4FB36DFC77FCACC
                      Malicious:false
                      Preview:......................?.....=....................................-......................d...........2............d......d..2.....d......N.....E........d......................................................d.........$........................................................x...........P........................2...............\..?..\..?..\..?..\..?....HB......................?..ff.?..\.B?.... ?..........................441:1..#1644:1;1646:1;2549:2;952:60;1004:50...200000...969:2;970:2;971:2;972:2;40:6.........en;zh-CN...p..d...............21:400..2..2.................................N..................0.5:0.5:0.5:0.5:6000...2...50:50....20000:24000:28000:32000:36000:40000:44000:48000:52000:56000:60000:64000:68000:72000:76000:80000:84000:88000:92000:96000:100000:104000:108000:112000:116000:120000:124000:128000:132000:136000:140000:144000:148000:152000:156000:160000:164000:168000:172000:176000:180000:184000:188000:192000:196000...................2549:1...2308:1....40000:48000:56000:6400
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):19745
                      Entropy (8bit):5.7003106900442555
                      Encrypted:false
                      SSDEEP:
                      MD5:8C18305014B271AB0CF1BADF9CE8E55D
                      SHA1:9075B9EFE8F32ACC99142E7098CA8A4FCD7AD516
                      SHA-256:301014E0B301962F142B7D17FE363792BF0672A48F775A480A4B2259C82586A3
                      SHA-512:9E7DB926BD24BE0415D1784F34B6AB4D881F2A54EA3A3400DF959592B1BA77B1F439AA27AA97DA23C4FAEE96CA6221AA95A713E54DD3556DBE7EFFDD6F4F52A7
                      Malicious:false
                      Preview:.'....samsung........samsung......SM-S901.'....samsung........samsung......SM-S908.'....samsung........samsung......SM-S918.'....samsung........samsung......SM-S711.'....samsung........samsung......SM-S916.'....samsung........samsung......SM-S911.)....samsung........samsung......SM-G781NK.'....samsung........samsung......SM-S906.'....samsung........samsung......SM-G990.'....samsung........samsung......SM-G998.'....samsung........samsung......SM-G996.'....samsung........samsung......SM-G991.'....samsung........samsung......SM-G781.'....samsung........samsung......SM-G780.'....samsung........samsung......SM-N986.(....samsung........samsung......SM-N985F.'....samsung........samsung......SM-N981.(....samsung........samsung......SM-N980F.'....samsung........samsung......SM-G988.+....samsung........samsung......SM-G988B/DS.'....samsung........samsung......SM-G986.'....samsung........samsung......SM-G985.(....samsung........samsung......SM-G981V.'....samsung........samsung......SM-G981.'....s
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):618
                      Entropy (8bit):4.739965546460895
                      Encrypted:false
                      SSDEEP:
                      MD5:9FB9D9F5FFAC061CAA4419A49E33DDE4
                      SHA1:41257251EF2267A8FA83FBBF71B122FD519B1870
                      SHA-256:24C0173EB573897897624D6049BF13648E21EEB38E62B9F05E7AB925569874D5
                      SHA-512:35F839402825CBC507A16139C7DC979C7677C4F1F81573649B3DDDAAF3F9E181C7E099852D7F464D3DC7DD5A03B868B7A3684CEB7DEA668D61CE91752E4F3F77
                      Malicious:false
                      Preview:.2..N...N...W.....(..d...90-40-10...5-10;20-40;20-30.7..N...N...W.....(.......100-20-5...30-50;51-100;101-140.2..N...N...W........d...90-40-10...5-10;20-40;20-30.7..N...N...W.............100-20-5...30-50;51-100;101-140.2..N...N...W.....(..d...90-40-10...5-10;20-40;20-30.7..N...N...W.....(.......100-20-5...30-50;51-100;101-140.2..N...N...W.....(..d...90-40-10...5-10;20-40;20-30.7..N...N...W.....(.......100-20-5...30-50;51-100;101-140.9..N...N...W.............100-20-5...70-130;131-230;231-320.:..N...N...W.............100-20-5...140-260;261-460;461-640.=..N...N...W.........'...100-20-5...327-545;546-1090;1091-1630
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):554148
                      Entropy (8bit):4.489658386157125
                      Encrypted:false
                      SSDEEP:
                      MD5:57E5309042631A5BD35BEEEF58933163
                      SHA1:EB53CBDEA75FE954CBA46273271C3B69F3E1A7CE
                      SHA-256:7471102EB45C40C018755B35E83EC38DAF1E9844315368DE879287E9B6ABC9C6
                      SHA-512:F308B2A98F04376AC18E034E703D351521E7DCC46FCF3B4F715CF4DCC0E6052922A4DF5B28AF71078E3166159160E09E96E0AA759DA0C0967B222D97FDE5DF3C
                      Malicious:false
                      Preview:...............dragon_name4.. ...............................6188:1:52500:155;6188:2:105000:155;6188:3:157500:155;6189:1:140000:188;6189:2:280000:188;6189:3:420000:188;2561:2000:6400:100;2561:5000:16000:100;2561:10000:32000:100;2557:2000000:1382:100;2557:5000000:3456:100;2557:10000000:6912:100;2558:2000000:1382:100;2558:5000000:3456:100;2558:10000000:6912:100;2559:2000000:1382:100;2559:5000000:3456:100;2559:10000000:6912:100;2560:2000000:1382:100;2560:5000000:3456:100;2560:10000000:6912:100;2566:2000000:7680:100;2566:5000000:19200:100;2566:10000000:38400:100;2566:3000000:11520:100;2566:8000000:30720:100;2566:15000000:57600:100;3161:20:3840:100;3161:50:9600:100;3161:100:19200:100;1002:4:7680:100;1002:10:19200:100;1002:20:38400:100;2850:8:15360:100;2850:10:19200:100;2850:15:28800:100;1003:100:3840:100;1003:300:11520:100;1003:600:23040:100;3036:20:3840:100;3036:50:9600:100;3036:100:19200:100;3507:10:17995:100;3507:25:44989:100;3507:50:89979:100;73:1:11664:100;73:3:34992:100;73:5:58320:10
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):736357
                      Entropy (8bit):5.934960316000674
                      Encrypted:false
                      SSDEEP:
                      MD5:AFE23BEFC14027455139324236F04E9D
                      SHA1:96348FDA7903D59ADC594A9663CC85C0BE3924B9
                      SHA-256:B32A7390A88A91BFC433175F6C26BB96E90363ADA76EE4E406FD6ACD1EC82412
                      SHA-512:5400B6BCEE735735F7708FCB706D4C381420B0271A615CD1FC6B7B3D875AD4E10DC7069E309756B402DE92C56A33A0DACE3A45BF6F028C16743FD7881DEF65A0
                      Malicious:false
                      Preview:.......................dragon1_talent1......3646:50;5046:50.....13.(.......15.(................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1...1:2200...-1.......................dragon1_talent1......3646:50;5046:50.....13.P.......15.P................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1...1:2200...-1.......................dragon1_talent1......3646:50;5046:50.....13.x.......15.x................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1...1:2200...-1.......................dragon1_talent1......3646:50;5046:50.....13..........15...................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1...1:2200...-1.......................dragon1_talent1......3646:50;5046:50.....13..........15...................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Spri
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):206434
                      Entropy (8bit):5.913767901947867
                      Encrypted:false
                      SSDEEP:
                      MD5:267BAE5EE6F3B0B530D3365F4B9D44FA
                      SHA1:F28BF3D4A6BF1FACC32D2672AB1A1A35305404B4
                      SHA-256:10501DE39FC1A240AA9972362C6868B5DC3FA8B1BC38AFCDB3CDAF195936E4EC
                      SHA-512:815A1C7F232E7449929FA0203107925D0913CB7D1E657272C5A76DFB0417C27AAEF36EE82213C014ADB9397550030B5B8722FF1D355469F71FBBED4B65D9B7F4
                      Malicious:false
                      Preview:.......................dragon1_talent1......3646:50;5046:50.....13.(.......15.(................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1...1:2200...-1.......................dragon1_talent1......3646:50;5046:50.....13.P.......15.P................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1...1:2200...-1.......................dragon1_talent1......3646:50;5046:50.....13.x.......15.x................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1...1:2200...-1.......................dragon1_talent1......3646:50;5046:50.....13..........15...................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1...1:2200...-1.......................dragon1_talent1......3646:50;5046:50.....13..........15...................................-1...dragon_talent_note8..8Assets/PackageRes/Raw/Spri
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):823
                      Entropy (8bit):4.822173624500485
                      Encrypted:false
                      SSDEEP:
                      MD5:64A935FAA1DAF4A9CAACC993993462FF
                      SHA1:FE3EE710BEBB2B07CE3EDD83F8F0B15C42609FD7
                      SHA-256:17612F559157026C0D1434B8B315A9CE9A1C5304F63AA5E5F4466CEF01E98811
                      SHA-512:68516E7BA9E353E7BEB31C1B4DD54F0662AA4A15C7A886EA4E67F8D36B1111231D0AA85972BE4BD42474391CD3D14E5DC74612F3A215345167BAC018ADB892FD
                      Malicious:false
                      Preview:.1.....................famous_general_presale_talk1.1.....................famous_general_presale_talk2.1.....................famous_general_presale_talk3.1.....................famous_general_presale_talk4.1.....................famous_general_presale_talk5.1.....................famous_general_presale_talk6.1.....................famous_general_presale_talk7.1.....................famous_general_presale_talk8.1.....................famous_general_presale_talk9.2.....................famous_general_presale_talk10.2.....................famous_general_presale_talk11.2.....................famous_general_presale_talk12.2.....................famous_general_presale_talk13.2.....................famous_general_presale_talk14.2.....................famous_general_presale_talk15.2.....................famous_general_presale_talk16
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1883
                      Entropy (8bit):4.328940712350253
                      Encrypted:false
                      SSDEEP:
                      MD5:6220C7DCAE3D2A1A9BF6E1C55F9AC96B
                      SHA1:8425EE0FB85CCFFD010354EF5E2D449EEC52A5A0
                      SHA-256:95A572F1CC0C2B07BE6746DC88CDCCD6069D9701CE5352C6D1BF635DACD0410E
                      SHA-512:D5787A65953DC54E326BE29DF8067787617B1EAB7B43ACB499345C3483301F18E4B94625E4CD4AE029EF82E1012FEE4569D9AA12601EC874A75D50187577215E
                      Malicious:false
                      Preview:."........L......1..................."........j......5...................$........0......250...................$........'..2...250...................$........'......250...................$........"..x...250...................%................250...................$...........P...250...................$...........P...250...................$...............250...................$...............550...................#..............750...................#..............750...................#..............750...................#..............750...................%...............2800...................$...............800...................$...............422...................#..............422..................."........L......1..................."........j......5...................$........0......250...................$........'..2...250...................$........'......250...................$........"..x...250...................%................250...................$...........P...250..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1791
                      Entropy (8bit):5.3810723058851435
                      Encrypted:false
                      SSDEEP:
                      MD5:355FD6B4A147BACB251A044A7345B00B
                      SHA1:D3EB50EA34576835F84FA68585C6D0EBD4E6FC61
                      SHA-256:9D075B8F9CA5C1A7F9A4B5ADC23C5343C1E58DDB25AB68C97079AF9CD86BF77C
                      SHA-512:014AF503977A18BD1C58F44A8A94FA8DAD66A5C0CEE660495EBA0B602D65A8A1277D28C0B0E0C6B3BFF35B60C7C526AE282CD3593740CCF04D78A819D9A068EC
                      Malicious:false
                      Preview:.........................11008:25;950:40;963:40;3:20;8:20;13:20;18:20;29:12..j1563:3;3646:24;3036:800;2858:20;4365:30;3502:45;19796:15;34:36;38:36;40:36;36:36;44:36;42:36;29:13;1008:13..7...Sprite/UI/Eggs/Egg1...Sprite/UI/Eggs/eggfissure...Sprite/UI/Eggs/eggfissure1...Sprite/UI/Eggs/egg1_1...godzilla_boss_name_1...Sprite/UI/Eggs/Egg3...Sprite/UI/Eggs/egg3_1...miracle...0...UIEffect/prefab/Egg1Effctlv1...UIEffect/prefab/Egg3Effctlv1..................p......I1012:16;3161:32;949:120;950:50;963:50;3:26;8:26;13:26;18:26;29:15;1008:15..j1563:3;3646:24;3036:800;2858:20;4365:30;3502:45;19796:15;34:36;38:36;40:36;36:36;44:36;42:36;29:13;1008:13..\...Sprite/UI/Eggs/Egg2...Sprite/UI/Eggs/eggfissure...Sprite/UI/Eggs/eggfissure1...Sprite/UI/Eggs/egg2_1...monster_name_43_1...Sprite/UI/Eggs/Egg3...Sprite/UI/Eggs/egg3_1...miracle...0...UIEffect/prefab/Egg2Effctlv1...UIEffect/prefab/Egg3Effctlv1.........................>3502:30;3646:9;949:60;950:40;3:18;8:18;13:18;18:18;29:9;1008:9..j1563:3;3646:24;303
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2209
                      Entropy (8bit):5.513609757468189
                      Encrypted:false
                      SSDEEP:
                      MD5:91D2FAE54929247F85EDF46156935C50
                      SHA1:CFD3F3FC25C595E6FC848F52D98E6536312CA2C5
                      SHA-256:E0197669CF75B09371E0F4C9A9D3607CE242014F3879796816D0654BE2CA6B0C
                      SHA-512:125021637C8D9B084C37AF99F3016B9706429E94B68A0F6026BA641967C7289C91A2ED84B67AED32B0F95B5F5E1B6DA6DEC798828EE1412FD7FE0FBAA854A6F0
                      Malicious:false
                      Preview:...........|.............+1008:18;950:40;963:40;3:16;8:16;13:16;18:16..q15858:1;1563:3;3646:15;3036:240;2858:15;4365:12;3502:30;34:24;38:24;40:24;36:24;44:24;42:24;4:15;9:15;14:15;19:15..7..$Sprite/UI/Icon/KongFrame/Frame_cloud..'Sprite/UI/Icon/KongFrame/Frame_octopus1..'Sprite/UI/Icon/KongFrame/Frame_octopus1..'Sprite/UI/Icon/KongFrame/Frame_octopus2..!kingkong_gigantusleviapus_monster..%Sprite/UI/Icon/KongFrame/kong_scroll1..$Sprite/UI/Icon/KongFrame/kong_scroll...egg_open_recorder...1...UIEffect/prefab/Frame3Effctlv1...UIEffect/prefab/FrameEffctlv2...........|......p......;1012:16;3161:16;949:100;950:40;963:30;3:26;8:26;13:26;18:26..q15858:1;1563:3;3646:15;3036:240;2858:15;4365:12;3502:30;34:24;38:24;40:24;36:24;44:24;42:24;4:15;9:15;14:15;19:15..\..$Sprite/UI/Icon/KongFrame/Frame_cloud..$Sprite/UI/Icon/KongFrame/Frame_kong1..$Sprite/UI/Icon/KongFrame/Frame_kong1..$Sprite/UI/Icon/KongFrame/Frame_kong2...monster_name_42..%Sprite/UI/Icon/KongFrame/kong_scroll1..$Sprite/UI/Icon/KongFra
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2388
                      Entropy (8bit):5.7131286476523595
                      Encrypted:false
                      SSDEEP:
                      MD5:CD4278284AC9C2849DD89AF29BBFE288
                      SHA1:34885BB60815B213BE8CC64ADBF17780E372E77B
                      SHA-256:E734ED9CF65E88E32168019CA426FF6FF874DD2C5C8C078B90702E95B065F469
                      SHA-512:0E8084A07C276D2EB585388BED72E94663CAF525C458DCB09ECB117D6D1E24CF6D7818217FED9118D8D180E16DE8E495E23E2FB8993991A643AE141EA34A3A9D
                      Malicious:false
                      Preview:.*.....}.....-.....<...N...N...N...N.......=./..................;.......................=./............/.....:...........................=./............0.....9...........................=./............1.....8...........................=./............2.....7...........................=./............4.....6...........................=./............6.....5...........................[./............8.....4...........................z.0............:.....3.............................0............<.....2..............................0............@.....1..........................0............D.....0..............................0............H...../... ... ... ... ..........0............L.........."...."...."...."..........0......".....P.....,...%...%...%...%..........0......'.....X.....*....'....'....'....'..........0......+.....`.....(...*...*...*...*..........0......0.....h.....&....,....,....,....,..........0......:.....p.....$..............................0......D.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9352
                      Entropy (8bit):5.5491376348014505
                      Encrypted:false
                      SSDEEP:
                      MD5:127C371757FE35C98EE445DADB9BD425
                      SHA1:57F657F374B32572A9E2CC28CAFFA42C7C5554F1
                      SHA-256:D0ECEDDF16DD08EE92CB2A4784D45E02509BB462061FDD7802BF41A839AAFBA4
                      SHA-512:96F106E8AB70A32FA8A677A5CF73417660094312E8B8B5564896D692691D4447D93F5704DE3BB7F2889EC5E20AF78298404B8A8FB81DBBB077A8C50F5CCFCFB2
                      Malicious:false
                      Preview:...........fame_module1...fame_module1_text1...............)Sprite/UI/Icon/FameIcon/Fame_Domination_1...Sprite/UI/UIRomeNum/Num_lv_1...............fame_module1...fame_module1_text1...............)Sprite/UI/Icon/FameIcon/Fame_Domination_2...Sprite/UI/UIRomeNum/Num_lv_2...............fame_module1...fame_module1_text1...............)Sprite/UI/Icon/FameIcon/Fame_Domination_3...Sprite/UI/UIRomeNum/Num_lv_3...............fame_module1...fame_module1_text1...............)Sprite/UI/Icon/FameIcon/Fame_Domination_4...Sprite/UI/UIRomeNum/Num_lv_4...............fame_module1...fame_module1_text1...............)Sprite/UI/Icon/FameIcon/Fame_Domination_5...Sprite/UI/UIRomeNum/Num_lv_5...............fame_module2...fame_module2_text1...........d..)Sprite/UI/Icon/FameIcon/Fame_Leadership_1...Sprite/UI/UIRomeNum/Num_lv_1...............fame_module2...fame_module2_text1...............)Sprite/UI/Icon/FameIcon/Fame_Leadership_2...Sprite/UI/UIRomeNum/Num_lv_2...............fame_module2...fame_module2_text1.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):292201
                      Entropy (8bit):5.853473520957365
                      Encrypted:false
                      SSDEEP:
                      MD5:256CD784E4BE404B600C411BEC4B894A
                      SHA1:9FBA685CAB1F8C0CF41FD5D740C79B9E0A3F6D49
                      SHA-256:12C49B1C35CC80DCA35D690AF5AA7816682653FEED6BDC4B7A8D2E262C52FB48
                      SHA-512:63E806D73076D3CD952445A0FAA4706731A0F9841FF26D62976994764A2911AFC287C5C76E08AC7D333E0319779FAC7CEF0929B3042889CEB0A1D8DF835706DA
                      Malicious:false
                      Preview:.............10...buffer_description10........?.....?.....?..33.?..33.?.....?.....?..ff.?..ff.?.....@...30|25|20|15|10..d...100..................................13...buffer_description13........?.....?.....?..33.?..33.?.....?.....?..ff.?..ff.?.....@...30|25|20|15|10..d...100..................................16...buffer_description16........?.....?.....?..33.?..33.?.....?.....?..ff.?..ff.?.....@...30|25|20|15|10..d...100..................................19...buffer_description19........?.....?.....?..33.?..33.?.....?.....?..ff.?..ff.?.....@...30|25|20|15|10..d...100..................................5...buffer_description5........?.....?.....?..33.?..33.?.....?.....?..ff.?..ff.?.....@...30|25|20|15|10..d...100..................................6...buffer_description6........?.....?.....?..33.?..33.?.....?.....?..ff.?..ff.?.....@...30|25|20|15|10..d...100..................................7...buffer_description7........?.....?.....?..33.?..33.?.....?.....?..ff.?..ff.?.....@...30|25|20|15|10
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11590
                      Entropy (8bit):5.840677359371587
                      Encrypted:false
                      SSDEEP:
                      MD5:D7CCE32182A9F677FADFCD6B28C9A9AF
                      SHA1:3E9A32E3F8D430C94724C73042D0D909EB90FB67
                      SHA-256:B3092928EB5AAB848973F9127C14FE1DAD82C8F527DABD90CC89613A310F4585
                      SHA-512:BFCFD93F65CBA0E837C8F97756AC666E4A41062D2D0EE037C08A8757B6545839ED239BA7926956FE4A09CF3AFB9C2C340E11FA502D9626E697CE0AA987054475
                      Malicious:false
                      Preview:.............Castle under truce agreement..Shttp://emggcdn.ucimg.co/android/UploadBundles/Sprite/SecondCreation/142282106_1.jpg.....C..%2022/12/11 0:00:00|2023/1/16 23:59:59...............$..............Qhttp://emggcdn.ucimg.co/android/UploadBundles/Sprite/SecondCreation/142282106.jpg.....C..%2022/12/11 0:00:00|2023/1/16 23:59:59...............$..............Shttp://emggcdn.ucimg.co/android/UploadBundles/Sprite/SecondCreation/142282106_8.jpg.....C..%2022/12/11 0:00:00|2023/1/16 23:59:59...............!.............Shttp://emggcdn.ucimg.co/android/UploadBundles/Sprite/SecondCreation/142282106_6.jpg.....C..%2022/12/11 0:00:00|2023/1/16 23:59:59...............!.............Shttp://emggcdn.ucimg.co/android/UploadBundles/Sprite/SecondCreation/142282106_7.jpg.....C..%2022/12/11 0:00:00|2023/1/16 23:59:59......................Shttp://emggcdn.ucimg.co/android/UploadBundles/Sprite/SecondCreation/
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):52830
                      Entropy (8bit):4.826591641731732
                      Encrypted:false
                      SSDEEP:
                      MD5:5338DB9F9FC4B1083F23BEAA338C65C1
                      SHA1:EFE78E62ADF6408982D68E0BF376382C8027D33E
                      SHA-256:5904D88015A1076F6851848615B9B0C9B077762518598E7A330EE99FF65DE9EC
                      SHA-512:A3ACD92B0A6B9E083ED56973CB3F1189CBDF0299DB96790A6697201C4E9E1B509DD49E41AD8E905BFFF232D3431CD090FF18606251E4C22E244D4AB2F5AC8C82
                      Malicious:false
                      Preview:.<.3....3........,967:2;3926:6;951:40;3036:100;1625:60;1557:10.:.3....3........*966:3;3926:4;951:36;3036:90;1625:56;1557:9.:.3....3........*966:2;3926:3;951:32;3036:80;1625:52;1557:8.:.3....3........*965:4;3926:2;951:28;3036:70;1625:48;1557:7.9.3....3........)24:6;3926:1;951:24;3036:60;1625:46;1557:6.:.3....3........*24:5;3926:1;951:20;3036:50;1625:44;1556:10.9.3....3........)24:4;3926:1;951:16;3036:40;1625:42;1556:8.9.3....3........)24:3;3926:1;951:12;3036:30;1625:40;1556:6.8.3....3........(23:5;3926:1;951:8;3036:20;1625:38;1556:4.8.3....3........(23:4;3926:1;951:4;3036:20;1625:36;1556:2.).M.....M..........4454:10;4455:10;3036:20.).M.....M..........4454:10;4455:10;3036:22.).M.....M..........4454:10;4455:10;3036:24.).M.....M..........4454:10;4455:10;3036:26.).M.....M..........4454:12;4455:12;3036:28.).M.....M..........4454:12;4455:12;3036:30.).M.....M..........4454:12;4455:12;3036:32.).M.....M..........4454:12;4455:12;3036:34.).M.....M..........4454:12;4455:12;3036:36.0.M.....M........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):51308
                      Entropy (8bit):4.816858883972261
                      Encrypted:false
                      SSDEEP:
                      MD5:541CC353E2784BDDDEAEF58828ED8A9E
                      SHA1:53E65753344D5F962E00361F67C5ED4E991523F1
                      SHA-256:4D7F70EE134217EA7796FCE1AAB7B0D502292F41703620023AEE8290CCB8E2E6
                      SHA-512:32CE1BE9380170A8E12845FBC8FEA9C95132927D6348869AAA440E5ABA9A34C04718B24D393C28BD01EB1F4F7252D61E2013EDF91120C86A8B3610B20E35C371
                      Malicious:false
                      Preview:.<.3....3........,967:2;3926:6;951:40;3036:100;1625:60;1557:10.:.3....3........*966:3;3926:4;951:36;3036:90;1625:56;1557:9.:.3....3........*966:2;3926:3;951:32;3036:80;1625:52;1557:8.:.3....3........*965:4;3926:2;951:28;3036:70;1625:48;1557:7.9.3....3........)24:6;3926:1;951:24;3036:60;1625:46;1557:6.:.3....3........*24:5;3926:1;951:20;3036:50;1625:44;1556:10.9.3....3........)24:4;3926:1;951:16;3036:40;1625:42;1556:8.9.3....3........)24:3;3926:1;951:12;3036:30;1625:40;1556:6.8.3....3........(23:5;3926:1;951:8;3036:20;1625:38;1556:4.8.3....3........(23:4;3926:1;951:4;3036:20;1625:36;1556:2.).M.....M..........4454:10;4455:10;3036:20.).M.....M..........4454:10;4455:10;3036:22.).M.....M..........4454:10;4455:10;3036:24.).M.....M..........4454:10;4455:10;3036:26.).M.....M..........4454:12;4455:12;3036:28.).M.....M..........4454:12;4455:12;3036:30.).M.....M..........4454:12;4455:12;3036:32.).M.....M..........4454:12;4455:12;3036:34.).M.....M..........4454:12;4455:12;3036:36.0.M.....M........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):690692
                      Entropy (8bit):5.792967638694883
                      Encrypted:false
                      SSDEEP:
                      MD5:7E05864939572601C04E621B79070A8A
                      SHA1:976B65C47B6A4AF585BB47B57A81286736D35FEA
                      SHA-256:1FF713F121F9EF0F283101E2C75FCE264B5E3F21E976568FA5E8977CDCF63A46
                      SHA-512:CB4DA9488B3015808480CEB11516C40C967DE0B56FE797779FF07B7E3D08905991CF017E794F6CCE4C19E0B0DB67595789D685E5BDF7DBA800AFC7102849D8E9
                      Malicious:false
                      Preview:.......... .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2686:5;1010:1;950:1;2:1..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2687:5;1010:1;950:2;7:2..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2688:5;1010:1;950:3;12:3..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2689:5;1010:1;950:4;17:4..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2690:5;1010:1;950:5;1625:1..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2691:5;1010:1;950:6;1625:2..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2691:5;1010:1;950:7;1625:3..<....|....... .................day_I...regression_activity_sub
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):641965
                      Entropy (8bit):5.785726048345813
                      Encrypted:false
                      SSDEEP:
                      MD5:8BF3728FC2BCA09E183EF66D623F7DA3
                      SHA1:92316BC8B37D8774AFBD09FF74C65FBB547425DB
                      SHA-256:57E654441D75933A3CB679C7E51B3A3E6EBAA03B3E1D98AD5195780C70C32EF8
                      SHA-512:7884DA21DAE119440781BCD2D32753CFBF06B3E73192DB095698AF7B223388E1DB5706586557EFD21A8BF5FB0C7FCB260C60CF3EDF5A0AAFC9B96EE0C69F21BE
                      Malicious:false
                      Preview:.......... .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2686:5;1010:1;950:1;2:1..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2687:5;1010:1;950:2;7:2..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2688:5;1010:1;950:3;12:3..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2689:5;1010:1;950:4;17:4..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2690:5;1010:1;950:5;1625:1..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2691:5;1010:1;950:6;1625:2..<............. .................day_I...regression_activity_subhead1...regression_activity_task1..&.........2691:5;1010:1;950:7;1625:3..<....|....... .................day_I...regression_activity_sub
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1427
                      Entropy (8bit):4.223990394572983
                      Encrypted:false
                      SSDEEP:
                      MD5:5234CF28E1B7E220305ABD53964E634B
                      SHA1:2F496CB9FEEECB05151B8A7C643B6B0F25EBB5EE
                      SHA-256:A69A02344C3A0712C6F6BFE1505B72417B6CD615CB63F4BDB1B2449CFC77534D
                      SHA-512:AAEC8F821B32CED019EC64C21D9AD7366ADD794A4ABFD86A539123822596ACB224C4E735B30356DBBCA957C68B9EB9D8DAD24A62DB746A387D5122EDF21A6B78
                      Malicious:false
                      Preview:.0........2020/1/4 0:00:00...2020/1/13 23:59:59....1........2020/1/17 0:00:00...2020/1/31 23:59:59....0........2020/2/5 0:00:00...2020/2/22 23:59:59....0........2020/2/27 0:00:00...2020/3/8 23:59:59....1........2020/3/13 0:00:00...2020/3/22 23:59:59....0........2020/3/27 0:00:00...2020/4/6 23:59:59....1........2020/4/11 0:00:00...2020/4/25 23:59:59....1........2020/4/30 0:00:00...2020/5/11 23:59:59....0........2020/5/8 0:00:00...2020/6/14 23:59:59....1........2020/5/16 0:00:00...2020/5/25 23:59:59....0........2020/5/30 0:00:00...2020/6/8 23:59:59....1........2020/6/12 0:00:00...2020/6/27 23:59:59....1........2020/6/14 0:00:00...2020/6/28 23:59:59....1........2020/6/14 0:00:00...2020/6/30 23:59:59....1........2020/6/14 0:00:00...2020/7/15 23:59:59....0........2020/7/2 0:00:00...2020/7/12 23:59:59....1........2020/7/17 0:00:00...2020/7/26 23:59:59....0........2020/7/31 0:00:00...2020/8/9 23:59:59....1........2020/8/14 0:00:00...2020/8/24 23:59:59....1........2020/8/16 0:00:00...2020/8/26
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):581
                      Entropy (8bit):4.630841487231613
                      Encrypted:false
                      SSDEEP:
                      MD5:5EBA821D9842132FEE72778D968DD0A5
                      SHA1:9C6B5657336C9457A41FFE1E03804812CCC747D2
                      SHA-256:EB2F0D9B2ABEF32EDDBE15B14990B51074F121A0DB1DAB2B1CA1404DC2107241
                      SHA-512:F21EF8F91C7786DA42D2FF85B54029446D04A00478D863DD3178153BD84FAAD4449B0F6FE67D12CB465DC48A69614693120579DBD69EFB48CCF8E2061EF97295
                      Malicious:false
                      Preview:.%.............1624:10;1566:1;976:30...................$.............1625:5;1564:1;963:12................................................1658:5;951:10................................................7171:1;2688:3.................................980:2..................1658:2..................1008:2..................29:2..................980:3..................1658:3..................1008:3..................29:3..................980:8..................1658:8...................1008:8..................29:8..................980:8..................1658:8..................2690:5....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):970
                      Entropy (8bit):5.32091067173608
                      Encrypted:false
                      SSDEEP:
                      MD5:A976E5B471A0E50FEADF128EDC961046
                      SHA1:2BEB8682BB7CCE530502ACB58BDE50B9BF82A931
                      SHA-256:C85470873125A1DFDEE92A1C9DD9DA47ACA43AC8909AA86A7DF95083F43D94C3
                      SHA-512:AAB23F55FDCB3E7AD08BE00B1FD52779F1F028997E1CE8CC4F19E8A5857A8535CEFA7F8B7BBE2C1C8BBADF80FC31D072FA57BB9D9FFFA8256D32D53493632961
                      Malicious:false
                      Preview:................B...................C...................C..................6D.............F....zD.............].....D.............}.....D....................D....................E...................(E................. AE...................ZE...................uE..................@.E...................E....................E..............-.....E..............=...P.E..............U...@.E..............z...0.E.....................E..................(.F.....................F.....................F...................@.F...................+F...................;F................... KF....................ZF..................`jF....................F...... .. .....!.....F......!..!....&.....F......"..".....-...P.F......#..#....4.....F......$..$.....^...PCG......%..%.....n...|.G......&..&.....}...P.G......'..'.........PCH......(..(.........|.H......)..)............H......*..*..........|.I......+..+..........7I......,..,...........[I......-..-.........,.I...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):108373
                      Entropy (8bit):5.680592136202297
                      Encrypted:false
                      SSDEEP:
                      MD5:B33CFEF0AF61634BC252184B68ADFD72
                      SHA1:88EAC4850F3B2A6D25806D8393D0155EB13D4753
                      SHA-256:E7A3C12AD301BC6283ACA5C6D0AEA761ED13DC3B6B414858394781ED90E826EE
                      SHA-512:33FF22C08BDA79B5028F8AAE9CBC9B30CB88640C54CACE41038088D6B652DBD0BC3F962EC34607099BF7B91684A3CB1A94D6C0CAF1229E5E5EC16EDF68AA695C
                      Malicious:false
                      Preview:.5.........................8.5:100..U.....?.A...n..................n......8.5:100..i....G?.C...............................8.5:100..n..fff?.J..........$......................8.5:100......q=.?.G..........!.....................8.5:100........u?.>.............................8.5:100......=.W?./...;............;......8.5:100..}.....?.=.............................8.5:100..}.....?.o........................A1.15:6;1.25:10;1.3:35;1.5:15;1.8:12;2:8;2.2:6.5;2.5:4;2.8:2;3:1.5..U.....?.{...n..................n.....A1.15:6;1.25:10;1.3:35;1.5:15;1.8:12;2:8;2.2:6.5;2.5:4;2.8:2;3:1.5..i....G?.}..............................A1.15:6;1.25:10;1.3:35;1.5:15;1.8:12;2:8;2.2:6.5;2.5:4;2.8:2;3:1.5..n..fff?.............$.....................A1.15:6;1.25:10;1.3:35;1.5:15;1.8:12;2:8;2.2:6.5;2.5:4;2.8:2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3836
                      Entropy (8bit):5.612089764614439
                      Encrypted:false
                      SSDEEP:
                      MD5:5E97FF3D42CB4F942BF0E7E2ACCF361E
                      SHA1:9F23B3904EEAF081E763B0F57B0F4E3607310117
                      SHA-256:B53523A35301988FEC8214A460DB62B39E4016937E343BE789B5CAF19D010576
                      SHA-512:4F81CCAD7B343BEF828C89A975BA30E26C67EB9D0C49CFD6DD0BFF04150843333AA43294F1083136261EBBE8279F8BF9CF452C0D353F6F388C6132FDDFE50D6B
                      Malicious:false
                      Preview:.....N...N..)30000|30010|30020|30030|30040|30050|30060...new_ach_groupname_01..*Sprite/UI/Icon/HomeAchievement/icon_Sparta....."Sprite/UI/Icon/Box/icon_glory_box2..*4365:30;3161:10;5067:5;984:3;9120:3;6244:3.....O...O..!30070|30080|30090|30100|30110|102...new_ach_groupname_02..(Sprite/UI/Icon/HomeAchievement/icon_Arch....."Sprite/UI/Icon/Box/icon_glory_box2..*4365:30;3161:10;5067:5;984:3;9120:3;6244:3.....P...P...30120|30130|30140|30150|30160...new_ach_groupname_03..*Sprite/UI/Icon/HomeAchievement/icon_Anubis....."Sprite/UI/Icon/Box/icon_glory_box2..*4365:30;3161:10;5067:5;984:3;9120:3;6244:3..............!30170|30180|30190|30200|30210|104...new_ach_groupname_04..*Sprite/UI/Icon/HomeAchievement/icon_Throne....."Sprite/UI/Icon/Box/icon_glory_box3..,3036:200;5068:10;5067:10;984:5;9120:5;6244:5.............2302|30230|30240|30250...new_ach_groupname_05..)Sprite/UI/Icon/HomeAchievement/icon_Venus....."Sprite/UI/Icon/Box/icon_glory_box3..,3036:200;5068:10;5067:10;984:5;9120:5;6244:5......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):81769
                      Entropy (8bit):5.5839277516365255
                      Encrypted:false
                      SSDEEP:
                      MD5:EE6E7F71EE656FAE840EA8660888004D
                      SHA1:8BDDD568DFE03C0E381EBA3ABC3AD3BAC02759DB
                      SHA-256:E62ABC6A5F98768D1136A42081BA56FCC362D5BC051F19B50CE3ADF88E762ADB
                      SHA-512:8BA0A061ED0259CF0B6A1B2E72F824894437A6192E639F5D80D45B9E71BAFB38047A942DAABD821A9B57CA9384A98498CCEA94FDB310F0A2302975F19EF0ABC6
                      Malicious:false
                      Preview:.].d..d......fame_title1...fame_text1..e....................Q.........1...951:20................\.e..e......fame_title1...fame_text1..f..d........Q.........1...951:50;3036:40................n.f..f......fame_title1...fame_text1..g..e........Q.........1.. 4:2;9:2;14:2;19:2;951:80;3036:40................|.g..g......fame_title1...fame_text1..h..f........Q.........1...969:2;970:2;971:2;972:2;951:120;3036:80;5068:8...................h..h......fame_title1...fame_text1..i..g........Q.....#...1..31559:2;1560:2;1561:2;1562:2;951:170;3036:120;5068:8...................i..i......fame_title1...fame_text1..j..h........Q.....(...1..41559:2;1560:2;1561:2;1562:2;951:260;3036:200;5068:16...................j..j......fame_title1...fame_text1..............i.....(..Q.....-...1..41559:2;1560:2;1561:2;1562:2;951:350;3036:300;5068:40................`.............fame_title1...fame_text1........................Q.........1...951:20................X.............fame_title1...fame_text1................Q.........1..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6064
                      Entropy (8bit):5.650761309440411
                      Encrypted:false
                      SSDEEP:
                      MD5:AC4C5F9B304CDA75F3AE1D6CA154D80F
                      SHA1:6B54CBE0156C6CDA73A655829B9E07A9CD1EE05A
                      SHA-256:682A23A3A27E7CD3B54DD79F01AA0C606511F59A56EDE7709FB348FDCE9D60A9
                      SHA-512:4A87D2A0A3D320B2AA9F8A56AF4598184FEB0EDB502F8B62106601288C68ACC16412231754431210EF1A2DC180C824BF94A88B62231E7A703DE6A5CAA0FF24E7
                      Malicious:false
                      Preview:.............worldcity_name1..."..."...Sprite/Map/castle_icon/Rostock...Sprite/Map/FamousCity/Rostock...Prefabs/Map/FamousCity/Rostock..V......................worldcity_name2..."..."...Sprite/Map/castle_icon/Milan...Sprite/Map/FamousCity/Milan...Prefabs/Map/FamousCity/Milan..d......................worldcity_name3..."..."...Sprite/Map/castle_icon/Timbuktu...Sprite/Map/FamousCity/Timbuktu...Prefabs/Map/FamousCity/Timbuktu..j......................worldcity_name4..."...".. Sprite/Map/castle_icon/Alexander...Sprite/Map/FamousCity/Alexander.. Prefabs/Map/FamousCity/Alexander..S......................worldcity_name5..."...".. Sprite/Map/castle_icon/ThangLong...Sprite/Map/FamousCity/ThangLong.. Prefabs/Map/FamousCity/ThangLong..X......................worldcity_name6..."..."...Sprite/Map/castle_icon/Patna...Sprite/Map/FamousCity/Patna...Prefabs/Map/FamousCity/Patna..L......................worldcity_name7..."..."...Sprite/Map/castle_icon/Budapest...Sprite/Map/FamousCity/Budapest...Prefabs/Map/Fam
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):92185
                      Entropy (8bit):6.376023801448312
                      Encrypted:false
                      SSDEEP:
                      MD5:7E7BF18E435F2188ED487837015E863B
                      SHA1:6E17A4AB5EBBE855A795DE373B74868289E8920C
                      SHA-256:4E34F515C5935FAEA563CFAD0B875432FDBF418879AD2605FC204D8F9403DB59
                      SHA-512:02669A47F0FDD127B9C9AE54C2A2BC08BDE8C202DBA5157572F3538A752CCCAF08407496434FD632434FA58B0E69D7C78D6F730796F2FF5B6B42CDB5B532DCA9
                      Malicious:false
                      Preview:...........hero_name1...general_description1_s..........PA.....d..j..d..}...................d..d........d..d..j..j..d..d..}..}..\..@..\..@...p.@...p.@..\..@..\..@...(.A...(.A............1008;1017;1037;1056...general_history1......6251:30......8.....................0.....)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name220...general_description220...........B.....m..,..C..{...................d..d.........m..m..,..,..C..C..{..{.....@.....@..33.@..33.@..33.@..33.@.....A.....A............1011;1027;1035...general_history2......-1.................)........)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name3...general_description3_s..........PA.....h..E..t..z...................d..d........h..h..E..E..t..t..z..z..R..@..R..@..ff.@..ff.@.....A.....A..H..A..H..A............1011;1027;1035;1094...general_history3......6252:30.................)..... Prefabs4/Generalmodel/Model_CN_2...0.....)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name4...general_desc
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):71551
                      Entropy (8bit):6.364147720077143
                      Encrypted:false
                      SSDEEP:
                      MD5:2F95405BF1B07B33B0CA4DAD65C379B8
                      SHA1:1502A030D2BAA8E1208DD1D367611E487EEE97E2
                      SHA-256:CE687C112E8323AFA32DC9C5F7788E81712B25746DE0171A5196B019D339967F
                      SHA-512:3F9705B00E0DCFB1124A559D86CB12D0FFF5EBE22D44962BD36B4141117F5C1A5A14FF90473E6B2D10100BC79953D81ADAFC71147230068F794A25C61B7E91BA
                      Malicious:false
                      Preview:...........hero_name1...general_description1_s..........PA.....d..j..d..}...................d..d........d..d..j..j..d..d..}..}..\..@..\..@...p.@...p.@..\..@..\..@...(.A...(.A............1008;1017;1037;1056...general_history1......6251:30......8.....................0.....)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name220...general_description220...........B.....m..,..C..{...................d..d.........m..m..,..,..C..C..{..{.....@.....@..33.@..33.@..33.@..33.@.....A.....A............1011;1027;1035...general_history2......-1.................)........)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name3...general_description3_s..........PA.....h..E..t..z...................d..d........h..h..E..E..t..t..z..z..R..@..R..@..ff.@..ff.@.....A.....A..H..A..H..A............1011;1027;1035;1094...general_history3......6252:30.................)......0.....)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name4...general_description4_s...........B.....n..s..q.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):74933
                      Entropy (8bit):6.366709777508973
                      Encrypted:false
                      SSDEEP:
                      MD5:DD1FAB9F17C3A351F643CBC38EC55577
                      SHA1:1F44A3AD561CD1261D4D33CA44AEB9C7BAA384CC
                      SHA-256:88D98CC39B31EDD2E8A833D07E133778E4D22A516C2CAC322326A0F7183F3914
                      SHA-512:EBE424D80FFDF14E851748057081C0FEA1DBD841C0716E3386636AC9CB53126F80C0730FC7402B39FE0C3DF84CE9AEB2E177D9175974146140F2E38ADAF23D6E
                      Malicious:false
                      Preview:...........hero_name1...general_description1_s..........PA.....d..j..d..}...................d..d........d..d..j..j..d..d..}..}..\..@..\..@...p.@...p.@..\..@..\..@...(.A...(.A............1008;1017;1037;1056...general_history1......6251:30......8.....................0.....)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name220...general_description220...........B.....m..,..C..{...................d..d.........m..m..,..,..C..C..{..{.....@.....@..33.@..33.@..33.@..33.@.....A.....A............1011;1027;1035...general_history2......-1.................)........)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name3...general_description3_s..........PA.....h..E..t..z...................d..d........h..h..E..E..t..t..z..z..R..@..R..@..ff.@..ff.@.....A.....A..H..A..H..A............1011;1027;1035;1094...general_history3......6252:30.................)......0.....)Sprite/UI/Icon/UIIcons/Icon_FamousGeneral..............hero_name4...general_description4_s...........B.....n..s..q.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7876
                      Entropy (8bit):4.86332673904231
                      Encrypted:false
                      SSDEEP:
                      MD5:B78C19F1F74813E3DC24A84579D750D0
                      SHA1:AA154FD166E68DDD82228F32CAE76D7E122DB6BB
                      SHA-256:1D07860026DB6B2EB3BF13F3F3712A989D2886C1AE7D57F86AE842A51D27E02C
                      SHA-512:3B7984337A221E74E95551119228B617A9A764367B3B87F507D1EDF1C29905CE643B19816981119B935D93BA891BFB610DC3E097AE8176629062165CD14B79F3
                      Malicious:false
                      Preview:.#...............N......2...301:1:12.*...............]......2...26:1:5;301:1:12.2...............m......2...370:1:8;26:1:5;301:1:12.F...............}......2...370:1:8;26:1:5;301:1:12...229:1:10;233:1:15.S.......................2..#102|108:1:8;370:1:8;26:1:5;301:1:12...229:1:10;233:1:15.e......................2..5108:1:12;102|108:1:8;370:1:8;26:1:5;301:1:12;378:1:15...229:1:10;233:1:15.#...............N......2...312:1:-8.-...............]......2...312:1:-8...42:1:15.?...............m......2...374:1:10;312:1:-8;108:1:10...42:1:15.L...............}......2...374:1:10;312:1:-8;108:1:10...42:1:15;131|137:1:-5.Y.......................2..&430|431:1:5;374:1:10;312:1:-8;108:1:10...42:1:15;131|137:1:-5.o......................2..<377|378:1:10;378:1:10;430|431:1:5;374:1:10;312:1:-8;108:1:10...42:1:15;131|137:1:-5.$...............N......2...15|21:1:5./...............]......2...15|21:1:5...245:1:10.6...............m......2...15|21:1:5;19:1:5...245:1:10.C...............}......2...15|2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11030
                      Entropy (8bit):4.382044071701954
                      Encrypted:false
                      SSDEEP:
                      MD5:39A0CF6AF63025DF90755BFF6D613ADC
                      SHA1:73EDD41995671AC324CEF471E4830451B26B5696
                      SHA-256:98ADA9E91CCA9EF361EE37F2F2D1E5070C8D1F7FD1EEF5CAB843EC09ADBDEC97
                      SHA-512:EDC41F8674F648BBE78D17C6EE03BCD0BB15733B83A314641362E53D7611D8E155632CF9F437A1008DFB5BDC03936D1F55FC66456CF2D89B78B3ACB287AF638B
                      Malicious:false
                      Preview:./.C..C...8/1/2017 00:00:00...1/1/2037 23:59:59.0.D..D...8/27/2017 00:00:00...1/1/2037 23:59:59.0.E..E...9/10/2017 00:00:00...1/1/2037 23:59:59.0.F..F...9/24/2017 00:00:00...1/1/2037 23:59:59.0.G..G...10/4/2017 00:00:00...1/1/2037 23:59:59.1.H..H...10/22/2017 00:00:00...1/1/2037 23:59:59.0.I..I...11/21/2017 00:00:00...1/1/2037 23:59:59.0.J..J...11/1/2017 00:00:00...1/1/2037 23:59:59.0.K..K...11/1/2017 00:00:00...1/1/2037 23:59:59.1.L..L...12/22/2017 00:00:00...1/1/2037 23:59:59./.M..M...1/1/2018 00:00:00...1/1/2037 23:59:59.0.N..N...2/11/2018 00:00:00...1/1/2037 23:59:59./.O..O...3/2/2018 00:00:00...1/1/2037 23:59:59.0.P..P...3/16/2018 00:00:00...1/1/2037 23:59:59.0.Q..Q...3/29/2018 00:00:00...1/1/2037 23:59:59./.R..R...5/2/2018 00:00:00...1/1/2037 23:59:59.0.S..S...5/16/2018 00:00:00...1/1/2037 23:59:59.0.T..T...5/31/2018 00:00:00...1/1/2037 23:59:59.0.U..U...6/14/2018 00:00:00...1/1/2037 23:59:59./.V..V...7/2/2018 00:00:00...1/1/2037 23:59:59.0.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8467
                      Entropy (8bit):4.33922536585569
                      Encrypted:false
                      SSDEEP:
                      MD5:9D328ADA37888187A566006201D7BE26
                      SHA1:9E5B62120FC44A85BFF259310ADC86DAC3668790
                      SHA-256:30277E7F20860CDBD38B0C1FF52EFB24F84695735215C8E098E8FF059E5ADECD
                      SHA-512:0DC26261984B614971380A3A087201A25F29665444F08AF333AF283DF115F8E79EBEA7D1DC2FD78277DEFE2F562DF3338C5945A58A04364350849607000458BE
                      Malicious:false
                      Preview:./.C..C...8/1/2017 00:00:00...1/1/2037 23:59:59.0.D..D...8/27/2017 00:00:00...1/1/2037 23:59:59.0.E..E...9/10/2017 00:00:00...1/1/2037 23:59:59.0.F..F...9/24/2017 00:00:00...1/1/2037 23:59:59.0.G..G...10/4/2017 00:00:00...1/1/2037 23:59:59.1.H..H...10/22/2017 00:00:00...1/1/2037 23:59:59.0.I..I...11/21/2017 00:00:00...1/1/2037 23:59:59.0.J..J...11/1/2017 00:00:00...1/1/2037 23:59:59.0.K..K...11/1/2017 00:00:00...1/1/2037 23:59:59.1.L..L...12/22/2017 00:00:00...1/1/2037 23:59:59./.M..M...1/1/2018 00:00:00...1/1/2037 23:59:59.0.N..N...2/11/2018 00:00:00...1/1/2037 23:59:59./.O..O...3/2/2018 00:00:00...1/1/2037 23:59:59.0.P..P...3/16/2018 00:00:00...1/1/2037 23:59:59.0.Q..Q...3/29/2018 00:00:00...1/1/2037 23:59:59./.R..R...5/2/2018 00:00:00...1/1/2037 23:59:59.0.S..S...5/16/2018 00:00:00...1/1/2037 23:59:59.0.T..T...5/31/2018 00:00:00...1/1/2037 23:59:59.0.U..U...6/14/2018 00:00:00...1/1/2037 23:59:59./.V..V...7/2/2018 00:00:00...1/1/2037 23:59:59.0.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8833
                      Entropy (8bit):4.345363194893545
                      Encrypted:false
                      SSDEEP:
                      MD5:3B608A78FB6BB7D4AB7953D6B41A8334
                      SHA1:AF804AA14681B80449DEEE7D1A76B3C85B58DB4A
                      SHA-256:734E227503216D8871081DD134E586D47F8B9789D0FA6BF49C461A2DC534F1D1
                      SHA-512:FF3F61B60181D2F5A18CD7DA054A53B7FC4FC96CA029E6D1DE17A58F0F633D6B619E003495EFC8FFE61889230545917D1170998B0B11DB2694F7481711A05134
                      Malicious:false
                      Preview:./.C..C...8/1/2017 00:00:00...1/1/2037 23:59:59.0.D..D...8/27/2017 00:00:00...1/1/2037 23:59:59.0.E..E...9/10/2017 00:00:00...1/1/2037 23:59:59.0.F..F...9/24/2017 00:00:00...1/1/2037 23:59:59.0.G..G...10/4/2017 00:00:00...1/1/2037 23:59:59.1.H..H...10/22/2017 00:00:00...1/1/2037 23:59:59.0.I..I...11/21/2017 00:00:00...1/1/2037 23:59:59.0.J..J...11/1/2017 00:00:00...1/1/2037 23:59:59.0.K..K...11/1/2017 00:00:00...1/1/2037 23:59:59.1.L..L...12/22/2017 00:00:00...1/1/2037 23:59:59./.M..M...1/1/2018 00:00:00...1/1/2037 23:59:59.0.N..N...2/11/2018 00:00:00...1/1/2037 23:59:59./.O..O...3/2/2018 00:00:00...1/1/2037 23:59:59.0.P..P...3/16/2018 00:00:00...1/1/2037 23:59:59.0.Q..Q...3/29/2018 00:00:00...1/1/2037 23:59:59./.R..R...5/2/2018 00:00:00...1/1/2037 23:59:59.0.S..S...5/16/2018 00:00:00...1/1/2037 23:59:59.0.T..T...5/31/2018 00:00:00...1/1/2037 23:59:59.0.U..U...6/14/2018 00:00:00...1/1/2037 23:59:59./.V..V...7/2/2018 00:00:00...1/1/2037 23:59:59.0.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1704
                      Entropy (8bit):4.324263507239442
                      Encrypted:false
                      SSDEEP:
                      MD5:D48883E4863FC889C4A5CF1E6BE6C1D9
                      SHA1:1F9176DA3FD560898435C50B788AD28952A11199
                      SHA-256:910F333B5F5399C567FFAC9EEBFE1A687682DCCA4CD4ED4E1D500EC04E6B3156
                      SHA-512:4B6AD88D907A1C33214239862AA308667B3BD0DBEA33298955AC443B4A098F8D17DAE8B77C2B59CE45D7BFDA7587E8F08A4D2C4C15A5A0A380747B73F664DDDC
                      Malicious:false
                      Preview:...........1642147200|1643011200...123|139|158....1:1619:1:60|2:1719:1:120|3:947:1:100|4:1720:1:120|5:3036:100:30|8:1618:1:80|9:983:1:150|10:1717:1:120|11:3036:20:100|12:1718:1:120.._6:123:4839:3:10|6:139:5606:3:10|6:158:5607:3:10|7:123:4839:1:40|7:139:5606:1:40|7:158:5607:1:40.._20-4839:5;2858:5|50-5046:30;1619:10|100-4839:5;5068:15|250-3712:40;5046:200|500-4839:10;5067:15..................?..333?.....?..........*...*...............1642147200|1643011200...123|139|158....1:1619:1:60|2:1719:1:120|3:947:1:100|4:1720:1:120|5:3036:100:30|8:1618:1:80|9:983:1:150|10:1717:1:120|11:3036:20:100|12:1718:1:120.._6:123:4839:3:10|6:139:5606:3:10|6:158:5607:3:10|7:123:4839:1:40|7:139:5606:1:40|7:158:5607:1:40.._20-4839:5;2858:5|50-5046:30;1619:10|100-4839:5;5068:15|250-3712:40;5046:200|500-4839:10;5067:15..................?..333?.....?..........*...*...............1642147200|1643011200...123|139|158....1:1619:1:60|2:1719:1:120|3:947:1:100|4:1720:1:120|5:3036:100:30|8:1618:1:80|9:983:1:150|10:1717:1:
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):470
                      Entropy (8bit):4.782746475407589
                      Encrypted:false
                      SSDEEP:
                      MD5:36A0273C13D0A335DC290F0336093AAB
                      SHA1:5398C897266E6552815C286C01F330C5B286D743
                      SHA-256:FEFB2AFE3D179A55D84E020EC8AACC13919632A74F45335581CCBFC6BF652DBA
                      SHA-512:3EAE32D58B04CE2E1DA4A8E6BA5226D6293210A2DBFC49BDF0AFCA9D77CE5E84E90944C98A305FE58AF7564A297CC61487B5943DBC55C2AEFC0D925AF9D21BBB
                      Malicious:false
                      Preview:......................................................'..........4..........D..........U..........i..........~......................................................................................................................................................................................................................................................... .. ........!..!........".."........#..#........$..$........%..%........&..&........'..'........(..(.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1525
                      Entropy (8bit):4.591353450698375
                      Encrypted:false
                      SSDEEP:
                      MD5:F8A627C189ECF5B209389570C7123736
                      SHA1:74A6098CFD8E0A88700D32404FFFF9D37DD1709F
                      SHA-256:0DFEDD8776C2F5DE42AAA8AA01D889533FF68CB66F0A5AD0884031CAA5A24A57
                      SHA-512:C3A3635AC1796DE85052F4375DB0E9BDC9793697E692FF7A493DE57C25E25DE2418B8ADF47293ACC43D59E4B73329B939E5305D4D1A087A2F0C6AD544C4E2CB9
                      Malicious:false
                      Preview:.3................"7:81396;17:81396;27:81396;37:81396.7................&8:140400;18:140400;28:140400;38:140400.7................&9:217152;19:217152;29:217152;39:217152.<................+122:210624;124:210624;126:210624;128:210624.7................&9:274344;19:274344;29:274344;39:274344.7................&9:337792;19:337792;29:337792;39:337792.8................'10:270000;20:270000;30:270000;40:270000.<................+122:392544;124:392544;126:392544;128:392544.8................'10:353646;20:353646;30:353646;40:353646.8................'10:420000;20:420000;30:420000;40:420000.8................'10:550116;20:550116;30:550116;40:550116.<................+122:610624;124:610624;126:610624;128:610624.<................+122:877787;124:877787;126:877787;128:877787.<................+123:446667;125:446667;127:446667;129:446667.<................+123:746667;125:746667;127:746667;129:746667.<.......... .....+123:946667;125:946667;127:946667;129:946668.<.......... .....+146:550116;148:550116;150:550116;1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1525
                      Entropy (8bit):4.591353450698375
                      Encrypted:false
                      SSDEEP:
                      MD5:F8A627C189ECF5B209389570C7123736
                      SHA1:74A6098CFD8E0A88700D32404FFFF9D37DD1709F
                      SHA-256:0DFEDD8776C2F5DE42AAA8AA01D889533FF68CB66F0A5AD0884031CAA5A24A57
                      SHA-512:C3A3635AC1796DE85052F4375DB0E9BDC9793697E692FF7A493DE57C25E25DE2418B8ADF47293ACC43D59E4B73329B939E5305D4D1A087A2F0C6AD544C4E2CB9
                      Malicious:false
                      Preview:.3................"7:81396;17:81396;27:81396;37:81396.7................&8:140400;18:140400;28:140400;38:140400.7................&9:217152;19:217152;29:217152;39:217152.<................+122:210624;124:210624;126:210624;128:210624.7................&9:274344;19:274344;29:274344;39:274344.7................&9:337792;19:337792;29:337792;39:337792.8................'10:270000;20:270000;30:270000;40:270000.<................+122:392544;124:392544;126:392544;128:392544.8................'10:353646;20:353646;30:353646;40:353646.8................'10:420000;20:420000;30:420000;40:420000.8................'10:550116;20:550116;30:550116;40:550116.<................+122:610624;124:610624;126:610624;128:610624.<................+122:877787;124:877787;126:877787;128:877787.<................+123:446667;125:446667;127:446667;129:446667.<................+123:746667;125:746667;127:746667;129:746667.<.......... .....+123:946667;125:946667;127:946667;129:946668.<.......... .....+146:550116;148:550116;150:550116;1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4496
                      Entropy (8bit):5.309120272012246
                      Encrypted:false
                      SSDEEP:
                      MD5:93E1CBBF229231C264C4890A4CA3F674
                      SHA1:8EF9E0AF856C2FFC98E7E95CDE27B952DE4DB9EF
                      SHA-256:DFF6ACAAAC427056A419F7D4331F170CF7F36DD010683AA3926D00EA1499A354
                      SHA-512:52C3FD44746EC7F5D3572CEF9ECBDCFC3D73BF594D9432A6A57761FA89395ABE74BE0160E5E08BADAB92524965034FAE321D7613BA77099F25E541B681DB2D22
                      Malicious:false
                      Preview:....e..e..........19660:200......ASprite/UI/Icon/Event/AbtestFishingCompetition9861/Fishing_cable01...fishing_competition_8...fishing_competition_11....f..f..........19660:250......ASprite/UI/Icon/Event/AbtestFishingCompetition9861/Fishing_cable01...fishing_competition_8...fishing_competition_11....g..g..........19660:300......ASprite/UI/Icon/Event/AbtestFishingCompetition9861/Fishing_cable01...fishing_competition_8...fishing_competition_11....h..h..........19660:350......ASprite/UI/Icon/Event/AbtestFishingCompetition9861/Fishing_cable02...fishing_competition_8...fishing_competition_11....i..i..........19660:400......ASprite/UI/Icon/Event/AbtestFishingCompetition9861/Fishing_cable02...fishing_competition_8...fishing_competition_11....j..j..........19660:500......ASprite/UI/Icon/Event/AbtestFishingCompetition9861/Fishing_cable02...fishing_competition_8...fishing_competition_11....k..k..........19660:600......ASprite/UI/Icon/Event/AbtestFishingCompetition9861/Fishing_cable03...fishing_co
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):15896
                      Entropy (8bit):5.489955984143553
                      Encrypted:false
                      SSDEEP:
                      MD5:95FD0139FB50FB79BEBE9A6E7F505A42
                      SHA1:DDDFEB38E1D6D39E87BBB61B233044C393F5A694
                      SHA-256:2999F3AB493BD75963190CAC70AABB60F9D26C39FF837E7DA51909C76776CFAA
                      SHA-512:C0E462D3A3FA3B50CCA82FF3AC6567309CB682CCA5C044371F4D065CFD8FF7B95B6826C83C9B81C15264A581A579751D3AF4EECB8A6E8D1FF124608D6CC54796
                      Malicious:false
                      Preview:.................19660:10;19659:5...2561:50;19660:50;19659:50../50:35;100:35;150:35;200:35;250:35;300:35;350:35...50:0...0...Fishingtype_name_1...Fishingtype_des_1..ISprite/UI/Icon/Event/AbtestFishingCompetition9861/FishingHandbook/abalone...Prefabs/Fishing/AbaloneA.....................19660:5;19659:10...2561:50;19660:50;19659:50../50:35;100:35;150:35;200:35;250:35;300:35;350:35...50:0...5:1:3...Fishingtype_name_2...Fishingtype_des_2..FSprite/UI/Icon/Event/AbtestFishingCompetition9861/FishingHandbook/Bass...Prefabs/Fishing/BassA.....................19660:8;19659:8...2561:50;19660:50;19659:50../50:35;100:35;150:35;200:35;250:35;300:35;350:35...50:0...10:5:8...Fishingtype_name_5...Fishingtype_des_5..ISprite/UI/Icon/Event/AbtestFishingCompetition9861/FishingHandbook/catfish...Prefabs/Fishing/CatfishA.....................19660:8;19659:8...2561:50;19660:50;19659:50../50:35;100:35;150:35;200:35;250:35;300:35;350:35...50:0...10:5:8...Fishingtype_name_6...Fishingtype_des_6..ESprite/UI/Icon/Eve
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2983194
                      Entropy (8bit):4.78930259326681
                      Encrypted:false
                      SSDEEP:
                      MD5:B53C9F9AA2387F02143C3145446EF0A1
                      SHA1:B28B697831B7E808B830F30D1F5B1409DEB0B728
                      SHA-256:FBBEB355369F52124A46ADF83C9C11314860D1FABC852E02B686BFAFEC83D220
                      SHA-512:A04621E3DFDDF5E60DD6D1C7F2BA279560FC869E76805A97089C40397E6CB17EA9E619718CB42DB191B9C5C8A7CB5A481909294E5D20B75D032F109AC2F06DEA
                      Malicious:false
                      Preview:............/(..)................item_name_key495_2...item_description_key495.....................................................o............c....................................................................................................o............c...........C...13....... A...42........@...-1............-1.................................1500|3000|5000......0|0|0|10|10|10|10|10|10|10...0|0|0|10|10|10|10|10|10|10...0|0|0|10|10|10|10|10|10|10...............0........13.....".buff_type_1.....42.....".buff_type_2............................................................-1.................................................(..)....1....item_name_key495_2...item_description_key495.............................................................................................................................................................................................................................................................o.........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):17789
                      Entropy (8bit):5.9550848796342235
                      Encrypted:false
                      SSDEEP:
                      MD5:8E4603EAB49C186DE92D5BAB2CE80788
                      SHA1:44C52421CF99C6466F58D48061DAE1294C77389A
                      SHA-256:C7565B3CE6A8C8C38F1CC147293F6959516A395E98564C2896B283688AFDDCD9
                      SHA-512:49019D50FCE39A8548D734A72AFAF680F4A9D3C96B3E836401D6808B5D6E3248D93A50CC1FCD7FEB91551C47800594446D6D994EB86698817133546EA180AB0D
                      Malicious:false
                      Preview:...........forge_series_1.........5|6|7|8:1:5...............-1...............-1..*Sprite/UI/Icon/UIEquipIcon/Icon_collection......915...1385...-1...-1...-1...-1..+Sprite/UI/Icon/UIEquipIcon/Icon_suit_Helmet..,Sprite/UI/Icon/UIEquipIcon/Icon_suit_clothes...-1...-1...-1...-1.....5|6|7|8.....".2...-1...-1......-1...-1...-1...............0...........forge_series_2.........13:1:10...............-1...............-1..&Sprite/UI/Icon/UIEquipIcon/Icon_attack......-1...-1...897...885...-1...-1...-1...-1..-Sprite/UI/Icon/UIEquipIcon/Icon_suit_trousers..*Sprite/UI/Icon/UIEquipIcon/Icon_suit_shoes...-1...-1.....13.....".2...-1...-1......-1...-1...-1...............0...........forge_series_3.........295|298|301|304:1:8...............-1...............-1..'Sprite/UI/Icon/UIEquipIcon/Icon_monster......-1...-1...-1...-1...879...855;861;867;873...-1...-1...-1...-1..)Sprite/UI/Icon/UIEquipIcon/Icon_suit_Ring..)Sprite/UI/Icon/UIEquipIcon/Icon_suit_arms.....295|298|301|304.....".2...-1...-1......-1...-1...-1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):18396
                      Entropy (8bit):5.225568829830242
                      Encrypted:false
                      SSDEEP:
                      MD5:7D937D4E50A6D4F507091786D4BECDF0
                      SHA1:3094F6D38C56B64279100A5C9083311F545BB25D
                      SHA-256:22F2E7B21E64CE243EF261F17C37CA860268BC7F37AEF9C1AA3B82AF5D5FC9D8
                      SHA-512:D53FC082920C9E5D8A15F848C17A2E6C272DA245A20D14D1731F766915B925606C64BE5E649CFF31DFA0B66B7563A6614891BFD73C04D881BB6B62ECA9670F9B
                      Malicious:false
                      Preview:.@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@.......................3269:30;3264:30;3271:20;3273:20...........@........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):25534
                      Entropy (8bit):5.14245342797173
                      Encrypted:false
                      SSDEEP:
                      MD5:024A3D511D69576C61441F80F512DC20
                      SHA1:66219124FD909326AFB7E86D5BCA2960056728B9
                      SHA-256:362B94F757A2E50279832E4874AB676B13EF8114161DCCEC6C22F808DFC79F98
                      SHA-512:461238CC368D86904B7C13ECC43C4A7DF484B54524AC0EC537F6A4D7A848B8F78D3436C802B3D6C067F5721C35B3303D92DCAF278BFFA6BC0DB749B6C4DB6241
                      Malicious:false
                      Preview:.0.e....e........14..........80|84.........136.....1.e....e........14..........80|84..........136.....:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136..............:.e....e........14..........80|84..........136............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):818
                      Entropy (8bit):5.439245579042591
                      Encrypted:false
                      SSDEEP:
                      MD5:BEAE6D4FC1EFCF0BB9DC8D52A4D69F2D
                      SHA1:18B2693A38E1BEC783CF6B5864474605F932E93B
                      SHA-256:32100BFFC06F8454B4478ABC234D2465B1D73F953D3E4B19AD573D27828711FB
                      SHA-512:F8C0C525D1622823B97FF445B62BDD3489C6B4CBA5ABBF048E3D2B32EAF201C274506E773151B07FEFB5CF39E2AFCD317111D817DF083C14BD7F2F89A29A011B
                      Malicious:false
                      Preview:.d.......%MainUI/BuilderHammer/UIBuilderHammer1.................%MainUI/BuilderHammer/UIBuilderHammer1.j.......(inCityPanel/LeftPanel/LeftPanel/UIPuzzle.................(inCityPanel/LeftPanel/LeftPanel/UIPuzzle.6........MainUI/ChatBar..................MainUI/ChatBar.@........MainUI/ChatBar..................MainUI/UITabBar/WorldBtn.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid...........mix_functionunlock_title1...mix_functionunlock_desc1..!Sprite/UI/UIMainUI/Base/Icon_task...MainUI/TaskTips/WOSActivityIntoQuest/iconClick.................:MainUI/TaskTips/LeftContent/WOSActivityIntoQuest/iconClick.;......................$MainUI/BuilderHammer/TaskList(Clone)
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):854
                      Entropy (8bit):5.386968847996412
                      Encrypted:false
                      SSDEEP:
                      MD5:BC315A686228BC0108E6DC0D394A8656
                      SHA1:492D87912C02548CF6CB7C84F7CEE7BFF61542CB
                      SHA-256:50564A9D0495C68B61F659ED753FC438502E00087C2BCE6E8BF748D2C115FB23
                      SHA-512:F55A32A72A8CAAB74FFB2BCCF5ED2AB8F77EEC02B227C95D19313069DED46EF02734CD59E071531F583D117AE59E5965FA3A8DB88E9308504099A269C086CCBC
                      Malicious:false
                      Preview:.d.......%MainUI/BuilderHammer/UIBuilderHammer1.................%MainUI/BuilderHammer/UIBuilderHammer1.j.......(inCityPanel/LeftPanel/LeftPanel/UIPuzzle.................(inCityPanel/LeftPanel/LeftPanel/UIPuzzle.6........MainUI/ChatBar..................MainUI/ChatBar.@........MainUI/ChatBar..................MainUI/UITabBar/WorldBtn.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid.g.......&MainUI/BuilderHammer/TaskButton(Clone)..................&MainUI/BuilderHammer/TaskButton(Clone)...........mix_functionunlock_title1...mix_functionunlock_desc1..!Sprite/UI/UIMainUI/Base/Icon_task..&MainUI/BuilderHammer/TaskButton(Clone)................;......................$MainUI/BuilderHammer/TaskList(Clone)
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):923
                      Entropy (8bit):5.457709037302545
                      Encrypted:false
                      SSDEEP:
                      MD5:C77149C6884E02DFF325CAC5C6771F12
                      SHA1:55A48DEA5AB21DF330967F19A9A78A87DB15F992
                      SHA-256:21D5559B1ADDAA80FBA019B6219B11F5D6296EA60BA6C7FA747C1831DED94864
                      SHA-512:ED2C7AE25D3CCA2B9D2B136B1C1E20B07466BFC5897EB740D12191D769FD02B5078FE9929C3917EA10D996D8E14D1E94D13ACC39F3C452E78C6D0302D1343CB9
                      Malicious:false
                      Preview:.d.......%MainUI/BuilderHammer/UIBuilderHammer1.................%MainUI/BuilderHammer/UIBuilderHammer1.j.......(inCityPanel/LeftPanel/LeftPanel/UIPuzzle.................(inCityPanel/LeftPanel/LeftPanel/UIPuzzle.6........MainUI/ChatBar..................MainUI/ChatBar.@........MainUI/ChatBar..................MainUI/UITabBar/WorldBtn.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid.A........MainUI/UITabBar..................MainUI/UITabBar/MenuGrid.g.......&MainUI/BuilderHammer/TaskButton(Clone)..................&MainUI/BuilderHammer/TaskButton(Clone)...........mix_functionunlock_title1...mix_functionunlock_desc1..!Sprite/UI/UIMainUI/Base/Icon_task...MainUI/TaskTips/WOSActivityIntoQuest/iconClick.................:MainUI/TaskTips/LeftContent/WOSActivityIntoQuest/iconClick.;......................$MainUI/BuilderHammer/TaskList(Clone)
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):977
                      Entropy (8bit):5.08972325856205
                      Encrypted:false
                      SSDEEP:
                      MD5:FAB74ABB544B151CB51C3113871E0CC5
                      SHA1:FFF7A4225C85BD4705B7260EE92F7A78B0DAA0C9
                      SHA-256:680C7F239D16DD21A27558CDCA14B9E5661E7108BA2C37D6FF635B2C73B5D66A
                      SHA-512:C17CFA53D737818EA2313E284BD2EC3337C43DC204652230A4818FB0D66FF6B7A399084A78CA852CF609903D6F70F0F226A76C8B4B78E894A71DBDA393D29FA4
                      Malicious:false
                      Preview:........................game_explain_map...building_menu_reap...building_menu_reap...game_explain_map1.."Sprite/UI/Banner/banner_collection..............................game_explain_map...active_title11...active_title11...game_explain_map2...Sprite/UI/Banner/banner_monster..............................game_explain_map...game_explain_map3_title...game_explain_map3_title...game_explain_map3...Sprite/UI/Banner/banner_explore.......z.....................game_explain_map...guild_war...guild_war...game_explain_map4.. Sprite/UI/Banner/banner_Assembly..............................game_explain_map...game_explain_map5_title...game_explain_map5_title...game_explain_map5...Sprite/UI/Banner/banner_SubCity..............................game_explain_map...sub_city_title...sub_city_title...game_explain_map6...Sprite/UI/Banner/banner_Kill..............................game_explain_map...game_explain_map...game_explain_map...game_explain_map..!Sprite/UI/Banner/banner_royalcity......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3579
                      Entropy (8bit):5.36503314855387
                      Encrypted:false
                      SSDEEP:
                      MD5:790A92DA80ACC3E25F576223184E36DF
                      SHA1:405287F8FE24A2E5AEBDE3EC1CFC65CE7B57F214
                      SHA-256:67929D81CE746776E1890FDDBC3B30EBC90F3610F318DB00B2BA06BBBBEAFF2F
                      SHA-512:D74023E8FFA8846DE903C976A5DF9650486E18DED4C822C90C3FAC417426C338C355D788CFBE3A6DFE962931B171EA2253F3F84418F68D273C2B5A628D29B859
                      Malicious:false
                      Preview:........................game_explain_map...building_menu_reap...building_menu_reap...game_explain_map1.."Sprite/UI/Banner/banner_collection..............................game_explain_map...active_title11...active_title11...game_explain_map2...Sprite/UI/Banner/banner_monster..............................game_explain_map...game_explain_map3_title...game_explain_map3_title...game_explain_map3...Sprite/UI/Banner/banner_explore.......z.....................game_explain_map...guild_war...guild_war...game_explain_map4.. Sprite/UI/Banner/banner_Assembly..............................game_explain_map...game_explain_map5_title...game_explain_map5_title...game_explain_map5...Sprite/UI/Banner/banner_SubCity..............................game_explain_map...sub_city_title...sub_city_title...game_explain_map6...Sprite/UI/Banner/banner_Kill..............................game_explain_map...game_explain_map...game_explain_map...game_explain_map7..!Sprite/UI/Banner/banner_royalcity............................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4567
                      Entropy (8bit):5.241021207339801
                      Encrypted:false
                      SSDEEP:
                      MD5:38D65C540414F04C9C4647A56E668E1C
                      SHA1:08C0A5A495A0F44943A23542E94163E6FA80AFC4
                      SHA-256:7A2E4D5835C1C1B44E67BAC8A21A3C2ADC7496025E53789A3EAB9D21D3119D72
                      SHA-512:2859916FE95FE263A372C7832B8CD422A3D52AC7C7DA4CE92E088CDDFC2B4ED2BBA21E40274F477C0817509C3CCE6317F8F2DFC73A20F3E3E18CB0D6987A575A
                      Malicious:false
                      Preview:......... ................game_explain...parkour_move_title...parkour_move_title...parkour_move_intro.."Sprite/UI/Banner/Parkour/Parkour_1......... ................game_explain...world_menu_attack...world_menu_attack...parkour_attack_intro.."Sprite/UI/Banner/Parkour/Parkour_1......... ................game_explain...parkour_weapon_update...parkour_weapon_update...parkour_weapon_intro.."Sprite/UI/Banner/Parkour/Parkour_2......... ................game_explain...parkour_update...parkour_update...parkour_update_intro.."Sprite/UI/Banner/Parkour/Parkour_3.|...... ................game_explain...parkour_BOSS...parkour_BOSS...parkour_BOSS_defeat.."Sprite/UI/Banner/Parkour/Parkour_6......... ................game_explain...parkour_defeat...parkour_defeat...parkour_defeat_intro.."Sprite/UI/Banner/Parkour/Parkour_5......... ................game_explain...parkour_victory...parkour_victory...parkour_victory_intro.."Sprite/UI/Banner/Parkour/Parkour_4.|...... ................parkour_intro...parkour_ump5
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):728
                      Entropy (8bit):5.849736072849199
                      Encrypted:false
                      SSDEEP:
                      MD5:D1E0E4F7A42D324D71A8C4C9B865B376
                      SHA1:70BFF3A505D9440CFAEF4CD9308F145311B1FCB3
                      SHA-256:4C5BD38B5036DB42F0A6C68643675B87713E83596069831538EF1EC763CDF810
                      SHA-512:8E73433FD1BE80647CA23AF6ACA4EE764E254F4AC101EC245E2365D3E285400809876FFBC3DB753BA6EB90CF8071421D71F8B2AB854B0E9992B78827CA676C23
                      Malicious:false
                      Preview:................................................................................../.......!..................5.......'....................&...............................................................)........helpshift.............#..............................................................)........................)........................(.............Muper..................................................'.............Chat........./.......!.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):289
                      Entropy (8bit):5.6940835607501015
                      Encrypted:false
                      SSDEEP:
                      MD5:B5009AFDECE0517E1E3325FBF173AF51
                      SHA1:EA57AB511B87D316ACC5976FDD417CE144AF16B7
                      SHA-256:5D7AA509F8A27904DA895A2085E09FCE252CB2B5AFA8E6ABBC2E3023C2D05CCE
                      SHA-512:B007845408B2753809D75C276B1E75864281FD150575789828391ACFB4E72A6C169BCC32D1AF943612F04640F7AEBC91E43D60ECF6B76399B78D8FA6EFDFD487
                      Malicious:false
                      Preview:...........h.m=.................l=C=..ffF@.............#=..ff.@............d(=..ff.@...........-..=..ff6A....T...T..@..<....NB.............?..<....BB.............)@.<..3.C............o5<..3S.D............./..<.....C...............<..3.tC.....$....$.....<... 2D.................~<....TD
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1088
                      Entropy (8bit):4.524982244854732
                      Encrypted:false
                      SSDEEP:
                      MD5:79DD525BE6CC9693A786528BD978C2CC
                      SHA1:450C7093A3E26B7A5AF490E0E81666C21EFC7B30
                      SHA-256:4222E64895B09DAB66A13952B8CC503DCBA9B92E971799AC8E6BE525337273C4
                      SHA-512:8BC4E462442529BE56B5C1EFC377E1F1E730B991C5B747571345B4D2D071CBBA876E937872CC5C8D6591F8589D560C9D3076E4ED5D4DC83BB7BAEA083B74FD25
                      Malicious:false
                      Preview:..................................................................................................................................................................................................................................................................................................................................................................T........................................................................................................................................................................................................................................+..+................,..,............F...-..-............p......................./../.................0..0.................1..1.................2..2.................3..3.................4..4................5..5.................6..6.................7..7.................8..8.................9..9.................:..:.................;..;.................<..<.................=..=.................>..>..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2864
                      Entropy (8bit):4.618160868574638
                      Encrypted:false
                      SSDEEP:
                      MD5:C4CD85FFFDE23D82CD9A6CD1448C85AB
                      SHA1:4C8C7F9ECF96721B27EFF32B34C649CB7497FEC8
                      SHA-256:21C0811F332113B4E23E6D41C8BD32946B1E1F52EBC32D59F9AF4931092650D6
                      SHA-512:B299A3DE4B4ED63ECF7380E73843399BECB6F25B76995051CD62470D5954E41C30FC68340C9480355A80196B03F300BD02AAB3C58A5CE6C737E7252BF426BC9E
                      Malicious:false
                      Preview:.......................................X.....X..................2..............2..............d..............d..............2..............2..............d..............2..............2..............d..............2..............2.....f.....f..2.....g.....g..2.....h.....h..d.....i.....i..d.....j.....j..2.....k.....k..2.....l.....l..d.....m.....m..2.....n.....n..2.....o.....o..d.....p.....p..2.....q.....q..2................(................(................P................P................(................(................P................(................(................P................(................(.....*.....*..2.......................................l.....l..d.....m.....m..2.....n.....n..2..............d..............2..............2.....*.....*..2.....w.....w.........+.....+..2................d................2................2................d................2................2................d................2................2................d................2..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):338
                      Entropy (8bit):4.489978925140297
                      Encrypted:false
                      SSDEEP:
                      MD5:DB083AF10E2B6453512FA1E5C046C77B
                      SHA1:5FA0367F30075E551BA6B2D1E23D69CA30325715
                      SHA-256:B67E0518919BC1DB9A4D84AEA671B65C66262552E9A0E6462D44EDF544902591
                      SHA-512:485FD0677B2C10C0097599B7BB2E346F84AEF1B3C3C18BCE0C884E830BC92D569ABFFED14C16DE43421655F9DD8D4A935DE238FA49C1AAF3918C28AB4BB35789
                      Malicious:false
                      Preview:.#.......2...0|1|2|3.........-1|-2....,....3..<...-3|-2|-1|0|1|2|3.....c...-1|-2....0....=..F...-3|-3|-2|-1|0|1|2|3..d.......-1|-2....4....G..P...-3|-3|-2|-2|-1|0|1|2|3...........-1|-2....7....Q..Z...-3|-3|-2|-2|-2|-1|0|1|2|3...........-1|-2....7....[..d...-3|-3|-3|-2|-2|-1|0|1|2|3...........-1|-2....#....e..n...-1|-2...........-1|-2...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5003
                      Entropy (8bit):5.89220605823148
                      Encrypted:false
                      SSDEEP:
                      MD5:6AE17BCB0DABD6F30DB8A4786A209874
                      SHA1:3B2167F30C8DC03694D2435EBBAD194BB70E3243
                      SHA-256:1F0EED94BCD31A6202B8534A640C79182029033D6F04F0BD677FA8959E95D722
                      SHA-512:362D11D685A9A14F85B55085991E964D7AB318FA392894D2B2FA6DB26019D5A8F313C6DF4447367BD23F1703FAE744960BE685069877F3EF177AEA5F60540DA3
                      Malicious:false
                      Preview:..........c...7118...item_name_key4001...item_description_key4001_1....{H......Prefabs4/Generalspine/Martinus..%Sprite/UI/Icon/GeneralSkinIcon/Icon_1...Sprite/UI/Background/Activity/bg_OdysseySeries...Sprite/UI/Background/card_bg..................454.....".buff_use.....455.....".buff_use..'Sprite/UI/GeneralSkinModel/skin_1/Art_1..!Sprite/UI/GeneralSkinModel/skin_1.........7.............{...7119...item_name_key4002...item_description_key4002_1....{H......Prefabs4/Generalspine/Elektra..%Sprite/UI/Icon/GeneralSkinIcon/Icon_2...Sprite/UI/Background/Activity/bg_OdysseySeries...Sprite/UI/Background/card_bg..................451.....".buff_use.....453.....".buff_use..'Sprite/UI/GeneralSkinModel/skin_2/Art_2..!Sprite/UI/GeneralSkinModel/skin_2.........7..................15768...item_name_key4724...item_description_key4724....{H......Prefabs4/Generalspine/Douglas..%Sprite/UI/Icon/GeneralSkinIcon/Icon_3...Sprite/UI/Background/Activity/bg_OdysseySeries...Sprite/UI/Background/card_bg...............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):327
                      Entropy (8bit):4.515305615966887
                      Encrypted:false
                      SSDEEP:
                      MD5:9EAC2243B9C285EC54D67C3C5C692754
                      SHA1:8C3F3DC57A34E88FA122A19F9628AD4E3BBCB964
                      SHA-256:A15D37CEC6FB788A2E295585571C447E838E3814521D076FD723C61D003D1469
                      SHA-512:C6E84625631FBB93156618A7B2311C88A8D252F5FC938F572F1FC6661E5DAD32744A795344B257E2C25A4E6E5F7DD3F087A455EDDE3AC63A264FCE83B3CD28C5
                      Malicious:false
                      Preview:.%.......2...0|1|2.........-1|-2|-3..........3..<...-2|-1|-1|0|1|2.....c...-1|-2|-3.....2....=..F...-2|-2|-1|-1|0|1|2..d.......-1|-2|-3.....6....G..P...-2|-2|-1|-1|-1|0|1|2...........-1|-2|-3.....*....Q..Z...-1|-2|-3...........-1|-2|-3.....*....[..d...-1|-2|-3...........-1|-2|-3.....*....e..n...-1|-2|-3...........-1|-2|-3....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):434
                      Entropy (8bit):5.011897811033343
                      Encrypted:false
                      SSDEEP:
                      MD5:A284A94FAC076F0757DEB59976E5A6C8
                      SHA1:0E9A1CF780EFB8342C95C6C8ABEA8828BF72BA01
                      SHA-256:D25B0AE6D8B2A3C95EF7614A1883F323DF2BEB6AB19498BFB649530EFDCBB25A
                      SHA-512:E1ED07CD50D0322AFA58AEFD3AB11BAF6425B2117FAFD7A6651E2ACD47C9932C2D83A5E7542DC273CBD378BF55116B7D53819B878C09D267D1681EAE89130587
                      Malicious:false
                      Preview:.T..........O.....O.....O.....O....U@...p.@....U@...p.@....U@...p.@....U@...p.@........T..........O.....O.....O.....O...p.@.....@...p.@.....@...p.@.....@...p.@.....@...N....U.......(..Y..(..Y..(..Y..(..Y.....@..\..@.....@..\..@.....@..\..@.....@..\..@.........U.......<..Y..<..Y..<..Y..<..Y..\..@...p.@..\..@...p.@..\..@...p.@..\..@...p.@....=....V.......P..c..P..c..P..c..P..c...p.@.....@...p.@.....@...p.@.....@...p.@.....@.........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2189
                      Entropy (8bit):4.782682016471062
                      Encrypted:false
                      SSDEEP:
                      MD5:1B552AE9C78F9B64615424E54807BA21
                      SHA1:D590408D322FF49B722A8EA234FB39FB57BC45DC
                      SHA-256:EDA8EB696488F33849639BDC98EB7B820D033A3FE35F8856CFFD3CFD42418AE1
                      SHA-512:6E80C2FE076371349678B16D5DEE682069AF6A180239D4DFDD4CECFB6900A05CFB1832D53CA70AA1973EF7F4177D5A4D608B0BE1A97142255A24F488AE9CAB6A
                      Malicious:false
                      Preview:.1........O.......30|5|3|1...455|3410|6444|11171....1........0.......30|5|3|1...455|3410|6444|11171....1........V.......30|5|3|1...455|3410|6444|11171....1........O.......30|5|3|1...455|3410|6444|11171....1........|.......30|5|3|1...455|3410|6444|11171....1........U.......30|5|3|1...455|3410|6444|11171....1........O.......30|5|3|1...455|3410|6444|11171....1........U.......30|5|3|1...455|3410|6444|11171....2.................30|5|3|1...455|3410|6444|11171....2.................30|5|3|1...455|3410|6444|11171....1........0.......30|5|3|1...455|3410|6444|11171....1........,.......30|5|3|1...455|3410|6444|11171....1........<.......30|5|3|1...455|3410|6444|11171....1........J.......30|5|3|1...455|3410|6444|11171....1........1.......30|5|3|1...455|3410|6444|11171....0........1..Q...30|5|3|1...455|3410|6444|11171....1........1.......30|5|3|1...455|3410|6444|11171....1........3.......30|5|3|1...455|3410|6444|11171....1........0.......30|5|3|1...455|3410|6444|11171....1........O.......30|5|3|1...4
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1638
                      Entropy (8bit):5.405369762205105
                      Encrypted:false
                      SSDEEP:
                      MD5:67BC3ADB3A5CF2401510AC01A30404BF
                      SHA1:4A173F585ADFFA7AD8E5F2B536B3F3DC63911379
                      SHA-256:A79CCF2FEB124D29D3297143C749D23BFF608913A6B3E504564EFFE8786DDCD7
                      SHA-512:84DFAC3177E309D9A00E397D6DA63EC459E3577A1716996E3930ED4CA223EEB89B37E364D9139D3C84062A49700D1EB1F357382510F33BBEB98BAC7C2CC5F1D6
                      Malicious:false
                      Preview:...............................................................8...........................(...T..........*...... .........P...p. ........8......1................ ........F......A................. ........T......W................. ........b......r.................!........p........................!........~........................".................................."..................................."..................................."..................................."...................................".................................."................ ................".................*.................".................;.................".................U.................#...................................#....................................#...................................#.............................'......#............................'.....#....................................#....................................#....................................#........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):340
                      Entropy (8bit):4.491218750633262
                      Encrypted:false
                      SSDEEP:
                      MD5:9FD0CF0FE4F20274FFFA838999CF7D53
                      SHA1:CBC0E52BE3DC7512641051FD63A70AEB73B0FEC8
                      SHA-256:F8A1D4E9045447B76A6954733FE187B4A8699F303ADAC38226577AD3EB474A35
                      SHA-512:224AD8C983A9568D4C75F1CCA31E3431EC63805308D8816E7EB578E4FCFA15B5918990C1C0B75BBCD3E40D9BA2B66495E47A79A24EEB584DFFD69C5849774BE3
                      Malicious:false
                      Preview:...c....c........42........c....c........42......#.c....c........42..........301......#.c....c........42..........301......#.c....c........42..........301......#.c....c........42..........301......................................39........................39........................39........................39........................39.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):459
                      Entropy (8bit):4.147257477449985
                      Encrypted:false
                      SSDEEP:
                      MD5:B9EB7AC47D0D2DE271ADFC6BC28C9E04
                      SHA1:D5B2AFF1641A4C015A3376BCD2B09B66A96AEABE
                      SHA-256:4B9908AE89BB822CB27247CB54058A8E9DAABFDCC492615F6C93B68C922870E6
                      SHA-512:288FBC3113507B6D0BF3F65221CCF77849BDDACDB75C1A2F7CEB883F1DF4BED7253AF6A4A32F2679B566D83D43F21185921AF2C79EB237B286436C370D9FF140
                      Malicious:false
                      Preview:.>.......d.....=.....=.....=.....=.....=....#<.....=.....=..o..<.?....e.........=.....=.....=.....=.....=....<.....=.....=..o..<.@...............=.....=.....=.....=.....=....<.....=.....=..o..<.@...............=.....=.....=.....=.....=....<.....=.....=..o..<.@...............=.....=.....=.....=.....=.....<.....=.....=..o..<.@...............=.....=.....=.....=.....=....#=.....=.....=..o..<.@..............L>....L>....L>....L>....L>....L=....L>....L>..o..=
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):525
                      Entropy (8bit):5.583616045788349
                      Encrypted:false
                      SSDEEP:
                      MD5:9EF244D82DB72645DC1AA8574D24CBE2
                      SHA1:592195561296590D6FBAB448ECA0221BC22D34E6
                      SHA-256:F121566BA352F1C7522189E1C758E0049CA351C417A5C740D2158932B00FC0BA
                      SHA-512:03EFF5E0AB2EC4D57DCE6A0115C93EDDA00B223474388BAB806358E19F6A6154A9B05955DCF1EC6D6F92AE3750A3F6059D7CC6DE7448EF5C24D075929A420F15
                      Malicious:false
                      Preview:.b........hero_quality1.........;.....;............<.......E...-2|-1|0.......-2|-1|0........?...6120.c........hero_quality2...N..<..E.....E.............F.......O...-2|-1|0.......-2|-1|0........?...6121.d........hero_quality3.......F..O..(..O.............P....z..Y...-2|-1|0.......-2|-1|0........?...6122.e........hero_quality4....=..P..Y..2..Y.............Z........c...-2|-1|0.......-2|-1|0........?...6123.u........hero_quality5........Z..c..<..c.....................................m...-2|-1|0.......-2|-1|0........?...6124
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):838
                      Entropy (8bit):4.727541331638127
                      Encrypted:false
                      SSDEEP:
                      MD5:9F380D26867EDB841FE834674DD66B65
                      SHA1:2ADFD3831937FB51CF84CAA8C3BA74103BB5BFB4
                      SHA-256:C47A91BEFADF12B6E77D288F4E483359476C438ADEBFC4973FA9BF2B1B430FDC
                      SHA-512:B83D1525C43CB626CDBEB2B1967B5F4D138EE144162102FA29D7E47F406B46AF1A71B40C46C5F97C324B0CCE537C97D76F8CA345F0244B46984117AECDDD4BF5
                      Malicious:false
                      Preview:...........Sprite/UI/UIGeneralCard/card_1..+Sprite/UI/UIGeneralCard/FamousGeneralcard_1..1Sprite/UI/Frame/UIGeneralCard/FamousGeneralcard_1...........Sprite/UI/UIGeneralCard/card_2..+Sprite/UI/UIGeneralCard/FamousGeneralcard_2..1Sprite/UI/Frame/UIGeneralCard/FamousGeneralcard_2...........Sprite/UI/UIGeneralCard/card_3..+Sprite/UI/UIGeneralCard/FamousGeneralcard_3..1Sprite/UI/Frame/UIGeneralCard/FamousGeneralcard_3...........Sprite/UI/UIGeneralCard/card_4..+Sprite/UI/UIGeneralCard/FamousGeneralcard_4..1Sprite/UI/Frame/UIGeneralCard/FamousGeneralcard_4...........Sprite/UI/UIGeneralCard/card_5..+Sprite/UI/UIGeneralCard/FamousGeneralcard_5..3Sprite/UI/Frame/UIGeneralCard/FamousGeneralcard_5_1...........Sprite/UI/UIGeneralCard/card_6..+Sprite/UI/UIGeneralCard/FamousGeneralcard_6..3Sprite/UI/Frame/UIGeneralCard/FamousGeneralcard_6_1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):39594
                      Entropy (8bit):5.1729530640942345
                      Encrypted:false
                      SSDEEP:
                      MD5:9AAFDC1F24A70F01A3830BD61B80E318
                      SHA1:243FFA32DDD2702C6F0D6DFA6ADD8A0416947D89
                      SHA-256:0D4CB73F953FC92FF7CC3C8B4A292D983D97C2571E78B0E20B798C76460BBC73
                      SHA-512:51259462FC2DD0A92E90F1EEA8A1E1ACC3650C032469B840CDD64001EBE56CE08A9E313E72F23EEC5CBD6C2F20B8F3C29879C9FC6FE96F3518DEE1D5076F96E9
                      Malicious:false
                      Preview:..........,Sprite/UI/GeneralModel/Model_EU_1/Model_EU_1..*Sprite/UI/GeneralModel/Model_EU_1/Art_EU_1...Sprite/UI/GeneralIcon/Icon_EU_1...................,Sprite/UI/GeneralModel/Model_EU_2/Model_EU_2..*Sprite/UI/GeneralModel/Model_EU_2/Art_EU_2...Sprite/UI/GeneralIcon/Icon_EU_2...................,Sprite/UI/GeneralModel/Model_EU_3/Model_EU_3..*Sprite/UI/GeneralModel/Model_EU_3/Art_EU_3...Sprite/UI/GeneralIcon/Icon_EU_3...................,Sprite/UI/GeneralModel/Model_EU_4/Model_EU_4..*Sprite/UI/GeneralModel/Model_EU_4/Art_EU_4...Sprite/UI/GeneralIcon/Icon_EU_4...................,Sprite/UI/GeneralModel/Model_EU_5/Model_EU_5..*Sprite/UI/GeneralModel/Model_EU_5/Art_EU_5...Sprite/UI/GeneralIcon/Icon_EU_5...................,Sprite/UI/GeneralModel/Model_EU_6/Model_EU_6..*Sprite/UI/GeneralModel/Model_EU_6/Art_EU_6...Sprite/UI/GeneralIcon/Icon_EU_6...................,Sprite/UI/GeneralModel/Model_EU_7/Model_EU_7..*Sprite/UI/GeneralModel/Model_EU_7/Art_EU_7...Sprite/UI/GeneralIcon/Icon_EU_7........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):650597
                      Entropy (8bit):5.4067685169634485
                      Encrypted:false
                      SSDEEP:
                      MD5:88258F4A99A347F2FAFF981DB2F6310C
                      SHA1:761FEFFE034BB7F7B911922DAE896CBA331D2432
                      SHA-256:A90B8BED7F0A03AC348F38D70C133C6241788C53C726B73439FF80E87BC0BFF9
                      SHA-512:7C65E6ED43D75F349DA6E21FD395EE12253FADAF44A9D97B4347382077F6A814BD3543EBB0DC9CCE9CE815E478BB450894D43B4F33565A36EE26B664A3D80F53
                      Malicious:false
                      Preview:.............10.........................0.....................................................................-1...-1.....10.....".buff_type...................................16.........................0.....................................................................-1...-1.....16.....".buff_type...................................19.........................0.....................................................................-1...-1.....19.....".buff_type...................................13.........................0.....................................................................-1...-1.....13.....".buff_type...................................49.........................0.....................................................................-1...-1.....49.....".buff_type...................................50.........................0.....................................................................-1...-1.....50....".buff_type...................................51..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):95
                      Entropy (8bit):3.772545834930638
                      Encrypted:false
                      SSDEEP:
                      MD5:9364B5DB03D623A0784112E459BE11C3
                      SHA1:E170D01E597727343C959070488F121CFBA9FEB2
                      SHA-256:58E25F14FE723529CAB684E56A6988D3A95F8ECBDB48D9DAC8D3D0ADA76525B7
                      SHA-512:4B6CD1F99FC13A9B1B71DCC3AFEAB434E2E5E9CACBCED246254F96A5EDD46E0F17254A460E1AA2ADEC24B32592E1CF7D77F7398FB611F5F572E5C62026AEE166
                      Malicious:false
                      Preview:.........d..d...............K..d...............2..2..2..2...............K..K...............d..d
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):311640
                      Entropy (8bit):6.200251580029628
                      Encrypted:false
                      SSDEEP:
                      MD5:CCA0121F93F65A6D269ECEF1E8750B05
                      SHA1:1540F6A2162E06B963DCE98D5E0032C55A0BB32E
                      SHA-256:AF8F6E24B414B9E409CDA35BD97E7D06BC49B48967C3D5E7864C5622998899FC
                      SHA-512:834106A38533DD5E33A0538717F0AD820AB02F77F42C029E4E74C1C3EAF5D06FC40786AB600112703B2C6187F763E6DD45A098B5F754624993D3E6628ECDF332
                      Malicious:false
                      Preview:....................."...10:1:1;12:1:1.....................hero_feature_soldier1..)Sprite/UI/UICharacteristic/bubingtuji_{0}.........-1.....10.d..".buff.....12.d..".buff....................."...10:1:1;12:1:1.....................hero_feature_soldier1..)Sprite/UI/UICharacteristic/bubingtuji_{0}.........-1.....10.d..".buff.....12.d..".buff....................."...10:1:2;12:1:2....=................hero_feature_soldier1..)Sprite/UI/UICharacteristic/bubingtuji_{0}.........-1.....10.....".buff.....12.....".buff....................."...10:1:2;12:1:2........2......W......hero_feature_soldier1..)Sprite/UI/UICharacteristic/bubingtuji_{0}.........-1.....10.....".buff.....12.....".buff....................."...10:1:4;12:1:4........P..............hero_feature_soldier1..)Sprite/UI/UICharacteristic/bubingtuji_{0}.........-1.....10.....".buff.....12.....".buff....................."...16:1:1;18:1:1.....................hero_feature_soldier2..)Sprite/UI/UICharacteristic/qibingtuji_{0}.........-1.....16.d..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):187151
                      Entropy (8bit):4.591107021391916
                      Encrypted:false
                      SSDEEP:
                      MD5:E1BA390902CA04B4A41DA63717918AEA
                      SHA1:83DDCDA9C7E4F89AF218E93B90ED8BB377FFECBC
                      SHA-256:5036B1A9362EAB48D5E9ADEC2FA6A828D52318798CD82B406A66942AF69A6BD0
                      SHA-512:EAF38D7F61FC5BD2C9FB16B041B1CCD0C86C98AE8A8006D1A7FF77E124C2CC0675B68E3AD757680304FE9088EB9DE2A837AD4B1BCE2606E0192F5C12A04DB492
                      Malicious:false
                      Preview:....c....c......10;0;0;0...10;10;0;0...10;10;10;0...10;10;10;10...0...4592:4;6244:80...4592:34|38|42|46|60...4592:14;6244:300...6244:64|128|192|256|496....c....c......20;10;10;10...20;20;10;10...20;20;20;10...20;20;20;20...0...4592:8;6244:100...4592:68|76|84|92|120...4592:28;6244:350...6244:576|656|736|816|1096....c....c......30;20;20;20...30;30;20;20...30;30;30;20...30;30;30;30...0...4592:12;6244:110...4592:132|144|156|168|210...4592:42;6244:450...6244:1184|1272|1360|1448|1808....c....c......40;30;30;30...40;40;30;30...40;40;40;30...40;40;40;40...0...4592:16;6244:130...4592:226|242|258|274|330...4592:56;6244:550...6244:1912|2016|2120|2224|2664....c....c......50;40;40;40...50;50;40;40...50;50;50;40...50;50;50;50...0...4592:20;6244:150...4592:350|370|390|410|480...4592:70;6244:650...6244:2784|2904|3024|3144|3664....k....k......10;0;0;0...10;10;0;0...10;10;10;0...10;10;10;10...0...4593:4;6244:80...4593:34|38|42|46|60...4593:14;6244:300...6244:64|128|192|256|496....k....k......20;10;10;10
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):432
                      Entropy (8bit):5.095255397893334
                      Encrypted:false
                      SSDEEP:
                      MD5:D7BF3128CBE2484A3BFDA2C164107C9E
                      SHA1:D9FA5EC0B223ACEE9A10EEF23BDCD58AC7133D5F
                      SHA-256:5BC1F17FF0A624CFD0A06E7FE48E9D9D2F233423DD7007BCE92B6403789E9FC1
                      SHA-512:22F8CD78E322AC845D808B5E4DCF982657C793A53A4BF94F91AF270698AA8A563C4FD3214FB841B534FB3DBA4AD23DF9B67ACF37F2414ABE859EB43E8EDFCA82
                      Malicious:false
                      Preview:.O.................................$...........0......#....=......(...............O................<....0......K....I......Z....a......i....z......x...............W.........0............a.................................................................X.........a..............................................................................Y........................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):185552
                      Entropy (8bit):5.37179000254315
                      Encrypted:false
                      SSDEEP:
                      MD5:48CB589B0361A886F3251191966B4DD8
                      SHA1:DF59F3048E792CFF87538C44D1A4B817CB5BDFA2
                      SHA-256:8B15D5360D84BC501C90A5C8EEC9CF4323BD22C25A086652FB8084548E9E6276
                      SHA-512:4501192CF4E6B2FB22DC7D016F8B2058750062D6E4AF3AF8FEDF5B9A066FF11E61E66078916CA4FB7912C96EBE42582C07844A96CD818CC918039E8C0611C49C
                      Malicious:false
                      Preview:.H...............5.........1:96;11:96;21:96;31:96......N...................L...............5.........1:144;11:144;21:144;31:144......a...................L...............5.........1:240;11:240;21:240;31:240......u...................M...............5.........1:384;11:384;21:384;31:384..........................M...............5.........1:621;11:621;21:621;31:621...........................M...............5.........2:864;12:864;22:864;32:864..........................Q...............5.........2:1134;12:1134;22:1134;32:1134...........................Q...............5.........3:1458;13:1458;23:1458;33:1458...........................Q...............5.........3:2040;13:2040;23:2040;33:2040...........................Q...............5.........3:2490;13:2490;23:2490;33:2490...........................Q...............5.........4:3000;14:3000;24:3000;34:3000...........................Q...............5.........4:3540;14:3540;24:3540;34:3540...........................Q...............5.........4:4554;1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):759410
                      Entropy (8bit):6.215711135125766
                      Encrypted:false
                      SSDEEP:
                      MD5:D9B82D92D902CAE3471A9C306E2B4B70
                      SHA1:250CEE203A88C2A6BD973A2C9388A541436FDA35
                      SHA-256:588FF443162C6147424D48603FD76E2534ACBDE697A0E77A5C3AC97096668AB5
                      SHA-512:723875822273123F9D61822A934FC983A85CC737965A30922E7A02906745245C7558E6344DCC6362573FC9BAF67177DEDB896C8C1E6BBBCD86282D391105BC30
                      Malicious:false
                      Preview:.............+..................................0...0.................@........................................................#Sprite/UI/Poster/Store/bg_Resources.............-Prefabs/Controller/EventsPackage/Gift_Learner.....................(Sprite/UI/Icon/UIStoreIcon/Icon_BestDeal........*Sprite/UI/Icon/UIStoreIcon/Icon_FastGrowth..*Prefabs/Store/FX_Icon_PowerfulBoost_Effect...Sprite/UI/Background/RedBg...packet_resource_text1_1......................................................1851_sg339_sp_100_2..................................................1CB06656ACCFFEF......................+..................................0...0.................A........................................................#Sprite/UI/Poster/Store/bg_Resources.............-Prefabs/Controller/EventsPackage/Gift_Learner..........5..........(Sprite/UI/Icon/UIStoreIcon/Icon_BestDeal........*Sprite/UI/Icon/UIStoreIcon/Icon_FastGrowth..*Prefabs/Store/FX_Icon_PowerfulBoost_Effect...Sprite/UI/Background/Re
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):571544
                      Entropy (8bit):6.254057512237002
                      Encrypted:false
                      SSDEEP:
                      MD5:65239D15498B3EC46413B5B8D270C8C2
                      SHA1:79773285145DE3F65FE9EA7BDE18BCB3E9F63880
                      SHA-256:AAEDF0017AE380921509112ABF0BBC8DE787FBA6D8BF119166A4E70DDC23DC5A
                      SHA-512:8C663232265525CAE8533FBC45AC37574A91538D25B43AD91A043808D751FA6550F2B310354D05979431B3B1653747D1F1B0211A3685AC3FF293AACEB6F9B5EC
                      Malicious:false
                      Preview:.............+..................................0...0.................@........................................................#Sprite/UI/Poster/Store/bg_Resources.............-Prefabs/Controller/EventsPackage/Gift_Learner.....................(Sprite/UI/Icon/UIStoreIcon/Icon_BestDeal........*Sprite/UI/Icon/UIStoreIcon/Icon_FastGrowth..*Prefabs/Store/FX_Icon_PowerfulBoost_Effect...Sprite/UI/Background/RedBg...packet_resource_text1_1......................................................1851_sg339_sp_100_2..................................................1CB06656ACCFFEF...................+..................................0...0.................A........................................................#Sprite/UI/Poster/Store/bg_Resources.............-Prefabs/Controller/EventsPackage/Gift_Learner..........5..........(Sprite/UI/Icon/UIStoreIcon/Icon_BestDeal........*Sprite/UI/Icon/UIStoreIcon/Icon_FastGrowth..*Prefabs/Store/FX_Icon_PowerfulBoost_Effect...Sprite/UI/Background/RedBg
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):38507
                      Entropy (8bit):5.954873944979686
                      Encrypted:false
                      SSDEEP:
                      MD5:B799F0FA44EF2E909B22BE5071F56D31
                      SHA1:AEDFB437F1A9969AF58331E749670E1C7EF4DC80
                      SHA-256:7810865EA9D7010762B6A2875B7CDD51C324F5A1060324C737AFD4478C3F6DB9
                      SHA-512:89C9525289D4DDE2CA1E397ABDD87EE393CE6BA9F48833AAB17FCEA83BDB492809125C9B3EECD84F5F2E2AEFE64D462622B1C7A043307F84B4B5608335A2425D
                      Malicious:false
                      Preview:....1....1.............lord_gift_name_49...lord_gift_description_49........:.....2......................................................Sprite/UI/Icon/TechIcon/Tech_41.....D......48.........-1.................$lord_gift_value_desc_percentage_plus.....48.....".buff_type_1....1....1.............lord_gift_name_49...lord_gift_description_49........:.....2......................................................Sprite/UI/Icon/TechIcon/Tech_41....;E......48.........-1.................$lord_gift_value_desc_percentage_plus.....48.....".buff_type_1....1....1.............lord_gift_name_49...lord_gift_description_49........:.....2......................................................Sprite/UI/Icon/TechIcon/Tech_41....zE......48.....-...-1.................$lord_gift_value_desc_percentage_plus.....48..#..".buff_type_1....1....1.............lord_gift_name_49...lord_gift_description_49........:.....2......................................................Sprite/UI/Icon/Tech
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11201
                      Entropy (8bit):4.017007889028482
                      Encrypted:false
                      SSDEEP:
                      MD5:D82BAE18ED86CDACCE80593D4564AE6B
                      SHA1:E3A4599466ECC9CCD7083CDDFC48C41E625CB65B
                      SHA-256:E1407565DE902A810F192B234A55B3BCEA6164A968E51D74F4EFF68ADAD36448
                      SHA-512:E867EE8EA5D2A2D657C04447E766F2AD63A8D23D093E9A4838E89F351CE8F44DFD0D2CAFA1CEFEDE9F8975E93E289B78E18CE1E3F5401FCB6F7BD6C92ED2B31E
                      Malicious:false
                      Preview:......................................251:2;255:2;259:2;263:2;275:2;252:2;256:2;260:2;264:2;276:2;253:2;257:2;261:2;265:2;277:2;254:2;258:2;262:2;266:2;278:2;267:4;271:4;268:3;272:3;269:2;273:2;270:1;274:1;283:4;287:4;291:4;284:3;288:3;292:3;285:2;289:2;293:2;270:1;274:1.............................................251:2;255:2;259:2;263:2;275:2;252:2;256:2;260:2;264:2;276:2;253:2;257:2;261:2;265:2;277:2;254:2;258:2;262:2;266:2;278:2;267:4;271:4;268:3;272:3;269:2;273:2;270:1;274:1;283:4;287:4;291:4;284:3;288:3;292:3;285:2;289:2;293:2;270:1;274:1.............................................251:2;255:2;259:2;263:2;275:2;252:2;256:2;260:2;264:2;276:2;253:2;257:2;261:2;265:2;277:2;254:2;258:2;262:2;266:2;278:2;267:4;271:4;268:3;272:3;269:2;273:2;270:1;274:1;283:4;287:4;291:4;284:3;288:3;292:3;285:2;289:2;293:2;270:1;274:1;1331:2;1332:1;1333:2;1334:1;1335:2;1336:1;1337:2;1338:1;1339:2;1340:1;1341:2;1342:1;1343:2;1344:1;1345:2;1346:1;1347:2;1348:1.............P.....P.......251:1;255:1;259:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3356516
                      Entropy (8bit):4.865405538830425
                      Encrypted:false
                      SSDEEP:
                      MD5:C81B9F017B25A0C7C515B283331A0212
                      SHA1:3359098B4A7907F5F81EE6661062B84E37C7CDBF
                      SHA-256:AC769BCF48522DFD40A9992EC2EA8C19F4A36DAFE21FA07FA0CDFAFBB5E10FE4
                      SHA-512:4C156F3FE8B081C5FED7A5F9445FAA3A1FF27EB014EDAC301E18097A9A58E1FA4B107A192FABD2990FF52B083FEDCB6898AFC530C5D54E6E99574B6CE3DC9540
                      Malicious:false
                      Preview:.O....................!.....d........................0............................O..........................d........................0............................O..........................d........................0............................O....................!..2..d........................0............................O....................".....d........................0............................O.......................d..d........................0............................O..........................d........................0............................O.......................d..d........................0............................O..........................d........................0............................O....................!..2..d........................0............................O....................".....d........................0............................O.......................d..d........................0............................O..........................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4897
                      Entropy (8bit):5.241286284550082
                      Encrypted:false
                      SSDEEP:
                      MD5:894423D2B4B3FB5B1A353722F5E667F0
                      SHA1:0EE5CBDD12B4821AE8FDE1D77D531250F138FF9A
                      SHA-256:45074FA2E928A2D6B869A3CC012FC2698F121B0EFB8879077E098BBFBA177ED9
                      SHA-512:3E926DC74A38683E236CA2A5E038A6EDEA8D499676151EFA81FF850B526CE5A4B0842B4620E194781D7365478472F5E20579C23E7F1EE79B1529D5F85885B0B7
                      Malicious:false
                      Preview:.......................................................................................................................#.....#............$.....$............%.....%............&.....&............'.....'............(.....(..................................................................................................................................................................................................................".....".................................................................................................................................................................................................................................................................................................................................................................................................................................................................. ..... ............!.....!.............".....".............#.....#........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4663
                      Entropy (8bit):5.769165612731567
                      Encrypted:false
                      SSDEEP:
                      MD5:AFAF8055F8E871FBB8CF314933359CFB
                      SHA1:B486FB047DE71ABB7B1B8E3523DF092FCEC69B68
                      SHA-256:EA81DAB1F2B7DBEBA013778F9F4F7A5631CF0C906E6D2E2A3F75728205F1B22C
                      SHA-512:3203632061979863A49760A5F66A084222D9DA7BB04922A447621E965FEAA98C7512925440AB1D268B06A96A5181615E867F0D8E6EA9ACEF8DCD7635AE2BC945
                      Malicious:false
                      Preview:.....N...N...gold_product_name6...gold_product_des6........................@......Sprite/UI/UIStoreIcon/gems_1.......].............................n............sg339_sp_100_56......1CB06656ACCFFEF.....N...N...gold_product_name2...gold_product_des2........................A......Sprite/UI/UIStoreIcon/gems_2.......].................5...........n............sg339_sp_200_51......76D36A017F0E730.....N...N...gold_product_name3...gold_product_des3.......................A......Sprite/UI/UIStoreIcon/gems_3.......].................d...'...'...n............sg339_sp_400_24......D73C29C68094287.....N...N...gold_product_name5...gold_product_des5...'...................GB......Sprite/UI/UIStoreIcon/gems_4.......]......................]...]...n............sg339_sp_1000_26......43CE684530C3B33.....N...N...gold_product_name7...gold_product_des7...N....................B......Sprite/UI/UIStoreIcon/gems_5.......]..........N.....................n............sg339_sp_2000_29......02B4F46F39C0D68.....N...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):24092
                      Entropy (8bit):5.887535411453358
                      Encrypted:false
                      SSDEEP:
                      MD5:D84FE2D66BC7722EB664015B87DF194B
                      SHA1:DA8FD75CDE83EC9CA0EE427D100766A66530465F
                      SHA-256:D69CF1D9B4CB107887A48B00055D49CB43A4060688A186209E591FE5BA1E66E8
                      SHA-512:1276AC189C903AF749CE19F7CD4F73493CE28EFAC550527BA39EA4651219BC726638B6D453BDE3F37CC681D0BA33025AA5EDDFF146D64028E72903C12F4B23D7
                      Malicious:false
                      Preview:........................officer_title6...officer_level1...2|1...500|450......48.....<.."Sprite/UI/ItemsIcon/FamousCity_box.....48.....".buff_id........................officer_title6...officer_level2...2|1...850|800......48.....Z.."Sprite/UI/ItemsIcon/FamousCity_box.....48..F..".buff_id........................officer_title6...officer_level3...2|1...1150|1100......48.....x.."Sprite/UI/ItemsIcon/FamousCity_box.....48..]..".buff_id........................officer_title6...officer_level4...2|1|5...1200|1150|3100000......48........."Sprite/UI/ItemsIcon/FamousCity_box.....48..u..".buff_id........................officer_title6...officer_level5...2|1|5...1350|1350|3100000......48........."Sprite/UI/ItemsIcon/FamousCity_box.....48.....".buff_id........................officer_title7...officer_level1...2|1...500|450......34........"Sprite/UI/ItemsIcon/FamousCity_box.....34.....".buff_id........................officer_title7...officer_level1...2|1...500|450......36........"Sprite/UI/ItemsIcon/Famou
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):640
                      Entropy (8bit):4.352791242811188
                      Encrypted:false
                      SSDEEP:
                      MD5:6C47D0974B68DEFDA6D7F3CFB0A9BF65
                      SHA1:9FC7FE734E5D3EACC4C15AB5BEFB93687B9B7241
                      SHA-256:08981DA8264A0CAC0A70CFE05937941AEF2833721899AA82AA072DD6CA40BF5C
                      SHA-512:681B2DD4E1686EB8800792A052601D25C9E1EA0E01B5393E3888592D63EE4CC33B7AB2768637AE3B2249214F62092623FA131F63E2D582ADFE44EF8F651DF648
                      Malicious:false
                      Preview:...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N...N..........N...N..........N...N.................................................$.....................#.....................&.....................-.....................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4795
                      Entropy (8bit):5.671233629407094
                      Encrypted:false
                      SSDEEP:
                      MD5:3769C1863B6ECC94EE96B3F51436E4E0
                      SHA1:3A12A1CEB0ABA8B17C351ACB621FEB1C0FF5C9E2
                      SHA-256:F9859137F6FE4AC0BCFAB516EDBD600C4D4610149F642832AE29938261B9D874
                      SHA-512:E8E79CAFBBAA8D65E3475D0912A6937E896AE346B64DC465DFB366DA999ADD7F5993E688F231EB8DD164E0DF13F261E2DFA4FF40EC8371ACD1402ECBDF0D88EA
                      Malicious:false
                      Preview:.[...e.....e.................f..%Prefabs/Guide/Evony{0:D}/Loading_role...troopgear_intro_1....u...f.....f.................g..%Sprite/UI/Background/Guide/BG_guide01...troopgear_intro_2_title...troopgear_intro_2....l...g.....g.....f..h..%Sprite/UI/Background/Guide/BG_guide02...troopgear_intro_3_title...troopgear_intro_3....u...h.....h.....g..............%Sprite/UI/Background/Guide/BG_guide03...troopgear_intro_4_title...troopgear_intro_4....e.................................%Prefabs/Guide/Evony{0:D}/Loading_role...alliance_showdown_intro0.......................................8Sprite/UI/Background/Activity/LeagueGame/LeagueGame_bg01...war_button1...alliance_showdown_intro1...............................8Sprite/UI/Background/Activity/LeagueGame/LeagueGame_bg02...alliance_showdown_intro_title2...alliance_showdown_intro2...............................8Sprite/UI/Background/Activity/LeagueGame/LeagueGame_bg03...alliance_showdown_intro_title3...alliance_showdown_intro3....{.....................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):440
                      Entropy (8bit):3.793480346848231
                      Encrypted:false
                      SSDEEP:
                      MD5:6A1CAB7B1645A4C44E5514F55766D14A
                      SHA1:F76DE959F5F2F2FE59E9314D0BB00636559D94A4
                      SHA-256:525CC29228CBB0868A2AE1BDF3EF7C7F7CDAFB7B4643996F75FAE7BAADDCFD8F
                      SHA-512:D42302BBDFF62506FF532CF9744FDEC944030A7F5D20FEB9C7495EB7D10781AE70BDB3BA66D1F80E50B4B9EE06A6AEA3279131BB7529607224A1343D3DE55F3C
                      Malicious:false
                      Preview:.V.......................................................................................V.......................................................................................V.......................................................................................V.......................................................................................V......................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):850
                      Entropy (8bit):5.734416034911719
                      Encrypted:false
                      SSDEEP:
                      MD5:169B47E7F9D4BE917E8A8EE6590C0FFD
                      SHA1:3D678580D2EAD2F536204376D1FC15BA98569EAE
                      SHA-256:F9937628E34C4F061B9A0632FBBD1F4D6CF5ADAE6405CC439E1770D20C2B228C
                      SHA-512:09379F49E9764CA6CEDB7F6E65B9DEF966217286F68B53454C48834B6DE6D477C908EAE081B7E38CAF99C18E8EA47D8C3D92FFC9C25EF419FC1189B0DE7F128F
                      Malicious:false
                      Preview:..........!...champion_castle2...castle_obtain_conditions2...Prefabs/Map/castle_Guild_honour..'Prefabs/Skin/UISets/UI_Castle_GuildCity...-1.........-1.........-1......................N...champion_castle3...castle_obtain_conditions3.. Prefabs/Map/castle_Guild_camelot...Prefabs/Skin/UISets/UI_Castle_GuildCityCamelot...248.........264.........284.................248..........264..........284....................champion_castle4...castle_obtain_conditions_4..!Prefabs/Map/castle_Guild_Sigiriya../Prefabs/Skin/UISets/UI_Castle_GuildCitySigiriya...248.........265.........285.................248..........265..........285....................champion_castle5...castle_obtain_conditions_5..!Prefabs/Map/castle_Guild_Starfort../Prefabs/Skin/UISets/UI_Castle_GuildCityStarfort...248.........265.........286.................248..........265..........286.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):13012
                      Entropy (8bit):5.7549103355926485
                      Encrypted:false
                      SSDEEP:
                      MD5:C27DEEEEFDB2B3233674EF2531EAD964
                      SHA1:6CE08FB7D7745AE5F759B9A990409E9EEC36C134
                      SHA-256:A1F3931A63958D28361E0EA75D1718E9FBCA973F80B5EE6CD350331DE8AB7421
                      SHA-512:C7AD53E82BB3082BC66056E15D448FE35B72EB0DA7E6BE1A2DE7A3E95D7DBCA919F50634648CDF7500F6110660F93CACBE6A3E5A428D551C04689CF914755513
                      Malicious:false
                      Preview:..............Guild_flag1.. Sprite/UI/GuildFlags/Guild_flag1........Prefabs/KingdomFlag/Flag1.............. Sprite/UI/GuildFlags/Guild_flag1.. Sprite/Map/GuildFlag/Guild_flag1.....................Guild_flag1.. Sprite/UI/GuildFlags/Guild_flag2.........Prefabs/KingdomFlag/Flag2.............. Sprite/UI/GuildFlags/Guild_flag2.. Sprite/Map/GuildFlag/Guild_flag2.....................Guild_flag1.. Sprite/UI/GuildFlags/Guild_flag3........Prefabs/KingdomFlag/Flag3.............. Sprite/UI/GuildFlags/Guild_flag3.. Sprite/Map/GuildFlag/Guild_flag3.....................Guild_flag1.. Sprite/UI/GuildFlags/Guild_flag4.........Prefabs/KingdomFlag/Flag4.............. Sprite/UI/GuildFlags/Guild_flag4.. Sprite/Map/GuildFlag/Guild_flag4.....................Guild_flag1.. Sprite/UI/GuildFlags/Guild_flag5..........Prefabs/KingdomFlag/Flag5.............. Sprite/UI/GuildFlags/Guild_flag5.. Sprite/Map/GuildFlag/Guild_flag5.....................Guild_flag1.. Sprite/UI/GuildFlags/Guild_fla
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1646
                      Entropy (8bit):5.498135644483106
                      Encrypted:false
                      SSDEEP:
                      MD5:B2ED42A1618B2CA58003BB05C64723C5
                      SHA1:5C19C785328DF2A79BE55E2A2115EAC7C2EF11C5
                      SHA-256:4B3DE628F2F500629A14A3C67784BAE54DDB2A54660C03E9A5F0CC5389E355E2
                      SHA-512:0ED485B8D93FDE57A56CBCF1E7DD1A0AE45728516AE7C7172EF599DDDFF2CE4219834495A1DB3E99042619C27662949CD8F87AB9F9FD1D9CA836A890064AE45B
                      Malicious:false
                      Preview:.................'...u.............................u.............................u.............................u....$........................u....$.....................0...u....6.....................r...u....6..........................u....I.........................u....[..........................u....[..........................u....[.........................u....[.........................u....m..........................u....m.........................u....m..........................u................................u...............................u........................... ...u............................%...u............................*...u............................0...u............................6...u..........................=...u............................D...u...........................L...u............................T...u...........................]...u...........................g...u............................q...u...........................|...u........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2313
                      Entropy (8bit):5.903032854848742
                      Encrypted:false
                      SSDEEP:
                      MD5:83A9B0CC0623020212C0F852433B701B
                      SHA1:5DF143DF8F6D3C3D62FF199CFA65E9528AFE56F1
                      SHA-256:3952D977EF02132F1ABB8BBD49CDD895D3D07A0242386EEB30518D4B4C7C7E3A
                      SHA-512:50866EE067F7133057200BC120543808ABBADF96EF583F2704FBAAEA8CB9AE83A2EF5387B6505D2C34FB0E857CCAEB794F03C28558129EBDD31A0B501043988A
                      Malicious:false
                      Preview:.....N.....N...guild_skill_9...guild_skill_1.........67......'.......................................}.....d............p........=.. Sprite/UI/Icon/TechIcon/Tech_387......guild_tech_desc_22...guild_tech_name_1_0........1;3|4;3|7;3|8;3.........119..........N.....N...guild_skill_9...guild_skill_1.........67..................'...........................}.....d............p............ Sprite/UI/Icon/TechIcon/Tech_387......guild_tech_desc_22...guild_tech_name_1_0........1;5|4;5|7;5|8;5.........119..........N.....N...guild_skill_9...guild_skill_1.........67......'.......................................}.....d............p............ Sprite/UI/Icon/TechIcon/Tech_387......guild_tech_desc_22...guild_tech_name_1_0........1;7|4;7|7;7|8;7.........119..........N.....N...guild_skill_10...guild_skill_2.........39..................'...........................}.....d............p........=.. Sprite/UI/Icon/TechIcon/Tech_388......buffer_description39...guild_tech_name_2_0........2;3|3;3|5;3|6;3........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1448
                      Entropy (8bit):4.919827910667321
                      Encrypted:false
                      SSDEEP:
                      MD5:49E8B89D5297F83EBD29D657E9DF043A
                      SHA1:8FF3220A9FCE44B65CB9BFA20D24DCC7AD51E85C
                      SHA-256:90AA3D0742CBF2574F29A4BDFF214C2B0EB8775961716309B7AC66968656BF8B
                      SHA-512:4E48FFAB547E4A0870DFF18C3C619D809D5395ADD8A85850DC3111427955E840853484812B7F0C71C331545096CDA4200FCFD85A78037310365C53CC6F0DEEF9
                      Malicious:false
                      Preview:.!.................................. ...............:................."................................."...................................!.......-..........................!..................................)...............u...u......................"..................................."................................. ................................."...................................+............................................+..........................................+............................................).......0...........N...................... .......1..........>.............!....................a.............!....................u.............)...............N...N......................"................................."........................2..........".......................2.......... ...............'................."........... ...................... ..............N...F..#........... ..............N...F..#........... ..............N...F..#.........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):52686
                      Entropy (8bit):5.804294964387589
                      Encrypted:false
                      SSDEEP:
                      MD5:8067EEDB931B56082ACFEC9A59FED469
                      SHA1:02DDD828D4EB5F529ADE5FC08CBA50748415D463
                      SHA-256:DEDC79858F015CF061001129F4043C4BCCB3B52234B15E382AD7D34326E41428
                      SHA-512:0AEB41DD142D0EB9CB10DB918A9B8CFFC3E769B2C0DE3E5E3EDAB4CF94B515AF4DB97AADBF331645692D9AA905ACF9FA93E046E973834FCA6259B147C23DD235
                      Malicious:false
                      Preview:.............guild_tech_name_1_1...guild_tech_desc_1......67......'.......................................}.....d............p...........Sprite/UI/Icon/TechIcon/Tech_36.........guild_tech_desc_22.....67....".buffer_type...guild_tech_name_1_0.............guild_tech_name_1_2...guild_tech_desc_1......67..................'..................................d............p............Sprite/UI/Icon/TechIcon/Tech_36.........guild_tech_desc_22.....67....".buffer_type...guild_tech_name_1_0.............guild_tech_name_1_3...guild_tech_desc_1......67......'..............................................d............p........=...Sprite/UI/Icon/TechIcon/Tech_36.........guild_tech_desc_22.....67....".buffer_type...guild_tech_name_1_0.............guild_tech_name_1_4...guild_tech_desc_1......67..(...............'..................................d............p............Sprite/UI/Icon/TechIcon/Tech_36.........guild_tech_desc_22.....67...(".buffer_type...guild_tech_name_1_0.............guild_tech_name
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):70119
                      Entropy (8bit):3.7195701885490178
                      Encrypted:false
                      SSDEEP:
                      MD5:B7AB2C3920A45C5383249D3C1607616A
                      SHA1:C155169D5E3FB292AB981D48925BE7FC8D749D22
                      SHA-256:F1E12886FDF1FEDD05AF2E8D224A89E88E3B42429D8956E776105A1ECDF9D4B7
                      SHA-512:74394530F5194C4006A3EC71EFCBC10E415E05B5D6820FC6D63BAA5345375FCBF50990AF0513F98A9AC1BFF3CEED1C17FA6EDB814D361305CBD731FF6829A99B
                      Malicious:false
                      Preview:........1_4_1.......1_4_1.....10|13|16|19..........11|14|17|20..........12|15|18|21........11|14|17|20;0;60000..*10|13|16|19:11|14|17|20:12|15|18|21;0;5000....1:1000;2:1000;3:1000;4:1000;5:1000;6:1000;7:1000;8:1000;9:1000;10:1000;122:1000;123:1000;146:40000;21:1000;22:1000;23:1000;24:1000;25:1000;26:1000;27:1000;28:1000;29:1000;30:1000;126:1000;127:1000;150:40000;11:1000;12:1000;13:1000;14:1000;15:1000;16:1000;17:1000;18:1000;19:1000;20:1000;124:1000;125:1000;148:40000;31:1000;32:1000;33:1000;34:1000;35:1000;36:1000;37:1000;38:1000;39:1000;40:1000;128:150000;129:150000;152:150000.....2.........18111:30........2_4_1.......2_4_1.....10|13|16|19..........11|14|17|20..........12|15|18|21.......+10|13|16|19|11|14|17|20|12|15|18|21;0;60000..*10|13|16|19:11|14|17|20:12|15|18|21;0;5000....1:1000;2:1000;3:1000;4:1000;5:1000;6:1000;7:1000;8:1000;9:1000;10:1000;122:1000;123:1000;146:1000;147:40000;21:1000;22:1000;23:1000;24:1000;25:1000;26:1000;27:1000;28:1000;29:1000;30:1000;126:1000;127:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8129
                      Entropy (8bit):4.865702784680666
                      Encrypted:false
                      SSDEEP:
                      MD5:1910C0A10BF9A0B1675358B40F75F400
                      SHA1:C5B49EE31CFCBD4A9B9903DDB51CD4A260C218E0
                      SHA-256:F3D733813AD605015B8CFC71067A8FC9134A251392B7D781FA1EA82A1DBED67A
                      SHA-512:B84F284FE9A909F28937F1F0D7E632F597E9E6992CE0AC063FF02B1551A36178B34032A1766744874E46E122C1A64F741FAFA34735F5D0AED1BCAC7FCA733631
                      Malicious:false
                      Preview:.?....... @............@..&2561:1500;18111:80;2806:1;6987:1;947:2.A....... ..................&2561:1500;18111:80;2806:1;6987:1;947:2.B....... ..................'2561:1500;18111:120;2806:2;6987:2;947:2.B....... ..................'2561:2000;18111:160;2806:2;6987:3;947:2.B....... ..................'2561:2500;18111:160;2806:2;6987:5;947:2.B....... ................)2561:24500;3507:50;3712:100;980:250;29:50.A....... ................(2561:19600;3507:40;3712:80;980:200;29:40.A....... ................(2561:17200;3507:35;3712:70;980:180;29:36.A....... ................(2561:14700;3507:30;3712:60;980:150;29:30.A....... ................(2561:12700;3507:25;3712:50;980:130;29:26.A....... ................(2561:11300;3507:20;3712:40;980:110;29:20.@....... ................'2561:9800;3507:18;3712:35;980:110;29:16.?....... ................&2561:7800;3507:15;3712:30;980:90;29:16.?....... ................&2561:6400;3507:12;3712:25;980:80;29:12.?....... ................&2561:4900;3507:10;3712:20;980:80;29:10
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):28237
                      Entropy (8bit):5.309547497580035
                      Encrypted:false
                      SSDEEP:
                      MD5:5522A152EAD7EB2001A0A5EB97647F34
                      SHA1:3E55FDE960EEB2A42C4EEB209CA31AB17B46EF79
                      SHA-256:727420D5A8A1F33C8B1898973234C0B17873EFBD270598EC2ACE41DE5BB3C696
                      SHA-512:696A55273AB13DBC41B9A2D3FA69C1FF850E0C9EF70A2F4F46AB7011817951C0B130F535B7C4CA08C2CF81217D87D1349E07FB25BDCF32C89B238654175567AD
                      Malicious:false
                      Preview:.C.....................1731...activity_hekate_change1.........18111:3.C.....................1731...activity_hekate_change2.........18111:3.C.....................1525...activity_hekate_change3.........18111:3.C.....................1530...activity_hekate_change4.........18111:3.C.....................1520...activity_hekate_change5.........18111:3.C.....................1731...activity_hekate_change1.........18111:3.C.....................1731...activity_hekate_change2.........18111:3.C.....................1525...activity_hekate_change3.........18111:3.C.....................1530...activity_hekate_change4.........18111:3.C.....................1520...activity_hekate_change5.........18111:3.}.....................1519;1535;1536..Gactivity_hekate_change6;activity_hekate_change7;activity_hekate_change8.........18111:6.C.....................1731...activity_hekate_change1.........18111:3.C.....................1731...activity_hekate_change2.........18111:3.C.....................1525...activity_hekate
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):800
                      Entropy (8bit):4.478042668928258
                      Encrypted:false
                      SSDEEP:
                      MD5:47A3C0C095BEB50C5ADB061C5909E2EF
                      SHA1:80395E9EF4EEE573D9BBC16399EF99483F12678E
                      SHA-256:21D93EF6D4E44B6C33B1BF25C74D0C2E5755413796437B78B96B06C8C9BFAAC8
                      SHA-512:FB20DA155EDEF1678AAA9B2147516502C98D128576CDA046BD9A8008312EF119114363E59116B017D42921B48003D8940C78D9F01A28DA04313B5157588BF58B
                      Malicious:false
                      Preview:.&..........A.....A.....A................&..........A.....A.....A................&..........A.....A.....A................&..........A.....A....@A................&..........A....@A....@A................&..........A....@A....@A................&..........A....@A.....A................&..........A....@A.....A................&..........A.....A.....A................&.........@A.....A.....A................&.........@A.....A.....A................&.........@A.....A.....A................&.........@A.....A.....A................&.........@A.....A.....A................&..........A.....A.....A................&..........A.....A.....A................&..........A.....A.....A................&..........A.....A.....A................&..........A.....A.....B................&..........A.....A.....B...............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):971
                      Entropy (8bit):5.121901756939702
                      Encrypted:false
                      SSDEEP:
                      MD5:FBE2665BCEA4223B0C1044CB7133ED4F
                      SHA1:97B704772F5F5D8CAE2CF0E9E9244634E633B9CA
                      SHA-256:93752F8A497D9F7C60AAF475A25761C53B7A7FFD2F0A819C636270E948213E13
                      SHA-512:6BCFEAA3E57FC56EA96C5E5248C5DE8B18C80958E8E6B73D45C628D5AD5401404DB13A8E88420BB168F3528F63AB5DE9D21AD7B33033BEFE0CD17EC667B98735
                      Malicious:false
                      Preview:.............activity_hekate_out8...............activity_hekate_out1..Mactivity_hekate_dialogue1;activity_hekate_dialogue2;activity_hekate_dialogue3.............activity_hekate_out3.....5activity_hekate_out5;Sprite/UI/Icon/TechIcon/Tech_385.....;activity_hekate_out6;Sprite/UI/Icon/TechIcon/Tech_Debuff_23.....;activity_hekate_out7;Sprite/UI/Icon/TechIcon/Tech_Senior_15......activity_hekate_out4.............activity_hekate_out8.....9activity_hekate_out10;Sprite/UI/Icon/TechIcon/GuildTech_9.....:activity_hekate_out11;Sprite/UI/Icon/TechIcon/GuildTech_10.....:activity_hekate_out12;Sprite/UI/Icon/TechIcon/GuildTech_11.....:activity_hekate_out13;Sprite/UI/Icon/TechIcon/GuildTech_12...activity_hekate_out9.............activity_hekate_out14.....=activity_hekate_out16;Sprite/UI/Icon/TechIcon/Tech_Recovery_7.....>activity_hekate_out17;Sprite/UI/Icon/TechIcon/Tech_Recovery_14.....>activity_hekate_out18;Sprite/UI/Icon/TechIcon/Tech_Recovery_24......activity_hekate_out15
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):29
                      Entropy (8bit):4.0472990984266435
                      Encrypted:false
                      SSDEEP:
                      MD5:B7F1845E9EFBCEABE5914F34FE412168
                      SHA1:F4641D8CADD90EC838D21EA46C1C99C11B1754D3
                      SHA-256:17E62CDA71F492FB29DF44808AD58DB85F6787E4487F49FDC4E4C972ECDFD181
                      SHA-512:DB6B5B417FA7639CEBFEC6EB77B41612FE36A8FF3C05CD36BE2EBB88922A28FBA714CEBB0ADD437AA05DD2088EF7C7FDF8E8845DD6EF0F8AE94D99AB04B325A2
                      Malicious:false
                      Preview:..........2;3;4...1625:2;38:2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):541
                      Entropy (8bit):4.4135985346938895
                      Encrypted:false
                      SSDEEP:
                      MD5:2527A87260CC0E8E9E6F97FD249424C2
                      SHA1:4C8765EE74780CE2AC61B84F01432C129B06743F
                      SHA-256:45507836AAA08D0AB7249A0EA7DD917E896AD7956411495EED48133592B09436
                      SHA-512:9918F926E063B4D54C5278461A28695B744C3293F16A46E4A1E81EE6F7956AA2D5F99ECE91CB095596883B4F02E40D5F23F86BF738BE1F7BD00D7DF84DF6C55E
                      Malicious:false
                      Preview:.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_1.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_2.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_3.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_4.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_5.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_6.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_7.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_8.4.............&Prefabs/Puzzle/PuzzleHell/PuzzleHell_9.5.............'Prefabs/Puzzle/PuzzleHell/PuzzleHell_10
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):242980
                      Entropy (8bit):4.191874649268926
                      Encrypted:false
                      SSDEEP:
                      MD5:2654A759414026261EC68751B34676A9
                      SHA1:9EAB633E288BE6B183B03D320FC3E1DBE6EBE065
                      SHA-256:D438300D3061F31F421ED8A87E0C89F5FF48D8613D97529E342F50F188A02D28
                      SHA-512:E00E21641EB3AB864AA485B6E97E49A0C344959CB19435A148CDB7DE560A91EFDFA0C842752853CF516A5E8253500C54F577C661C8B649A30E94AB62F805B522
                      Malicious:false
                      Preview:.....N...N...3:95....=.. RunEscapeNew/Prefabs/RESceneRoot.........1000:4017;0;0;0;2|4018;0;0;0;4...1000:3003;20;5;0;0...1000:4042;0;0;0;0|4038;0;0;0;1...1000:3003;20;5;0;4...2000:4003;0;0;0;0|5000;0;5;0;1...1000:3002;1;1;0;3...2000:3006;1;1;0;2...2000:3003;20;5;0;2...1000:4037;0;0;0;0|4042;0;0;0;1...1000:3006;1;1;0;4...2000:3003;35;5;0;3........N...N...2:1....=.. RunEscapeNew/Prefabs/RESceneRoot.........1000:4035;0;0;0;2|4036;0;0;0;4...1000:4009;0;0;0;1..-1000:6006;0;5;0;0|3003;10;5;0;2|3003;10;5;0;4...1000:4006;0;0;0;0|4030;0;0;0;1...1000:3002;1;1;0;3...1000:3003;10;5;0;4...2000:3004;1;1;0;2...2000:4034;0;0;0;0|4037;0;0;0;1...2000:3001;1;1;0;0........N...N...3:75....=.. RunEscapeNew/Prefabs/RESceneRoot.........1000:4034;0;0;0;2...1000:6005;0;10;0;0|4035;0;0;0;1...1000:3003;15;10;0;0...1000:4036;0;0;0;0|6005;0;10;0;1...1000:3003;10;10;0;2..!1000:3003;5;10;0;0|3003;15;10;0;0...1000:3006;1;5;0;0...3000:3003;25;10;0;4...1000:3006;1;5;0;0...3000:4034;0;0;0;0|4039;0;0;0;1...1000:3006;3;8;0;
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4723
                      Entropy (8bit):5.47017887461574
                      Encrypted:false
                      SSDEEP:
                      MD5:93927528F7ABECF277FDE489BA84C87E
                      SHA1:C59732FEE7A2D55C2206F78F658E7BDA18D90CB0
                      SHA-256:FEDD5FE4C2FCB0278114EEAD1E7E1EC1EF8664DF69B05F8F53004B3786CB2E51
                      SHA-512:13EBFC3D5F97FC0F9D6F6B51BD2E3A954402644525F714887F69789413FE9AC57BE6D952C2F4CAA9E60FDB340FBED4DE5BD11D45715E3066F97E27F75E1C32F2
                      Malicious:false
                      Preview:.............<...history_plot_title1...history_plot_text1...regression_activity_task65..Q.........24:1;2330:2;951:1;1634:1;26:1..)Sprite/UI/UIInterface/Milepost/Milepost_8..0Sprite/UI/UIInterface/Milepost/Milepost_small_08.............<...history_plot_title2...history_plot_text2...history_task1_1..g.........24:1;1003:20;2489:1;4140:2;26:2..)Sprite/UI/UIInterface/Milepost/Milepost_9..0Sprite/UI/UIInterface/Milepost/Milepost_small_01.............<...history_plot_title3...history_plot_text3...history_task3..i........#1003:20;1628:2;951:1;4141:2;4676:10..)Sprite/UI/UIInterface/Milepost/Milepost_4..0Sprite/UI/UIInterface/Milepost/Milepost_small_05.............<...history_plot_title4...history_plot_text4...regression_activity_task65..Q.........24:2;2330:3;951:2;1634:1;26:3..)Sprite/UI/UIInterface/Milepost/Milepost_8..0Sprite/UI/UIInterface/Milepost/Milepost_small_08.............<...history_plot_title5...history_plot_text5...history_task5..k.........24:3;4:3;9:3;14:3;19:3..)Sprite/UI/UIInterf
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5235
                      Entropy (8bit):5.492984433145216
                      Encrypted:false
                      SSDEEP:
                      MD5:BE25E7DAFC94ED2978458040A12CE043
                      SHA1:7D118C67FC2D58433081EB7E24378B83D8D0F25E
                      SHA-256:CEAA8002208B1722FEEE56BD0A57F7CB5995917F9365464A5E675FF26CB48209
                      SHA-512:9AD0CF65FC2AEB62FA82F9F348BF1621E18AB9CF83AC845DCBE30040125439A1B57FFFBC07341EF66FA70445D80168917A17BE0490D8C556C7CE9BA730DEC358
                      Malicious:false
                      Preview:.............<...history_plot_title1...history_plot_text1...regression_activity_task65..Q........!965:5;2330:50;951:50;1634:20;28:5..$Sprite/UI/Banner/Milepost/Milepost_8..+Sprite/UI/Banner/Milepost/Milepost_small_08.............<...history_plot_title2...history_plot_text2...history_task1_1..g........"965:10;1003:100;2491:5;4140:5;28:5..$Sprite/UI/Banner/Milepost/Milepost_9..+Sprite/UI/Banner/Milepost/Milepost_small_01.............<...history_plot_title3...history_plot_text3...history_task3..i........$965:15;4582:2;951:100;4141:5;4676:10..$Sprite/UI/Banner/Milepost/Milepost_4..+Sprite/UI/Banner/Milepost/Milepost_small_05.............<...history_plot_title4...history_plot_text4...regression_activity_task65..Q........!966:4;2330:50;951:50;1634:20;28:5..$Sprite/UI/Banner/Milepost/Milepost_8..+Sprite/UI/Banner/Milepost/Milepost_small_08.............<...history_plot_title22...history_plot_text22...rally_boss_task.........2..$966:6;4582:2;1003:200;951:150;2491:5..$Sprite/UI/Banner/Milepost/M
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1476
                      Entropy (8bit):5.426176657212731
                      Encrypted:false
                      SSDEEP:
                      MD5:96D9FDCB52AEFF0E1EA8B7D7AE559A79
                      SHA1:BA6F6BD58845BE80FDD525E8AC4F9BD4A14C25B4
                      SHA-256:834BFCCD625AA957D5D52787638E8A2422AEF8B3F3F704B4FF494D1A431A25BB
                      SHA-512:6336E426F692931FBC8DF812523666D1E4FC85631AEDABA8561F932B00B124A934B6EDBC739C1B39FC5A13EACF33594406D62521B1054B9B15C9CE2097AF3D6E
                      Malicious:false
                      Preview:..................$...territory_battle_plot_title3...territory_battle_plot_task3.................2970:1;34:20;40:20;3036:50..$Sprite/UI/Banner/Milepost/Milepost_3..+Sprite/UI/Banner/Milepost/Milepost_small_03........................$...territory_battle_plot_title1...territory_battle_plot_task1..............2971:1;34:20;40:20;3036:50..$Sprite/UI/Banner/Milepost/Milepost_5..+Sprite/UI/Banner/Milepost/Milepost_small_05........................$...territory_battle_plot_title4...territory_battle_plot_task4................2972:1;34:20;40:20;3036:50..$Sprite/UI/Banner/Milepost/Milepost_9..+Sprite/UI/Banner/Milepost/Milepost_small_09........................$...territory_battle_plot_title2...territory_battle_plot_task2.............1658:5;34:20;40:20;3036:50..$Sprite/UI/Banner/Milepost/Milepost_1..+Sprite/UI/Banner/Milepost/Milepost_small_01........................$...territory_battle_plot_title4...territory_battle_plot_task2.............2970:1;34:20;40:20;3036:50..$Sprite/UI/Banner/Milepost/Mile
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):21
                      Entropy (8bit):3.64900120971034
                      Encrypted:false
                      SSDEEP:
                      MD5:449D7CD9F159B8153BF138B594ADDE2A
                      SHA1:96370B49226A8BE67710556D4FBB39DBD07EC8D0
                      SHA-256:2E4B3CF52D8E46CB250E42AD8ED2BD351A023C406C77752E70B9F34C3B8E2BB5
                      SHA-512:5FDC8FD9644D47C56531AD3E3D5F187BBB856A72CF7BE14142F5A6AF706F6D6B0D9019C602BD42CDC8FFAD7EA84E5FBF5F2321377A26DCC4A664041499F18301
                      Malicious:false
                      Preview:......... ..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):260
                      Entropy (8bit):4.1857962302306735
                      Encrypted:false
                      SSDEEP:
                      MD5:3F6CE306BB30C553001312B1EAADEC79
                      SHA1:C855CCEA20060C9B160E876F04D869A537532620
                      SHA-256:5AE89C62E5E7361239B5F81BA194B233C9F1FAAF8337A7388220ADAD647C56F3
                      SHA-512:B4E5B1940D7995D0F990FD7C5EC5C8692432CC5A25FD34C41A329AB4D14A5F8F0B20506D8CD95279C8742EE7788162BB2B443B6F9DBF15DDC26EA6D4AC92245D
                      Malicious:false
                      Preview:..........4.....&..-..........4.....-..8..........4.....1..,..........4.....5../..........4.....5..1..........4.....2../..........4.....9..2..........4.....2..4..........4.....5..4..........4.....4..7..........4.....2..7..........4.....7..7..........4.....4..9
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):94675
                      Entropy (8bit):6.0157225380263775
                      Encrypted:false
                      SSDEEP:
                      MD5:8415627221F8F1B0CCE1A1C14B0288D1
                      SHA1:788F2DF1D3FEE4223B7B7C3233BFAB894823231E
                      SHA-256:A03F25A5CD6B0FD5A84D914C165AD414E4E7D90E0D0A48D7AD891DBAD55A933D
                      SHA-512:2ABDF775A1F9E0CEBC505383D55C30F1CC11EEA2CBA0E770625688BD3854F147D8D5F1CF73A7F861CE8F0DD394DE398176126EEA3B73D8E52C1794825A42357F
                      Malicious:false
                      Preview:.........................homeland_buliding_name_4...homeland_buliding_desc_4.....................................................!Sprite/Home/Grounds/HomeBuiding_3..!Sprite/Home/Grounds/HomeBuiding_3...homeland_acquire_tips_text_1.........................homeland_buliding_name_3...homeland_buliding_desc_3.....................................................!Sprite/Home/Grounds/HomeBuiding_4..!Sprite/Home/Grounds/HomeBuiding_4...homeland_acquire_tips_text_1.........................homeland_buliding_name_5...homeland_buliding_desc_5......................................................Sprite/Home/Wall/HomeBuiding_5..!Sprite/Home/Wall/HomeBuiding_5_10...homeland_acquire_tips_text_1.........................homeland_buliding_name_6...homeland_buliding_desc_6......................................................Sprite/Home/Wall/HomeBuiding_6.. Sprite/Home/Wall/HomeBuiding_6_1...homeland_acquire_tips_text_1.........................homeland_buliding_name_7...homeland_buliding_desc_7...........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):543
                      Entropy (8bit):5.079751745847552
                      Encrypted:false
                      SSDEEP:
                      MD5:7D034C3786E58D1D3C4400FB3DBC2E0A
                      SHA1:04D8D7E9AAC51C5969D579EFFB0517107A2CD097
                      SHA-256:17C613C0151895D76035A2CB95F8DA4711ED1E8EDB640FA777AC249A948B4692
                      SHA-512:2522FD2AA8FA8E4B17F99C222F2ED4AC30EBB8D08F2287E0AA6325B26E55FE01EF957326D24E24CA94A7BB2729A1109545BFA7B9AA2DDC1E672EAAB530B2A1E2
                      Malicious:false
                      Preview:.M..........%Sprite/UI/UIInterface/Wonder/Honour_1......honor_name1.............D..........%Sprite/UI/UIInterface/Wonder/Honour_3......honor_name2....D..........%Sprite/UI/UIInterface/Wonder/Honour_4......honor_name3....V..........%Sprite/UI/UIInterface/Wonder/Honour_5...............honor_name5.............M..........%Sprite/UI/UIInterface/Wonder/Honour_2...............honor_name6....D..........%Sprite/UI/UIInterface/Wonder/Honour_6......honor_name4....U.'..'..'...Sprite/UI/Icon/Others/Godzilla...............honour_Godzilla_1............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):537
                      Entropy (8bit):4.802997737609697
                      Encrypted:false
                      SSDEEP:
                      MD5:D7E1FF555D5EAEBDA9F9E8F3AD729A8B
                      SHA1:4BC55D249B2592598EB8AF65A8B04DA9211726A7
                      SHA-256:0C137FBBE979B24D52CE654F8D821F4B15890A1AA7DF51F7B82B875BC5824BD4
                      SHA-512:0E690A11561CD2D4E94C7B8E08D8CDF0569ACF1DC95DCA9875CF160C010A527AFEA7DA6DE9B522329C73ACD9AEB2FEB9E767563EDCB8520D15146B5FC807D4E3
                      Malicious:false
                      Preview:..........N..........]..........m............................................................................................................................................................................................................................................................................................................................................. .. .......!..!........"..".......#..#........$..$........%..%........&..&........'..'...."...(..(...&...)..)....)...*..*....-...+..+....2...,..,....6...-..-....;
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):798
                      Entropy (8bit):5.0179141882489375
                      Encrypted:false
                      SSDEEP:
                      MD5:23C329231DBA0BFA5C2D2ACA35812624
                      SHA1:B7B4389870F2A25A4BCEA4C663E7D93A520CCE01
                      SHA-256:2E21D1EAFC29DEE966869867FCA028F54F935E003D91423D0EA132807646D405
                      SHA-512:FC74A1CFB52C6CDAA0298C195DAD1249584BDBD31C5CC09347F5AA2446A6BE94EFBF08A0DD76901BB2F64B0393A3FDFA96B18580257F229E4ECA46BBB15B8382
                      Malicious:false
                      Preview:.:........show_off_task1......1:1...23:1;2775:1;951:3;1658:1.:........show_off_task1......2:1...24:1;2775:1;951:5;1658:1.<........show_off_task1......3:1...965:1;2775:1;951:10;1658:1.;........show_off_task1......5:1...24:3;2776:1;951:15;1658:2.=........show_off_task1......10:1...966:1;2776:1;951:20;1658:3.9........show_off_task2......1:10...24:1;1012:1;951:3;38:3.9........show_off_task2......1:15...24:3;1012:2;951:5;38:5.<........show_off_task2......1:18...966:1;1012:3;951:10;38:10.;........show_off_task2......1:20...24:7;1012:4;951:15;38:15.C........show_off_task2......2:20.. 4434:1;967:1;1012:5;951:20;38:20.+........show_off_task3......-1...23:1;963:1.+........show_off_task3......-1...23:1;963:1.,........show_off_tips11......-1...23:1;963:1.,........show_off_tips11......-1...23:1;963:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):830
                      Entropy (8bit):5.01817695886321
                      Encrypted:false
                      SSDEEP:
                      MD5:15E3054589CB3B4ABA9374EF43B9820D
                      SHA1:AC0ECA3CE25BF000D7C8D090B5F7A9009A9AC710
                      SHA-256:7BFDD26373C9B5C494EBAB78E3495958F408B2A7B48EFC62B6076D73D648EC54
                      SHA-512:1CE1BB9FD296A4F6A427C619EABB2BC9956D6B1EABE62AA04F7F2045A533B2F46E7931FFF93CEC9A1158B78366B310458A6CD4320E419743D1CD63066DCF30C8
                      Malicious:false
                      Preview:.B........show_off_task1......1:1.. 23:1;2775:1;951:3;1658:1;19593:1.B........show_off_task1......2:1.. 24:1;2775:1;951:5;1658:1;19616:1.D........show_off_task1......3:1.."965:1;2775:1;951:10;1658:1;19618:1.C........show_off_task1......5:1..!24:3;2776:1;951:15;1658:2;19617:1.=........show_off_task1......10:1...966:1;2776:1;951:20;1658:3.9........show_off_task2......1:10...24:1;1012:1;951:3;38:3.9........show_off_task2......1:15...24:3;1012:2;951:5;38:5.<........show_off_task2......1:18...966:1;1012:3;951:10;38:10.;........show_off_task2......1:20...24:7;1012:4;951:15;38:15.C........show_off_task2......2:20.. 4434:1;967:1;1012:5;951:20;38:20.+........show_off_task3......-1...23:1;963:1.+........show_off_task3......-1...23:1;963:1.,........show_off_tips11......-1...23:1;963:1.,........show_off_tips11......-1...23:1;963:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):41982
                      Entropy (8bit):5.755504853132796
                      Encrypted:false
                      SSDEEP:
                      MD5:85931A2E283C11C2FEE88D3C824567C2
                      SHA1:B03568CF8BE7130E642A3272A195674CA27ECD42
                      SHA-256:783900EE15131CBACCBFC98851D88A8C9FE14BE43F4C9B9C45B96F4B00B05C01
                      SHA-512:3C1A1A8819E780B0AA59CE150769CD8A5C0D54769A2F9E06D7BB5DC5CEFE09F337A9B95AF4870975B4AED691448F90BAE34D9A1DD037EA88447109B9F7356767
                      Malicious:false
                      Preview:.}..0.....0...item_name_key3554.....)Sprite/UI/Icon/GiftIcon/Gift_ArmyTraining...kingdom_war_title...general_starup22......0....y..0.....0...item_name_key3554....."Sprite/UI/Icon/UIMenuIcon/menu_111...special_daily_active...general_starup23......0....s..0.....0...item_name_key3554....."Sprite/UI/Icon/Others/Icon_remains...active_title25...general_starup24......2....|..0.....0...item_name_key3554....."Sprite/UI/Icon/UIMenuIcon/menu_121...activity_lordrank_text2...general_starup25......1....q..0.....0...item_name_key3554..... Sprite/UI/Icon/UIMenuIcon/menu_c...active_title11...general_starup26......3....s.<....<...item_name_key2936....."Sprite/UI/Icon/UIMenuIcon/menu_101...general_starup16...general_starup17......0....v.<....<...item_name_key2936....."Sprite/UI/Icon/UIMenuIcon/menu_120...general_chest_title...general_starup18......0....s.<....<...item_name_key2936....."Sprite/UI/Icon/Others/Icon_remains...general_starup19...general_starup20......0........L.....L...treasure_description26.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8312616
                      Entropy (8bit):4.568582060475798
                      Encrypted:false
                      SSDEEP:
                      MD5:849EBCFE40FE6D8C83D8DC0D43058509
                      SHA1:4E66F0A5A3DCDF8E6799FDF64D63292461BAE6C7
                      SHA-256:7706D5EF39BC64584FED039A6AB8BBF299FDB59C253B3C093D7FDB51D4D67D2A
                      SHA-512:4B3862E12D2FAEB4265047EE4DFF30AC5FABEDDD63C432FA86A805F1EE6B1C616371074FB38B8E59461A263063F328B57140D74BD56112A498433C0056847317
                      Malicious:false
                      Preview:...........5K......item_name_key1...item_description_key1....pA...............'...............................................................-1.............................................................................................................................Sprite/UI/ItemsIcon/1...item_gain_description1..........................................................-1...................................10K......item_name_key2...item_description_key2.....A...............N...............................................................-1.............................................................................................................................Sprite/UI/ItemsIcon/2...item_gain_description1..........................................................-1...................................50K......item_name_key3...item_description_key3.....B...............................................................................-1.....................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):182
                      Entropy (8bit):4.665763878809926
                      Encrypted:false
                      SSDEEP:
                      MD5:258CBD1E8523663211ADBB89724448E9
                      SHA1:7ADDE6B31AD44E181FDBB70F0ACA125F23775CD0
                      SHA-256:5025E3A7F06520B7B363E4D0AD04384DAA5F32714FE604CD70BC63FF63525CED
                      SHA-512:B67A562F47DB6DCBF609CFEDA991F805E55B9E7B6505B5EC04E91FC2C916183DF2B2249ED03908B0878B6FAB62620E0E440253F4CA2801FCAFBCB5A3110ABA05
                      Malicious:false
                      Preview:..............rank_packet1..............rank_packet2..............rank_packet3..............rank_packet4..............rank_packet5...3..3.......rank_packet6...e..e.......rank_packet7
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6446
                      Entropy (8bit):5.497549285674938
                      Encrypted:false
                      SSDEEP:
                      MD5:D57F4014B8703A8B7754C3524F969193
                      SHA1:3D06D5B5A579EBDAEFB3B76896B3C82067D53654
                      SHA-256:B8B8DB95379E93C7BEC7990A7B362104A48C9D6C56AB021478A6DF1AA3793C71
                      SHA-512:596436FD2660C3592D1009A8CC8325EA69A6A8A4B242D37CD30C4EC84FC309B6DD849F1CE6E30FDB8BE40BF15FA27B37A7D48269B0F7B6207BD62F61AED1D4DF
                      Malicious:false
                      Preview:...........title_kingdom.....#10|13|16|19|11|14|17|20|12|15|18|21.........70.........244.........-1..........................&Sprite/UI/Icon/PositionIcon/Position_0...#87D71E...#87D71E...#87D71E...-1......Prefabs/Position/Position_0.....2.#10|13|16|19|11|14|17|20|12|15|18|21.....".effect.....70.....".effect2.....244.....".effect3...........title_prince......11|14|17|20|12|15|18|21.........102|105|108|111.........40.........-1..........................&Sprite/UI/Icon/PositionIcon/Position_1...#87D71E...#87D71E...#87D71E...-1......Prefabs/Position/Position_1.....&..11|14|17|20|12|15|18|21.....".effect.....102|105|108|111.....".effect2.....40.....".effect3...........title_chancellor......1|2|3|4.........47.........-1...........................-1..........................&Sprite/UI/Icon/PositionIcon/Position_2...#87D71E...#87D71E...-1...-1......Prefabs/Position/Position_2........1|2|3|4.....".effect.....47.............".effect2...........title_bodyguard......10|13|16|19|11|14|17|20........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):36
                      Entropy (8bit):3.314536459234778
                      Encrypted:false
                      SSDEEP:
                      MD5:DBA93AF0A52CC3C8B6B52328E7735DC9
                      SHA1:BB039FC1AA61CF43BE88D99BB797DF967830683F
                      SHA-256:64076C7887F9A771A55D8ACFBEAFEC3708CA62C7AD9D69CE1337542A1DD4B2F2
                      SHA-512:EEBDFE63C3B9EC2E47858FFE2BB674EF43882663BF74D71B6FF154332CA68D50C9D85C71CF9CBC3CE19512F530749A7E672419BDC16D71587B193799E46A982C
                      Malicious:false
                      Preview:....................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1033
                      Entropy (8bit):5.361120391953377
                      Encrypted:false
                      SSDEEP:
                      MD5:035F9BFA7D2F1271A4DBF9EB4FA1A331
                      SHA1:C7B99727E0D8795663571BB851AB744B7E00EFA3
                      SHA-256:D0D39DE1D23FBF8982EAA35CB7D425C5E071A713004BA98699497C7309C6EF3F
                      SHA-512:1F8C582682862B56146BD1A89C26EFACF27B14965222CF955A0CF8C696044E83347AEABFA843BC6E81ECC00AAFE0460DAA47D05A301E27AC437089D9E21F830E
                      Malicious:false
                      Preview:....................................[.............................................................................................................................................................&...................2.................@...................O..................._...................q............................................................................................................................................................................................................................................................................................................................................ .. ...... .........!..!......!..........".."......".........#..#......#.........$..$......$..........%..%......%.........&..&......&.........'..'......'..........(..(......(..........)..)......)..........*..*......*.........+..+......+.........,..,......,.........-..-......-............................../../....../.........0..0......0..........1..1..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):28398
                      Entropy (8bit):5.311332961477246
                      Encrypted:false
                      SSDEEP:
                      MD5:E14FB1FAFD8573A5B7E5A999057CB7B0
                      SHA1:819A45FFDEBB4308DC51B4CC23E9A59C31E32E4F
                      SHA-256:6183C741CF692C40DB81BB14605A1E0C04B3F29B817D7AE1A00C71F66D08E451
                      SHA-512:5A0C33390F64C2E8EAFA59A3A0DB703F822109294F92B34B77850BE6AA49AD253FB3480B9D8F89D18B60B9E941BD72870DEB22918CC8273C6E716CCC438422C2
                      Malicious:false
                      Preview:.9......... ...................11335:5;4:10;1617:40;1007:70.7......... ...................11335:5;9:10;1649:40;28:70.9......... ...................11335:5;4:12;1617:45;1007:80.;......... ...................11335:10;14:10;1620:40;1628:25.;......... ...................11335:10;19:10;1647:40;2330:25.7......... ...................11335:5;9:12;1649:45;28:80.6......... ...................11335:5;5:3;36:25;3036:90.B........ .................%11335:10;1658:5;963:40;1012:8;3161:80.:......... ...................11335:15;4:12;1617:50;1007:80.;......... ...................11335:10;14:12;1620:45;1628:30.8......... ...................11335:15;9:12;1649:50;28:80.;......... ...................11335:20;14:12;1620:50;1628:30.;......... ...................11335:10;19:12;1647:45;2330:30.7......... ...................11335:5;10:3;40:25;2330:35.;......... ...................11335:20;19:12;1647:50;2330:30.F........ .................)11335:20;2561:2000;963:50;1012:10;3161:80.C........ .................&
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1054
                      Entropy (8bit):5.515625228848998
                      Encrypted:false
                      SSDEEP:
                      MD5:CF8BE717378D1DC02FC4694E5AA85F84
                      SHA1:48A5EC3BE8745AB9E044AD55A1E7893E446ED080
                      SHA-256:86C777762C83BB5B5E1A697C07850DF244DDE06DA9F0CDF772EEEE4601D4916D
                      SHA-512:9ED86E4637037C278CC17FFC01CA8D482467212F60D69D272623A492309EE2E41B92967E4E2421153036805760B917AFB7A8ECB0D990ACD4E7F6079944BDDF0A
                      Malicious:false
                      Preview:.R.......&Sprite/UI/Icon/TechIcon/Tech_Senior_31........544...........buffer_name340.R.......&Sprite/UI/Icon/TechIcon/Tech_Senior_26........545...........buffer_name338.R.......&Sprite/UI/Icon/TechIcon/Tech_Senior_29........546...........buffer_name339.V.......%Sprite/UI/Icon/TechIcon/Tech_Senior_7........550..N........technology_name_238.V.......%Sprite/UI/Icon/TechIcon/Tech_Senior_4........553..N........technology_name_239.W.......&Sprite/UI/Icon/TechIcon/Tech_Senior_11........556..N........technology_name_240.X.......&Sprite/UI/Icon/TechIcon/Tech_Debuff_19........547...........buffer_name357...1:4.X.......&Sprite/UI/Icon/TechIcon/Tech_Debuff_21........548...........buffer_name355...2:5.X.......&Sprite/UI/Icon/TechIcon/Tech_Debuff_20........549...........buffer_name356...3:6.W.......%Sprite/UI/Icon/TechIcon/Tech_Debuff_3........559..N........buffer_name272...1:4.W.......%Sprite/UI/Icon/TechIcon/Tech_Debuff_1........562..N........buffer_name275...2:5.W.......%Sprite/UI/Icon/TechIcon/T
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):19252
                      Entropy (8bit):5.728309842070236
                      Encrypted:false
                      SSDEEP:
                      MD5:BBCC0FAFB447202FF66E77EAA5D005E8
                      SHA1:063E34CCA78C1C7179BB481D603E05F8F222E8A2
                      SHA-256:AD475478808BFD96466FB2F42A26D1DD9B25A07D3AAD9DEA05D220E4F16B5066
                      SHA-512:8069E81A42B40C33543BCA4E677F3A33170A8FC031C9846CFDD4E2C1E4819105E290DB5FB1F0209AB6D265AFF666F28E7BDECFEDE67D84C8A35778C1F728C2F8
                      Malicious:false
                      Preview:................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02..,CommonTrack/Prefabs/UICommonTrackNewMapCell1............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........4436:1;1012:2;1655:4...CommonTrack/UI/Track_Map03.."CommonTrack/UI/icon_LevelGeneral01...CommonTrack/UI/icon_Level02............................N.........19908:30;4581:2;2561:200...Common
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1396
                      Entropy (8bit):5.296505257889829
                      Encrypted:false
                      SSDEEP:
                      MD5:0957101EE7B7EF8CDB32C1877CB958FE
                      SHA1:82C1DF924453377ABC3975A64048908123887A7E
                      SHA-256:D65D57E51FCD52D3BE5C91DB1C2247993FE68857545BF85950CDD22D90221260
                      SHA-512:94DA7CE6E821377E74DF132DC58852BB8EEC3563FA4891D2AA4A6432269D617055171064A0359790AF7953E5B646ADADBF3B16D86E89A20E2499D8B868CAB909
                      Malicious:false
                      Preview:.S............e.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............f.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............g.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............h.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............i.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............j.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.W............k.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Levelboss01.]............l.........2:1...CommonTrack/UI/Track_Map0..%CommonTrack/UI/icon_Leveladditional01.T.......................2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.T.......................2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.T.......................2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.T.......................2:1...CommonTrack/UI/Tr
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1396
                      Entropy (8bit):5.296505257889829
                      Encrypted:false
                      SSDEEP:
                      MD5:0957101EE7B7EF8CDB32C1877CB958FE
                      SHA1:82C1DF924453377ABC3975A64048908123887A7E
                      SHA-256:D65D57E51FCD52D3BE5C91DB1C2247993FE68857545BF85950CDD22D90221260
                      SHA-512:94DA7CE6E821377E74DF132DC58852BB8EEC3563FA4891D2AA4A6432269D617055171064A0359790AF7953E5B646ADADBF3B16D86E89A20E2499D8B868CAB909
                      Malicious:false
                      Preview:.S............e.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............f.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............g.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............h.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............i.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.S............j.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.W............k.........2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Levelboss01.]............l.........2:1...CommonTrack/UI/Track_Map0..%CommonTrack/UI/icon_Leveladditional01.T.......................2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.T.......................2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.T.......................2:1...CommonTrack/UI/Track_Map0...CommonTrack/UI/icon_Level01.T.......................2:1...CommonTrack/UI/Tr
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):33031
                      Entropy (8bit):5.812364275408981
                      Encrypted:false
                      SSDEEP:
                      MD5:96373051C33DE9D57BE0972ADA7119A5
                      SHA1:734AD4D3E62F2D3740CCB681527FC931DAD2D05C
                      SHA-256:210427426392BA1E19A2DFA0083F66F3A49BEBC600DA57D66C62F24C0D9BF405
                      SHA-512:96CB6BC43C8BD95B75488F0FA3E352D53F0ABB7C244EDF8AC9BAB4CB179503C512560DBA26A51DA6FF414C97519C1EDA31ED8543CF446307C9DD2CD1905A0199
                      Malicious:false
                      Preview:................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02..,CommonTrack/Prefabs/UICommonTrackNewMapCell1............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.......................................1003:50;1012:2;1655:4...CommonTrack/UI
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):33031
                      Entropy (8bit):5.811985554412642
                      Encrypted:false
                      SSDEEP:
                      MD5:AFA1812D6F1107EB06B2C72120518820
                      SHA1:74F846DC6BF4574B7B239C37107B3139875FAEC5
                      SHA-256:964D4261A09FAF9BA63BA54C07BC3C3075EE1ABEE32B662398D595E207729058
                      SHA-512:AA09001919F75AE7257F21628F7D71BB628D10FD125C7901E1BBF24F0AA8ABC5646D200D9720707557BB66CD52F15B0F6E7DB505707BBFA53C8D62BDB6C2200F
                      Malicious:false
                      Preview:................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02..,CommonTrack/Prefabs/UICommonTrackNewMapCell1............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.......................................1003:50;1012:2;1655:4...CommonTrack/UI
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):39203
                      Entropy (8bit):5.825124629012162
                      Encrypted:false
                      SSDEEP:
                      MD5:38250254A56C9FCDA89330F931654C41
                      SHA1:835F7B5734A72E7681D8D9D03E55E42BBF0D571B
                      SHA-256:5F9A68F9287FCA0AB9F0A6658E93345C98B299E094E2515B56DB22BCCD96842F
                      SHA-512:9B63B2E5400B0774C958FBB1FA7B13D31FC93F1CFE0B258432D2B835A85C7B87ED684AA946035749A762A96CCABA35D8EB44F49BFE6F0FF6205CF377F7817300
                      Malicious:false
                      Preview:................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02..,CommonTrack/Prefabs/UICommonTrackNewMapCell1......................................20498:1;1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.............s.............N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.............n.......................20498:1;1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):39167
                      Entropy (8bit):5.830555608371247
                      Encrypted:false
                      SSDEEP:
                      MD5:30AB00CFB01D360E8E71A0DEC05F7D3A
                      SHA1:CEF510D836CD7AB5B28235BDD451FC0760B6D592
                      SHA-256:0E782C1C43858292408E01F976238EEE9CAB2BB4C3134B7FA074431047D5C9AF
                      SHA-512:AD383C4DC1F74262E45225F5638D5E8924C4CF46CA3C1D9B9D67C824F3484D7DB9022ACA73AA9D7F9B61A97571B0C2A10900AAC1AC9E43838A59E515EB118EF1
                      Malicious:false
                      Preview:................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02..,CommonTrack/Prefabs/UICommonTrackNewMapCell1......................................20574:1;1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.............s.............N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02.............f........................1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.............n.......................20574:1;1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):39167
                      Entropy (8bit):5.828860600005465
                      Encrypted:false
                      SSDEEP:
                      MD5:5DAA0DAA40FAC158516C00C63A1A0A63
                      SHA1:69EA72C9FFBAD92E080688D37290D97E812F3932
                      SHA-256:FF04F6325B75D2B05F1608450AC7D66369DF640A3782D0C54D93D0E181820FA4
                      SHA-512:6C9150720D202C5F1FEAEA8DBAFB7D2844322AFE472B47908543455D208AE9819AE16DC44F2B1DBD333A3E17177B88A5824DBC2C0D9DD0E991E3F353C48E6870
                      Malicious:false
                      Preview:................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02..,CommonTrack/Prefabs/UICommonTrackNewMapCell1......................................20574:1;1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.............s.............N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02.............f........................1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.............n.......................20574:1;1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):39581
                      Entropy (8bit):5.830941987312321
                      Encrypted:false
                      SSDEEP:
                      MD5:8BD8BB9CD9B7650BCB88D6CFD62B26C3
                      SHA1:8854EE5CE8E76E3E3C4D7CEB239B43C8EF3028CD
                      SHA-256:A9B1E3392E87121E6BF436DE04F4C8B92E41B678385BC3C986A8ABEED0FA003A
                      SHA-512:2BC01AA3A2C74F0B277C043B64381AF1414231A4B83BD684B4F6251E17C42CADBC9C29D0789FB2CF658F234DAE895043AF19737DF10AC11305119FC8CB14183C
                      Malicious:false
                      Preview:................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02..,CommonTrack/Prefabs/UICommonTrackNewMapCell1......................................20574:1;1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.............s.............N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02.............f........................1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02.............n.......................20574:1;1003:50...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level02............................N.........1003:50;1012:2;1655:4...CommonTrack/UI/Track_Map03...CommonTrack/UI/icon_Level01...CommonTrack/UI/icon_Level02............................N.........1003:50
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):114
                      Entropy (8bit):3.9767302641957945
                      Encrypted:false
                      SSDEEP:
                      MD5:2067694106E29E5F270FDD1E0C5C4271
                      SHA1:F2444534222DADF096D417DE272259854879BE70
                      SHA-256:4569189E05FCA64352E1A6F0482175A32F2B626328D7EBDC30D34D3CCD322F02
                      SHA-512:45344E6765243250471D2964F026B50B1CD44F95EE1ABF5C60D95E89C7327B7276005C4B8A5D261BDAEC5F58B9C397A189DEA92201C789A61F6D126A9AE18F42
                      Malicious:false
                      Preview:.............................(.........<...d..d..P...........P....................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):10948
                      Entropy (8bit):5.034380591760341
                      Encrypted:false
                      SSDEEP:
                      MD5:DBBA5E0456809AF2B6BC4EBBA6B5667D
                      SHA1:2BCED4B377ACB30483E439DF8D5947E48BBB87C2
                      SHA-256:C9DDF55A97E95E037C03E58843B721564C6BCCB6699D7BF0EDD063EBFB3149F8
                      SHA-512:D15DD1DC4FA46A272D3E8E26C450CD0275863D1C611E7C9152D7C2AFA95FDB07180DB0482DC9EF5F17D53F9B7BB01C5F1E5338BD413C23487A8EECD9AE2A40E4
                      Malicious:false
                      Preview:.+........12/11/2017...2695|2696|2697|2698.............12/26/2023...2727.............2/2/2017...2755....0........11/21/2017...3121|3122|3123|3124|3125....0........12/25/2017...3142|3143|3144|3145|3146..../........1/31/2018...3204|3205|3206|3207|3208..../........2/22/2018...3387|3388|3389|3390|3391..../........3/29/2018...3421|3422|3423|3424|3425..../........5/19/2018...3470|3471|3472|3473|3474..../........6/17/2018...3596|3597|3598|3599|3600..../........7/19/2018...3615|3616|3617|3618|3619..../........8/30/2018...3696|3697|3698|3699|3700..../........9/13/2018...3713|3714|3715|3716|3717.............9/13/2018...3689..../........9/28/2018...3741|3742|3743|3744|3745.... ........9/15/2018...3689|3711....:........10/12/2018.."3689|3711|3860|3861|3862|3863|3864....:........11/17/2018.."3121|3122|3123|3124|3125|3689|3711....D........12/12/2018..,2695|2696|2697|2698|3142|3143|3144|3145|3146....8........1/4/2019.."3689|3711|3204|3205|3206|3207|3208..../........1/28/2019...3387|3388|3389|3390|339
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1683
                      Entropy (8bit):4.675002156361172
                      Encrypted:false
                      SSDEEP:
                      MD5:9387F3D093802571FC9B1F1C9C06C161
                      SHA1:2D637CB16FF311DBC77BFA76FDA777BEDC649FEA
                      SHA-256:17C51B6D1A90FFFAB84A3DD8DD1BB29703995E8B7C971F67F5E8274C80588EAC
                      SHA-512:82508D524C43123C4EC9281E6B8F80933B48FE93703B5C38E1F714B93B99FE11CC9253B030263CC84AAD5EC1CA22FC042C66C0BCCB73E1AE7C18391A3DC45B2B
                      Malicious:false
                      Preview:.............18592:80...19235................18592:80...19235................18592:80...19235................18592:80...19235................18592:80...19235....9...........1;2;3;4;5...8858:80;3712:200;983:30;2754:50................18592:80...19235................18592:80...19235................18592:80...19235................18592:80...19235................18592:80...19235....<...........7;8;9;10;11.. 6244:80;3712:200;983:30;2858:100................18592:80...19235................18592:80...19235................18592:80...19235................18592:80...19235................18592:80...19235....>...........13;14;15;16;17...6988:40;3712:200;983:30;2754:50................18592:80...19235................18592:80...19235................18592:80...19235................18592:80...19235................18592:80...19235....?...........19;20;21;22;23.. 9120:50;3712:200;983:30;2858:100................18592:80...19235................18592:80...19235................18592:80...19235................1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):240
                      Entropy (8bit):4.109530286268033
                      Encrypted:false
                      SSDEEP:
                      MD5:1760CCA12B1F79D9AB374B537FCA86AC
                      SHA1:43A380A8812DF9D1B1841DC9086D8089EF74A1C4
                      SHA-256:AEEAF79198A8059F6D974601C464F189375C96649E6C07D70DD91E4866F7FEA6
                      SHA-512:680CE6303E7359EEDD3C95A033FE4C4927D4A2E64943F01B0873FB43FB5A3687A448C28E4BADCAE24071DE94436E1164E22B2224E81DA2A94C6AC31AC0732B0D
                      Malicious:false
                      Preview:..............................................."...............................................................................%......................2.........................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):252
                      Entropy (8bit):4.203989400210353
                      Encrypted:false
                      SSDEEP:
                      MD5:E1CC90EF98DBC982250B4CD5ADA4F9C6
                      SHA1:27328A22A87B25284DE6292D76D55217814CD1DF
                      SHA-256:A1BFF9542BFAC95C6692B3AF2D041BDA2FD3841231FD1B50EA62BCA7899A1A97
                      SHA-512:8B68063887B32ABA36E5143A812467B31D8733F5636F4440FAF00A51ED2742D1AA2701E01FAF1859880B9BD281943770E4B699E218C679ABF2546D12B8ED803E
                      Malicious:false
                      Preview:..........64|66|65..........58|50|51..........49|56|57..........54|53|55..........60|59|52..........63|62|61..........67|68|69..........70|71|72..........73|74|75..........76|77|78..........79|80|81..........82|83|84..........85|86|87..........88|89|90
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):111
                      Entropy (8bit):4.492437643404792
                      Encrypted:false
                      SSDEEP:
                      MD5:01C52428B7AAA8E968E469298D82DF49
                      SHA1:64EDE9F32F9FD82B3168191DE555B9E181CD632E
                      SHA-256:99CDAA201FA68E6D9BFA0E4A4677A4507CCB568A3F8F7748E99FFEA9D2F0C01F
                      SHA-512:B0BB5B18D54F545311D2DD6BA57832F62E81A3578D5CA1F3EA3B3D96D7FAFAD56ED53E103228124A99B164FFC4B7A226D1160F7FA541544603DD74AD3300FB4D
                      Malicious:false
                      Preview:.......{................0...........................................................d...............'.....x....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6077
                      Entropy (8bit):5.255251681028166
                      Encrypted:false
                      SSDEEP:
                      MD5:BA73A2CFCFC51DFFE7AFFDBE26C3D1B4
                      SHA1:38D8263BBFC15C745F06F44B11B818A1BAD5038C
                      SHA-256:E942C7B01F71D41B2A3009F11A8A56335E71086441597E1E6B79312CDE118D0F
                      SHA-512:7DF0B1983E0E26C679215A71AADB211341A0FFBB49381EF9E0FD87091B55B22C8BAD2DC016863070F90CBB8DFA2D9B98F92457BED805F7D11C86B0C0239B5930
                      Malicious:false
                      Preview:.C.%..%...system_mail_title37..%Sprite/UI/Icon/UIMailIcon/Icon_mail_9.C.&..&...system_mail_title38..%Sprite/UI/Icon/UIMailIcon/Icon_mail_9.C.+..+...system_mail_title43..%Sprite/UI/Icon/UIMailIcon/Icon_mail_9.C.;..;...system_mail_title59..%Sprite/UI/Icon/UIMailIcon/Icon_mail_5.C.=..=...system_mail_title61..%Sprite/UI/Icon/UIMailIcon/Icon_mail_5.C.>..>...system_mail_title62..%Sprite/UI/Icon/UIMailIcon/Icon_mail_5.C.?..?...system_mail_title63..%Sprite/UI/Icon/UIMailIcon/Icon_mail_5.C.@..@...system_mail_title64..%Sprite/UI/Icon/UIMailIcon/Icon_mail_5.C.E..E...system_mail_title69..%Sprite/UI/Icon/UIMailIcon/Icon_mail_5.C.F..F...system_mail_title70..%Sprite/UI/Icon/UIMailIcon/Icon_mail_5.C.H..H...system_mail_title72..%Sprite/UI/Icon/UIMailIcon/Icon_mail_5.F..........system_mail_title155..%Sprite/UI/Icon/UIMailIcon/Icon_mail_1.J..........system_mail_title221..)Sprite/Map/castle_icon/icon_castle_viking.F..........system_mail_title222..%Sprite/UI/Icon/UIMailIcon/Icon_mail_2.F..........system_ma
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2213
                      Entropy (8bit):4.696247385662894
                      Encrypted:false
                      SSDEEP:
                      MD5:6DC264E7082C8C502283D8BE0732FA4E
                      SHA1:7EB31554E0F34C6FFF5EB5023483C7D56A24D1DD
                      SHA-256:4F513B2FDFA300018E5AB3624DC5743ADDB006909BC001FC855E6813B0DE5902
                      SHA-512:466F040B0F2FF74CB2AE4150E19E12966561C61F61B80AC6888CF692FBD1178352BDE7DE7CE7EC44429627EFD64CAAF4250CD5AA3D067FCC95AA0EB95523BFDB
                      Malicious:false
                      Preview:.1...........................2......................1...........................3......................1...........................4......................1...........................5....................../................................................/................................................2............................6......................1...........................7......................3.............................9......................-..............................................U..........................1;2;3;4;5;6;7;8;9;10........2..2............................1...........................1......................-.e..e.........................................2...........................11......................2...........................12......................1.f..f.....................13....................d.7............................1:1000......................-..............................................6............................1:500................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2456
                      Entropy (8bit):4.773861213621815
                      Encrypted:false
                      SSDEEP:
                      MD5:1FEF4BA2B1B44E395081E27C68AACED9
                      SHA1:95AB882F1F0F1CAE8DB35A6F43047FAE5BBC50DF
                      SHA-256:94A71165A4D56262A5E36AE1B3CF9F7EA4732CD179B57AFC99F4B4DE9C17CB87
                      SHA-512:EF4CBD4FD63CBB6246AF3D6EE048A4EB942CECF3A1296ECFF54293F18A2E4C3A6EDF8B678EA114471DB4E2E3B0D6B8E49722048D6700E0FD2FFDC99C08C9A586
                      Malicious:false
                      Preview:.1...........................2......................1...........................3......................1...........................4......................1...........................5....................../................................................/................................................2............................6......................1...........................7......................3.............................9......................-..............................................U..........................1;2;3;4;5;6;7;8;9;10........2..2............................1...........................1......................-.e..e.........................................2...........................11......................2...........................12......................1.f..f.....................13....................d.7............................1:1000......................-..............................................6............................1:500................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2540
                      Entropy (8bit):4.7815648705773155
                      Encrypted:false
                      SSDEEP:
                      MD5:379E749EC066CD985F24C05D67BDD48A
                      SHA1:238AA62696CFC999D674269A61E694ABB0B3B771
                      SHA-256:68B0AA6F777C03DD2F551103F5B2AC155D411502E4843EE89EDC9A7E2433E6B9
                      SHA-512:AF0D1BD6C51F7AB98C688A310C68AE1BB322FD52B3FED9D0A2B68E26B87772E049DB9F420A94AEDAC8DF22ADCD265B63FCCDB8E946910C9B22BB597F510BD4C8
                      Malicious:false
                      Preview:.1...........................2......................1...........................3......................1...........................4......................1...........................5....................../................................................/................................................2............................6......................1...........................7......................3.............................9......................-..............................................U..........................1;2;3;4;5;6;7;8;9;10........2..2............................1...........................1......................-.e..e.........................................2...........................11......................2...........................12......................1.f..f.....................13....................d.7............................1:1000......................-..............................................6............................1:500................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2540
                      Entropy (8bit):4.783248579636411
                      Encrypted:false
                      SSDEEP:
                      MD5:F9727AC902144D47765C63125ECF6199
                      SHA1:01E15ADC9625926F83504E1BA825F9C41AD28158
                      SHA-256:2D35FD0E9FF1A9EBA51A325A211EA5C69BABDFDA4304F7F20B83620B9967C2DB
                      SHA-512:75798CC749CFA2EB1691A9FA60A260A7DCC4AA3800B84746C2F0B0844B0F0B18A127ED7A0787D2845AEB328C73145A004500135DBE10EFBF6D7B8D3A3FD895E8
                      Malicious:false
                      Preview:.1...........................2......................1...........................3......................1...........................4......................1...........................5....................../................................................/................................................2............................6......................1...........................7......................3.............................9......................-..............................................U..........................1;2;3;4;5;6;7;8;9;10........2..2............................1...........................1......................-.e..e.........................................2...........................11......................2...........................12......................1.f..f.....................13....................d.7............................1:1000......................-..............................................6............................1:500................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2532
                      Entropy (8bit):4.753553331771774
                      Encrypted:false
                      SSDEEP:
                      MD5:1294382203ADB019BECECD1C637B8159
                      SHA1:3DEF44D1DAF724515511E590CA6E711F669CB831
                      SHA-256:08D263CFD17011A64D00AD4F4121F1B5EC8BBFD5442B3CC587B86A570917CE96
                      SHA-512:F413EBD59D91C0599AB6F5BD5062AEB65D4B50AE3A8F328153AECCAA94A3210614AAD58B4370E65D1771468D85C7FAACD59577F66576C15DD3CD5229C91164BE
                      Malicious:false
                      Preview:.1...........................2......................1...........................3......................1...........................4......................1...........................5....................../................................................/................................................2............................6......................1...........................7......................3.............................9......................-..............................................U..........................1;2;3;4;5;6;7;8;9;10........2..2............................1...........................1......................-.e..e.........................................2...........................11......................2...........................12......................1.f..f.....................13....................d.7............................1:1000......................-..............................................6............................1:500................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2527
                      Entropy (8bit):4.749872967450031
                      Encrypted:false
                      SSDEEP:
                      MD5:6E4EAF30F5C3B14E10B0B9BD155D3A22
                      SHA1:F13707A164735EEFD6B6C848BB047A0E69C474B4
                      SHA-256:AEC81344101D520BA725CF84ECEADD7181ADBEC2F1A3517700630DCC5E227D19
                      SHA-512:36010C2AD09C1DC8AE94565F2F433BD724C67FA1AA5CB93559DBFC2098FE577E95A4D0ADD5944EED1518DA2E3C7E842A4A85D6EEDEF3D98E0C8C235951216B2D
                      Malicious:false
                      Preview:.1...........................2......................1...........................3......................1...........................4......................1...........................5....................../................................................/................................................2............................6......................1...........................7......................3.............................9......................-..............................................U..........................1;2;3;4;5;6;7;8;9;10........2..2............................1...........................1......................-.e..e.........................................2...........................11......................2...........................12......................1.f..f.....................13....................d.7............................1:1000......................-..............................................6............................1:500................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):431729
                      Entropy (8bit):6.296772845954814
                      Encrypted:false
                      SSDEEP:
                      MD5:5625075F03E94E55C556B5E987AFA1D9
                      SHA1:B41881CAC12AA20771E40FD2D2B48A561B12092D
                      SHA-256:DFFA123127B2FBC201D3068DDBE0ABC225D70A0ED1171383867B476A8BFBCA40
                      SHA-512:3F972243C7D8D80C7944E010FB83786723CD51C4A5C0AA3389A14BC5F7A7D3ADAEF62A2858D4C6D9F55FA1305D45B791A99CEE071E7B67701C6E2E6E98CE7D97
                      Malicious:false
                      Preview:.......d......d...regression_activity_task65..................Q.........2:17;949:9;952:10;1004:20..............1Sprite/BuildingList/Evony{0}/Age5/buildingList_14...............N....................regression_activity_task65..................Q.........2:17;949:9;952:10;1004:30..............0Sprite/BuildingList/Evony{0}/Age5/buildingList_1...............N....................regression_activity_task65..................Q.........2:17;949:9;952:20;1004:35..............1Sprite/BuildingList/Evony{0}/Age5/buildingList_18...............N....................regression_activity_task65..................Q.........2:17;949:9;952:20;1004:50..............1Sprite/BuildingList/Evony{0}/Age5/buildingList_15...............N....................regression_activity_task65..................Q........!7:16;949:8;952:40;4677:5;1004:100..............0Sprite/BuildingList/Evony{0}/Age5/buildingList_1...............N....................regression_activity_task65..................Q.........7:16;949:8;952:40;1004:70..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):279
                      Entropy (8bit):4.539956223209167
                      Encrypted:false
                      SSDEEP:
                      MD5:2CCEE1A861DF9A3448B12204582B5F42
                      SHA1:F382015DF9D654018201EDC0D4275A42CAAE4D7B
                      SHA-256:77AE3DC70C44209567D335302C6C193E5EE5A0D7491A5EDB7DE0837F0233201B
                      SHA-512:EC2FC38E8942B44FFEF438B71B7209818BFB3170B7B40E7192EBC2F2D41401CDB61BE507F3D487D4E2BF95AE8C0579F132646781339C35C9E933CE50B011812F
                      Malicious:false
                      Preview:.......u...............600|960.......0........x...................x..........0..P............0|50......."..(.....x..........6........x.........."...N............50|400.......G........x...................x...........................350|700................x...................x...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):291
                      Entropy (8bit):4.451130578887103
                      Encrypted:false
                      SSDEEP:
                      MD5:59B3433DAF1D25EA15617D7FA9E6297F
                      SHA1:C98720A3D8406CBEAFC750909B77AB2709409D52
                      SHA-256:6081A10BDE99BF05066603E36A1011FF89BFB2EA23B3FEFBCA769564DC1AE591
                      SHA-512:72B7CDF8AD7605384418272950EF9DB518AB8723489C4B8303CD6101CA2DFCC51B3AC3B4E2C71A2A4271F5BD56A10C29299FBF5480B27DE794F3F37D7704F764
                      Malicious:false
                      Preview:........................800|1200.......0.........................................0..d............0|50......."..2.................6....................................200|600.......G..........................................................400|1000..........................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):278
                      Entropy (8bit):4.535732344083367
                      Encrypted:false
                      SSDEEP:
                      MD5:8D4B25DECC0225EE4E916BD019854ABF
                      SHA1:6EB4F5A63B852BC293CA2FD9ACE73C6CACCAA7E4
                      SHA-256:AF64F0D82A62BACDDBF3CF1A2E2229545864DD73429839FA33AF6A8C3D722622
                      SHA-512:E4D71DF45F47A18220ABD0B7DD1A4EB2A6E2DA4515B2A54F35F320EB726E798C893ED7BAFC587F6889A68B01E0AECCD41A499C4532BD60739DE044482E58E67A
                      Malicious:false
                      Preview:.......0................500|640.......0........P...................P..........................0|80.......0........P..........'........P..........U...............12|300..........(.....P...................P...........................200|550................P...................P...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4354
                      Entropy (8bit):5.433102947503611
                      Encrypted:false
                      SSDEEP:
                      MD5:2B4A19889D376F2A351A9C0B5701163E
                      SHA1:A074EC5BB9B005B4B3CF44ACF001F26319C428B1
                      SHA-256:E3C54603C66F6AF6F00B38F98158D87D8FBF54D31B8CBE5E28C204A40418D34F
                      SHA-512:45F5EB073E5A147BB79ED559574185684852020CE9B12748DE1DCF39F116059FF073DE9AC4E465DAEF3D139BDA5D1A28D848B053CD8A6986F333606883FD6725
                      Malicious:false
                      Preview:.F............D..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............J..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............P..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............V..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............\..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............b..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............h..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............n..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............t..........material_groupname1...Sprite/UI/UIIcons/type5_1.F............z..........material_groupname1...Sprite/UI/UIIcons/type5_1.G........................material_groupname1...Sprite/UI/UIIcons/type5_1.G........................material_groupname1...Sprite/UI/UIIcons/type5_1.F............E..........material_groupname2...Sprite/UI/UIIcons/type5_2.F............K..........material_groupname2...Sprite/UI/UIIco
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):10578
                      Entropy (8bit):6.329767324577868
                      Encrypted:false
                      SSDEEP:
                      MD5:AA63AF30DC43F87F47074212B29B99DF
                      SHA1:D2B7850C3140C33EB606950662A7F5D0E6E64B4F
                      SHA-256:E095C10AD1E21F9CB52EEC6D7BDC5F6E9274FD672C151AD8DA8E95CBB6372D65
                      SHA-512:6B83BD3F53E6706D474DD41ECEE644F8EC9282F06A54C262B3AF5253F4381E10D6D142E0B1BDF95B2770D7CABB8B4A542D18786FD3BCE95375E5D5BC684D5314
                      Malicious:false
                      Preview:...............membership_name_week...membership_des1........@...........'......Sprite/UI/UIStoreIcon/Card_1...^...]...e.....................&Sprite/UI/UIInterface/Store/Bg_Green_b...o..........(32:2;2754:3;3712:15;28:15;1007:15;980:45.........1CB06656ACCFFEF...0......0..................membership_name_week...membership_des1........@..................Sprite/UI/UIStoreIcon/Card_1...]...]...e.....................&Sprite/UI/UIInterface/Store/Bg_Green_b...n...........&1705:1;1706:1;1707:1;1708:1;29:4;963:5...sg339_mc_100.........1CB06656ACCFFEF...0......0..................membership_name_month...membership_des1.......A...'..............Sprite/UI/UIStoreIcon/Card_2...^...]...e......d..............#Sprite/UI/UIInterface/Store/Bg_Bule...o...........3712:14;29:16;951:120...3321_sg339_mc_450...6842:1;6843:1;6865:1.........D73C29C68094287...0......0..................membership_name_month...membership_des1.......A..................Sprite/UI/UIStoreIcon/Card_2...]...]...e......d..............#
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7253
                      Entropy (8bit):5.431597818884288
                      Encrypted:false
                      SSDEEP:
                      MD5:0945E313FEB186CA77B20AE7C382736D
                      SHA1:AF3136B5054F24AB84017484D470C7843A554FFC
                      SHA-256:A554CFB18354C5CC0E405BAFA7911A0517A69364BE7FFF8ED536EEB1C6E8E0E2
                      SHA-512:14DDCF8AD992FF17D1B46F397EFA266F00BF92BB1EE58352DA58DAB98BAA353AA4C53BB52DD8D1E202934776CC227985DBFF83C38831DCADF866F366229661A1
                      Malicious:false
                      Preview:.W.....push_tips_building1..... Sprite/UI/UIBaseIcon/Icon_hammer...title_adm...-1...-1....R.....push_tips_building2......Sprite/UI/UIMenuIcon/menu_2...title_adm...-1...-1....O.....push_tips_train......Sprite/UI/UIMenuIcon/menu_5...title_army...-1...-1....V.....push_tips_treat......Sprite/UI/UIMenuIcon/menu_14...-1...push_button_key8...-1....S.....push_tips_traintrap......Sprite/UI/UIMenuIcon/menu_5...title_army...-1...-1....h.....push_tips_equipment1......Sprite/UI/UIMenuIcon/menu_7...-1...push_button_key1...push_button_key8....h.....push_tips_equipment2......Sprite/UI/UIMenuIcon/menu_7...-1...push_button_key1...push_button_key8....e.....push_tips_task......Sprite/UI/UIBaseIcon/Icon_task...-1...push_button_key2...push_button_key8....T.....push_tips_technology......Sprite/UI/UIMenuIcon/menu_6...title_tech...-1...-1....Y.....push_tips_spiritfull..... Sprite/UI/UIMenuIcon/Icon_detail...title_army...-1...-1....W.....push_tips_troopsreturn......Sprite/UI/UIMenuIcon/menu_40...title_army...-1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):14061
                      Entropy (8bit):5.364643425276149
                      Encrypted:false
                      SSDEEP:
                      MD5:453C1761D776639F1D50AAECC5152960
                      SHA1:34147F4F6FF8E8DCE31C8700D5167DAA5B5B9735
                      SHA-256:DB49CC99D6C9B2150DA2C231A18E2F0A57AEBF88C0EF19C2B75B22CCB03C0069
                      SHA-512:9DBCB26BF7F26CA130521732CF123884C713D29DD43B524DB1BAA5F7E94DCEB6193E36463BE25D751529CD194019DBFB979F351C9719B71FC36D712022D76F71
                      Malicious:false
                      Preview:.U.............10001|10002..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.O.............10003..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.U.............10004|10005..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.O.............10006..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.O.............10007..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.O.............10008..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.O.............10009..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.U.............10010|10011..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.O.............10012..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.U.............10013|10014..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.O.............10015..$Sprite/UI/Icon/Military/Tab_Infantry...military_formation1.U.............10016|10017..$Sprite/UI/Icon/Military/Tab_Infantry...military_formatio
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):331
                      Entropy (8bit):5.323085573045631
                      Encrypted:false
                      SSDEEP:
                      MD5:C3702AFA871CA5FF51E001C8DBC733F3
                      SHA1:C598BAE2BC3F4474482983DA926C88AED2D215AA
                      SHA-256:F7714448E5EA7B254DAC25B320E3F9962567AE6A8195958B90FA1DB38F78CE47
                      SHA-512:A8F733FB520C58AEDE696E12C11006E43211F9D9030B7E96F2222AB55F1A89C4095592129964CDFDC7C7503046CCA5E34CA470AFA67F6C4E44BC986B400E4129
                      Malicious:false
                      Preview:.l...........3507:1700;3161:4000...Prefabs/Map/Evony{0}/castle_lv6..&Sprite/Map/castle_icon/Evony{0}_icon_6....l...........3507:2800;3161:6600...Prefabs/Map/Evony{0}/castle_lv6..&Sprite/Map/castle_icon/Evony{0}_icon_6....m...........3507:4600;3161:10800...Prefabs/Map/Evony{0}/castle_lv6..&Sprite/Map/castle_icon/Evony{0}_icon_6...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4552
                      Entropy (8bit):5.590352194420988
                      Encrypted:false
                      SSDEEP:
                      MD5:A65F5BFCECFCA168A1C1AA382156FF91
                      SHA1:687C0781AA9B9B6A1A9ADE763F4854D708CD3DDD
                      SHA-256:41E92D84F23658D67D185EA3C06C109F998CA61AA6258F1CDEE187823E3536F9
                      SHA-512:8E05555299BD0CB601598D629784CE25A25A9953765B2A5773A0626E571DAD95E5881A0FDDBD452AE9C15778072D184B7E3FE88747252114AA0F4E531725685E
                      Malicious:false
                      Preview:..............1563:1;13657:5...Sprite/UI/NpcArt/NpcArt_4002..RSprite/UI/Background/Activity/ExpeditionActive/Activity/ExpeditionActive/ui_base02...0;45;128;128....................19:1;13657:2...Sprite/Map/world_garrison_ar..8Sprite/UI/Background/Activity/ExpeditionActive/ui_base01...0;14;72;72....................3036:1;13657:2...Sprite/Map/Pigeon/recovery..8Sprite/UI/Background/Activity/ExpeditionActive/ui_base01...0;17;128;128....................2753:1;13657:5...Sprite/UI/NpcArt/NpcArt_Snakes..8Sprite/UI/Background/Activity/ExpeditionActive/ui_base02...0;45;80;80....................1011:1;13657:2.. Sprite/UI/NpcArt/NpcArt_ViKIng_s..8Sprite/UI/Background/Activity/ExpeditionActive/ui_base01...0;45;80;100......._...........3161:1;13657:2...-1..8Sprite/UI/Background/Activity/ExpeditionActive/ui_base01.......^...........983:1;13657:5...-1..8Sprite/UI/Background/Activity/ExpeditionActive/ui_base02......._...........1008:1;13657:2...-1..8Sprite/UI/Background/Activity/ExpeditionActive/ui_base
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1476008
                      Entropy (8bit):4.770359096766042
                      Encrypted:false
                      SSDEEP:
                      MD5:23EE1F151FD295E0DA1A5CD2111B10FB
                      SHA1:44A120481917787E1942C09E309DC2B76DD93813
                      SHA-256:0879944874F9E9CE55FE24F2E3F8D5EE8DF5242A285160216BE9203259C308BA
                      SHA-512:C200E4703A3BDB4B8C09C0725F4930E6636DF848DFC2B46B49CF0757D15E605ACC4109F05FA141333FF4E46E2AD4E1E207DA0AB2B019C1CD86B3D17A261994B7
                      Malicious:false
                      Preview:................monster_1...monster_description_1...monster_diagolue1...........................................2......d...............2.........F.........2.........d......2............................d..d..d..d...................................................Sprite/UI/NpcArt/NpcArt_1...Prefabs/NPC/Monster_1....hB...Sprite/UI/NpcModel/NpcArt_1........d....................................................................................4111:1:3................................................................................................................................................................................................................................................................................................-1...............-1...............................monster_1...monster_description_1...monster_diagolue1.............................@..............2......n...............7.........(.........<.........d......7............................d..d..d..d..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):428240
                      Entropy (8bit):5.2662315838263005
                      Encrypted:false
                      SSDEEP:
                      MD5:E7AFC469B30CA63DD64725B054F63C2F
                      SHA1:13F4A49C6BA65844D8F4CAECA04980449C5AF907
                      SHA-256:8CB233E01DBC42D40D883048E2F494A935BC45CDC68379B16F505AFF3DB42097
                      SHA-512:E706652A9CB8AED747ED6FD4304D9FF0C8DC1708C50B0D4FF037B2DEF6651F4890B9106DF6D09CA7EB382DD136C21EE861CE30D63463E843D10C85B3BE5C1450
                      Malicious:false
                      Preview:................monster_1...monster_description_1...monster_diagolue1...........................................2......d...............2.........F.........2.........d......2............................d..d..d..d...................................................Sprite/UI/NpcArt/NpcArt_1...Prefabs/NPC/Monster_1....hB...Sprite/UI/NpcModel/NpcArt_1........d....................................................................................4111:1:3.............................................................................................................................................................monster_1...monster_description_1...monster_diagolue1.............................@..............2......n...............7.........(.........<.........d......7............................d..d..d..d...................................................Sprite/UI/NpcArt/NpcArt_1...Prefabs/NPC/Monster_1.....C...Sprite/UI/NpcModel/NpcArt_1........n..............................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1880
                      Entropy (8bit):5.074763396821538
                      Encrypted:false
                      SSDEEP:
                      MD5:D866DAE56800620F7DEA1EE348BB88CE
                      SHA1:88818181EC53A3D9F4D976E964B1475B1B7BD4CE
                      SHA-256:99B9920CD29F9F4782F13C684B625CE560F85D27B4111FBADC5ACB21A925589F
                      SHA-512:0763C08EF038D5E225EA8AF1FE13EFE532EADEA7755705C13BC55C766F242EEF617F0DA67FDB16267705A33934EA1D1B99D4E96E99A9B9BE6BA06C786074521F
                      Malicious:false
                      Preview:................................................................................................................................................. ..... ...............................................>.......................................>.......................................>.....!.....!.............".....".......>...................'...............N...]...................'...............N...]...................'...............N...].....#.....#.......'.....$.....$...N...]...............#...6....................................#...6....................................#...6..........................%.....%...#...6.....&.....&........................W.........................................W.........................................W...............................'.....'...W.........(.....(...............o.....o...........z.....z...............{.....{...............~.....~.....................................}.....}.......................................z.....z...y.........{.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):45134
                      Entropy (8bit):5.683716353870777
                      Encrypted:false
                      SSDEEP:
                      MD5:306C653B23CC4E8BCF41253419DA88B7
                      SHA1:E2E1F088F56E3F4028E5ED16E718C993D6750355
                      SHA-256:2525BD966E78896045C946FAA19C672190A71EE1B3430D78078244B68B587390
                      SHA-512:99132BC5A30A0DDA91AC4D4E9BC0945073F6719A3ED9D259286EC78D5B61B1CC0FDA5DF362D95D4EF83F0E8E9C1C01ED8EE576D8681F73371C6D09CAF04FD817
                      Malicious:false
                      Preview:.>..................GiftPackageConfigure...GiftPackageConfigure2.>..................GiftPackageConfigure...GiftPackageConfigure3.>..................GiftPackageConfigure...GiftPackageConfigure4.>..................GiftPackageConfigure...GiftPackageConfigure5.2..................ItemsConfigure...ItemsConfigure2....................w20076;20084;20093;20108;20128;20114;20117;20131;20134;20238;20079;20088;20102;20122;20139;20074;20082;20091;20106;20126..w20442;20443;20444;20445;20446;20447;20448;20449;20450;20451;20452;20453;20454;20455;20456;20457;20458;20459;20460;20461....................4006...4005.3..................4006...4007-refresh_activity_note....................4...0.4..................TiroGuideConfig...TiroGuideConfig5......................20237|20238|20236|20235|20339|20077|20074|20075|20076|20078|20079|20080|20086|20088|20087|20089|20085|20082|20083|20084|20094|20091|20092|20093|20095|20102|20096|20104|20103|20097|20098|20099|20101|20100|20112|20122|20113|20124|20123|20115|20116
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6907
                      Entropy (8bit):5.492711838643461
                      Encrypted:false
                      SSDEEP:
                      MD5:DC3D72CFD6CCFAB2B95AD921E7D4DC5A
                      SHA1:39FF1A53E2EE7F0508B0BD28D59F54CF817AA617
                      SHA-256:7B4068006A720F90F82588BB6DDA4A2A52A455CF85EFA98B6C2F5B5FE2454CCC
                      SHA-512:8A01EE2A8A971757CE9241DE1B0F53094BE2AC16EC58B4D6866C7750E99AC38CFFABC78229588313D0C02B93EAFE7BE05214D8ABD8B2A011FA5C0CF0226667CD
                      Malicious:false
                      Preview:...........region_key5..#Sprite/UI/Icon/InspectIcon/region_5...region_key5..#Sprite/UI/Icon/InspectIcon/region_5...region_key5..#Sprite/UI/Icon/InspectIcon/region_5.................UIEffect/prefab/FX_Fireworks_3..........HB...newpatrol_text12..bSprite/UI/Background/Patrol_bg02|Sprite/UI/Background/Patrol_bg02|Sprite/UI/Background/Patrol_bg02...............area_key10.."Sprite/UI/Icon/InspectIcon/area_10...area_key10.."Sprite/UI/Icon/InspectIcon/area_10...area_key10.."Sprite/UI/Icon/InspectIcon/area_10.................UIEffect/prefab/FX_Fireworks_3...........B...newpatrol_text13..bSprite/UI/Background/Patrol_bg03|Sprite/UI/Background/Patrol_bg03|Sprite/UI/Background/Patrol_bg03...............figure_key1..#Sprite/UI/Icon/InspectIcon/figure_1...figure_key1..#Sprite/UI/Icon/InspectIcon/figure_1...figure_key1..#Sprite/UI/Icon/InspectIcon/figure_1.................UIEffect/prefab/FX_Fireworks_3...........B...newpatrol_text14..bSprite/UI/Background/Patrol_bg01|Sprite/UI/Background/Patrol_bg01
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1680
                      Entropy (8bit):4.1173145627394865
                      Encrypted:false
                      SSDEEP:
                      MD5:E85202D47E3FFB5F4FDD3E71494CA70E
                      SHA1:34F09CA5EB33E2E27E31C73088306EDA11DD2F79
                      SHA-256:238C4C77519AC39ADF345AC2CC5E5ACE7C1478EA294440F1B59315D6B4197EE8
                      SHA-512:14614F324C59565D82E7E371AE2C25E53C062725E46AC948A9FCED9E4A5E5507C7E3B1BCA8966E052A359083BB18353842DDD0695E772F60B9A1E3F4A97B62AA
                      Malicious:false
                      Preview:....................<...........................................................................................................................................<...........................................................................................................................................<...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................<...........................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):49816
                      Entropy (8bit):5.870025529275562
                      Encrypted:false
                      SSDEEP:
                      MD5:D401CA220AB7172AF24D6E048DDC49DC
                      SHA1:31FFF16966207B7717E03512C3D72359F27A576C
                      SHA-256:31F0024A0897566E1245A0F063BB06E84D0F38A91C6FFEA159C85D20F5DAC024
                      SHA-512:D6AA15A41CE54294358463BACF2BA7BAB99546994C314B66B10AAAD6F465EB9CC63DC4EDA839C03A6F35EC2A6E01A678617A7803EA9060FD6E4837CA6B1A08DD
                      Malicious:false
                      Preview:........................buffer_name114...buffer_description114_subcity...39.....................-1...-1...Sprite/UI/BuffIcon/buff_39...39.........-1...-1...-1.........-1.....39.....".buff_type...........$............buffer_name72...buffer_description72_1...72.....................-1...-1...Sprite/UI/BuffIcon/buff_72...............-1.....72.....".buff_type...........G............buffer_name213...buffer_description213...213............1...1..%Sprite/UI/BuffSubcity/Buff_Subcity_14...............subcity_buff_condition1.....213.....".buff_type...........j............buffer_name214...buffer_description214...214............2|3...900|900..%Sprite/UI/BuffSubcity/Buff_Subcity_12...............subcity_buff_condition2.....214.....".buff_type........................buffer_name114...buffer_description114_subcity...39.....................-1...-1...Sprite/UI/BuffIcon/buff_39...39.........-1...-1...-1.........-1.....39.....".buff_type...........%............buffer_name72...buffer_description72_1...72...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):160
                      Entropy (8bit):3.8632797420651697
                      Encrypted:false
                      SSDEEP:
                      MD5:5A6377E0B860F97196A331D5EE322E54
                      SHA1:6DE2854D3E401DC15B769373621B903B5BDBFCE5
                      SHA-256:BE175DED39CB0BE39B11B2FBAB75B0620BAB5DBB6B1F40417997E6164D9A59F0
                      SHA-512:5DBA3657EE74E90FF6DD0AD508AE52A6C275F05CB09FE77454708C565F9DEEDBC5D72E361C5D9FB1A8129ECEF4876C90F1702CC66D37525A39CCB39698D79AF0
                      Malicious:false
                      Preview:.........<..(..2.........<..(..2.........F..-..<.........F..-..<.........P..F..P.........P..F..P.........P..F..P.........Z..P..Z.........Z..U..Z.........Z..Z.._
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):10524
                      Entropy (8bit):4.852976009356038
                      Encrypted:false
                      SSDEEP:
                      MD5:42B8CF80A1C2410F413188F28E66878C
                      SHA1:57694E76159EF62D59AB41BF943ACA421E4D0B31
                      SHA-256:78613897A35042D73F828CD499C74CF380E9458E4BBD177DC98685491E93E854
                      SHA-512:D4CAF1F7391B11C1D7FFD8BCBD1CEE2A8CAA7F86BB72426BF52ADBF212A90E0A10EC04887EBB2D863DB0D0DA31DADC37E6F68BD6DC8431AEEA5CBAEA9C3D03B4
                      Malicious:false
                      Preview:..........opinionBox_npc_name_27..........opinionBox_npc_name_28..........opinionBox_npc_name_29..........opinionBox_npc_name_30..........opinionBox_npc_name_27..........opinionBox_npc_name_28..........opinionBox_npc_name_29..........opinionBox_npc_name_30..........opinionBox_npc_name_27..........opinionBox_npc_name_28..........opinionBox_npc_name_29..........opinionBox_npc_name_30..........opinionBox_npc_name_27..........opinionBox_npc_name_28..........opinionBox_npc_name_29..........opinionBox_npc_name_30..........opinionBox_npc_name_27..........opinionBox_npc_name_28..........opinionBox_npc_name_29..........opinionBox_npc_name_30..........opinionBox_npc_name_27..........opinionBox_npc_name_28..........opinionBox_npc_name_29..........opinionBox_npc_name_30..........opinionBox_npc_name_27..........opinionBox_npc_name_28..........opinionBox_npc_name_29..........opinionBox_npc_name_30..........opinionBox_npc_name_27..........opinionBox_npc_name_28..........opinionBox_npc_name_29... .. .
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11867
                      Entropy (8bit):5.386666114393155
                      Encrypted:false
                      SSDEEP:
                      MD5:A95C9CAD510227010AC54134CFFD27A2
                      SHA1:48D778876008DFEED4A6958542FFA6C8A10AD020
                      SHA-256:221C656D29CF9660E8E118E839D345EB283626B2087A27ECB590D648C7E37E39
                      SHA-512:F4725BBBD0D48AB8955974209C2599DE0C3CF9409B8537F8A0582E1DD179A623FBBA9DE90DE466987475D2BF8FC5F62703E8D74782C9AF2CBFF940794AC5F60C
                      Malicious:false
                      Preview:.@...........opinionBox_npc_msg_like_1...2:1............#.....d....@...........opinionBox_npc_msg_like_2...1:0............#.....d....@...........opinionBox_npc_msg_like_3...1:0............#.....d....@...........opinionBox_npc_msg_like_4...2:2............#.....d....@...........opinionBox_npc_msg_like_5...2:3............#.....d....@...........opinionBox_npc_msg_like_6...1:0............#.....d....@...........opinionBox_npc_msg_like_7...2:4............#.....d....@...........opinionBox_npc_msg_like_8...1:0............#.....d....@...........opinionBox_npc_msg_like_9...2:5............#.....d....A...........opinionBox_npc_msg_like_10...2:6............#.....d....A...........opinionBox_npc_msg_like_11...2:7............#.....d....A...........opinionBox_npc_msg_like_12...2:8............#.....d....A...........opinionBox_npc_msg_like_13...2:9............#.....d....B...........opinionBox_npc_msg_like_14...2:10............#.....d....B...........opinionBox_npc_msg_like_15...2:11............#.....d....B
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):34151
                      Entropy (8bit):5.316112280996425
                      Encrypted:false
                      SSDEEP:
                      MD5:201B07934A07044FE7F5B8AE6759550F
                      SHA1:4F4C5836D8763183274E3288D3958B7A98E01EC8
                      SHA-256:C372D6FB20AD02449EC2C40F917D25850FFABA045258792C28318DDC2B3A1CA5
                      SHA-512:54B9B785324CC015D6E1D5F6E7974B06433D9D968293789BE31D6068352438524333BDD28E4260124F9EAF7FE5298B20839256230CE27ED40E384B3AEB944AA6
                      Malicious:false
                      Preview:................opinionBox_npc_name_1..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Happy..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Angry................opinionBox_npc_name_1..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Happy..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Angry................opinionBox_npc_name_1..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Happy..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Angry................opinionBox_npc_name_1..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Happy..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Angry................opinionBox_npc_name_1..VSprite/UI/Icon/Event/AbtestPublicOpinion9541/HeadSculpture/1head_WarehouseKeeper_Happy..VSprite/UI/I
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4703
                      Entropy (8bit):5.04193262719173
                      Encrypted:false
                      SSDEEP:
                      MD5:CFB35AE33629AD1814E7C6EAD4D99E13
                      SHA1:C2AE05F8B63F93AE522825EB4B1217310C038641
                      SHA-256:FE69B638396A318F89E6DA14CB0783C392A506D970CC8E00C628EE3915BE0E04
                      SHA-512:BA782E8A7976E14EB6B70802E937EBC3E2C4906D39B13C75AA41AE67BADE4F78EE9D16C6D6F6CB4FFD72A378DF77380B54F2908EAB7DDD16AE2B61D72D5AF094
                      Malicious:false
                      Preview:..............opinionBox_npc_sos_1_0_0...2:16...opinionBox_npc_sos_1_1_1...21:30......opinionBox_npc_sos_1_2_1...opinionBox_npc_sos_1_1_2...21:30...............opinionBox_npc_sos_1_2_2..........d.................opinionBox_npc_sos_2_0_0...2:8...opinionBox_npc_sos_2_1_1...21:30......opinionBox_npc_sos_2_2_1...opinionBox_npc_sos_2_1_2...21:30...............opinionBox_npc_sos_2_2_2..........d.................opinionBox_npc_sos_3_0_0...2:4...opinionBox_npc_sos_3_1_1...21:30...............opinionBox_npc_sos_3_2_1...opinionBox_npc_sos_3_1_2...21:30......opinionBox_npc_sos_3_2_2..........d.................opinionBox_npc_sos_4_0_0...2:21...opinionBox_npc_sos_4_1_1...21:30...............opinionBox_npc_sos_4_2_1...opinionBox_npc_sos_4_1_2...21:30......opinionBox_npc_sos_4_2_2..........d.................opinionBox_npc_sos_5_0_0...2:7...opinionBox_npc_sos_5_1_1...21:30......opinionBox_npc_sos_5_2_1...opinionBox_npc_sos_5_1_2...21:30...............opinionBox_npc_sos_5_2_2..........d................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):844
                      Entropy (8bit):5.889676821765197
                      Encrypted:false
                      SSDEEP:
                      MD5:6EB4FB5EE3FE67C57F1712CC2C15A452
                      SHA1:E66775305BA05E073B1DAF24BE4F86660D8B9F83
                      SHA-256:9BCE6133EA4A5EBA0158035FF8F647D088B9FDA48B87547D197C2F3DFD4A07B8
                      SHA-512:DB55CF5D7B7261FC57D467CCF2532C131E79B5207A22E80E6D83E071FFB71E2078E4B334F666BEB6B34B70EF76BB4872B288986246DE5A6B7BA30305D7870580
                      Malicious:false
                      Preview:..........Return...13......#........A...97...................B...98...............0........!........I...105..................J...106...............K...107...............L...108.......$........M...109...................N...110.................O...111...............P...0...............Q...0........!........U...117..................V...0.................W...0...vip..........Z...0......!........Keypad1...257.......$........Keypad2...258.................Keypad3...259...............Keypad4...260...............Keypad5...261...............Keypad6...262...............Keypad7...263...............Keypad8...264...............Keypad9...265...............C...0.................0......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2673
                      Entropy (8bit):5.488559783797907
                      Encrypted:false
                      SSDEEP:
                      MD5:FD6292C67855977FD15DF2A9359E61F6
                      SHA1:675DDF0566363CD4BB395DB7F6992B0EB3A8B882
                      SHA-256:89EA8664148E46907A81227AE69ACF8A89BF09F05395F4FF3347CCC058808A2C
                      SHA-512:834C15B86FDD39AC4D9DD7A7DD50CA7B4AFBFEA7CFD714CE3D0F38AED27FDC1FC146328CA477686219CD426F222530A9A872590A197FF9CEC98E54182E4FCB1B
                      Malicious:false
                      Preview:......................e......................Prefabs/GeneralModel/Model_6...battlepve4_dialogue11...0;350;1300...hero_name41.i......................Prefabs/Guide/Common/Huns...battlepve4_dialogue12...0;250;900...battlepve4_npcname1.e......................Prefabs/GeneralModel/Model_6...battlepve4_dialogue13...0;350;1300...hero_name41.i......................Prefabs/Guide/Common/Huns...battlepve4_dialogue14...0;250;900...battlepve4_npcname1......................f......................Prefabs/GeneralModel/Model_55...battlepve4_dialogue15...0;250;1200...hero_name98.V......................playerImage...battlepve4_dialogue16...0;250;1200...title_monarch......................i......................Prefabs/Guide/Common/Huns...battlepve4_dialogue17...0;250;900...battlepve4_npcname1...........................................i......................Prefabs/Guide/Common/Huns...battlepve4_dialogue18...0;250;900...battlepve4_npcname1......................f......................Prefabs/GeneralModel/Mod
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):134
                      Entropy (8bit):5.167718040678714
                      Encrypted:false
                      SSDEEP:
                      MD5:F4CD3A74F8AE8E7ECB475E0D769746CB
                      SHA1:DB1052B8233A415A65B6C9460549397D5396D5F7
                      SHA-256:CAA1B755217D2B3713604C493C5CEE72137472863202695904A4F6ABE926823B
                      SHA-512:54DEDCD10CA90995277B56E8AAA3F40404193F8BC44629F9E8D2C6DDB11EAEAC5CD0DD66F47E4583A515454B236B900033E1C512807EF04407F4A0737779F0AC
                      Malicious:false
                      Preview:.............1.............................24................24....B.......4RunEscapeNew/Effect/Prefab/TimeLine/FxShowBoss330006......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3333
                      Entropy (8bit):5.237338577177828
                      Encrypted:false
                      SSDEEP:
                      MD5:C368A9989F4E32F7EF779D95F7AD28A2
                      SHA1:137C0A875C57FF41D9C2D76954FE703D0EBAA443
                      SHA-256:C3E474F7D08816266342DA105E122DE52B2099D264C3028CDB9FE15EEF73E8DB
                      SHA-512:6B7418850C9E47D767AABB0249DBE4FBB94B039B0CD8116F3FA9A399C06801C056DB75E1B80E74E574812AA2FB2F2B820106F99B2598B97F08150AFD827936E7
                      Malicious:false
                      Preview:.;.......-Category/Prefabs/Track/Stage/groundCliffGrass.......:.......,Category/Prefabs/Track/Stage/groundCliffRoad.......;.......-Category/Prefabs/Track/Stage/RE_RisLevel_T1_1.......;.......-Category/Prefabs/Track/Stage/RE_RisLevel_T1_2.......;.......-Category/Prefabs/Track/Stage/RE_RisLevel_T2_1.......;.......-Category/Prefabs/Track/Stage/RE_RisLevel_T2_2.......;.......-Category/Prefabs/Track/Stage/RE_RisLevel_T3_1.......;.......-Category/Prefabs/Track/Stage/RE_RisLevel_T3_2.......:.......,Category/Prefabs/Track/Stage/groundCliffRoad.......:.......,Category/Prefabs/Track/Stage/groundCliffRoad.......9.......+Category/Prefabs/Track/Stage/RG_RisLevel_T1.......9.......+Category/Prefabs/Track/Stage/RG_RisLevel_T2.......9.......+Category/Prefabs/Track/Stage/RG_RisLevel_T3.......6.e..e..(Category/Prefabs/Track/Stage/rr_branch_2.......6.f..f..(Category/Prefabs/Track/Stage/rr_branch_3.......6.g..g..(Category/Prefabs/Track/Stage/rr_branch_4.......<.h..h...Category/Prefabs/Track/Stage/rr_branch
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):17496
                      Entropy (8bit):5.42585397683915
                      Encrypted:false
                      SSDEEP:
                      MD5:DAB458ED371758B7C653214D11AC31DD
                      SHA1:69843D68AE12CFFC90549E1DCCD127E1B012C9F7
                      SHA-256:D0FF2A9EA486F9F5E1716B0A857BA485CC8EE26652C3AF3928199B6127947E5D
                      SHA-512:3F90741F33E71B8262C1B2759925B6ACCFE0E738763F780981E3C343D15A795BD2E2A908AF9A15141889C626FF882AEA71B23F59895490B8E1CB86A8D0824EA6
                      Malicious:false
                      Preview:...........region_key1...Sprite/UI/InspectIcon/region_1...area_key1...Sprite/UI/InspectIcon/area_1...Sprite/UI/InspectIcon/figure_1............A.....................figure_key1.....#...........region_key1...Sprite/UI/InspectIcon/region_1...area_key2...Sprite/UI/InspectIcon/area_2...Sprite/UI/InspectIcon/figure_1............A.....................figure_key1.................region_key1...Sprite/UI/InspectIcon/region_1...area_key1...Sprite/UI/InspectIcon/area_1...Sprite/UI/InspectIcon/figure_2............A.....................figure_key2.....$...........region_key1...Sprite/UI/InspectIcon/region_1...area_key2...Sprite/UI/InspectIcon/area_2...Sprite/UI/InspectIcon/figure_2............A.....................figure_key2.................region_key1...Sprite/UI/InspectIcon/region_1...area_key1...Sprite/UI/InspectIcon/area_1...Sprite/UI/InspectIcon/figure_3............A.....................figure_key3.....%...........region_key1...Sprite/UI/InspectIcon/region_1...area_key2...Sprite/UI/InspectIco
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):17496
                      Entropy (8bit):5.42875829525103
                      Encrypted:false
                      SSDEEP:
                      MD5:C50D44C51C552F42D0B9D6F329573808
                      SHA1:F6CF6D79B2C89EA7818FA1EC583DB914E5DAD1C0
                      SHA-256:9356CABD62B36775294D5E1D3AA832F7B2B48D2B75F1DE8952C0AC40B79BFE53
                      SHA-512:D27B9B06E78C82EE10EE313BA49A4C015D797A9F159F33B70382CC5A1F98D104060424C9F619B38615F19E555EBD532C388D9ED511524E3192C98FFA9D05AE2D
                      Malicious:false
                      Preview:...........region_key1...Sprite/UI/InspectIcon/region_1...area_key1...Sprite/UI/InspectIcon/area_1...Sprite/UI/InspectIcon/figure_1............A.....................figure_key1.....#...........region_key1...Sprite/UI/InspectIcon/region_1...area_key2...Sprite/UI/InspectIcon/area_2...Sprite/UI/InspectIcon/figure_1............?.....................figure_key1.................region_key1...Sprite/UI/InspectIcon/region_1...area_key1...Sprite/UI/InspectIcon/area_1...Sprite/UI/InspectIcon/figure_2............A.....................figure_key2.....$...........region_key1...Sprite/UI/InspectIcon/region_1...area_key2...Sprite/UI/InspectIcon/area_2...Sprite/UI/InspectIcon/figure_2............?.....................figure_key2.................region_key1...Sprite/UI/InspectIcon/region_1...area_key1...Sprite/UI/InspectIcon/area_1...Sprite/UI/InspectIcon/figure_3............A.....................figure_key3.....%...........region_key1...Sprite/UI/InspectIcon/region_1...area_key2...Sprite/UI/InspectIco
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):306760
                      Entropy (8bit):6.057133829273518
                      Encrypted:false
                      SSDEEP:
                      MD5:7D15B59C189C4FCF8A93A111F254E646
                      SHA1:0779E72B4F013AFBF0B302BDC4D48F63D3E3C16F
                      SHA-256:5159A5DDB6D57B9DC7FD72A529A878E437A296F3ED59081A078CC899914B8476
                      SHA-512:1AD6B6036E40E94DB3109E3DB7C1F5B14E8E9CD9F47F64C4742525134568DD70C1612C470A8C02994BAC3BEC91A96675A08379D0BB88599FDA962602F15E6C95
                      Malicious:false
                      Preview:.....2.... ....2.................1....Beast_Soulengraving_tips12...Beast_Soulengraving_skilldesc1..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1..3Prefabs/Controller/Dragons/UIAnimalsBrandCell_horse...Beast_Soulengraving_text1..............................1:5000...15950:120.....108..........5|6|7|8.P.......2.... ....2.................2....Beast_Soulengraving_tips12...Beast_Soulengraving_skilldesc1..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1..3Prefabs/Controller/Dragons/UIAnimalsBrandCell_horse...Beast_Soulengraving_text1..............................1:6000...15950:130.....108..........5|6|7|8..........2.... ....2.................3....Beast_Soulengraving_tips12...Beast_Soulengraving_skilldesc1..8Assets/PackageRes/Raw/Sprite/UI/Icon/DragonTalent/3595_1..3Prefabs/Controller/Dragons/UIAnimalsBrandCell_horse...Beast_Soulengraving_text1..............................1:7000...15950:150.....108..........5|6|7|8..........2.... ....2.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):18312
                      Entropy (8bit):5.8935472353326395
                      Encrypted:false
                      SSDEEP:
                      MD5:774BEFC1F68CFBC2F269330ED9DC38D7
                      SHA1:E3CC4B230BB9A6831B23181DF3DB7A5DB209787C
                      SHA-256:2B24747B9AA90D40BA4221E157325E58E32B805E43C17A6EEAB6C520E078217F
                      SHA-512:48800716DD3F373D46FFC8EAD7E7AFDB0F0EE1FC7D4EE7FFA2D1B97C43E4DEB9D17C7FC2674AE53BB6048EFD8E194EEF771D9A0AB5EC5F110FC43AE7BB3513E9
                      Malicious:false
                      Preview:.................... .........monster_77...'.....................$.. .....d...monster_77...u....0................O.. ..........monster_77.........1.................... ..........monster_77........1.................... ..........monster_77.........1.................... ..........monster_77.........1................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................. ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1................... ..........monster_77.........1.................... ..........monst
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):18662
                      Entropy (8bit):5.896030963283197
                      Encrypted:false
                      SSDEEP:
                      MD5:1E146500D26960EDC2DA2AA20E3C1F14
                      SHA1:FB6DACBF4C2DC25DA5C45B0AFB945874BD2DE81A
                      SHA-256:5205AD6123B3A56C6D4C1C582007C2516466650DBB480DB4F497C91D6A0754EA
                      SHA-512:27AB61C0AB1F179A1D1BA096EF5355F09BA1606BC91DA8FB982B2ED1A58BE9C74B6A06B4A93813E54F0DC67798595C6F9CC1BFDF4AA96C135936C4EB1066F9F5
                      Malicious:false
                      Preview:.................... .........monster_77...'.....................$.. .....d...monster_77...u....0................O.. ..........monster_77.........1.................... ..........monster_77........1.................... ..........monster_77.........1.................... ..........monster_77.........1................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................. ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1.................... ..........monster_77.........1................... ..........monster_77.........1.................... ..........monst
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3610
                      Entropy (8bit):5.374089401675193
                      Encrypted:false
                      SSDEEP:
                      MD5:530E6299BAFA1D4333F6D8FC2A7618AA
                      SHA1:9A074777DF4DB1EDFF75631033D22ACA93F55BE1
                      SHA-256:402A08816159C9F35597F3166BFB8FF037E7FFD99FA6C972A4DFAB5FE4BD418F
                      SHA-512:807C2F3E24C5178185F746708E9DA45D15B815220404138FD610E9B4E82F64B8367FEBFD84F87C2AFD8F7644C7785AC9B2936A32EAE708372A320829C3F7E04B
                      Malicious:false
                      Preview:.$...........................d..d......&................z......................'.....................N..................(.........................................(.........................................2.............................*............6667:10.$...........................d..d......&................z......................'.....................N..................(.........................................(.........................................2.............................*............6667:10.$...........................d..d......&................z......................'.....................N..................(.........................................(.........................................2.............................*............6667:10.$...........................d..d......&................z......................'.....................N..................(.........................................(.........................................2.............................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3345
                      Entropy (8bit):5.365948798136549
                      Encrypted:false
                      SSDEEP:
                      MD5:7BE3C58D86B8946958F519EB8EED748C
                      SHA1:ADF06166CE88A3190103B331D5B946EFAF6709F3
                      SHA-256:AB0B60D518E0B96B3961B55396006AEA5E49EC19C49FC3C0284F3B9016C84D81
                      SHA-512:4A3E7D6C249AE546A0EA437344C938D38B40568EF6FC95BB30D386AA1BA3AE2B531D03EFD18F18DB598644837513F430B1BF3F4564B776B47C3A1F4D4A7A8412
                      Malicious:false
                      Preview:.$...........................d..d......&................z......................'.....................N..................(.........................................(.........................................2.............................*............6667:10.$...........................d..d......&................z......................'.....................N..................(.........................................(.........................................2.............................*............6667:10.$...........................d..d......&................z......................'.....................N..................(.........................................(.........................................2.............................*............6667:10.$...........................d..d......&................z......................'.....................N..................(.........................................(.........................................2.............................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):451
                      Entropy (8bit):4.537994185412605
                      Encrypted:false
                      SSDEEP:
                      MD5:E0DDECACC91B2FD20844EEFE1175FB38
                      SHA1:C42C32C5067DFC8B490D4A1AC998F0A0D1246C3E
                      SHA-256:CB24F701D55A6722806F919C369F96ACEE246932BB3B86BE73779B11FB6A2EB5
                      SHA-512:D6FC2CFA6BA57F081C300E94A35A49658E67E04E246569EC0989D24D59DF1E5D3E0975308032FB9DC73543A752F3BD2E346A82C9ABCDDFB74DC10FC9B8939C24
                      Malicious:false
                      Preview:....N...N...24:2;949:5;3995:1....N...N...24:2;949:5;4009:1....N...N...24:2;949:5;4023:1....N...N...24:2;949:5;3995:1....N...N...24:2;949:5;4009:1....N...N...24:2;949:5;4023:1....N...N...24:2;949:5;3995:1..............24:2;949:5;3995:1..............24:2;949:5;3995:1..............24:2;949:5;3995:1..............24:2;949:5;3995:1..............24:2;949:5;3995:1..............24:2;949:5;3995:1..............24:2;949:5;4009:1............24:2;949:5;4023:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2925
                      Entropy (8bit):5.18278433455238
                      Encrypted:false
                      SSDEEP:
                      MD5:AADB3742E2EB585C31CAEB531D12F493
                      SHA1:93ECC6F6341EE8CC728412820D1292CD7676F7E5
                      SHA-256:91529A1CEC446602317E7BB3F301C7F58304F775E3B3E09596FA314782E71CA0
                      SHA-512:F4FEACBF6A35EE89F055B07FDAB94B87A06520CF7BD66825B14884E8F7D32F1007C0B51D99B7A7C510F8D6DC3186657EB208A1F26C863433B183C417263C16CC
                      Malicious:false
                      Preview:...............19328:1.........19328:1...19328:1.<.............19329:1.........19329:1;6244:5...19329:1;6244:5.>.............19330:1.........19330:1;6244:10...19330:1;6244:10.>.............19331:1........19331:1;6244:15...19331:1;6244:15.>.............19332:1.... ...19332:1;6244:20...19332:1;6244:20.>.............19333:1.....5...19333:1;6244:25...19333:1;6244:25.>.............19334:1.....k...19334:1;6244:30...19334:1;6244:30.?.............19335:1.........19335:1;6244:35...19335:1;6244:35.?.............19336:1..........19336:1;6244:40...19336:1;6244:40.+.............4874:1........4874:1...4874:1.+.............4875:1.....5...4875:1...4875:1.+.............4876:1.....k...4876:1...4876:1.,.............4877:1..........4877:1...4877:1.,.............4878:1.........4878:1...4878:1...............5222:1.....................5223:1.....................5224:1.....(...............5225:1.....;...............5226:1.....N...............5227:1....._...............5228:1.....................5229:1..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):366
                      Entropy (8bit):5.103098823530673
                      Encrypted:false
                      SSDEEP:
                      MD5:FD0682FB2CB4753D7BCD3CCBD6B1D001
                      SHA1:32190930945E10AB544BB831D29F20C24AD3CE51
                      SHA-256:730422D764366F85195F55C63EE2A74DF09597F740783C010BDD4542726878FB
                      SHA-512:05E70C6000CCD909DEC7035907A09EEA27C8233019448066800861AEC3F3C2BC31DDAD4C6217C6083C9F0D500C30469ADA2D52726D69E9A60492A28E37740DC0
                      Malicious:false
                      Preview:...........$............................. .......>...>.."..<....]...]......<...............-.............(..x...................................$..............'...................................................'....................-................................'..$.....$....$......-.....*....*............I....I...'..Z.....z....z...'......................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1519
                      Entropy (8bit):4.943077673304415
                      Encrypted:false
                      SSDEEP:
                      MD5:1AB2E05441121D241ACED75C4ACC602F
                      SHA1:8F3F575FE12ECEB4BC759DAD969E9EAA402B95A0
                      SHA-256:B20078143DE89D9F547D4D0A7DEEFD7F1126BAB8972779850C61DF4BD4DDBB22
                      SHA-512:89E83E54BA457871B5BFCC437796A948A1A9936311B4EFE5F8B6A40D2102D85C013673BCFE46FD815835699A2579EE76B7116E8466FAAD752DD6F376B652B096
                      Malicious:false
                      Preview:.........................p..................................................................................................................'................................6................................F................................U................................e................................}....................... ................................. ................................ ................................. ................................. ................................ ................................ ................................. ................................. ................................ ................................ ................................ ................................. ................................ ................................. ................................. ................................. ................................ ................................. ................................. .......................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2205
                      Entropy (8bit):5.414578392255706
                      Encrypted:false
                      SSDEEP:
                      MD5:6B82ADC5DA37F12F0BE19974B046AEEF
                      SHA1:B3D95365BEE76FCAF8872892546B60B89AF6032A
                      SHA-256:E8D3433C4CE13A4869B37D82891427698583B3DD1AED2D346E158E822C278487
                      SHA-512:E2A532CD687300B3CD86A21D84E9AFFA41BC89E4FC5C75A9FEF8F32FD7D1A05336C2F37BCF4D5FDC4989390F444783C0777A79FFCEDD1FAB6F3C76C4F8F8AB82
                      Malicious:false
                      Preview:./................B.............................../................B.....A.....@.................../................B.....A.....@.................../................B....A.....@..H.:?...........?./................B....A.....@...zT?...........@./................B.....A.....A..{.n?..........,@./................B....A.....A.....?..........L@./................B.....A..ff&A..R.^?...z.>...Gq@./................B....A....8A....u?....>....@./...............xB.....A..ffJA..ff.?...Q.>..H.@./...............pB.....A....]A...z.?..\..>..33.@./...............hB.....A....qA...G.?..=..>..{..@./...............`B.....A...p.A..)\.?.....>..33.@./...............XB.....A..ff.A...p.?.....?...G.A./...............PB.....A....A.....?..q=.?..ff.A./...............HB.....A.....A...p.?.....?....,A./...............@B..ff.A....A.....?..R..?....@A./...............8B...Q.A...z.A...p.?....+?..q=VA./...............0B.....A.....A.....@....5?....mA./...............(B..R..A.....A....@..\.B?....A./............... B.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2205
                      Entropy (8bit):5.414578392255706
                      Encrypted:false
                      SSDEEP:
                      MD5:6B82ADC5DA37F12F0BE19974B046AEEF
                      SHA1:B3D95365BEE76FCAF8872892546B60B89AF6032A
                      SHA-256:E8D3433C4CE13A4869B37D82891427698583B3DD1AED2D346E158E822C278487
                      SHA-512:E2A532CD687300B3CD86A21D84E9AFFA41BC89E4FC5C75A9FEF8F32FD7D1A05336C2F37BCF4D5FDC4989390F444783C0777A79FFCEDD1FAB6F3C76C4F8F8AB82
                      Malicious:false
                      Preview:./................B.............................../................B.....A.....@.................../................B.....A.....@.................../................B....A.....@..H.:?...........?./................B....A.....@...zT?...........@./................B.....A.....A..{.n?..........,@./................B....A.....A.....?..........L@./................B.....A..ff&A..R.^?...z.>...Gq@./................B....A....8A....u?....>....@./...............xB.....A..ffJA..ff.?...Q.>..H.@./...............pB.....A....]A...z.?..\..>..33.@./...............hB.....A....qA...G.?..=..>..{..@./...............`B.....A...p.A..)\.?.....>..33.@./...............XB.....A..ff.A...p.?.....?...G.A./...............PB.....A....A.....?..q=.?..ff.A./...............HB.....A.....A...p.?.....?....,A./...............@B..ff.A....A.....?..R..?....@A./...............8B...Q.A...z.A...p.?....+?..q=VA./...............0B.....A.....A.....@....5?....mA./...............(B..R..A.....A....@..\.B?....A./............... B.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):569
                      Entropy (8bit):5.284829630152051
                      Encrypted:false
                      SSDEEP:
                      MD5:EC9D640231C8E17F2FE30DE5E9D5C457
                      SHA1:520D7725966538E686A54CBA2D48DC0F7CD85E62
                      SHA-256:1FF66D182E5310D819BE506BCDBC0E7C551B835A29A87D2FDFDCA26B6560CA57
                      SHA-512:DDB0A380A44FC1D21EB87BF1ABC724E9076D85CABB595C98CB66B08DC3EC7876A824F23A830089F99124EE417CDC51D54EC9F796FD125E3296573BE579E122C0
                      Malicious:false
                      Preview:.5........PayPal...PC_icon_Paypal.png......Paypal.......2........adyen...PC_icon_adyen.png......adyen.......4........stripe...PC_icon_Pay06.png......stripe.......8........VISA...PC_icon_Pay09.png......adyen.........visa.K........Google Pay...PC_icon_Pay02.png......adyen.........BR;US...googlepay.B........Bank Card...PC_icon_Pay05.png......adyen.........KR...card.A........NAVER Pay...PC_icon_Pay03.png......3563.........KR...3563.E........KakaoPay...PC_icon_Pay01.png......adyen.........KR...kakaopay.A........Apple Pay...PC_icon_Pay11.png......adyen.........applepay
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):621
                      Entropy (8bit):5.347592048458039
                      Encrypted:false
                      SSDEEP:
                      MD5:3DF536E897438E68C2BFFB415B3D720A
                      SHA1:1A2244B3002692105C88FB4145F42011F399C0C6
                      SHA-256:3E711A576D7E3D2D39CABAB8F2B3F1D4205035E6489301ABB995B9AB441949B8
                      SHA-512:6E6ABF7F91CE626EE677AFAD3B4D25820DB7808B43D19D97C17C9DB8E9E87C070E7331AF06A408BFB90AE61F6F11562CB53C16BF3273FEB9FE125AF0E7253481
                      Malicious:false
                      Preview:..........PushDoubleCouponWindow..........PushDailyRewardWindow."........PushSuperValueReturnWindow.#........PushSevenDaySuperSaleWindow..........PushFamousGeneralWindow..........PushNewServerGiftWindow..........PushStoreGiftWindow.$........PushInvitationAndShareWindow..........PushChurnGiftWindow..........PushJoinSocialWindow..........PushNPSWindow.#........PushNoviceGiftIDNViewWindow."........PushNoviceGiftJPViewWindow..........IOSStorePushGift..........PushFreeGiftWindow..........PushMineSaleWindow..........PushMonthSignWindow..........PushBoardWindow..........PushUserRecallDialog..........PushPreventLossWindow
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2917
                      Entropy (8bit):4.735670173914618
                      Encrypted:false
                      SSDEEP:
                      MD5:B8AC23D392173A816E3FB33DFC38FAD4
                      SHA1:7C28C52CA869FF5C35B38F6A052E5733597E4AD3
                      SHA-256:42257C5CBC2BBC8AB62D5DB5799FE51BA38A460E9E7E801CB184C9C02597844D
                      SHA-512:6D8B6A1CC837C0A0E47044BD23FC920595AAFDFD20A236DE5955E143242F793A4D2A2C7D98C5A1A7F78E6A040CC0C942B58A83FD1C70ED00F046EBAE8E42ABC3
                      Malicious:false
                      Preview:..........1001;2118..........1002;2005..........1003;2012..........1004;2013..........1005;2017..........1006;2018..........1007;2019..........1008;2011..........1009;2002..........1010;2140..........1011;2004..........1012;2022..........1013;2129..........1014;2007..........1015;2028..........1016;2021..........1017;2029..........1018;2125..........1019;2120..........1020;2131..........1021;2008..........1022;2001..........1023;2051..........1024;2003..........1025;2014..........1026;2054..........1027;2064..........1028;2009..........1029;2015..........1030;2006..........1031;2143... .. ...1032;2010...!..!...1033;2020...".."...1034;2016...#..#...1035;2023...$..$...1036;2024...%..%...1037;2025...&..&...1038;2027...'..'...1039;2030...(..(...1040;2036...)..)...1041;2026...*..*...1042;2031...+..+...1043;2033...,..,...1044;2034...-..-...1045;2035..........1046;2037.../../...1047;2038...0..0...1048;2039...1..1...1049;2032...2..2...1050;2040...3..3...1051;2041...4..4...1052;2042...5..5...10
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):21681
                      Entropy (8bit):5.073444376342997
                      Encrypted:false
                      SSDEEP:
                      MD5:22A0CAB941BD48092ABF9EF1D077F9CF
                      SHA1:4D86232D83DD995F5B97D73B55F441D02A4756E3
                      SHA-256:0993469BA0FBF082C620CB0DBC000B20A3FD42D30A82DE2684E4B4910523A901
                      SHA-512:546A0EA28E5250B79DFA1576A153FC6B1C1A213BEC61ACBAD0346C97AC176D2B0F14A46B72F6B7C029075E9FAED134E342DB98951BCA25403E223F3CC83DA486
                      Malicious:false
                      Preview:.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_1.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_2.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_3.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_4.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_5.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_6.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_7.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_8.N.........DPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_9.O.........EPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_10.O.........EPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_11.O.........EPrefabs/Puzzle/PuzzleShootingCombination/PuzzleShootingCombination_12.O.........EPrefabs/Puzzle/PuzzleShoo
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):21647
                      Entropy (8bit):5.401944934312244
                      Encrypted:false
                      SSDEEP:
                      MD5:09C58183F317CFB6D1ADD4237D94F3FB
                      SHA1:CE6AD4B767747B9FB38C2246A8A3D6A2B28A79C1
                      SHA-256:9664684E4B1F7F6B1958CC7F089B4E3CEA2202C6E2ED05A83857C3A2D87B610C
                      SHA-512:0D1003A798BE428ED028ACFF8E3C4B58A62878D572DEA4D21688E0FC3DFED42E3282F241A55C18951198E4927AEC97C8D0383563ABBDD623A40B485376CDCAC0
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle13/Puzzle13_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle13/Puzzle13_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9010
                      Entropy (8bit):5.301740225886867
                      Encrypted:false
                      SSDEEP:
                      MD5:868AF052A44436D4DD9A40EA10DD675C
                      SHA1:BB76ECCF1630672D1BB8E7F91DA52D0E006EC5D3
                      SHA-256:85EF1AF3FA5D680CF913EDA18EE3ACEBD8A2669AC93C6A6888F880B0DE5BAA1D
                      SHA-512:372E2209F391FEEA2AB7D8F0EC7F8583F607150D2FFBB82114A188857813D7D48BA5136262C46553FC1A5BC25CBF56ABFD930DAF27B635BA376101D7AFB0C61E
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.. Prefabs/Puzzle/Puzzle6/Puzzle6_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3..............................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle7/Puzzle7_100.."Prefabs/Puzzle/PuzzleMap/UI_clip_4..............................g...puzzle1...puzzle_des1.....f...2:3..!Prefabs/Puzzle/Puzzle6/Puzzle6_21.."Prefabs/Puzzle/PuzzleMap/UI_clip_4..............................h...puzzle1...puzzle_des1.....g...1623:8..!Prefabs/Puzzle/Puzzle6/Puzzle6_14.."Prefabs/Puzzle/PuzzleMap/UI_clip_4...................................puzzle1...puzzle_des1.........1010:3...Prefabs/Puzzle/Puzzle3/Puzzle3.."Prefabs/Puzzle/PuzzleMap/UI_clip_3...................................puzzle1...puzzle_des1..........1644:4...Prefabs/Puzzle/Puzzle1/Puzzle1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4...................................puzzle1...puzzle_des1..........8:1.. Prefabs/Puzzle/Puzzle5/Puzzle5_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4...........................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47844
                      Entropy (8bit):5.59026461663595
                      Encrypted:false
                      SSDEEP:
                      MD5:7F265C89AC4BE29EA280AF81EB89E47A
                      SHA1:D24795157455292D56CE561050F6B62DB4D0ACC1
                      SHA-256:046ECF95F801F7439DDF0B89F10F04B3E8E659DD44DC85E196D4A92115B8EDCE
                      SHA-512:CE44929AF2BF23930C76EA6F12CC401DF7ECA7DA0D69B2C3C6746719EE723FFC33D673892A066329621ECDBBCAB282C216F64C62362E6154D856FAC78E127245
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48081
                      Entropy (8bit):5.587823557250514
                      Encrypted:false
                      SSDEEP:
                      MD5:B1DE8DCBDA63403B8CFF366B4A437397
                      SHA1:F4C62DB6EB59EEFFB43588CED01638FFDA73067F
                      SHA-256:49C395868E9238D5863AAE003AC4D615A2B0807E65D3FA5DFCC58E57E847C374
                      SHA-512:6C1B56987DADA15BED2324B673B3C4657845743AA4876FFE4BDD58235365F117449B91B91B031B20E222FD42ED4271F851F4ED48037AB15E2C10A4C3C36ACEE1
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47844
                      Entropy (8bit):5.589190778578392
                      Encrypted:false
                      SSDEEP:
                      MD5:C25CA815ECBB3518B207958EFDBA2877
                      SHA1:896A42A2D4C744ED752CB5F6E432A611994DBC87
                      SHA-256:961BDED4658D0BF6E92DCE64B36DA6BC68A39EED972C348AEC359A9CA02BA114
                      SHA-512:7EB3A194EB2765C5713508A492C92995B601F00D1DDEFFA5CE87A6F80200F595B5DC849B041CA5BABDAA3C31629F4AF469BF366A35CBC0375F7B0634EA146A03
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle16/Puzzle16_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle16/Puzzle16_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle16/Puzzle16_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle16/Puzzle16_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle16/Puzzle16_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):52153
                      Entropy (8bit):5.653089715683603
                      Encrypted:false
                      SSDEEP:
                      MD5:D518D1E34ABBC19CA6AED37146A74E2A
                      SHA1:751EC462994B87787E6DD4CA89C86EBE0D2E50BB
                      SHA-256:F29B2BE4290617181C9A57A1D579244823DEFDD9A81351C3168C06F813B5FFFB
                      SHA-512:426D7C6257E65051761617C56BCB20D33D9355EF189DA60E6AAB192AB59218E8869D147F377EB05713C258A591A5CAA6C3CC4AEAFE54F203BDE0B4CB3D88EDF6
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.....................10399:1;1:2;33:1..................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.....................10399:1;6:2;35:1..................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.....................10399:1;11:2;37:1..................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.....................10399:1;16:2;949:1.......................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.....................10399:1;1:2;21:1.......................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.....................10399:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47988
                      Entropy (8bit):5.591069878563978
                      Encrypted:false
                      SSDEEP:
                      MD5:E2BE62B6C55B4A5BBF37FB6E86AFC896
                      SHA1:3933609770C20FCC0FFA5FBD8903E5C710BDDD25
                      SHA-256:C5C0A880884C0F19C16C9F001F553D391C9C1C9DF4065851B9A3083C12E23C9B
                      SHA-512:12457C72E037F934F78BC964488F953EE001B5D297D2285DDE0C130ACC9D3225EABB7FFCECC8542DAC20D9E246B3B27F052A9473904F227D9B7D0DA106ABEFD9
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..+Prefabs/Puzzle/Puzzle_lines/Puzzle_lines1_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..+Prefabs/Puzzle/Puzzle_lines/Puzzle_lines1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..+Prefabs/Puzzle/Puzzle_lines/Puzzle_lines1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..+Prefabs/Puzzle/Puzzle_lines/Puzzle_lines1_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..+Prefabs/Puzzle/Puzzle_lines/Puzzle_lines1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..+Prefabs/Puzzle/Puzzle_lines/Puzzle_lines1_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48238
                      Entropy (8bit):5.597190467345763
                      Encrypted:false
                      SSDEEP:
                      MD5:BDFDB00E2E640FCFA711677F78BFF87B
                      SHA1:893AF1291468F17740BFBF13621E6ABBA56F43F7
                      SHA-256:5A12FF1892A04E881C1EAFAFB8C6D8F591CF38B0343CCE363FC241D2F6CF95CC
                      SHA-512:7BA456E9E6D02B6F7A67561DC748084991174C66CBB6210356AB181F037B50BF3152F02ACECCE05994420B9466D283735CBDEEB67C2D195B20B828B60E5281FE
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..)Prefabs/Puzzle/Puzzle_pins/Puzzle_pins1_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..)Prefabs/Puzzle/Puzzle_pins/Puzzle_pins1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..)Prefabs/Puzzle/Puzzle_pins/Puzzle_pins1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..)Prefabs/Puzzle/Puzzle_pins/Puzzle_pins1_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..)Prefabs/Puzzle/Puzzle_pins/Puzzle_pins1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..)Prefabs/Puzzle/Puzzle_pins/Puzzle_pins1_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1..)Prefab
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48641
                      Entropy (8bit):5.642630874326545
                      Encrypted:false
                      SSDEEP:
                      MD5:2DCFAADACF60F6843B80B83D68F526DE
                      SHA1:0341A984989D8C535154AD3E55492562C12BC4E6
                      SHA-256:1D66315DCF4324B70C17A860D4EF394A14775D9F5786EA0C0556886CBBD90ADF
                      SHA-512:6B9EEEC71E14782D3E80A78C271B236DC9A7772A46C395E17C5C376AA78F355614BB42FF5F373337F358F48463853DF2C30AAEFE15C05631E8F42A43C211736F
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):50206
                      Entropy (8bit):5.670321030212327
                      Encrypted:false
                      SSDEEP:
                      MD5:C132D759EEB8398CA34006E4066F4510
                      SHA1:D27507393AABEA1ED7F36E24B6C38B31D35BA546
                      SHA-256:1A83C31523B3E4273B6BFB18C72096AC2317A58F2D6D457CB9220ED7CF0880DB
                      SHA-512:57BF366CF043881278ADEDE149A7EDD047776D800E8A30747592B362D190FA1633673C405785F41E12E2AB4CEE4F9D582B7AA649B3301813B449E79407EAC693
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_86.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_87.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48330
                      Entropy (8bit):5.627394621785048
                      Encrypted:false
                      SSDEEP:
                      MD5:3D62F6FB54EB8D66BF9583C25782CBBA
                      SHA1:FA8F2FD56B1F9115B22EA89F0413D04408C5D9B3
                      SHA-256:9B2E35561BAD1EB079346130DA65DF16F1E91166AEBCAE6924107775DBC63382
                      SHA-512:19C9F4F4F65982EE03C5E7FBCE72096E294288C1183F401B5463B7886EF1DDB509835FA2205BCA200C476A14A39DD972C25B14CF280D973D6DB6CA5A72F5A519
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1..1Prefabs/Puzzle/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):49179
                      Entropy (8bit):5.669112783578195
                      Encrypted:false
                      SSDEEP:
                      MD5:691C76C5B82412CA967FBF78B750FF64
                      SHA1:DC1B547805269117067F36DAFF3815153B1E3DA5
                      SHA-256:39620F660C197D052DBE7A7566979BD02EA400DF0CA9882E19DA64455C5EA96F
                      SHA-512:18BAC9F905710C42B13450C568AD7B99B0960ECC922FB539BB81C59EFB119F48A3DDEB9E422C346F9CD9D1E7128DF3B014FF0A62323EEE1417455537ABB47FF9
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):50250
                      Entropy (8bit):5.592160232248423
                      Encrypted:false
                      SSDEEP:
                      MD5:B743D93E63EF4042CDD64C77E28A86EF
                      SHA1:8CA2CCFE2D22301C2EB65AB9C91759AC2512F180
                      SHA-256:69A65E8687560A2C95C3C6F065EA174F15447E9647964B2DE8928B91262BD73D
                      SHA-512:E8973D8C536308C256A3E43716239EE3B5ACB6E7F7D2A109D6CDA8A82CCDF6C29297B93AD768C5225BA944193774A270E2CC3A27A229B5ACBCE2589C293280E9
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):49179
                      Entropy (8bit):5.666595887149239
                      Encrypted:false
                      SSDEEP:
                      MD5:FAFCB9DA40FEF1E6B79696A9543AA087
                      SHA1:937B122E3BE4705C7F678E449254E726622DEBF7
                      SHA-256:AC08CEBF716D83708B40D1891353B98A857BBC1BE7831ED58F5056E39E1252D7
                      SHA-512:D24B09E10DE2A8F5CCF28FE3B28D9878C6F23CB6E65944A236710B23BD53B48910F9564F6B60B2F21823195CD2F97FE716F4DE14B83A79CDB68D3C87255D9CD4
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_7.."Prefabs/Puzzle/PuzzleMap/UI_clip_4...................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):49179
                      Entropy (8bit):5.669233033813412
                      Encrypted:false
                      SSDEEP:
                      MD5:F16F67204B3B1EE3764ABC415861438A
                      SHA1:85D05BA6F79E7EB3225A4A6E2868617A965FA57F
                      SHA-256:60E9EDB6827FB3F32701B84236C9F262D50AB2AC6DE8757B925E38FCE08DA961
                      SHA-512:6F20BBD23A2C002BDC90390994206B8BE059482AC2685F967FD5F7FC311F42725D7300A53FD947DE3DD61A39F4DF3C1A6DF23D9082F5D6C260397D49F64C1EC8
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_7.."Prefabs/Puzzle/PuzzleMap/UI_clip_4...................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):50206
                      Entropy (8bit):5.673163848191895
                      Encrypted:false
                      SSDEEP:
                      MD5:414862C59EFFB57F6F13E2D378C15040
                      SHA1:C91B474773169DA3EF704B37442F161DAD5C073D
                      SHA-256:9C7D5F2566202DADC780DF83C82CD482AD5982C3BA4CE28578AFC2718C529FCB
                      SHA-512:6961FA1AFC18A61C72781EB8C03924D4614BBDE55192017A8A0A258EFFBA9974C404F6387F975997C3867FCD455890823DD7D143FF54E9E0A244528F32520B51
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_86.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_87.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):46883
                      Entropy (8bit):5.764788230022067
                      Encrypted:false
                      SSDEEP:
                      MD5:D86860B763EB9244655A9AB3FEFD6C3E
                      SHA1:21A09E5645288A254DDED29941BC96E25119BEDF
                      SHA-256:9477FC837737A047CEB815A23C03443B88C701D51CAB097BF02F9539ABBDB9A8
                      SHA-512:5A38B59171CAC10C5C8784DF187994F72ECC1844070BCD23F38D8B12A8A4118AEF7153A7B48F398122E4DFF5CF7CB53956AFA8EE273D10B8929588C94EA0A243
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5...PuzzleShootingCombination_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3...PuzzleShootingCombination_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8...PuzzleShootingCombination_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3...PuzzleShootingCombination_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4...PuzzleShootingCombination_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1...PuzzleShootingCombination_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):75960
                      Entropy (8bit):5.672265585027742
                      Encrypted:false
                      SSDEEP:
                      MD5:C9F3220DCB94DCC380CE7D02C8C506B0
                      SHA1:0C486FA11607C79F6E92F2D6A5E91295173FAB8C
                      SHA-256:254B0CD52B921B747DB1D5BF5315E7B7589E04A19C8AF87A4EF587B690B57A10
                      SHA-512:52B734E956A7F6CEC26462817AAAE46DB588A25292F54FF174C3D38C2BFEC037895B2DBF3E87B132DA1E9E7F1DE4FEAF0BABE0455BD93BA484443D0DC84B35DA
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):50206
                      Entropy (8bit):5.672975504707064
                      Encrypted:false
                      SSDEEP:
                      MD5:A086D5D6444A969665B55E00F7C07025
                      SHA1:1C6A2F64D681B957727807F4545A2B62A904F2EB
                      SHA-256:31D4AF35B7666D137487136A3767C4BF4DA4D0C46BC48BB9E14F6EC855F3DC87
                      SHA-512:7ACEA5993F5AEFA0B26F41CB3567857E3895FE9E12D8955B2782C33449729E41D84CF3A9493A21EA5C00F41F310EF9688D80073B6F3D3B7CCBD26999ABFDB0FD
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_7.."Prefabs/Puzzle/PuzzleMap/UI_clip_4...................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47120
                      Entropy (8bit):5.7625043961154
                      Encrypted:false
                      SSDEEP:
                      MD5:B59490F1845E25D466837557CB0AFC5F
                      SHA1:A43CE58C5139E816DA58C1B972EB98FCC4DC2065
                      SHA-256:12C93F13D519F852CF9B242C7EEF96D8E6EC290D06D74A4A30F8954DA8C72B48
                      SHA-512:B2B73C9E93683D9E0841B3E5EFBFBFE5DCB5C2E3492C5913BAF225F57AAE7EB48D7BAD44FB9631820FD110E046D7F993B825F46DECCAA288AC156779D383765F
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5...PuzzleShootingCombination_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3...PuzzleShootingCombination_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8...PuzzleShootingCombination_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3...PuzzleShootingCombination_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4...PuzzleShootingCombination_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1...PuzzleShootingCombination_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47844
                      Entropy (8bit):5.589178826193698
                      Encrypted:false
                      SSDEEP:
                      MD5:9E05FF4FEB0223CBCA5E31D692E0B358
                      SHA1:A394F142D41E7E759270B63EC051B50153C5F2D6
                      SHA-256:E31F45AFF0EFE8534B66DE6095E247069E94F351C8ACBB3C58FE3F566BF8CC8B
                      SHA-512:14B63F475ACF0487EF14B7FA9E7DA766DAC7540C2AB722EB3E2E54EE2E095FA693A83F84FAA1644D3B9F29E158C19315BD732BAD8EA8B21ACFBB3046759C3A66
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle16/Puzzle16_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle16/Puzzle16_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle16/Puzzle16_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle16/Puzzle16_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle16/Puzzle16_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle16/Puzzle16_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle16/Puzzle16_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):116270
                      Entropy (8bit):5.7051909522453235
                      Encrypted:false
                      SSDEEP:
                      MD5:8E43B7A372A730AC1DF96CAC053098A5
                      SHA1:8D102A447865CEE3A732D98A10D69673B4DCD91F
                      SHA-256:14AC916804F0F486F8C2A6AF0C240D051C94409CE44C4849D818AE7FE70F4F29
                      SHA-512:D08BBD2DE9C53EE5F4B8D30486577159283B67BC372B21ED48CE8ED1CE0F2249385BDD9190A62A85B2618EB5F6775069E2C62B8CE5AFF202A51C3D569AD0452A
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):46883
                      Entropy (8bit):5.764847662796906
                      Encrypted:false
                      SSDEEP:
                      MD5:EBA7A6DBEAFE3E1A7A5DA3B206B4F501
                      SHA1:3EC8DED3D7163457DDE2EDEE0316D69F2092E0AC
                      SHA-256:66E7D4FFF4E0157B05B8B2150D15163CB77193542A111929386E833083D37D4F
                      SHA-512:2DAE10F96EF8F1B7B542A2E7B17579C2A08D356A045F945C32E360E332FE35AE0F64BAE11EE56652F29904FCE3FC4925BC5FDDC25B852F9603DF4BC3CDC037CF
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5...PuzzleShootingCombination_138.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3...PuzzleShootingCombination_150.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8...PuzzleShootingCombination_8.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3...PuzzleShootingCombination_7.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4...PuzzleShootingCombination_16.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1...PuzzleShootingCombination_120.."Prefabs/Puzzle/PuzzleMap/UI_cl
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):27459
                      Entropy (8bit):5.417702557035579
                      Encrypted:false
                      SSDEEP:
                      MD5:F5FE4B51833499C3CC93B67C0D058412
                      SHA1:A70EE852043089A4172B53F577C8C3AB31698534
                      SHA-256:5C04B0EF2FFF5BD12761FAEF2575958EEBC4F493709B58D6C72ACBA9CD556D1C
                      SHA-512:61A7B388AFEF857A00EE5453C3E7FD18BBCFC87A1308E256D45E5E0B504F1D27954035BB8B0B6826D6D5CEF1EDB2D28D18541A290C9DEF1635235157951AEDD7
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...7:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................i...puzzle1...puzzle_des1.....h...4:3;6:4.."Prefabs/Puzzle/Puzzle15/Puzzle15_8.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/P
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):115309
                      Entropy (8bit):5.7581425123995915
                      Encrypted:false
                      SSDEEP:
                      MD5:C66093C9363A7C70E59B7B3A3E0532FD
                      SHA1:D2D7951AAD025626B6E8DF12354D25CDF60BBED6
                      SHA-256:8CE7D8DAE40528CE553AA5EF214E8017A3402B800CB4D5FCA9B59EB31DEA9E1E
                      SHA-512:E0B5A8DBF28234663F98932E123E329A6F42B768B3FF9376BDC43A68519AF255D38885922FB2274D8172E3DDE1CA3F0D3F9DA9EDEE5C9D331D809F9BA95B2298
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5...PuzzleShootingCombination_138.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3...PuzzleShootingCombination_150.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8...PuzzleShootingCombination_8.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3...PuzzleShootingCombination_7.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4...PuzzleShootingCombination_16.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1...PuzzleShootingCombination_120.."Prefabs/Puzzle/PuzzleMap/UI_cl
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48329
                      Entropy (8bit):5.67019312333738
                      Encrypted:false
                      SSDEEP:
                      MD5:4E8CE6421F1944153E7F16C3EFD29A02
                      SHA1:CCCABB4ADB16DF971E100F69F11613B371CFF1B3
                      SHA-256:58592B464A4F75BB88670C9FA3B302D3BB4A2D017B7FD3AA74DA1F41D8854DDE
                      SHA-512:780D0D65FD6A83A82F213205E61A2D9A7B797F86E7C45694B9E8E04F99996BB4796A3170211426FBC962D7CD5B23E4D55154CA5DDC9D88EF10A15D97544B2455
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1..*
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4366
                      Entropy (8bit):5.617569594555599
                      Encrypted:false
                      SSDEEP:
                      MD5:13296384A744E12143C8E64185B524A0
                      SHA1:1BC708FB00A991A126BBDD2F8E010C1FF4AB9029
                      SHA-256:B430AB1EE9921E8875D83F60DCAA36AC7D7E0CAD80C84C23E7F8414376210F53
                      SHA-512:B6AE7BD1530A0BE29B285A1C37970EC0C1F1DD157B2625D3D4D7227029FD82790A666BE815A42654F42A0F37D9CC304C41BB7F2E963EEA515054CE3419690D07
                      Malicious:false
                      Preview:.....N.....N...........puzzle1...puzzle_des1.........2:10;1655:6;7144:1..#Prefabs/Puzzle/Puzzle_CP/Puzzle1_26.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........50001......run_plot_story1........N.....N...........puzzle1...puzzle_des1.........7:10;1644:6..$Prefabs/Puzzle/Puzzle_Egypt/Egypt_14.."Prefabs/Puzzle/PuzzleMap/UI_clip_4............run_plot_story1........N.....N...........puzzle1...puzzle_des1.........12:10;950:6..#Prefabs/Puzzle/Puzzle_CP/Puzzle1_30.."Prefabs/Puzzle/PuzzleMap/UI_clip_4............run_plot_story1........N.....N...........puzzle1...puzzle_des1.........17:10;1655:6..$Prefabs/Puzzle/Puzzle_Egypt/Egypt_22.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........50002......run_plot_story2........N.....N...........puzzle1...puzzle_des1.........2:10;1644:6;1625:5..$Prefabs/Puzzle/Puzzle_Egypt/Egypt_25.."Prefabs/Puzzle/PuzzleMap/UI_clip_4............run_plot_story2........N.....N...........puzzle1...puzzle_des1.........7:10;950:6.."Prefabs/Puzzle/Puzzle_CP/Puzzle1_8.."Prefabs/Puzzle/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):132440
                      Entropy (8bit):5.749965652805351
                      Encrypted:false
                      SSDEEP:
                      MD5:FF310E825C4CCF35E0BD8A400DC6AA97
                      SHA1:1F6C907BE73B148212B493AEA6F01C667643D3EC
                      SHA-256:EBD8E387658482B652FA7B2B6FC0F408975964A868ADFC0A77FC8C1FC443915C
                      SHA-512:6B1F7445D107B7E852D79366E28164543FDAEE2B14C2372F548596512D4BC9B23886DF25F02097CB92BB7D260A6F993F78E9AD53390E15B9F7D563A6D8C97508
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................i...puzzle1...puzzle_des1.....h...1623:8.."Prefabs/Puzzle/Puzzle11/Puzzle11_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Pu
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):132456
                      Entropy (8bit):5.752633109890003
                      Encrypted:false
                      SSDEEP:
                      MD5:69060E7866BCB228E61A7F850C886D60
                      SHA1:B9366FBB2167D8B92DF4059D341C5EA330A84DEB
                      SHA-256:5603C73F4F2AC606B9E8D42AA5FEE610ED941F2B1D08D064399F70B5C3D267FD
                      SHA-512:AC289D486247A2EDCB8F5F5E1A588416F155566E96C28C8D7E24C2611A42945D26B4C2C31F62526BC836B6D04D7F542CF2B62CDC0F81E7F73B786FA41053DA76
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_86.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_31.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..1Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................i...puzzle1...puzzle_des1.....h...1623:8..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_65.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..2Prefabs/Puzzle/Puzzle_Shooting/Puzzle_Shooting1_87.."Prefabs/Puzzle/PuzzleMap/UI_clip_3..................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):132392
                      Entropy (8bit):5.747039373211097
                      Encrypted:false
                      SSDEEP:
                      MD5:2AA1B9C98A06ADDD3EDB086EE316A3A2
                      SHA1:A1B345D521E8FBCD010EF86E3D336F0AA8F32480
                      SHA-256:6D46679712F4D064C3E0B54026C5EC828698473358182D81F2B692522EE21381
                      SHA-512:C73E88F6F3D96C238BA51490FBE535E97A18C8FA0DDA9CE30B6BBBE83A78FB3A0C7855A259DC090F0658A482C239A066E6D27C060BE47EE025565F24A26F850A
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................i...puzzle1...puzzle_des1.....h...1623:8..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):128470
                      Entropy (8bit):5.762204331933164
                      Encrypted:false
                      SSDEEP:
                      MD5:F9D631B2EDC870C1773A6528A2CDDAD0
                      SHA1:7B90D8C75F08AEB1CDDD078B6A2F29153F8F4C17
                      SHA-256:177B05880987EDD90E99E5C281CD29E8A3FBAC3AF8B3612AD92E58BEC65997F4
                      SHA-512:3CFC1467AE713CC1669FD96E7DDA52265CE7D02F48FB1C890C70A1F17A3CD5C0512280143CE6F16B82E51E9B4782E85AED2D2941828DCA8981D676AF03CE7808
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1..*
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):51586
                      Entropy (8bit):5.711406434443891
                      Encrypted:false
                      SSDEEP:
                      MD5:FDAB1A23C24629BC54E3951F75C3029D
                      SHA1:345F9841E333A8DB92E58FE9C7033CC3A0A4A02F
                      SHA-256:ADEEC38B6F72AF104CD0AE064B8C08BC23F07206DCDAC3369F48FCAFAC1CACD9
                      SHA-512:E25D522BA0CC52DA25324B25047035F1C63DDA90F9FE18BA0C10053D9F19FB8FB040BC4C60D515513218DF989F4E11F3643668749A386072132B49082C928F19
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..+RunEscape/Model/Prefab/Game/RunEscapeLevel4.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..+RunEscape/Model/Prefab/Game/RunEscapeLevel3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..+RunEscape/Model/Prefab/Game/RunEscapeLevel1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..*RunEscape/Model/Prefab/Game/RunEscapeLevel.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..+RunEscape/Model/Prefab/Game/RunEscapeLevel4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1..+RunE
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):51042
                      Entropy (8bit):5.677006115481207
                      Encrypted:false
                      SSDEEP:
                      MD5:F03B86B6BF982F6233309C23C5B2746D
                      SHA1:2080A421F51BA8C73CFA2CD8550782709E4BBAFF
                      SHA-256:DC88ABF7DE357AD3848384991BA1F648A008C34AC506AA1482989CE7532C6D0E
                      SHA-512:E41C0A5BB3333EDF76CD2663380AA6B6DAB8E28ED993C45486133415938C429A716E66AE824E7E738BCEEEDA95B98DD7AB4CCE03E20E170267FD5D8D57488D10
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1..+RunEscape/Model/Prefab/Game/RunEscapeLevel4.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3..+RunEscape/Model/Prefab/Game/RunEscapeLevel3.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47845
                      Entropy (8bit):5.589317725138004
                      Encrypted:false
                      SSDEEP:
                      MD5:FC6D18131764DE803B30F17EAA334B7B
                      SHA1:FB3247911F19428F0CFCC6A17851936A35654047
                      SHA-256:35A0024B25975E4347C3C9FABFE9B62A0AE7D5B7BD800BA0E974B26FE81C8546
                      SHA-512:5C5C10EC6BD8FE6F3E9722DE34D52672FB0132AC014E58EA03CB23ADA476E67B70D4E7175ABB8312F131B5A08C8F867EF5E60587938E6E8AD601DA3F2FA46EC6
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47844
                      Entropy (8bit):5.589263648381331
                      Encrypted:false
                      SSDEEP:
                      MD5:BDBE18D33BCEDD42083B24F6272B2E06
                      SHA1:39D5E481BFF58A46734381F22CC7DD403689296F
                      SHA-256:D8B18CD3CE815A86AD3E24270BF1E6328A46837F028DEA95E6B4F89085E659EE
                      SHA-512:AA1A5534968D87A5CB7C86B47FA63639C112DC2837A573ED800E5C1CF646EB856BF0F4C9926BBC6D58177B089C134AD7A9BC3BD45C7198A795BCC168144CFE29
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle_CP/Puzzle1_7.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3..$Prefabs/Puzzle/Puzzle_Egypt/Egypt_18.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle_CP/Puzzle1_9.."Prefabs/P
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):24695
                      Entropy (8bit):5.414651287878037
                      Encrypted:false
                      SSDEEP:
                      MD5:626FABF76E6B707BEF74E4089C4C3547
                      SHA1:48E3350C34A7F306A5F4096F15736AD9E2652D27
                      SHA-256:A066C20EA3A5662845844F4D0E4536B44C6EAF53BC727C47F0C75EFD0745009D
                      SHA-512:26ADEE5C382D5CD76CD8EF02657ED424C16361DAC3EC34FEED7E630205855929C9C972E6C344E16202AEEC9E140BECCB2A9700F745E9D91FCEE9E7E8CE59E8B0
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........-1.."Prefabs/Puzzle/Puzzle13/Puzzle13_9.."Prefabs/Puzzle/PuzzleMap/UI_clip_3................................puzzle1...puzzle_des1..........1624:5..#Prefabs/Puzzle/Puzzle13/Puzzle13_10.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........51:1..#Prefabs/Puzzle/Puzzle13/Puzzle13_13.."Prefabs/Puzzle/P
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):21651
                      Entropy (8bit):5.419611034970853
                      Encrypted:false
                      SSDEEP:
                      MD5:E9313A51714D66C7219C2964DA375804
                      SHA1:928CCCF25EC622D4D6402D96D946594C2ADD6F22
                      SHA-256:73E202CC548039AA39523821EA92C173AFE84148E866FC0E7156C94B0641249F
                      SHA-512:F85881F2EA8EAC4345AAF612F8F8C452DADF51D2E8887B9F8F114FFDD91619474397BCE71F6E15954E80A88ECD7DEC2F9C0D77261AFD7B006D01B9FD89344056
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..#Prefabs/Puzzle/Puzzle_Egypt/Egypt_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..$Prefabs/Puzzle/Puzzle_Egypt/Egypt_16.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47839
                      Entropy (8bit):5.58618533172814
                      Encrypted:false
                      SSDEEP:
                      MD5:A293A8EC2EE5E4F2B40A9782975BC387
                      SHA1:E6E9EB78F8D5D8BFE02A61F383060F1A6B798128
                      SHA-256:555B5401B4366C818D5270DDD2E88351040CFE3CCB7FE692EAEC6A1CDB0FED92
                      SHA-512:3216C0DD7E0720A8164D0F7750A1C6550E931DFCC269E9DCC20CF9D789D2C0118FBDC05939F85D0D0FA4AAB9712586A2C6A85226B38F85DC3D31A10C50B2B17C
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8..#Prefabs/Puzzle/Puzzle_Egypt/Egypt_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4..$Prefabs/Puzzle/Puzzle_Egypt/Egypt_16.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):47844
                      Entropy (8bit):5.589121251487046
                      Encrypted:false
                      SSDEEP:
                      MD5:10E7CC1B044C0D1B21F752559339D5EE
                      SHA1:302307322B45AB53DE53C5386C6A030B8B793D54
                      SHA-256:CFF880386D86EE140B851F4C3960089107B494795F0E46BE4C079CC905D01192
                      SHA-512:E0E3347A1E279409E9103940159FFE546AABE515ECA3D55BDB858632469C3109047E847C3F8C85C62A04F9976FB21DFE94CED2F3E953C2446E146398D2AD30F7
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle11/Puzzle11_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5..#Prefabs/Puzzle/Puzzle10/Puzzle10_10.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle11/Puzzle11_4.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Pu
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48021
                      Entropy (8bit):5.59150111980781
                      Encrypted:false
                      SSDEEP:
                      MD5:F05F858DA37DEA9217494B9678D1026A
                      SHA1:C1D3D09A59AE0A519485FC81C6FDBB7D7979C0E9
                      SHA-256:4ECF6B757ABF4E11869D0970B90429275B7BC80FE041C09D6C86FA8F8E77C8DC
                      SHA-512:E6995B298608DDC5AF54A3E105EE86BF9171D8D6A11BE6F40EBA3715550AD1F7027262AD20B6CFFDC140451CF95F60C0FE69C86936288CEF4B15793CD8922464
                      Malicious:false
                      Preview:...............e...puzzle1...puzzle_des1.........2:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_3....................................f...puzzle1...puzzle_des1.....e...35:5.."Prefabs/Puzzle/Puzzle14/Puzzle14_1.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................g...puzzle1...puzzle_des1.....f...2:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_3.."Prefabs/Puzzle/PuzzleMap/UI_clip_4....................................h...puzzle1...puzzle_des1.....g...1623:8.."Prefabs/Puzzle/Puzzle14/Puzzle14_2.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1.........1010:3.."Prefabs/Puzzle/Puzzle13/Puzzle13_5.."Prefabs/Puzzle/PuzzleMap/UI_clip_3.........................................puzzle1...puzzle_des1..........1644:4.."Prefabs/Puzzle/Puzzle13/Puzzle13_6.."Prefabs/Puzzle/PuzzleMap/UI_clip_4.........................................puzzle1...puzzle_des1..........8:1.."Prefabs/Puzzle/Puzzle13/Puzzle13_7.."Prefabs/Puz
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1178
                      Entropy (8bit):4.910281507827993
                      Encrypted:false
                      SSDEEP:
                      MD5:D3936A1AF5BD3A3CF5A26311F38731D7
                      SHA1:973A5342283EF83F2DA8F9D5092D37E98F1BCD2A
                      SHA-256:F5E21C801C0EE795C52C31F5498CE23A23B1458B2AD67764ECC637BF9045A95F
                      SHA-512:BE5CF2D3B1881E3858AC8D7FFFA3D76E8F4EEB0AD38579210D827D82854EBA772A3AE9DABED84DAD7C05677E15148E11CC566F78F8C133DB9A96B051F2388CD0
                      Malicious:false
                      Preview:..........Sprite/UI/UIIcons/type1..........Sprite/UI/UIIcons/type2..........Sprite/UI/UIIcons/type3..........Sprite/UI/UIIcons/type4..........Sprite/UI/UIIcons/type5..........Sprite/UI/UIIcons/type6..........Sprite/UI/UIIcons/type1..........Sprite/UI/UIIcons/type2..........Sprite/UI/UIIcons/type3..........Sprite/UI/UIIcons/type4..........Sprite/UI/UIIcons/type5..........Sprite/UI/UIIcons/type6..........Sprite/UI/UIIcons/type1..........Sprite/UI/UIIcons/type2..........Sprite/UI/UIIcons/type3..........Sprite/UI/UIIcons/type4..........Sprite/UI/UIIcons/type5..........Sprite/UI/UIIcons/type6..........Sprite/UI/UIIcons/type1..........Sprite/UI/UIIcons/type2..........Sprite/UI/UIIcons/type3..........Sprite/UI/UIIcons/type4..........Sprite/UI/UIIcons/type5..........Sprite/UI/UIIcons/type6..........Sprite/UI/UIIcons/type7..........Sprite/UI/UIIcons/type7..........Sprite/UI/UIIcons/type7..........Sprite/UI/UIIcons/type7.1.......)Sprite/UI/UIInterface/General/Point_White.1.......)Sprite/UI/UIInt
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):44171
                      Entropy (8bit):5.313549678655258
                      Encrypted:false
                      SSDEEP:
                      MD5:8CB913C9187CE60C98DD5519278450B5
                      SHA1:A319E64161D5D2E61AFAB2F1FF97CA6DE5EC4D4E
                      SHA-256:74C7C51101C3FAFD4C7542532B4CAD1DDBB36A98BF20635C0F92B8E19AEC51AB
                      SHA-512:6CF7861949E3AAED0E2DE0904E4348A6C06B11ABD593F25C15388B0C4C836F7E9447CED00867DE2C53AB8F821EC8ABBE7A78E5D92FD98B2EDA5CE59FE08BD5E2
                      Malicious:false
                      Preview:.]........Exam_Question_desc_1_1...hero_name131...hero_name18...hero_name120...hero_name148...D.\........Exam_Question_desc_2...hero_name237...hero_name150...hero_name135...hero_name120...A.\........Exam_Question_desc_3...figure_key11...hero_name120...hero_name126...hero_name170...D.\........Exam_Question_desc_4...hero_name251...hero_name120...hero_name209...hero_name111...A.\........Exam_Question_desc_5...hero_name138...hero_name146...hero_name181...hero_name234...D.[........Exam_Question_desc_6...hero_name140...hero_name150...hero_name123...hero_name25...B.j........Exam_Question_desc_7...mail_solider2...Exam_Question_option_94...mail_solider3...mail_solider1...C...........Exam_Question_desc_8...Exam_Question_option_49...Exam_Question_option_95...Exam_Question_option_15...Exam_Question_option_1...D...........Exam_Question_desc_9...Exam_Question_option_50...Exam_Question_option_2...Exam_Question_option_96...Exam_Question_option_139...B.\........Exam_Question_desc_10...hero_name176...he
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7566
                      Entropy (8bit):4.244277969297417
                      Encrypted:false
                      SSDEEP:
                      MD5:23730DF764C61F032405E96D157B2C1C
                      SHA1:F38910A2ADD1BB84E98B7CB9075693B6E97A06B9
                      SHA-256:404070A56B9B82A473684BF27CBD238407BC991D780AB4855EB2DDD5B9BE1C10
                      SHA-512:FC1DE52E58BC1D41D09D72C21C4942EDBD27296D26AB0185D1C19D836DAE4E0527DFD8103340D15D0E9E58833D8FC4CF33421CE55FF3F2C03CBA2F198D8C0AE1
                      Malicious:false
                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ ..... ..............!.....!.............."....."..............#.....#..............$.....$..............%.....%..............&.....&..............'.....'..............(.....(..............).....)..............*.....*..............+.....+..............,.....,..............-.....-.................................../...../..............0.....0.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):14278
                      Entropy (8bit):5.573125188260538
                      Encrypted:false
                      SSDEEP:
                      MD5:100C46E92E01249DB9DE5569D7C26D9F
                      SHA1:4D347660C8F3DFC20F7BEB3C3E8B54571A52710F
                      SHA-256:59A77BC5E60FEBDCF18A424F155F0677D59170B6D385104507FEED5B398338A5
                      SHA-512:FF4E9895FB05E3AF1CA9378981C1B886B1E3C4AA41959D5026959E69D102BF422F29585466B7974FBB7559C7D3FC6AB7616F9BA505DC47DBBB44A952E5427446
                      Malicious:false
                      Preview:..................D.........Evony..................wos_questionnaire_01../wos_questionnaire_01_01|wos_questionnaire_01_02..................<..........................wos_questionnaire_02....wos_questionnaire_02_01|wos_questionnaire_02_02|wos_questionnaire_02_03|wos_questionnaire_02_04|wos_questionnaire_02_05|wos_questionnaire_02_06|wos_questionnaire_02_07|wos_questionnaire_02_08|wos_questionnaire_02_09|wos_questionnaire_02_10|wos_questionnaire_02_11|wos_questionnaire_02_12|wos_questionnaire_02_13..................U....../............................wos_questionnaire_03....wos_questionnaire_03_01|wos_questionnaire_03_02|wos_questionnaire_03_03|wos_questionnaire_03_04|wos_questionnaire_03_05|wos_questionnaire_03_06|wos_questionnaire_03_07|wos_questionnaire_03_08|wos_questionnaire_03_09|wos_questionnaire_03_10|wos_questionnaire_03_11|wos_questionnaire_0
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):179
                      Entropy (8bit):5.343448237180226
                      Encrypted:false
                      SSDEEP:
                      MD5:182BBFF51FB4D0A1E6638D128B007C37
                      SHA1:FB3C3C1CE6BEACF1BFCF8670541E382BDD06A172
                      SHA-256:627012B1E5D83C6DED840A1167273DAAEFED933992F31E8F8EB89D4E19A056BB
                      SHA-512:4309D466E16D84F56F64041915C04FE28DE7A59F64DCACE360050BB5949B1EAC1820CEDC0D304E9E07D3926B36B94163B205C8750D5B4747E4C6F6C2F788A2B7
                      Malicious:false
                      Preview:.Q......................967:6...wos_questionnaire_title01...Sprite/UI/Banner/WOS_bg.^......................1697094000...967:9...wos_questionnaire_title02...Sprite/UI/Banner/WOS_bg
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):531
                      Entropy (8bit):4.723670079557126
                      Encrypted:false
                      SSDEEP:
                      MD5:9D7C29EF93F1133B0903C9659747B481
                      SHA1:6A366B8C89055D6435D103C17A1C41B25CE764AA
                      SHA-256:89AB20A2EB1E33E776D8EA123596A24E379E237DDCCB94B80D2E928EBD245618
                      SHA-512:AF26AE7F00188CAB75A7129B73ACEEC56FA0760D1173C7122E4489B80D3DC87A7914DE9B84249C29277EFB461566F64F68B9B1D178CB0BDB48B95CBF8CF009C3
                      Malicious:false
                      Preview:......................................................#..........2..........A..........T..........j......................................................................................................................................................................................................................................................................... .. ........!..!.......".."........#..#........$..$.......%..%........&..&........'..'........(..(....!...)..)....$...*..*....(...+..+....+...,..,...0...-..-...4
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1549
                      Entropy (8bit):3.9468258909316454
                      Encrypted:false
                      SSDEEP:
                      MD5:F05119D773CF2F26B6F7BDACDB3D5842
                      SHA1:E71A46679102167DE22F381CC76E99E8765700A2
                      SHA-256:D735B589FDBB554CADE5202D1993200E64A15B91B7C48B469A3E082DD84FD010
                      SHA-512:CDC62E666FA0D5670FD77974F8C0ECDF0EAA5C8652F84D4D3A2DAC79C2829F1E077E405CEBFECDCCA858C5DC857B74AD230995A5C4643B3EDC7759BF07A7C375
                      Malicious:false
                      Preview:.+....... ...................d..d..d..d..d..d.+....... ...................d..d..d..d..d..d.+....... ...................d..d..d..d..d..d.+....... ...................d..d...........d.a....... ........................................................................................<.a....... ........................................................................................<.a....... ........................................................................................<.b....... ...........................................................................................4....... ...................(.........................4....... ...................(.........................4....... ...................(.........................4....... ...................(.........................4....... ...................(.........................4....... ...................(.........................4....... ...................d.........................4....... ...................d...............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):62
                      Entropy (8bit):4.2579444095651375
                      Encrypted:false
                      SSDEEP:
                      MD5:DD4A1E9256DFAC0209A60E15806F1CC0
                      SHA1:EE346C1B6C11CE2CC66AD8E7A539DB01263B0555
                      SHA-256:3ACC2046F0414E0519240A9A31A5093CFA4771FAF998A010916173D5A21E6EF5
                      SHA-512:287BF6E22A1B7BBEF3C3966DAD1BC2299FFFB2EE11502CB35B39B37362AE2059C7AACED79BCD22BC46C3FEA4A5158DD1DB541C9DDBF4A950F23D08EA3C207B8C
                      Malicious:false
                      Preview:..............D..D...'............N............u..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):21267
                      Entropy (8bit):5.5142435639112115
                      Encrypted:false
                      SSDEEP:
                      MD5:E7FEBCB48952F2D312E2D1C8AAFD9208
                      SHA1:112909C54EB769B248F4606E0CC72F3E048814EB
                      SHA-256:1ABDEA9FA93D480B6698E258B9920BF6F3C4FED5C914C0C6A24398FABF568812
                      SHA-512:EF5C0C57B0D1780164E43D4EF8B3E5B999A9E39BE108B74E7E3039C365F98BA3C58589CDD91DE1E7A4AB1E1D4F2CC7B4ADEA88D335D3529AE163F41A5B199A46
                      Malicious:false
                      Preview:.>.....resource_name_resA..$Sprite/UI/Icon/Resource/icon_food_48.>.....resource_name_resB..$Sprite/UI/Icon/Resource/icon_wood_48.?.....resource_name_resC..%Sprite/UI/Icon/Resource/icon_stone_48.>.....resource_name_resD..$Sprite/UI/Icon/Resource/icon_iron_48.9.....resource_gold..$Sprite/UI/Icon/Resource/icon_gold_48.?.....equip_type_weapon..&Sprite/UI/Icon/UIEquipIcon/Type_weapon.;.....equip_type_ring..$Sprite/UI/Icon/UIEquipIcon/Type_ring.=.....equip_type_boots..%Sprite/UI/Icon/UIEquipIcon/Type_boots.9.....equip_type_leg..#Sprite/UI/Icon/UIEquipIcon/Type_leg.;.....equip_type_body..$Sprite/UI/Icon/UIEquipIcon/Type_body.;.....equip_type_head..$Sprite/UI/Icon/UIEquipIcon/Type_head.&....!Sprite/UI/Icon/Others/Icon_hammer.+....&Sprite/UI/Icon/Others/Icon_hammer_gold.'...."Sprite/UI/Icon/Common/icon_okay_48.(....#Sprite/UI/Icon/Common/icon_wrong_48......)Sprite/UI/Icon/Resource/icon_hourglass_48.?.....resource_name_resA..%Sprite/UI/Icon/Resource/icon_food_128.?.....resource_name_resB..%Sprit
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):21231
                      Entropy (8bit):5.514035018532951
                      Encrypted:false
                      SSDEEP:
                      MD5:790846515FD906FE2FF1B319DE603D1B
                      SHA1:E883CB71C25AF49B4EC44C9CBBEE3DE8148BD217
                      SHA-256:96FDEC2E14EF50E5A2BB4192B220B989C1CAEAEE96803BF59F0C5667317387EB
                      SHA-512:8B138027AF78F356C4C29522243A5577D902E3B21C27B8E42C69DCD679374E285BE043D4D99430259C50C61D03D5FD9EB5DD445C0D811CD6F63F0C4F8D21CE7B
                      Malicious:false
                      Preview:.>.....resource_name_resA..$Sprite/UI/Icon/Resource/icon_food_48.>.....resource_name_resB..$Sprite/UI/Icon/Resource/icon_wood_48.?.....resource_name_resC..%Sprite/UI/Icon/Resource/icon_stone_48.>.....resource_name_resD..$Sprite/UI/Icon/Resource/icon_iron_48.9.....resource_gold..$Sprite/UI/Icon/Resource/icon_gold_48.?.....equip_type_weapon..&Sprite/UI/Icon/UIEquipIcon/Type_weapon.;.....equip_type_ring..$Sprite/UI/Icon/UIEquipIcon/Type_ring.=.....equip_type_boots..%Sprite/UI/Icon/UIEquipIcon/Type_boots.9.....equip_type_leg..#Sprite/UI/Icon/UIEquipIcon/Type_leg.;.....equip_type_body..$Sprite/UI/Icon/UIEquipIcon/Type_body.;.....equip_type_head..$Sprite/UI/Icon/UIEquipIcon/Type_head.&....!Sprite/UI/Icon/Others/Icon_hammer.+....&Sprite/UI/Icon/Others/Icon_hammer_gold.'...."Sprite/UI/Icon/Common/icon_okay_48.(....#Sprite/UI/Icon/Common/icon_wrong_48......)Sprite/UI/Icon/Resource/icon_hourglass_48.?.....resource_name_resA..%Sprite/UI/Icon/Resource/icon_food_128.?.....resource_name_resB..%Sprit
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):171
                      Entropy (8bit):4.6970513163623675
                      Encrypted:false
                      SSDEEP:
                      MD5:0716BC22F871573142065FD234029D07
                      SHA1:62E31485BDB37CC2A9BBED4673D50074D2634390
                      SHA-256:EF2A7CB9D42423D2EF9EE92CCDE181E9277E6E568B1A15EF258F9F8FF1C45056
                      SHA-512:01EFF0254C5F18269026BCAC9EF9A79D0AD6E1FA3EFBF07FE44B1CBC8528E6721327793A33C3E3EDEEA4D9FFF20D6009016D754F04C9D874DCA731F8E11710FA
                      Malicious:false
                      Preview:..................................................................................................0..................................................=....................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6465
                      Entropy (8bit):5.947952790645666
                      Encrypted:false
                      SSDEEP:
                      MD5:96710EAD46B88A3604DAD3AF9F2458CD
                      SHA1:8AEF1647CD6AA450E6F0AA3ED57A0DAC8EEB2422
                      SHA-256:811F4BCF6FB8D500F479842CE2FD817B5A9924057A979C41CAC6E0C269BB5D96
                      SHA-512:B8E45F68DFC6B6F67927FB27E2BDAFD82FE3191D474207BFE4316D68BD909D8758E8B3EBEB44CB54A1CF07CBF7F7CCE74AE424A9A10A0DB10EE99AD1A59FE9F1
                      Malicious:false
                      Preview:.4..F...F...rogue_1......2...100.........1:20;2:10;3:2.4..F...F...rogue_2......2...100.........1:30;2:15;3:3.4..F...F...rogue_3......2...100.........1:50;2:25;3:5.$..F...F...rogue_4......2...100.......$..F...F...rogue_5......2...100.......)..F...F...rogue_6......2...100.........20.)..F...F...rogue_7......2...100.........40.)..F...F...rogue_8......2...100.........60.)..F...F...rogue_9......2...100.........15.*..F...F...rogue_10......2...100.........20.*..F...F...rogue_11......2...100.........30.*..F...F...rogue_12......2...100.........20.%..F...F...rogue_13......2...100.......%..F...F...rogue_14......2...100.......%..F...F...rogue_15......2...100.......%..F...F...rogue_16......2...100.......%..F...F...rogue_17......2...100.......%..F...F...rogue_18......2...100.......%..F...F...rogue_19......2...100.......X..F...F...rogue_20......2..*.#10|11|12|13|14|15|16|17|18|19|20|21..N.....100.........100.M..F...F...rogue_21......4.....10|11..........15|21........100.........25S;10S.M..F...F...rogu
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2272
                      Entropy (8bit):5.678348416276426
                      Encrypted:false
                      SSDEEP:
                      MD5:AD2386572910D2E199E9B358D677AF2C
                      SHA1:CFE4F059159DA43AD7F2112951324DA39FA4D00B
                      SHA-256:DB3647EB66B0D3EF23D0B31F715CADC634942EE9F78FB04DAA7A9181C3AEC730
                      SHA-512:79F1FE08052120EB173CAF4A796C2530346AA0861FB0D1A5FC91160AB4A976CF62A9849F1C5713888C46CB77CC7BB814390EF215C14DED8FF13C07D3848CE31A
                      Malicious:false
                      Preview:.c.......)...........%Prefabs/Map/Roguelike/RogueBuilding_1..................Sprite/Map/Pigeon/Portal..........(.........100.....%Prefabs/Map/Roguelike/RogueBuilding_2............portal...rogue_building_info8.........Sprite/Map/Pigeon/Portal_icon...100...100..........(.........50.....%Prefabs/Map/Roguelike/RogueBuilding_3............40;10...rogue_building_name4...rogue_building_info4........494.......2..!Sprite/Map/Pigeon/GuardTower_icon..........(.........50.....%Prefabs/Map/Roguelike/RogueBuilding_4............1;5;10...rogue_building_name2...rogue_building_info2.....d...Sprite/Map/Pigeon/bartizan_icon..........(.........50.....%Prefabs/Map/Roguelike/RogueBuilding_5............10;25...rogue_building_name3...rogue_building_info3.....*.#10|11|12|13|14|15|16|17|18|19|20|21..........$Sprite/Map/Pigeon/BlessingTower_icon.d.......'............%Prefabs/Map/Roguelike/RogueBuilding_6.....2............Sprite/Map/Pigeon/Portal.d.......'............%Prefabs/Map/Roguelike/RogueBuilding_7.....d....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1928
                      Entropy (8bit):5.639051214580681
                      Encrypted:false
                      SSDEEP:
                      MD5:6DEBB4AD153151837BB4A0FA905FD61E
                      SHA1:323695E94EC43D441CEB58FC5AECFD0D514DC74B
                      SHA-256:B77E720E55A191AC4857A4160135ABBAA673008542162271E3E2AC7566CB0560
                      SHA-512:47E284B2CC49F99158BD21C4D3A5DCC6FA1F65FD0F0F11EA3ACC0F3819AA5AB02E276641BE4D1C97CB5C4667AAE134DF78FED3EEA360687C76F12D055B739FB6
                      Malicious:false
                      Preview:.|...........4;1;1../180:9999999;181:9999999;182:9999999;183:9999999....=............ Prefabs/Map/Roguelike/levelBG1_1..d...50.V...........4;1;1.............. Prefabs/Map/Roguelike/levelBG1_1..x...1:581;2:582;3:583.N...................... Prefabs/Map/Roguelike/levelBG1_1..2...1:594;2:595;3:596.W...........4;1;1.............. Prefabs/Map/Roguelike/levelBG1_1.......1:597;2:598;3:599.l...........0;0;1............578:1...5:5..... Prefabs/Map/Roguelike/levelBG1_1.......1:600;2:601;3:602...9529.W...........4;1;1.............. Prefabs/Map/Roguelike/levelBG1_2.......1:603;2:604;3:605.W...........4;1;1.............. Prefabs/Map/Roguelike/levelBG1_2.......1:606;2:607;3:608.N...................... Prefabs/Map/Roguelike/levelBG1_2..2...1:609;2:610;3:611.W...........4;1;1.............. Prefabs/Map/Roguelike/levelBG1_2.......1:612;2:613;3:614.m...........0;0;1............578:1...5:5..... Prefabs/Map/Roguelike/levelBG1_2.......1:615;2:616;3:617...10037.W...........4;1;1.............. Prefabs/Map/Rogu
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1316
                      Entropy (8bit):4.133011030678627
                      Encrypted:false
                      SSDEEP:
                      MD5:AD34E8CDE28C2790E72A4F7090D4EF38
                      SHA1:97067F5C9E204508EF90D2146D00169F359F6AA9
                      SHA-256:56558B7901216AC722A22CE9F5AFAEE96BBC755D457AB8912721FF5085D51F37
                      SHA-512:C6D9C4FB4C1A3EC17DF9043F199A3532A440968D06A0C397875713173993B79FEFC381974915F5FD6942642F3BF7DBA23CBC3FBF9893F99BAFD813CD159509A5
                      Malicious:false
                      Preview:.\...........(...........500;500;500;500...0..+180:700000;181:100000;182:100000;183:100000....\...........(...........500;500;500;500...0..+180:400000;181:200000;182:200000;183:200000....\...........(...........500;500;500;500...0..+180:250000;181:250000;182:250000;183:250000....\...........(...........500;500;500;500...4..+180:100000;181:700000;182:100000;183:100000....\...........(...........500;500;500;500...4..+180:200000;181:400000;182:200000;183:200000....\...........(...........500;500;500;500...4..+180:250000;181:250000;182:250000;183:250000....\...........(...........500;500;500;500...E..+180:100000;181:100000;182:700000;183:100000....\...........(...........500;500;500;500...E..+180:200000;181:200000;182:400000;183:200000....\...........(...........500;500;500;500...E..+180:250000;181:250000;182:250000;183:250000....\...........(...........500;500;500;500...0..+180:100000;181:100000;182:100000;183:700000....\...........(...........500;500;500;500...0..+180:200000;1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):205724
                      Entropy (8bit):5.182244918123883
                      Encrypted:false
                      SSDEEP:
                      MD5:16F911D5BC66CF2F8AB413D020B6CE1A
                      SHA1:EFE926AB9CD6EB542D16D8C04ECF4F1952B7DD9D
                      SHA-256:939357BB58E953939FBB202189F0E39CA6A6ABCF1FBA907104338267E554EFF1
                      SHA-512:CCEFE0BA46DCF7B65CE3282FE98FB98E396F602A56E4B69EFD2A6A8D6B151E4FA6458E9FB969348F8219DBC712E1362EF08BB6132E9F4514B4E11E9CF7A617E1
                      Malicious:false
                      Preview:................hero_name39..........................100:100:100...2.2:2.2:2.2..w1.5:1.5:1.5|2.5:2.5:2.5|1.5:1.5:1.5|1.5:1.5:1.5|1.5:1.5:1.5|1.5:1.5:1.5|2.5:2.5:2.5|1.5:1.5:1.5|1.5:1.5:1.5|1.5:1.5:1.5..w100:100:100|200:200:200|300:300:300|400:400:400|500:500:500|100:100:100|200:200:200|300:300:300|400:400:400|500:500:500..d.........................avatar_1100..&Function/HeroParkour/Prefab/10029_lod1......3...................................................................................................................................................................................................................................................................................................................................................................hero_name40.....d...................20:20:20...2.2:2.2:2.2..;1.5:1.5:1.5|1.5:1.5:1.5|1.5:1.5:1.5|1.5:1.5:1.5|1.5:1.5:1.5..;100:100:100|100:100:100|100:100:100|100:100:100|100:100:100.............................avatar_1100..9Function/He
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):54025
                      Entropy (8bit):5.659235289507828
                      Encrypted:false
                      SSDEEP:
                      MD5:3D57142029DFFEB87FB9BAC242FE85ED
                      SHA1:E33522B34D1464D7037CEB4F1BCB354218AF2E1C
                      SHA-256:A18B1ACEE70B32574DA7A065518C043EE46CA1D583D49068FD311D9A7FCA5255
                      SHA-512:3DF79BFC6BF1EB40563EA5BE807A07050A24558C4A8651860CB247084CFA944EFC48F28C24E938357AE27FAC0584C932CA47632DFD8449E351392D301B359060
                      Malicious:false
                      Preview:...............*Sprite/UI/RoleModel/Evony1/model_1/model_1..(Sprite/UI/RoleModel/Evony1/model_1/art_1.."Sprite/UI/UIMainUI/RoleIcon/icon_1.. Prefabs/RoleModel/Evony1/model_1...aicon_1........... Prefabs/RoleModel/Evony1/model_1..................*Sprite/UI/RoleModel/Evony1/model_2/model_2..(Sprite/UI/RoleModel/Evony1/model_2/art_2.."Sprite/UI/UIMainUI/RoleIcon/icon_2.. Prefabs/RoleModel/Evony1/model_2...aicon_2........... Prefabs/RoleModel/Evony1/model_2..................*Sprite/UI/RoleModel/Evony1/model_3/model_3..(Sprite/UI/RoleModel/Evony1/model_3/art_3.."Sprite/UI/UIMainUI/RoleIcon/icon_3.. Prefabs/RoleModel/Evony1/model_3...aicon_3........... Prefabs/RoleModel/Evony1/model_3..................*Sprite/UI/RoleModel/Evony1/model_4/model_4..(Sprite/UI/RoleModel/Evony1/model_4/art_4.."Sprite/UI/UIMainUI/RoleIcon/icon_4.. Prefabs/RoleModel/Evony1/model_4...aicon_4........... Prefabs/RoleModel/Evony1/model_4..................*Sprite/UI/RoleModel/Evony1/model_5/model_5..(Sprite/UI/RoleModel
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):455
                      Entropy (8bit):4.196325292578276
                      Encrypted:false
                      SSDEEP:
                      MD5:0B2461E50DA25E54D832F197ACCB7B27
                      SHA1:87570DD8A409A73879FDDC023B83968BBEC3DC99
                      SHA-256:88782BBA3B5684C30EC189636FC0AF0C790C4F38E92DFDD620DD53C33C337389
                      SHA-512:08CE83AEE34BC7E229B0199A21641FE75F8A38515B489E1C03B0E15E3462545A5B83E7AB88D4DD20485552632C32CC9D3404BFF65550EAAD5451049DA8A3D391
                      Malicious:false
                      Preview:..............2............................................................................................................2..2.........$..$....................2.............................(.................................................................................(............(............(............(...............................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):600
                      Entropy (8bit):4.370697773746474
                      Encrypted:false
                      SSDEEP:
                      MD5:0840625E262225A24A03F29B1F5C6DCF
                      SHA1:641646F36C758D2836BBEED43BA80858DC80DAF8
                      SHA-256:FF06583CBFFCB61064CB9B0C4CA91BE4DB7D8798DE6B93B8AF270624C40DEBAD
                      SHA-512:77768326EEC3B0A9C9D3DCFC6BA1AEC8958B393E2A97EE4F074E36DA0EF908BBFE1F70945628464818590A3A86CCBD104F20889C6338C1696E47CACF287F7068
                      Malicious:false
                      Preview:........W....................................P........................d........................x........................d...............2........P............W..........."........................Z........................n........................n........................x........................d............W....................................P........................d........................x........................d...............2........P............W..........."........................Z........................n........................n........................x........................d....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):600
                      Entropy (8bit):4.3798807320870194
                      Encrypted:false
                      SSDEEP:
                      MD5:8D3A695E0CF47584E108554BD6415801
                      SHA1:9D781DEE270C00EC544ED6AD338E51ABEB8AC514
                      SHA-256:32328ED447DA2E4F6A8A94D69E3C97963649D17CAA23BBDB145A350D0F711E58
                      SHA-512:6AB16B86BAC71DC99BCACB0ECD4777D608D26E99F2CFDE8362B86B2F6ACD71B158C0B0A1860F60F54700CC922DF73C115A300C556C3FBFBEB321817DC1A4033D
                      Malicious:false
                      Preview:........'....................................F........................d........................x........................d...............2........M............'...........(........................Z........................n........................d........................x........................d............'....................................F........................d........................x........................d...............2........M............'...........(........................Z........................n........................d........................x........................d....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):600
                      Entropy (8bit):4.3798807320870194
                      Encrypted:false
                      SSDEEP:
                      MD5:8D3A695E0CF47584E108554BD6415801
                      SHA1:9D781DEE270C00EC544ED6AD338E51ABEB8AC514
                      SHA-256:32328ED447DA2E4F6A8A94D69E3C97963649D17CAA23BBDB145A350D0F711E58
                      SHA-512:6AB16B86BAC71DC99BCACB0ECD4777D608D26E99F2CFDE8362B86B2F6ACD71B158C0B0A1860F60F54700CC922DF73C115A300C556C3FBFBEB321817DC1A4033D
                      Malicious:false
                      Preview:........'....................................F........................d........................x........................d...............2........M............'...........(........................Z........................n........................d........................x........................d............'....................................F........................d........................x........................d...............2........M............'...........(........................Z........................n........................d........................x........................d....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):600
                      Entropy (8bit):4.3798807320870194
                      Encrypted:false
                      SSDEEP:
                      MD5:8D3A695E0CF47584E108554BD6415801
                      SHA1:9D781DEE270C00EC544ED6AD338E51ABEB8AC514
                      SHA-256:32328ED447DA2E4F6A8A94D69E3C97963649D17CAA23BBDB145A350D0F711E58
                      SHA-512:6AB16B86BAC71DC99BCACB0ECD4777D608D26E99F2CFDE8362B86B2F6ACD71B158C0B0A1860F60F54700CC922DF73C115A300C556C3FBFBEB321817DC1A4033D
                      Malicious:false
                      Preview:........'....................................F........................d........................x........................d...............2........M............'...........(........................Z........................n........................d........................x........................d............'....................................F........................d........................x........................d...............2........M............'...........(........................Z........................n........................d........................x........................d....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):20737
                      Entropy (8bit):4.325793343935565
                      Encrypted:false
                      SSDEEP:
                      MD5:D2557957A4C1F70C81DA1F5B09536B5E
                      SHA1:AF17F82CACD192FC19301D5C4797B95873B15908
                      SHA-256:8D46F063827CBAF9734612F0D8E86CF7478607DB34B54320595BB34FE2D46FF1
                      SHA-512:512C3BBA8923A6A3225856C52395554E7EC455B74F0B662CBE596AAB5B0A11B2A840E133210F91B7D8C1D4FA24D727A97D384A0392724A4CC704934B23544CE7
                      Malicious:false
                      Preview:.............................#....................................!.............................x....!.............................x....!.............................x....!.............................x....!.............................2....!.............................2...."...................................!.............................(...."..................................."...................................".............................. ...."..............................2...."..............................(...."..............................2....!....+.............................".............................. ...."..............................2....!....%.............................".............................. ...."..............................2....!....!.............................".............................. ...."..............................2....!....'.............................".............................. ...."..............................2....!....)...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):95
                      Entropy (8bit):4.500074655877362
                      Encrypted:false
                      SSDEEP:
                      MD5:E27D526469B4C46C51031BBABB1EFAB6
                      SHA1:34F1C73082E0062C141C990CF13B26C01C82F571
                      SHA-256:1C2A7D4D371EE4AC609AD96247EE519B4B023AACF16C81A7F70E6670E2546B32
                      SHA-512:6381232E5EFB0BE52BA6EAA3EF0DCCA3C9AB70FF79B3D63A43DE93CC52CC6472F458375BA2B93CFCB47C57BF1D759A2198D3344AED750AE9AC236CF207C8C6B8
                      Malicious:false
                      Preview:..........100;400.....?..........500;900..fff?..........1000;4900....Y?..........5000;inf....L?
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):620
                      Entropy (8bit):5.298211786856418
                      Encrypted:false
                      SSDEEP:
                      MD5:E9ADD69078EFB13E3F524908D76864BF
                      SHA1:C4222527AB5FF0396BCEF7D9171170E7F4EFE2A0
                      SHA-256:673AFB76C09E99B39E27EA14D36FDACE097CBF4DD7607C02C0E183C02730E9A2
                      SHA-512:4C7229C7B4A6472D8B8701899821D609E3E5BA04933051DCD4C5CDD34E6B7F9A477EA20710C70793F7E550D7E8E0A88EBBFB07FCD7C8CF04118956D8D4A1C792
                      Malicious:false
                      Preview:.............................roulette_play_name_key5...roulette_play_res_key1....."Sprite/UI/Icon/GeneralIcon/Icon_28......Sprite/UI/GeneralModel/Model_28.............................roulette_play_name_key6...roulette_play_res_key2....."Sprite/UI/Icon/GeneralIcon/Icon_40......Sprite/UI/GeneralModel/Model_40......................2......roulette_play_name_key7...roulette_play_res_key3.....#Sprite/UI/Icon/GeneralIcon/Icon_210..d.. Sprite/UI/GeneralModel/Model_210......................2......roulette_play_name_key8...roulette_play_res_key4.....#Sprite/UI/Icon/GeneralIcon/Icon_121..d.. Sprite/UI/GeneralModel/Model_121
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):12536
                      Entropy (8bit):5.310024830498971
                      Encrypted:false
                      SSDEEP:
                      MD5:F62D2B4F9D02AB9C5B801CBCEC06F154
                      SHA1:F6800F2C408D47AADECAE043E63230E3427868A5
                      SHA-256:3257707FB63F5E1EB1D73943F1CED08CA75C4CAAC42DFCA9FA5C7CDA89714B27
                      SHA-512:E515FD9F1534EEDC0014CED44BC782EA11F7272B4C5F492C2D06C25F56D68BD20E179100E486381061C5BFD19BC75B49CEB616943CB4297C685A06848473B018
                      Malicious:false
                      Preview:.i.............................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.r................................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.r................................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.l..............................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.l..............................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.g........4....................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.o...............................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.i............... .............................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.z...............10..... .............................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7893
                      Entropy (8bit):5.17626912078378
                      Encrypted:false
                      SSDEEP:
                      MD5:7A92A2D5A13103043758AB2D318F3A3C
                      SHA1:D198FED2CB75A45A6365069DA2D2A955B0538EC3
                      SHA-256:58300255B1DFD69F53D6B24915418AE6AD4FE133CC2D68E4129DAD07019E2CA4
                      SHA-512:01A65DDEA72D06E9136C67E5C5B96B919299627534C2ADC39BB784D6FDC04FD78080F1944562AC2AE09C1026CCADBBB37886BEEBA3F9D75BF91FAFAB2F5753B3
                      Malicious:false
                      Preview:.o.........................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.z...............10..... .......................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.j........1...............................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.i............... .......................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.i.......................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.i.......................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.e........1M.............................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.}....... .......10..............................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.r..........................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8646
                      Entropy (8bit):5.230655281777452
                      Encrypted:false
                      SSDEEP:
                      MD5:D74E0EC32C26AEC7841FACD9B77D230F
                      SHA1:95BF1E1A97ADEFCC124C7B5C1C9DC4395D4998F2
                      SHA-256:B8888FDC6B082C35186EB4E78F2E8AD09D6CC439D6C5F8B21B847A2E399BC612
                      SHA-512:71282089C247CD975CD12A18DFA8F2B8C515C13CB0C1A7D25B4E5439FA8DEBCDC3FD552A1FA7A6BC022FC23EDC896E4C1EE18D07FAAB53F65B4B5C6930564836
                      Malicious:false
                      Preview:.i.............................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.r................................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.r................................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.l..............................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.l..............................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.g........4....................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.o...............................................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.i............... .............................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.z...............10..... .............................P..P..P..P..P..P..P..P..P..P..P..P..P..P..P.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5222
                      Entropy (8bit):6.051212346004406
                      Encrypted:false
                      SSDEEP:
                      MD5:3A53947A5E08AAB6A8FCF6ACEB6152E0
                      SHA1:7E3B90E698D04F714F484FB8F397802A98748563
                      SHA-256:A028C68486367FC9CECD5871BAEEC71BFCEDA7DBD81E90A2F9A3CE3A2B35B85A
                      SHA-512:96A4A9E3BF38221F110F1583D29ED874EAC0BE3D05958B349A9BBF575BE4EAE006F7C52022BD6660FAD426E35E24BF2AA7103AC2B93E7199E601655BBC4929B3
                      Malicious:false
                      Preview:...........1......internal_name...-1..............................P..".....P.........d.........d..-.....(........d.......................Sprite/Map/ruin............#..#...............................-1...Prefabs/Map/ruin...%.........%....................2......internal_name...-1..............................P..$.....P.........d.........d..-.....2........d............................Sprite/Map/ruin...............................................-1...Prefabs/Map/ruin...%.........%....................3......internal_name...-1..............................P..&.....2.........d.........P..-.....<........d....C....C....C....C....C...Sprite/Map/ruin...............................................-1...Prefabs/Map/ruin...%.....+...%.....+..............4......internal_name...-1..............................P..(.....<.........d.........P........F........P.......................Sprite/Map/ruin...............................................-1...Prefabs/Map/ruin..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4874
                      Entropy (8bit):4.564104571141603
                      Encrypted:false
                      SSDEEP:
                      MD5:A2882B971C52669A1D4DB4791B4DAE43
                      SHA1:8509D4E2C1AD64E540B20E23875E1BD0A55A45E4
                      SHA-256:18EF19A5A9C4D5832426257CEEB33DD82CE54166A2B15853DCC6501157D51DB0
                      SHA-512:360A357718346E70B9C2D2689CD268353E09FC9A0A84D3CCC613F11595CD6C2B00355D3BC6DBD0E2E49A2DBCD0351B69890033B7AC83DF2EB0536E3430A75E62
                      Malicious:false
                      Preview:........................................Z.............................................................................................................d....................d....................d....................d....................d....................2.........................................d.....................d.......................................................................................(.....................Z.....................K.............................................................................................................d....................Z....................Z....................Z....................Z..............................................................Z.....................Z.............................................................................................................Z.....................(.............................................................................................................Z.....................P.....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):89724
                      Entropy (8bit):3.5518332156070587
                      Encrypted:false
                      SSDEEP:
                      MD5:797EEF9071F449A6C49DF72EF7A7F853
                      SHA1:CB07761E231D69FA59C95BECEE16C12C2A7F3C98
                      SHA-256:13BC41D1553F8C93E6D86EA8D0123A6E5071B37E572068B51958191BA9277165
                      SHA-512:9246A7751C45DDD250CB92DA615CC652B1922C9B86102AEDB097C2E122DB42537F4A28F6AB3B067A5EF3C78A3E23D8289465DBF93D1E2E55F5A10FAD03CC1FAC
                      Malicious:false
                      Preview:....e....e......210;717...1...1...1...1...100;125...1...1...1...1...100;421...1...1...1...102;95...1...1...1...1...1...1...1...1...1...1...202;242...1...1...1...202;799...1...200;360...1...202;161...1...204;1111...1...1...1...1...206;2725...1...1...1...202;499...1...1...1...202;30...1...1...1...1...1...1...1...1...1...1...1...1...214;625...1...1...1...1.......e....e......200;1875...1...1...204;4001...200;996...1...1...100;200...1...1...1...1...1...1...101;996...1...1...200;880...1...1...1...202;667...1...1...1...200;556...1...1...1...202;230...1...1...1...204;999...1...1...1...1...204;2500...1...1...1...1...1...1...1...206;3920...1...1...1...1...1...204;1530...1...202;1498...1...1...1...1...210;4686...1...1...1...214;384...1...1.......e....e......1...1...209;1413...1...1...1...1...102;831...1...1...1...1...100;378...1...1...1...1...201;114...1...200;504...1...1...1...204;652...1...1...1...204;1103...1...1...1...204;1250...1...1...1...1...1...1...1...1...1...1...202;999...1...204;1500..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):73351
                      Entropy (8bit):3.56525878840779
                      Encrypted:false
                      SSDEEP:
                      MD5:CD0557E2B0E657673038A81F2678F7CF
                      SHA1:62A1BA6335CBCF66945B4708034CDB7F01C00658
                      SHA-256:D99F1B784687380A45DC67FDFFFB76E2BB229C3C2F480C0F583A4CE1B60B3311
                      SHA-512:96C762CF451C88D2F2FC302663CD96F0DAEC1765D079D5AC558321F77173A83DB9490C5F97AFC96B4F883BD38156FC148EC80B7BF6AFF185C21EDF0A73DBDFEE
                      Malicious:false
                      Preview:....e....e......210;717...1...1...1...1...100;125...1...1...1...1...1...100;421...1...1...102;95...1...1...1...1...1...202;667...1...1...1...1...202;242...1...1...1...202;799...1...200;360.......e....e......1...1...200;1875...204;1001...200;996...1...1...1...100;200...1...1...1...1...1...101;996...1...1...200;880...1...1...1...1...1...1...1...200;556...1...1...1...202;230...1...1.......e....e......1...1...1...1...1...1...1...1...102;231...1...1...100;378...1...1...1...1...1...201;114...1...1...200;504...1...1...204;652...1...1...1...1...204;103...1...1...204;1250.......f....f......204;777...1...1...1...1...101;123...1...1...1...1...1...100;20...1...1...1...102;777...1...1...1...1...100;345...1...1...1...1...102;411...102;32...1...1...1...1...1...100;104...1...1...1...1...1.......f....f......1...1...1...1...200;413...1...1...1...100;831...1...1...1...1...1...100;32...1...1...1...1...1...1...1...1...100;888...1...1...1...1...1...1...202;108...1...102;306...1...100;102...1...1...206;199..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):195807
                      Entropy (8bit):3.734419484940919
                      Encrypted:false
                      SSDEEP:
                      MD5:F197AB2A5D2A1EFA768FB1BDFF3D8B38
                      SHA1:C068212683836A10D5038381765C3AAF71A17DF7
                      SHA-256:62CE04A5D60EC5C75004A370BE0FCDDE937CBF0509992A28EA173859761CB885
                      SHA-512:CC5D303342E7307EF764EE5BA76AE46FAFD21391C3E31D5B0D4AF62034E22B56143754B05738EB63A24D483553E55654065088E2A7B1C54185A309B3710DB286
                      Malicious:false
                      Preview:....e....e......214;717...1...1...1...1...102;125...1...1...1...1...102;421...1...400;111...1...104;95...1...1...1...1...500;666...1...1...1...1...1...202;242...1...1...1...202;799...1...200;360...1...202;161...1...208;1111...1...1...300;112...1...210;2725...1...1...1...202;499...1...1...1...202;30...1...1...1...1...1...1...1...1...1...1...400;456...1...218;625...1...1...1...1.......e....e......200;1875...1...1...208;4001...200;996...1...1...102;200...600;222...1...1...1...1...1...103;996...1...1...200;880...1...1...1...202;667...1...1...1...200;556...1...1...1...202;230...1...1...1...208;999...1...1...1...1...208;2500...1...1...1...1...1...1...1...210;3920...1...1...1...1...1...208;1530...1...202;1498...1...1...1...1...214;4686...1...1...1...218;384...1...1.......e....e......1...1...213;1413...1...1...1...1...104;831...1...1...1...1...102;378...1...1...1...1...201;114...1...200;504...1...1...1...208;652...1...1...1...208;1105...1...1...1...208;1250...1...1...1...1...1...1...1...1...1.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):216721
                      Entropy (8bit):3.7356193238668367
                      Encrypted:false
                      SSDEEP:
                      MD5:D5EAF3522015ABA4F218AC7D85CA1C97
                      SHA1:CFD1A81B3C7A8E3A01F515A0CEA55FC8A3D45880
                      SHA-256:025EDA1C7FC55426AFA2F9B1377E6DDAB5ACBECFFEB15CCE6B1718E10348CB5C
                      SHA-512:E2E5C108349160E1C036361D8CB6BF3865DF2E0CFD093AB67041EF58E86E4EC50293027FF500A40276BD94DF694F3209F7954DFE366E4602995B282D252D16C4
                      Malicious:false
                      Preview:....e....e......301;1500...1...1...1...1...1...1...100;600...1...1...1...1...1...1...108;1750...1...1...202;95...1...1...1...1...1...1...106;513...1...204;1320...1...1...212;4801...1...1...1...108;1888...1...1...600;3300...600;1500...1...600;3300...600;1500...1...1...1...110;1599...1...1...600;3300...600;3400...600;3500...1...1...1...1...1...1...1...1...1...1...1...1...600;2400...600;2500...600;2600...600;2700.......e....e......601;3500...601;4500...601;5500...1...1...200;125...1...1...1...1...102;421...1...600;366...1...110;1996...1...1...1...1...1...600;380...1...106;625...1...1...1...208;1520...1...1...1...212;6401...1...1...108;888...1...1...600;3200...600;1600...1...600;3200...600;1600...1...1...500;1852...110;1599...1...1...1...600;4900...600;5000...600;5100...1...1...1...600;1600...600;1700...600;1800...600;1900...1...1...1...1...1...1...1...1.......e....e......1...1...1...1...600;9999...200;125...1...102;331...1...1...1...1...102;378...1...1...1...1...208;1096...1...1...1...1..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):124465
                      Entropy (8bit):3.757662559012887
                      Encrypted:false
                      SSDEEP:
                      MD5:19454646C719DAD681E62084B4D22566
                      SHA1:C949EC7BBB01B8B3D7385E8008B0BFD27E9E7146
                      SHA-256:A76637E899EDE252624A7C77CE19BA07421F5F5F7A606A4EDC707F693FC05447
                      SHA-512:181291933E5A291B82C2DBE74108042FBF7C7BBAA91816CCA467A27CCF8041BF7140EFD3859D6BDD7EE80026B0E24C92F852608812D6D80BDF1C8BBDEFC98050
                      Malicious:false
                      Preview:....e....e......301;1500...1...1...1...1...1...1...100;600...1...1...1...1...1...1...108;1750...1...1...202;95...1...1...1...1...1...1...106;513...1...204;1320...1...1...212;4801...1...1...1...108;1888...1...1...600;3300...600;1500...1...600;3300...600;1500...1...1...1...110;1599...1...1...600;3300...600;3400...600;3500...1...1...1...1...1...1...1...1...1...1...1...1...600;2400...600;2500...600;2600...600;2700.......e....e......601;3500...601;4500...601;5500...1...1...200;125...1...1...1...1...102;421...1...600;366...1...110;1996...1...1...1...1...1...600;380...1...106;625...1...1...1...208;1520...1...1...1...212;6401...1...1...108;888...1...1...600;3200...600;1600...1...600;3200...600;1600...1...1...500;1852...110;1599...1...1...1...600;4900...600;5000...600;5100...1...1...1...600;1600...600;1700...600;1800...600;1900...1...1...1...1...1...1...1...1.......e....e......1...1...1...1...600;9999...200;125...1...102;331...1...1...1...1...102;378...1...1...1...1...208;1096...1...1...1...1..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):257192
                      Entropy (8bit):3.6771362042292384
                      Encrypted:false
                      SSDEEP:
                      MD5:F88122A633090EEAE284450658803D8C
                      SHA1:332BB94343F86CEBEF7D507099B7DABC94FF504F
                      SHA-256:2FFAD3737CB1A8D9E46B4F45A2E5346EFD4179AA3209FC00FF388605A70F6E0E
                      SHA-512:FBB1B9037EE9B3FE6917308D9B4830F76804C9D4F3749C5E7908B82C1C43C5E9BED97C64F705CF14101AC0C1BF142828FD2F7921693F59F9FF5E270D9341FEBC
                      Malicious:false
                      Preview:....e....e......1...600;25...1...1...1...1...1...102;25...1...1...600;50...1...1...1...1...1...600;200...1...1...1...1...1...600;200...1...1...600;200...1...1...600;300..n....e....e......800;2600...1...1...1...600;25...1...1...102;25...1...1...1...1...1...1...106;200...1...1...600;200...1...600;200...1...1...600;2000...1...1...1...1...1...1..n....e....e......1...1...1...1...600;25...1...1...1...1...1...104;40...1...1...1...1...1...600;200...1...1...600;200...1...1...600;200...1...1...1...1...1...600;300..n....f....f......1...600;25...1...1...102;25...1...1...1...600;50...1...600;100...1...1...1...1...106;200...600;500...1...1...1...1...1...600;1500...1...1...600;500...1...600;500...600;300..n....f....f......800;4000...1...1...600;25...1...102;25...1...600;50...1...1...1...600;100...1...600;100...1...106;200...1...600;500...1...600;500...1...1...600;500...1...701;500...1...600;500...1...1..n....f....f......1...600;25...1...1...600;25...1...1...1...1...1...104;50...1...600;100...1...1...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):257192
                      Entropy (8bit):3.6771362042292384
                      Encrypted:false
                      SSDEEP:
                      MD5:F88122A633090EEAE284450658803D8C
                      SHA1:332BB94343F86CEBEF7D507099B7DABC94FF504F
                      SHA-256:2FFAD3737CB1A8D9E46B4F45A2E5346EFD4179AA3209FC00FF388605A70F6E0E
                      SHA-512:FBB1B9037EE9B3FE6917308D9B4830F76804C9D4F3749C5E7908B82C1C43C5E9BED97C64F705CF14101AC0C1BF142828FD2F7921693F59F9FF5E270D9341FEBC
                      Malicious:false
                      Preview:....e....e......1...600;25...1...1...1...1...1...102;25...1...1...600;50...1...1...1...1...1...600;200...1...1...1...1...1...600;200...1...1...600;200...1...1...600;300..n....e....e......800;2600...1...1...1...600;25...1...1...102;25...1...1...1...1...1...1...106;200...1...1...600;200...1...600;200...1...1...600;2000...1...1...1...1...1...1..n....e....e......1...1...1...1...600;25...1...1...1...1...1...104;40...1...1...1...1...1...600;200...1...1...600;200...1...1...600;200...1...1...1...1...1...600;300..n....f....f......1...600;25...1...1...102;25...1...1...1...600;50...1...600;100...1...1...1...1...106;200...600;500...1...1...1...1...1...600;1500...1...1...600;500...1...600;500...600;300..n....f....f......800;4000...1...1...600;25...1...102;25...1...600;50...1...1...1...600;100...1...600;100...1...106;200...1...600;500...1...600;500...1...1...600;500...1...701;500...1...600;500...1...1..n....f....f......1...600;25...1...1...600;25...1...1...1...1...1...104;50...1...600;100...1...1...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4646
                      Entropy (8bit):5.58395676466741
                      Encrypted:false
                      SSDEEP:
                      MD5:A25CE08F18CDCE670B62DDA4C8C0D8FC
                      SHA1:5E9AECD26BC6E33E9AA1F252D9D58300F80FDC1D
                      SHA-256:861EDF4C29E69C8FBEE177C6F7555D894BE293589876CFEB109D399A4A0015FF
                      SHA-512:B5D0D047ECF4D1DF66392CE73B76F817A5F3D418F7779CE61608EC5C6682A61CD47B2537F4BEB117A07DFF616B5C519E41B6EB5FCAF25BC7F387751E7659AA35
                      Malicious:false
                      Preview:.j.d..d.................'RunEscape/Model/Prefab/Weapon/WeaponMp5......0...........runEscape1...1.............j.e..e.................'RunEscape/Model/Prefab/Weapon/WeaponMp5......0...........runEscape1...1.............i.f..f.................&RunEscape/Model/Prefab/Weapon/WeaponAk......0...........runEscape5...2.............i.g..g.................&RunEscape/Model/Prefab/Weapon/WeaponAk......0...........runEscape5...2.............o.h..h.................+RunEscape/Model/Prefab/Weapon/WeaponGatling......0...........runEscape10...3.............o.i..i.................+RunEscape/Model/Prefab/Weapon/WeaponGatling......0...........runEscape10...3.............l.j..j.....?............'RunEscape/Model/Prefab/Weapon/WeaponAwp......0...........runEscape11...4.............l.k..k.....?............'RunEscape/Model/Prefab/Weapon/WeaponAwp......0...........runEscape11...4.............j........................%RunEscape/Model/Prefab/Role/PirateMp5......0...........runEscape1...1.............j..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8045
                      Entropy (8bit):5.613509102022936
                      Encrypted:false
                      SSDEEP:
                      MD5:0F555515C3CB18511651792F91FA5DEE
                      SHA1:417868FDA6D93E27CDC220B54138AEFEC68BC7D3
                      SHA-256:66844BA3B1BC3BB69CDD3B8757C1D62E8064D09CBF5282F1BDB8E3616C3E856B
                      SHA-512:80299E4F98FEA56421AE66E37A961D42A6BAEBA0B040EEC34A5272441E7AB515CFE5187732A9A467F5BBD20C5BA58A6224EABAECF6427EAC6CF1EA080947838B
                      Malicious:false
                      Preview:....d..d.................'RunEscape/Model/Prefab/Weapon/WeaponMp5......5...........runEscape1...1..d..d..'RunEscape/Model/Prefab/Weapon/WeaponMp5............e..e.................'RunEscape/Model/Prefab/Weapon/WeaponMp5......5...........runEscape1...1..e..e..'RunEscape/Model/Prefab/Weapon/WeaponMp5............f..f.................&RunEscape/Model/Prefab/Weapon/WeaponAk......5...........runEscape5...2..f..f..&RunEscape/Model/Prefab/Weapon/WeaponAk............g..g.................&RunEscape/Model/Prefab/Weapon/WeaponAk......5...........runEscape5...2..g..g..&RunEscape/Model/Prefab/Weapon/WeaponAk............h..h.................+RunEscape/Model/Prefab/Weapon/WeaponGatling......5...........runEscape10...3..h..h..+RunEscape/Model/Prefab/Weapon/WeaponGatling............i..i.................+RunEscape/Model/Prefab/Weapon/WeaponGatling......5...........runEscape10...3..i..i..+RunEscape/Model/Prefab/Weapon/WeaponGatling............j..j........<........'RunEscape/Model/Prefab/Weapon/WeaponAwp...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):17598
                      Entropy (8bit):5.186467351274315
                      Encrypted:false
                      SSDEEP:
                      MD5:5D0BAB83EC187962DA31247126E284F0
                      SHA1:97476E27020B5995878B1F407590D334D6F08A91
                      SHA-256:941919F2B4C60C3FB32D9176A6C1BFF96B87DE10DC05701CB4D4F2802552FEB0
                      SHA-512:3B6E778B5566C0E0BFDBA913C80BCE59952D169353BF1629E950585E3C1E0EEA2DED0D5F3F0A945B43B5D106F95FB1EE528DEFDAED5B747C20074A49CC41932D
                      Malicious:false
                      Preview:./..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2....9..........G........................G...rush_buy_title2....8..........G...........................rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2....9..........G........................G...rush_buy_title2....8..........G...........................rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........rush_buy_title2..../..........G........d.........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11917
                      Entropy (8bit):6.123373608901348
                      Encrypted:false
                      SSDEEP:
                      MD5:19FCD646915EA31112609CEAEE16F6C5
                      SHA1:2EA50F7535E3C6655C313EA0977097E9F615B341
                      SHA-256:4927160782E974562EDA0FE155A4E681EE43BDE96512F3E98CBD6EAAB9187121
                      SHA-512:DC874955EA62589FA3656217525DF560BD78E310FDD14EBFDD1591C588B4739603567E272E20B6E822C8E1F1B5E724116F28DA98C2560F9D07CA3C34F465AF25
                      Malicious:false
                      Preview:..............d......}.......................1|2|3|4..d...8............2..d.............................................................................-1...............Sprite/UI/UIAltar/altar_flag_1.....1|2|3|4..N..".buffer1..............d......}.......................1|2|3|4..d...8............2..d.............................................................................-1...............Sprite/UI/UIAltar/altar_flag_1.....1|2|3|4..N..".buffer1..............d......}.......................1|2|3|4..d...8............2..d.............................................................................-1...............Sprite/UI/UIAltar/altar_flag_1.....1|2|3|4..N..".buffer1..............d......}.......................1|2|3|4..d...8............2..d.............................................................................-1...............Sprite/UI/UIAltar/altar_flag_1.....1|2|3|4..N..".buffer1..............d......}.......................1|2|3|4..d...8............2..d.........................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):146
                      Entropy (8bit):4.408718469952967
                      Encrypted:false
                      SSDEEP:
                      MD5:56937E6DDEAB04D8A27DA0155E0F23BC
                      SHA1:E1C73F22CE4EF7BC3182B1CAA1D7E6A51A07615D
                      SHA-256:C07EA59197EFB12A8E4EE7465BFA9C2BAFD580A6DF10FCB113AB89701A6779E2
                      SHA-512:8A0073BF7B7E3516BE656C400DDCCC3A667179C486D5466AEFEA5226AA80C7783824D03EC759322EB7C1ECAB1AB6D603A27BF911F7277B42BF7290BD14940147
                      Malicious:false
                      Preview:............d.............2..x............d.......................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):531
                      Entropy (8bit):4.774651496408712
                      Encrypted:false
                      SSDEEP:
                      MD5:7126E78929B6AFD6E1EB32886F7919F9
                      SHA1:DC7346F5F3E871ED63388EF60AA9CD7529D037C4
                      SHA-256:D00043FA9BE5C337607CC8AD2FDDD973AD6D7AEBA888343C534B3F7D59CDFE89
                      SHA-512:F3BF54CF33723B53AAA9723225CA47C526F7CA7746FED3D5907749D17F7E29E3D6C90FCC30BEED5B6816DD4285A245C3079EA8176983161A37BBBA37A23047CE
                      Malicious:false
                      Preview:..........'.....................6..........>..........F..........N..........]..........m..........}...................................................................................................................................................................................................................................................................... .. ........!..!........".."........#..#.......$..$........%..%........&..&........'..'........(..(........)..)........*..*....$...+..+....*...,..,....3...-..-....=
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1826
                      Entropy (8bit):5.604211890270588
                      Encrypted:false
                      SSDEEP:
                      MD5:773B4104CBA6C303A83DDAD125505071
                      SHA1:E1F2E6549D869559F79C9CBAF441897DF54AB719
                      SHA-256:DEC1FF8DB2F71C70B678B3404610D203F8395585DF3DF8FB27040FA4A86904E7
                      SHA-512:AA4DE5CCE249DBB5101874C5E96DBE05A25208F3830C4D6A5136F8F06CB7CCB27BC53609C64598B0A875C725FD98BC603F336679B40F6E6733DC9275632A719A
                      Malicious:false
                      Preview:.D........................................sand_sea_description28.D........................................sand_sea_description28.A.......................................sand_sea_description28.D........................................sand_sea_description28.G.........................................sand_sea_description28.D........................................sand_sea_description28.G.........................................sand_sea_description28.D........................................sand_sea_description29.A.......................................sand_sea_description29.D........................................sand_sea_description29.G.........................................sand_sea_description29.D........................................sand_sea_description29.D........................................sand_sea_description29.D........................................sand_sea_description29.D...............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2188
                      Entropy (8bit):4.603942933549562
                      Encrypted:false
                      SSDEEP:
                      MD5:50B57A8F300EE6F2CC0CD26027817EA6
                      SHA1:BBE2AB161A81CB4A82B17946F5B7DE6E2617F161
                      SHA-256:0F88FB63177760DDB103BC7E2379CA9A5E23880DFADA8A5CC304F11608F7439D
                      SHA-512:BAF85C99026505A39321DC3D5117703BBD21CB47D34F81FDFF9032346BBB15E7E0F50111E880056840B90D7494CB1820DB6B1DCC7A0AB6271AEBDB5A6D836BFE
                      Malicious:false
                      Preview:.5........8;1..!5067:5;6244:5;27:10;951:5;19796:3.......;........9;2..#5067:5;6244:5;1006:10;951:8;19796:3...1.......;........9;4..#5067:5;6244:5;1012:5;951:10;19796:5...2.......9........16;7..$5067:5;6244:5;3161:50;951:15;19796:5.......<........21;10.."5067:10;6244:5;46:3;951:20;19796:5...4.......:........27;15..$5067:10;6244:5;1628:10;983:2;19796:2.......>........34;20..$5067:10;6244:5;2330:10;983:2;19796:2...6.......9........44;25..#5067:10;6244:5;1012:8;983:2;19796:2.......8........57;30.."5067:10;6244:5;947:5;983:4;19796:5.......;........73;35..%5067:10;6244:10;4304:1;983:4;19796:10.......<........93;40..&5067:10;6244:10;1628:10;983:4;19796:10.......<........99;45..&5067:10;6244:10;2330:15;983:4;19796:10.......=........105;50..&5067:10;6244:10;1012:11;983:6;19796:10.......;........111;55..$5067:10;6244:10;947:6;983:6;19796:10.......:........117;60..#5067:10;6244:10;46:2;983:6;19796:10.......=........123;65..&5067:10;6244:10;1628:15;983:6;19796:10.......>........129;70..'5067:10;62
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):162419
                      Entropy (8bit):5.676182097682833
                      Encrypted:false
                      SSDEEP:
                      MD5:3ABE06C60A6D5934FF9A724786FF0F29
                      SHA1:9A8639A04B9E85E3A34086480D1D033770FAEA81
                      SHA-256:0CBB74AC502EA7AD9A07B550E2B503071008DF22B7DC628C47022F5FC196B50C
                      SHA-512:B8B94D1084C0A17F03AEF7944A9C0462806B33D3CB9BBCFD33CE01726B012935D992DEF9473A0141E17D8D87CC02BB22067CFDAC6BF6693E501CE387DBE8CF18
                      Malicious:false
                      Preview:.................1628:2;1005:10;6244:1...1:10...scout_mission_normal1...scout_paidmission_intro1..(Sprite/UI/Icon/Others/reconnoitre_icon01......(.....................7793:2;20419:500;40:80...2:20...scout_mission_normal3...monster_description_207..(Sprite/UI/Icon/Others/reconnoitre_icon03......(.......3993:1................%3:1;8:1;13:1;18:1;949:2;4365:1;1636:1...3:20...scout_mission_normal5...scout_paidmission_intro4..(Sprite/UI/Icon/Others/reconnoitre_icon04..............1624:1;1644:1.................19796:3;2754:1;38:80...4:20...scout_mission_normal5...scout_paidmission_intro4..(Sprite/UI/Icon/Others/reconnoitre_icon02..............1628:1;1655:1.................2754:1;19796:2;3161:20...5:0...scout_mission_boss1...scout_paidmission_intro2..(Sprite/UI/Icon/Others/reconnoitre_icon06............................1659:2;1005:10;6244:1...1:10...scout_mission_normal1...scout_paidmission_intro1..(Sprite/UI/Icon/Others/reconnoitre_icon01......(.....................7793:2;20419:500;40:80...2:20
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2744
                      Entropy (8bit):5.573676384809211
                      Encrypted:false
                      SSDEEP:
                      MD5:F2514ED3B99C6A794E863F282EE9AE87
                      SHA1:4D532E412376D2B423046622877A2DCC21EAD26E
                      SHA-256:3AEE2EAC91196E76F903F510C0977F63BE181E8E05FAC80B1A1FB2369DFB6CA6
                      SHA-512:67085A882EB483AC687D01E60D5FAB3962790D247C7AE098EBE2EEA736E6DCEACD9FE783638BF07F084C2768D37C49ED7DBE464483DBB3D2DF907E5B007D20FF
                      Malicious:false
                      Preview:...........Exam_Question_kongoption_19..4Sprite/UI/Icon/Event/AbtestSearch9471/Search_monster.....-.......1;2;3;4;5;6;7;8;9;10;11;12;13;14;15;16;17;18;19;20;21;22;23;24;25;26;27;28;29;30;31;32;195;196;197;198;199;233;234;235;236;237;467;468;469;470;471;1133;1134;1135;1136;1137.....-...........monster5..1Sprite/UI/Icon/Event/AbtestSearch9471/Search_BOSS...........M126;131;136;139;141;144;146;149;151;152;175;202;203;238;239;472;473;1138;1139.......l........resource_point_name1...Sprite/Map/world_food...........&1;2;3;4;5;6;7;8;9;10;69;70;79;80;93;98.......u........resource_point_name2...Sprite/Map/world_wood.........../11;12;13;14;15;16;17;18;19;20;71;72;81;82;94;99.......w........resource_point_name3...Sprite/Map/world_stone...........021;22;23;24;25;26;27;28;29;30;73;74;83;84;95;100.......v........resource_point_name4...Sprite/Map/world_iron...........031;32;33;34;35;36;37;38;39;40;75;76;85;86;96;101.......v........resource_point_name5...Sprite/Map/world_gold...........041;42;43;44;45;
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3509
                      Entropy (8bit):4.7482881776708945
                      Encrypted:false
                      SSDEEP:
                      MD5:5E081A3BD24B759F681FBEDD02CF9E74
                      SHA1:820FD8C3166943EA46692C82933A929FFC00DF2C
                      SHA-256:99330CB72149543CBEE16623CA079149D4B11B3E9B9A353AE881E38BB6941A0A
                      SHA-512:CCD424EA3BFB2D22D4C0493959849DE95F595E0773CFA2E075FFAB595EF5FBFA865086106720C55D5FECE950E5A3AAB362D2B8E6D590503F659BEFE31FB08F9F
                      Malicious:false
                      Preview:.............."..............L.......4:25;4:25;9:25;9:25;14:25;14:25;19:25;19:25;1012:12;1012:12;951:35;951:35;3036:50;1003:50;946:8;946:8;1628:25;1628:25;2330:25;8791:25;8791:25;1008:25;29:12...L..................1...........L.......4:25;4:25;9:25;9:25;14:25;14:25;19:25;19:25;1012:12;1012:12;951:35;951:35;3036:50;1003:50;946:8;946:8;1628:25;1628:25;2330:25;8791:25;8791:25;1008:25;29:12...L.............................2...L.......4:25;4:25;9:25;9:25;14:25;14:25;19:25;19:25;1012:12;1012:12;951:35;951:35;3036:50;1003:50;946:8;946:8;1628:25;1628:25;2330:25;8791:25;8791:25;1008:25;29:12...L............................L.......4:50;4:50;9:50;9:50;14:50;14:50;19:50;19:50;1012:25;1012:25;951:70;951:70;3036:100;1003:100;946:15;946:15;1628:50;1628:50;2330:50;8791:50;8791:50;1008:50;29:25...L..............L.............L.......4:50;4:50;9:50;9:50;14:50;14:50;19:50;19:50;1012:25;1012:25;951:70;951:70;3036:100;1003:100;946:15;946:15;1628:50;1628:50;233
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2688
                      Entropy (8bit):4.688533106579772
                      Encrypted:false
                      SSDEEP:
                      MD5:6EB19B1F22A38FAE283AECAFC6BAE0C4
                      SHA1:B505F780A2031C5129C33AD72E4E469880D1E6C9
                      SHA-256:C011013ACB832FE22DD0404AA73EFE6D03667B8CF1EB73DBE9F4421B1E911FD7
                      SHA-512:26E452B7D669A1E3345C77A1DF8E6C6001DAD7F9221E6B7048F8B342255C63D4C2187CDA7B98DA90DB455CACCD9FC0EF47914B9995178718E4883BF79096DEC0
                      Malicious:false
                      Preview:....%...%...10|13|16|19;0;200.......&...&...10|13|16|19;0;200.......&...&...12|15|18|21;0;200.......&...&...11|14|17|20;0;200.......'...'...11|14|17|20;0;200.......'...'...12|15|18|21;0;200.......'...'...10|13|16|19;0;200.......'...'...10|13|16|19;0;200.......'...'...12|15|18|21;0;200.......(...(...11|14|17|20;0;200.......(...(...11|14|17|20;0;200.......(...(...12|15|18|21;0;200.......(...(...10|13|16|19;0;200.......(...(...10|13|16|19;0;200.......(...(...12|15|18|21;0;200.......(...(...11|14|17|20;0;200.......(...(...11|14|17|20;0;200.......(...(...12|15|18|21;0;200.......)...)...10|13|16|19;0;200.......)...)...10|13|16|19;0;200.......)...)...12|15|18|21;0;200.......)...)...11|14|17|20;0;200.......)...)...11|14|17|20;0;200.......)...)...12|15|18|21;0;200.......)...)...10|13|16|19;0;200.......)...)...10|13|16|19;0;200.......)...)...12|15|18|21;0;200.......)...)...11|14|17|20;0;200.......)...)...11|14|17|20;0;200.......)...)...12|15|18|21;0;200.......)...)...10|13|16|19;0;200.......)...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7336
                      Entropy (8bit):5.648551290323031
                      Encrypted:false
                      SSDEEP:
                      MD5:3845BD705F6D1DB9CD1B232CEEBCF1EC
                      SHA1:54C643E9F1E3A8F7262D91FD72DED228350A662E
                      SHA-256:1BBD630CC23A188D4547FE5A56FA58A63DBC297E28AC1A66A79377C4BF87C685
                      SHA-512:876352BEF91104647200033D0C1587E87705D6684E29BE8B14E80CF721F30E0553567E3621740B35C695DFA5272511FC52311B3B9668655FF6E7FCE977E9BB0B
                      Malicious:false
                      Preview:.@...........3036:50...a................p.........?...........!..,.B........]...3036:50...a................p.........?......2.....!..,.C.............3036:50...a................p.........?......d.....!..,.D.............3036:50...a................p.........?.............!..,.D............3036:50...a................p.........?.............!..,.D.............3036:50...a................p.........?.............!..,.D.............3036:50...a................p.........?.............!..,.D.............3036:50...a................p.........?.............!..,.D.............3036:50...a................p.........?.............!..,.D............3036:50...a................p.........?...#.........!..,.D.............3036:50...a................p.........?...'.........!..,.D.............3036:50...a................p.........?...*.........!..,.D.............3036:50...a................p.........?.............!..,.D.............3036:50...a................p.........?...2.........!..,.D.............3036:50...a.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9079
                      Entropy (8bit):3.6287449232986813
                      Encrypted:false
                      SSDEEP:
                      MD5:1AF1217DC40C690CB64CB3DEC774C059
                      SHA1:94A7E888B77DD595D6768DC4AD91D9C7A4EE0625
                      SHA-256:3A0D177CF74FD9F6B4586B722ADE16AA1A83EFD59F59CB82E4F7249390CAEB5A
                      SHA-512:D4EF33F49434415866D85B2F44A79A9BCD5A1D9F9D52745FBDC317168584E39469A26C45ACAC26D997892AFA93F540F6A955ED64D52E16C67992028BE695B4F8
                      Malicious:false
                      Preview:..........72561:300000;3712:100;984:100;5046:220;5068:300;6244:270..'2561:4000;2570:20000;2569:20000;1624:40..]16464:1;2561:300000;2570:200000;2569:200000;1625:400;34:800;40:800;5046:200;5068:250;5067:100..L2561:2000;2570:2000;2569:2000;1624:40;36:100;38:100;5046:50;5068:100;5067:20..C2561:300000;3712:100;984:100;5046:220;5068:300;6244:270;5487:114300..]16464:1;2561:300000;2570:200000;2569:200000;1625:400;34:800;40:800;5046:200;5068:250;5067:100..L2561:2000;2570:2000;2569:2000;1624:40;36:100;38:100;5046:50;5068:100;5067:20..[5532:1;2561:150000;2570:100000;2569:100000;1625:200;34:400;40:400;5046:100;5068:125;5067:50..I2561:1000;2570:1000;2569:1000;1624:20;36:50;38:50;5046:25;5068:50;5067:10..\5928:1;2561:300000;2570:200000;2569:200000;1625:400;34:800;40:800;5046:200;5068:250;5067:100..g19782:1;11414:200;2561:300000;2570:200000;2569:200000;1625:400;34:800;40:800;5046:200;5068:250;5067:100..e19783:1;11156:2;11414:50;2561:2000;2570:2000;2569:2000;1624:40;36:100;38:100;5046:50;5068:100;5067
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1578
                      Entropy (8bit):5.52849783637471
                      Encrypted:false
                      SSDEEP:
                      MD5:3894016DB924441B3E61D71FE0931C4B
                      SHA1:DF979BACDBB6827AEB0A28F251BF20F656BD5DAF
                      SHA-256:F5834124BE8826E61368266D3CEE5770250A2744D5CF104EB844E05103A7C1BE
                      SHA-512:0606213041DCFBDDBFFB783E0E4E86511A55D32448B694676A22DDAA411E11755C29085A008BEB35A7780391A5141117DB379D21CB379DA10F68CFDD31221708
                      Malicious:false
                      Preview:.Y........../...............................(1615:40;1602:40;3036:200;2850:40;4110:40...../.Y.........._...............................(1615:80;1602:80;3036:400;2850:80;4110:60....._.^....................&....&....&....&..+1615:150;1602:150;3036:800;2850:150;4110:80.......`......................9.....9.....9.....9..-1615:220;1602:220;3036:1200;2850:220;4110:100........`.....................L....L....L....L..-1615:290;1602:290;3036:1600;2850:290;4110:120........`................$....._....._....._....._..-1615:360;1602:360;3036:2000;2850:360;4110:140........`................-....w....w....w....w..-1615:450;1602:450;3036:2500;2850:450;4110:160........d...............6..........................-1615:530;1602:530;3036:3000;2850:540;4110:180.......d...............@..........................-1615:620;1602:620;3036:3500;2850:630;4110:200.......d...............I..........................-1615:710;1602:710;3036:4000;2850:720;4110:220.......`............U.........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):302
                      Entropy (8bit):4.399538276867281
                      Encrypted:false
                      SSDEEP:
                      MD5:5357BCBE66BC0F9DEB2073FD51D6C60C
                      SHA1:819CE3C3D79CF3AA32EA1FF88A2E90F61799785F
                      SHA-256:AE0C6D9FA7452C773EC7C395ED84F305845BD06D74AFF3ED0EBEA754DE2E0DD3
                      SHA-512:7BE43387338532D7A3BE02DD9F9A78DD7C383BECA90EAEC55701B0E99E77DF61DB779367B1D04B0A3ADB6E6106F913085BB71A63E96843657010A3DD2E7647B2
                      Malicious:false
                      Preview:..........US...7:8:9:10:15:16:17..........IT...7:15:10:8:9:16:17..........AE...7:8:10:15:9:16:17.'........KR...18:7:10:15:9:19:17:16:8:20.'........JP...17:7:15:16:9:10:8:18:20:19..........DE...7:8:15:10:9:16:17..........CA...7:8:9:15:10:16:17..........GB...7:8:9:15:10:16:17..........CN...4:3:21:5:22:9
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3279
                      Entropy (8bit):5.565055650542115
                      Encrypted:false
                      SSDEEP:
                      MD5:11865C2EEB76A7914EAC306239824755
                      SHA1:3EEA7EE6877248248658647BDECFB0CBF632A370
                      SHA-256:3DEA56C1037A5150E13215E719F174F4E0C7425BFFC74589BE921EE5796B4E02
                      SHA-512:8F3AF269E842B9C9E7CAD26E4739F985C663B2054930023E75C6E8096BE40A4F55AB486CEF1FA74DFB9CF573FEF47A7D31121AFD09F477D7E363A839A6D4D133
                      Malicious:false
                      Preview:...........1;2;3;4;5;6...0...Sprite/UI/Icon/ItemsIcon/3126........ahttps://m.evony.com/n1.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=..............-1...0...Sprite/UI/Icon/ItemsIcon/3126........ahttps://m.evony.com/n2.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=..............5...0...Sprite/UI/Icon/ItemsIcon/3126........ahttps://m.evony.com/n3.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=...............519;549;579;609;639;669;699;729;759;789;849;819;1217;2954;3282;3288;3294;3300;3306;3312;3318;3324;3330;3336;3342;3348;3354;3360;3508;3514;3520;3526;3532;3538;3544;3550;3556;3562;3568;3574;3580;3586;3761;3767;3773;3779;3785;3791;3797;3803;3809;3815;3821;3827;3833;3839...0...Sprite/UI/Icon/ItemsIcon/3126........ahttps://m.evony.com/n4.html?content=Try_it_Yourself_Many_failed_before_Think_you_can_do_better&u=............."3592;3593;3594;3595;3641;3981;4798...0...Sprite/UI/Icon/ItemsIcon/3126........ahttp
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4510
                      Entropy (8bit):3.615313024252165
                      Encrypted:false
                      SSDEEP:
                      MD5:BC87E48BCFDC668BD1CAF0244C12A5F6
                      SHA1:521211B8B6FC5AE31BE02C8813748292B5BB56F6
                      SHA-256:0784890EB85AD734CDD049922B5BB0AD8E17DC8095E1A1186240E314BBD6C4B7
                      SHA-512:26DA16670F23719AFF50162C6129310C2F765BFF9ECFAEFC3D7C4568FE788945B714522115064E44F5CC18A9BF5270D9B60EF457CC0BE796322701511EACFEDB
                      Malicious:false
                      Preview:.....V...V...1101:0:0:100....3003:0:4;3003:0:5;3003:0:6;3003:0:7;3003:-1:4;3003:-1:5;3003:-1:6;3003:-1:7;3003:-2:4;3003:-2:5;3003:-2:6;3003:-2:7;3003:1:4;3003:1:5;3003:1:6;3003:1:7;3003:2:4;3003:2:5;3003:2:6;3003:2:7.............V...V...1101:0:0:100....3003:0:4;3003:0:5;3003:0:6;3006:0:7;3003:-1:4;3003:-1:5;3003:-1:6;3003:-1:7;3003:-2:4;3003:-2:5;3003:-2:6;3003:-2:7;3003:1:4;3003:1:5;3003:1:6;3003:1:7;3003:2:4;3003:2:5;3003:2:6;3003:2:7.............V...V...1102:0:0:100....3003:0:4;3003:0:5;3003:0:6;3003:0:7;3003:-1:4;3003:-1:5;3003:-1:6;3003:-1:7;3003:-2:4;3003:-2:5;3003:-2:6;3003:-2:7;3003:1:4;3003:1:5;3003:1:6;3003:1:7;3003:2:4;3003:2:5;3003:2:6;3003:2:7.......'.....V...V...1102:0:0:100....3003:0:4;3003:0:5;3003:0:6;3008:0:7;3003:-1:4;3003:-1:5;3003:-1:6;3003:-1:7;3003:-2:4;3003:-2:5;3003:-2:6;3003:-2:7;3003:1:4;3003:1:5;3003:1:6;3003:1:7;3003:2:4;3003:2:5;3003:2:6;3003:2:7.............V...V...1103:0:0:100....3003:0:2;3003:-1:2;3003:1:2;3003:0:3;3003:-2:2;3003:2:2;3003:0:4;3003:-1:3;
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6488
                      Entropy (8bit):5.577321919346071
                      Encrypted:false
                      SSDEEP:
                      MD5:EF3ADD19E8CF19D5237F623C6A123772
                      SHA1:CF24AD020EDC524AC75FDEE8124DE39C1FC52AA7
                      SHA-256:A8D4BEC30CD461F23E51C07DDF090A147F6DD560551096B8B51F2B3DC8346363
                      SHA-512:D8F6E7B3E0CC4D29CEFB929AAE57B5718FA0C3D4F47D98F4737294D13F0BC1D291C3E0EAFF355F90321AA840B7DB5F38E0CB92E0C5FF334E77175FAC0E1ABE9F
                      Malicious:false
                      Preview:............................alliance_showdown_grade1..&Sprite/UI/Icon/UIIcons/Fame_Showdown_1...0-199..!9260:1400;2561:1200;1726:12;34:80...9260:400;2561:8000...162:102:84:255............................alliance_showdown_grade1..&Sprite/UI/Icon/UIIcons/Fame_Showdown_1...0-199..!9260:1250;2561:1000;1726:11;34:72...9260:400;2561:8000...162:102:84:255............................alliance_showdown_grade1..&Sprite/UI/Icon/UIIcons/Fame_Showdown_1...0-199..!9260:1250;2561:1000;1726:11;34:72...9260:400;2561:8000...162:102:84:255............................alliance_showdown_grade1..&Sprite/UI/Icon/UIIcons/Fame_Showdown_1...0-199.. 9260:1100;2561:800;1726:10;34:64...9260:400;2561:8000...162:102:84:255.......................d...alliance_showdown_grade1..&Sprite/UI/Icon/UIIcons/Fame_Showdown_1...0-199.. 9260:1100;2561:800;1726:10;34:64...9260:400;2561:8000...162:102:84:255...........................alliance_showdown_grade1..&Sprite/UI/Icon/UIIcons/Fame_Showdown_1...0-199...9260:950;2561:600;1726:9;
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7095
                      Entropy (8bit):6.11248378003938
                      Encrypted:false
                      SSDEEP:
                      MD5:09A8018C1EA4775A2D40D699DB65053D
                      SHA1:64515CE09D9EA702BB95BD2401F3F28360FA34B6
                      SHA-256:BF03A35AA27AFF5E2AA064E037CA547BFA2B174B673A5952CF4C30CDAD4EBEED
                      SHA-512:0772FC29D66F5251886B662DE674014CCF6EA2E96C424100B959817D103B3380FC8031B1473734C18D020B3C633582A3CD637957001D3C1E917D5B871EE20114
                      Malicious:false
                      Preview:.......................................Prefabs/Skin/UINormal...christmas_chat_text1...Prefabs/Bubbles/Normal......christmas_chat_text7...2016/12/23 0:00:00.....e.W......................Prefabs/Army/Common/snowman......2016/12/23 0:00:00.....h....................christmas_chat_text4.......3....Prefabs/Skin/Christmas/UISkin...christmas_activity_castle..!Prefabs/Skin/Christmas/Skin_Lv{1}.."Prefabs/Skin/Christmas/FX_Marching...Prefabs/Bubbles/Christmas.......christmas_chat_text3...Christmas...2016/12/23 0:00:00.....i........$.......$...christmas_chat_text5.......7....Prefabs/Skin/Christmas/UISkin...christmas_activity_castle..!Prefabs/Skin/Christmas/Skin_Lv{1}.."Prefabs/Skin/Christmas/FX_Marching...Prefabs/Bubbles/Christmas...'...christmas_chat_text3...Christmas...2016/12/23 0:00:00.....j......................christmas_chat_text6.......30....Prefabs/Skin/Christmas/UISkin...christmas_activity_castle..!Prefabs/Skin/Christmas/Skin_Lv{1}.."Prefabs/Skin/
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):282
                      Entropy (8bit):4.972273688411907
                      Encrypted:false
                      SSDEEP:
                      MD5:01B1C51359C83CBD2EBCA2AC54B41464
                      SHA1:CA9669CB529A7A037AA60263F2030CBFD99041F2
                      SHA-256:ECD55C5097DB7BB38D2B38305CE56C1559B7BDA3DECEF29F085F82F2E68812EB
                      SHA-512:D4B1204651644333D47A55551C307C14BC7EEE64993E38AAD1B4BA75E4F6107657E6E0D380189C19FA3808956294DE7AFE9D7C92146C7E36D00D3695E3C18F54
                      Malicious:false
                      Preview:.2........'..d.........Sprite/UI/Icon/ItemsIcon/8883.3......................Sprite/UI/Icon/ItemsIcon/8881.3......................Sprite/UI/Icon/ItemsIcon/8885.2.....................Sprite/UI/Icon/ItemsIcon/8886.2.....................Sprite/UI/Icon/ItemsIcon/8887..........L.........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):179
                      Entropy (8bit):4.761692321954214
                      Encrypted:false
                      SSDEEP:
                      MD5:44C5890D5EE0C313DF75D77B02CE99EE
                      SHA1:68590311D2E73A7817DD681A466BACD723FB3399
                      SHA-256:F6EA86E1A93DFEAF7116406176755EBC60B2679B034D884466BC41E51746CBFF
                      SHA-512:C903631C5FB3D9C06BC14EB8D8F4D158FDFC92AEE3766E3BECC15945556DAC9CF65DF2E83B75EDAE286F7A6523C3179E05CC13AE78957F0C4A07B9D82F6D9EBC
                      Malicious:false
                      Preview:.O........1:3...8........3993:2;2:15;7:15;12:15...3993:2;2:10;7:10;12:10.........`........2:600.............4030:20;4582:3;6244:10;1566:10...4030:20;4582:2;6244:8;1566:8........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):194542
                      Entropy (8bit):5.953577180726838
                      Encrypted:false
                      SSDEEP:
                      MD5:454F5AE46F1AC112536612AE85EB5E0E
                      SHA1:A1BF7B863FBAC1EF5D60CD80EA417C6B57087170
                      SHA-256:1861EDC9EB031842A59FFA70AAC12B1A836CD5B8967F45E1F7E06DA058A9F943
                      SHA-512:96BD34DA5B694F700CF18D34644D5941D84B84D51631245E07BBFCAC58659860592FBD731533769014FE1809833E426B25F37CBA85F0A3531FE4F571EA09B9CC
                      Malicious:false
                      Preview:........................special_attribute_level1..0Sprite/UI/Icon/UICharacteristic/bubingfangshou_1...0...4361:55;4362:50;4363:35..d.....12.2.......15.2.......18.2.......21.2.....buffer_description12|15|18|21...........................special_attribute_level1..0Sprite/UI/Icon/UICharacteristic/bubingfangshou_1...0...4361:55;4362:50;4363:35.........12.d.......15.d.......18.d.......21.d.....buffer_description12|15|18|21...........................special_attribute_level1..0Sprite/UI/Icon/UICharacteristic/bubingfangshou_1...0...4361:55;4362:50;4363:35.........12..........15..........18..........21........buffer_description12|15|18|21...........................special_attribute_level1..0Sprite/UI/Icon/UICharacteristic/bubingfangshou_1...0...4361:55;4362:50;4363:35.........12..........15..........18..........21........buffer_description12|15|18|21...........................special_attribute_level1..0Sprite/UI/Icon/UICharacteristic/bubingfangshou_1...0...4361:55;4362:50;4363:35......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):10960
                      Entropy (8bit):5.746028205664527
                      Encrypted:false
                      SSDEEP:
                      MD5:98334BE7A4940366073012782DE719F6
                      SHA1:1D958E994914D207759BD7DFE0CD7446E39D8095
                      SHA-256:7AD0CACF2626D7DE98498167358B3560EB9D71547B7969D28FFF1B2DBDA26E83
                      SHA-512:28BE0DCC95127C6F5842DFC90B717C206659D1B43DB27DC24514E9611641598739BFF193D2DEC23338246E09EAF7AA6019A28F2C975563C3AC46F77AFA30643F
                      Malicious:false
                      Preview:.................1Sprite/UI/Icon/UICharacteristic/jiuzhanshachang_1......special_attribute_level1...buffer_description10|13|16|19.....10.........13.........16.........19......1Sprite/UI/Icon/UICharacteristic/jiuzhanshachang_1...'...18419:10...18419:10....................1Sprite/UI/Icon/UICharacteristic/jiuzhanshachang_2..(...special_attribute_level2...buffer_description10|13|16|19.....10...}.....13...}.....16...}.....19...}..1Sprite/UI/Icon/UICharacteristic/jiuzhanshachang_2...'...18419:20...18419:15....................1Sprite/UI/Icon/UICharacteristic/jiuzhanshachang_3..<...special_attribute_level3...buffer_description10|13|16|19.....10..........13..........16..........19.......1Sprite/UI/Icon/UICharacteristic/jiuzhanshachang_3...(...18419:30...18419:25....................1Sprite/UI/Icon/UICharacteristic/jiuzhanshachang_4..P...special_attribute_level4...buffer_description10|13|16|19.....10..........13..........16..........19.......1Sprite/UI/Icon/UICharacteristic/jiuzhanshachan
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):11505
                      Entropy (8bit):5.843837765998424
                      Encrypted:false
                      SSDEEP:
                      MD5:5D95443D6A15123A42B725F178D95A61
                      SHA1:0683CFB86252F069C846542831644A5544DA5F2F
                      SHA-256:419787A59672B4191C5396F438EBFE52F03AF9CC77C7935CB1CA09E2AEA32D4D
                      SHA-512:209E8C0569167EC832A12BDF534607C6D44CD9AD610338A047C38E74F4D48E55FAAB100A7E38D3FF272256F69D8DF985F468795EFFE2F075B2D1CC668620D1A4
                      Malicious:false
                      Preview:..........................18183:1........42.........46.........39......,Sprite/UI/Icon/WishingPool/WishingPool_Crown...kingstatue_module_1...kingstatue_module_1_1........................18183:1........42.d.......46..........39.......,Sprite/UI/Icon/WishingPool/WishingPool_Crown...kingstatue_module_1...kingstatue_module_1_1........................18183:1........42..........46..........39.......,Sprite/UI/Icon/WishingPool/WishingPool_Crown...kingstatue_module_1...kingstatue_module_1_1........................18183:1........42..........46..........39.......,Sprite/UI/Icon/WishingPool/WishingPool_Crown...kingstatue_module_1...kingstatue_module_1_1........................18183:1..+.....42..........46..........39.......,Sprite/UI/Icon/WishingPool/WishingPool_Crown...kingstatue_module_1...kingstatue_module_1_1........................18183:1..?.....42..........46..........39.......,Sprite/UI/Icon/WishingPool/WishingPool_Crown...kingstatue_module_1...kingstatue_module_1_1........................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8575
                      Entropy (8bit):5.691978523802015
                      Encrypted:false
                      SSDEEP:
                      MD5:F47456F606E911433F0AF94F1EE0D2A8
                      SHA1:74488261F74764C853823826CBA401C8DBB5C512
                      SHA-256:22A938A132241A1180B6F79FF7E4A2DD7D9761404C4A02311D2C63DE8EA5CDA8
                      SHA-512:8006FCA51D069D42E1651E998D86B227DCA02E3586950A3D20D39E3EF2B20CFC86887D6905F55A0D7636859B595F4DFFDAF41DCD9F3E4D22705F70BB1082F529
                      Malicious:false
                      Preview:.9.....10K..............................0...0...30....:.....50K...........x..................0...0...120....<.....100K...............................0...0...225....<.....500K...............................0...0...900....<.....1M................................0...0...1500....<.....5M................................0...0...6000....9.....10K..............................0...0...30....:.....50K...........x..................0...0...120....<.....100K...............................0...0...225....<.....500K...............................0...0...900....<.....1M................................0...0...1500....<.....5M................................0...0...6000....9.....10K..............................0...0...30....:.....50K...........x..................0...0...120....<.....100K...............................0...0...225....<.....500K...............................0...0...900....<.....1M........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8646
                      Entropy (8bit):5.700530409953322
                      Encrypted:false
                      SSDEEP:
                      MD5:BB16A92BAFACEEA6D932B30D7661FCEC
                      SHA1:C538F9479C31F5DCAE38873C17D60E56D42E962B
                      SHA-256:C79CB978812163C688D312C34D52C9B10759DCA0F2656EF47252D85085206E33
                      SHA-512:43F2AE2DBC880C187594315A0AA2481878B2FC28BF5CE7DE8D352819663F2E247A16AB2E1EE76A5185910A819A053F1EF61828632DCD0798B90C1C5BC9E777BF
                      Malicious:false
                      Preview:.9.....10K..............................0...0...30....:.....50K...........x..................0...0...120....<.....100K...............................0...0...225....<.....500K...............................0...0...900....<.....1M................................0...0...1500....<.....5M................................0...0...6000....9.....10K..............................0...0...30....:.....50K...........x..................0...0...120....<.....100K...............................0...0...225....<.....500K...............................0...0...900....<.....1M................................0...0...1500....<.....5M................................0...0...6000....9.....10K..............................0...0...30....:.....50K...........x..................0...0...120....<.....100K...............................0...0...225....<.....500K...............................0...0...900....<.....1M........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1680
                      Entropy (8bit):4.108202742709842
                      Encrypted:false
                      SSDEEP:
                      MD5:F371EA2CE652974F20E32683C3670091
                      SHA1:DFF84614C8ED191676F386B7F06597D035CC7656
                      SHA-256:76C1325BC18B8F49429896ABB4D092DB26B8C6919434DF299F3E618CEE00F3BB
                      SHA-512:278453724BE86100393C24636955BBFE0BEE362C7CEB48C93A6F8CD33B5E50CD11887D5C7C280E8366A9AAC761294D7809BBBB2C6524EE2C729A7C13AC151B22
                      Malicious:false
                      Preview:....................<...........................................................................................................................................<...........................................................................................................................................<...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................<...........................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4010
                      Entropy (8bit):5.536046427139932
                      Encrypted:false
                      SSDEEP:
                      MD5:688D018311B0EBE8B404267E49421FC3
                      SHA1:A826D0FFFEB0749ABBC54E66B01A962B5484A486
                      SHA-256:7A0DDDA2C9DFD4F608399ACF932B3649B0742808AA81FA154092F854DE46299D
                      SHA-512:F84A49B31D1D35D82DB0811A2937BE971C34277D66681A4420C456473B934B3AE3E4AE89A112BB2F28C0EB57929E0D8859916C9A4DA9C474F5DA9A1A65ECDC36
                      Malicious:false
                      Preview:.V................buffer_name114...buffer_description114...39.........-1...-1...-1.......V................buffer_name114...buffer_description114...39.........-1...-1...-1.......V................buffer_name114...buffer_description114...39.........-1...-1...-1.......V................buffer_name114...buffer_description114...39.........-1...-1...-1.......V................buffer_name114...buffer_description114...39.........-1...-1...-1.........................buffer_name115...buffer_description115...1|2|3|4.........buffer_name5|6|7|8|9...buffer_description5|6|7|8|9_1...5|6|7|8|9.........................buffer_name115...buffer_description115...1|2|3|4.........buffer_name5|6|7|8|9...buffer_description5|6|7|8|9_1...5|6|7|8|9.........................buffer_name115...buffer_description115...1|2|3|4.........buffer_name5|6|7|8|9...buffer_description5|6|7|8|9_1...5|6|7|8|9.........................buffer_name115...buffer_description115...1|2|3|4.........buffer_name5|6|7|8|9...buffer_description5|6|7
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):35488
                      Entropy (8bit):5.248760611905377
                      Encrypted:false
                      SSDEEP:
                      MD5:06E0522643A1C7DED0E28DD438D6C15E
                      SHA1:0A967804480E2BD5C200DAE9E9960605342787F0
                      SHA-256:6EBABA15B525E46A8BBB125F8CF53DB8EBBAFFD082A818E0D2189583C414E6BC
                      SHA-512:CC8914D023BDEFFD7FE36F067B83846810E8AC8DA7AE8B447E84E5EB84D28CD1FAB77E5C4A55897207D522AE097D7BFB4E1230C549988145461AD8CC56E235B3
                      Malicious:false
                      Preview:...............D..@.@H..................E...=.G..................F...).G..................J..@.@H..................K...=.G..................L...).G..................P..@.@H..................Q...=.G..................R...).G..................V..@.@H..................W...=.G..................X...).G..................\...U@H..................].....G..................^....G..................b...U@H..................c.....G..................d....G.......................7.G.......................!.G.......................,DG........................MH.......................u(H..................D...w.H..................E...).H..................F.....G..................J...w.H..................K...).H..................L.....G..................P...w.H..................Q...).H...... .. ........R.....G......!..!........V...w.H......".."........W...).H......#..#........X.....G......$..$........\...9.H......%..%........].....H......&..&........^...(.G......'..'........b...9.H......(..(........c....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):39161
                      Entropy (8bit):5.732703753636124
                      Encrypted:false
                      SSDEEP:
                      MD5:E3549BBE3CE7155CD675CD734EA66A5A
                      SHA1:6D4A73C30FEF99DFB7AAC5DE51A9B4806D6C3B52
                      SHA-256:CCC95ABA3583CE4022DA666143C795591378B17492743A6F8A58AA3E35FD2B63
                      SHA-512:0927F883EFCEFC66681FE768BFE4ECB02822E60A23F65A14372DDC73CFF97164E20F31D36CBB8A0C5E0841806ADAA7D98595129725ED58A70496BA899D412324
                      Malicious:false
                      Preview:................eur_subcity_wonder1...buffer_description72_1.....72.......,Sprite/UI/Icon/SubCitySublimation/eurwonder1..*Prefabs/UI/SubCity/WonderEffect/eurwonder1...18828:5;18861:25................eur_subcity_wonder2...buffer_description16.....16..........42........buffer_description42..,Sprite/UI/Icon/SubCitySublimation/eurwonder2..*Prefabs/UI/SubCity/WonderEffect/eurwonder2...18828:8;18861:40................eur_subcity_wonder3...buffer_description3.....3.......,Sprite/UI/Icon/SubCitySublimation/eurwonder3..*Prefabs/UI/SubCity/WonderEffect/eurwonder3...18828:12;18861:60................eur_subcity_wonder4...buffer_description39.....39..........108........buffer_description108..,Sprite/UI/Icon/SubCitySublimation/eurwonder4..*Prefabs/UI/SubCity/WonderEffect/eurwonder4...18828:15;18861:75................eur_subcity_wonder5...buffer_description16|17|18.....16|17|18.......,Sprite/UI/Icon/SubCitySublimation/eurwonder5..*Prefabs/UI/SubCity/WonderEffect/eurwonder5...18861:300................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):151493
                      Entropy (8bit):5.378062711572886
                      Encrypted:false
                      SSDEEP:
                      MD5:45160EB490807DE01CAC85BCEC4A1D77
                      SHA1:1300B5254B32047FCCE362851E835C5FF0D0C684
                      SHA-256:1F3AC3FA1EEAF326D36E6073C379C40984D9B95D982BAFA1EE699DD8137E5644
                      SHA-512:BF6F6FFEB2D959163D1FCF78064C9D4366701892BA3CC12404FAEE30ED412AFC6F62D165C9DB7023AFADB137990201F1EB791B27792363A1A0D730BA781FE1BC
                      Malicious:false
                      Preview:.....N.....N..........................................1.....B......................Attack.........................................................................%RunEscapeNew/Effect/Prefab/RE/FxEmpty...RunEscapeNew/Sound/3003_atk................................................................................................................................................................................................................................................................................................................................................................................................N........N.....N..........................................1.....B......................Attack...........2............................................................0RunEscapeNew/Effect/Prefab/Common/FxUnitArcherTP...RunEscapeNew/Sound/3005_atk..............................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):29448
                      Entropy (8bit):3.8055745909516956
                      Encrypted:false
                      SSDEEP:
                      MD5:610F20FEBF788B97ABB7080D5695F214
                      SHA1:D93C57F0DF679EAA7E0BE355CB256D11A1D25230
                      SHA-256:7E8459FC7A178ED7AB73F37C2C0018548DBE9F26F97BAC15E5F813FD306EA7B3
                      SHA-512:2C613CCD01FA9801D03189BD2BD99E3BE1091824DF22643B3C8B50A0A2C04B9C65FEF2CAA6CC63B78868DE2FA4BBD37C16638D5680BEE277BFFD8B3A3C0DE592
                      Malicious:false
                      Preview:.....F.....F......N.....?..................................................................................................................................................F.....F......N.....@..................................................................................................................................................F.....F............@@...............................................................................................................................................................V.....?...............................................................................................................................................................V.....@...............................................................................................................................................................V....@@................................................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1575
                      Entropy (8bit):5.264982037810297
                      Encrypted:false
                      SSDEEP:
                      MD5:BD2679B0B3906E2CCEFD6CDC1AAFDF7F
                      SHA1:CD7684E2FA45353D00366B5A8EF036ACB6E5DD7B
                      SHA-256:44CAC12DC4AA525C00257702A1681E40D791BF563216FA613034A2D4CE934C97
                      SHA-512:646F64652BB6FC723112A8E07B6506F48900571BB2E7E2C6E36A48C56BFC61E70C5F1AA0E6DA8F37536A0C6920C8BD86702F08C37A5233E3AE25F3DE39F31AAA
                      Malicious:false
                      Preview:.L.............taskChallenge_task_name_2...regression_activity_task30..+.......M.............taskChallenge_task_name_13...regression_activity_task30..+.......M.............taskChallenge_task_name_14...regression_activity_task30..+.....d.D.............taskChallenge_task_name_15...commontask_name_9..(.......C.............taskChallenge_task_name_3...commontask_name_9..(.......D.............taskChallenge_task_name_16...commontask_name_9..(.......J.............taskChallenge_task_name_17...dailytask_description24..........I.............taskChallenge_task_name_4...dailytask_description24..........J.............taskChallenge_task_name_18...dailytask_description24..........@.............taskChallenge_task_name_19...active_desc14..*.......@.............taskChallenge_task_name_20...active_desc14..*.......?.............taskChallenge_task_name_5...active_desc14..*.......I.............taskChallenge_task_name_8...dailytask_description14..!.......J.............taskChallenge_task_name_23...dailytask_de
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):109870
                      Entropy (8bit):5.15388561544527
                      Encrypted:false
                      SSDEEP:
                      MD5:8BA220A27EBAE9EC69A66B3C156C2E8B
                      SHA1:60916E072B625F31814DA5AE8E6A0BD96910B111
                      SHA-256:B4A3A739BFCB166F12E855CEA30029CD98BB663411D7D310823AADB735F9265B
                      SHA-512:0FEE53D6D5F9099A20E2E69CD5A1EE0B0A081C6D79EA5339C8B181746C0F76C2E1474AF0971C84BE984C2E043972A933DF002BEB6D027615EC79D00E87231E8F
                      Malicious:false
                      Preview:.................1....commontask_name_1...commontask_description_1...............................................................................'...'........................................................... Sprite/UI/UIBaseIcon/Icon_hammer..2..................1....commontask_name_1...commontask_description_1...............................................................................'...'........................................................... Sprite/UI/UIBaseIcon/Icon_hammer..2..................1....commontask_name_1...commontask_description_1......................................................................'...'........................................................... Sprite/UI/UIBaseIcon/Icon_hammer..2...................2....commontask_name_2...commontask_description_2...............................................................................:...:............................................................Sprite/UI/UI
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):5626
                      Entropy (8bit):4.030509942505165
                      Encrypted:false
                      SSDEEP:
                      MD5:35326F4C1F3B0D35A2F56BB2237383D3
                      SHA1:35E579BCCCFAD678284DA58A71F3666DF36B523C
                      SHA-256:44742416E556B25094DAD94702AD2575059CC8E133B41BABB82C014011B9255E
                      SHA-512:6BAC53594B01711F601F90C28356FB5578ADCA95585E188B4F8EDDAA915C52CCCCE4FFB3A0742DBFE4F8F2C580A183E4597210F2010567A6F257F04D8C38C09B
                      Malicious:false
                      Preview:............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................. .. ..................!..!..................".."..................#..#..................$..$..................%..%..................&..&..................'..'..................(..(..................)..)..................*..*..................+..+..................,..,..................-..-.........................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3525
                      Entropy (8bit):5.022547565471757
                      Encrypted:false
                      SSDEEP:
                      MD5:E2932F71D71D7420E6ED27D1C5C1E806
                      SHA1:67F47831C26DB1B4B6B89AD9A3F337096B278890
                      SHA-256:FD0A221F4500CF07FF5142C5DE1EFA57C222F3CB33A8B11117606870CFD57DF8
                      SHA-512:64CE163FB24271E6020AE7E28D3840DB47CB44F8E1ADAA4B005EB992948E4D7248680195C515282AF64455D0CA4649F6E3EA4DFD9BAF50D5FF9781F972EE2DA3
                      Malicious:false
                      Preview:.H...........N......N......N......N......N.................................H...........W......W......W......W......W.................................H...........a......a......a......a......a.................................H...........k......k......k......k......k.................................H...........u......u......u......u......u.................................H...........~......~......~......~......~.................................M.........................................................................M..............................................................................M..............................................................................M..............................................................................M.........................................................................M.........................................................................M..............................................................................M.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1030
                      Entropy (8bit):5.129329700441486
                      Encrypted:false
                      SSDEEP:
                      MD5:CF58E2D22A0419592C611969F63085C6
                      SHA1:40321A1032F77A21FF891A83FF7952BBDF2897D4
                      SHA-256:AEBCD8347EA980CAEB633D279C5B6B8A6DACF8790B7BA04A916CED85F767B8DA
                      SHA-512:1E910200D458926E6A537B568D39F7F2D7CFFB91856D7FCBA3BF8C0882F0E1CB81675654CD37BF88182EC98CA5BB96CE367B6395A7C653281CB282BC768A175C
                      Malicious:false
                      Preview:.%.......................;......*..%..d.%.......................G......3..%..d.%.......................U......=..%..d.%.......................f......I..%..d.%........$.............{......X..%..d.&.........0.....................i..%..d.&.........B.....................~..%..d.'.........Y.........................%..d.&.........x.........&.............%.....(..................&..............%.....(....................&..............%.....(....................&..............%.....(...................&..............%.....(...................&..............%.....(.................#..&..............%.....(.................*..&..............%.....(................3..&..............%.....(................=..&..............%.....(.................J..&..............%.....'.................,......v..&......%.....(.........."......C..........&......%.....(.................e..........&......%.....).........>..................&......%.....)..........T..................&......%.....)..........r
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):608
                      Entropy (8bit):4.475595446401443
                      Encrypted:false
                      SSDEEP:
                      MD5:5982A0546F2BA51069FFD19A5DBCE548
                      SHA1:F33D7E4EDFE9722892B09B5607FF0334E84F637D
                      SHA-256:BD19EFBFF78B20FD817293F18B5CC0C4455FDDF8E90B2D92C504F4CE72241DFD
                      SHA-512:608AFC509A8954D47F41170D8D2DBCD68121677D695170EAEE55503C81D90289C09F2A2A01F3D5FE68DBA6804FAC66C9D2CBE3E9FF47D8FDE977650CF1349495
                      Malicious:false
                      Preview:.............................................................(............(............2............2............<............<............F............F............P............P............Z............Z............d............d............n............n............n............x.................................................................................................................................... .. ..........!..!..........".."..........#..#..........$..$..........%..%..........&..&..........'..'..........(..(..........)..)..........*..*..........+..+...!......,..,...#......-..-...%...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6519
                      Entropy (8bit):5.491993396007892
                      Encrypted:false
                      SSDEEP:
                      MD5:4E92D1DEC7E55B859FD4A862196329D9
                      SHA1:B6C282BE14D37EF9D646DE518003986F3112C6DF
                      SHA-256:E453F9616FA21D03D072FABFC57473096D7ABEF43397F4A23FC4B4FDC2F2B0D3
                      SHA-512:6F96E5721169BDBE5846EC7A3A1DEAB573F0EA688CA094FFFAE4827429BE6D24258627E8F747C44793376D18903865BE6CDC25D034CDE3449C097D05726181C3
                      Malicious:false
                      Preview:.Q...............Sprite/UI/GeneralIcon/Icon_RU_1...general_workshop_tips1.........5.Q...............Sprite/UI/GeneralIcon/Icon_RU_1...general_workshop_tips1.........5.Q...............Sprite/UI/GeneralIcon/Icon_RU_1...general_workshop_tips1.........5.Q...............Sprite/UI/GeneralIcon/Icon_EU_2...general_workshop_tips2.........5.Q...............Sprite/UI/GeneralIcon/Icon_EU_2...general_workshop_tips2.........5.Q...............Sprite/UI/GeneralIcon/Icon_EU_2...general_workshop_tips2.........5.Q...............Sprite/UI/GeneralIcon/Icon_US_1...general_workshop_tips3.........5.Q...............Sprite/UI/GeneralIcon/Icon_US_1...general_workshop_tips3.........5.Q...............Sprite/UI/GeneralIcon/Icon_US_1...general_workshop_tips3.........5.N...............Sprite/UI/GeneralIcon/Icon_1...general_workshop_tips4.........5.N...............Sprite/UI/GeneralIcon/Icon_1...general_workshop_tips4.........5.N...............Sprite/UI/GeneralIcon/Icon_1...general_workshop_tips4.........5.Q...........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):20
                      Entropy (8bit):3.721928094887362
                      Encrypted:false
                      SSDEEP:
                      MD5:A6B310E81EB952A0B9172EE2079D5E20
                      SHA1:16602723CA2B3A1B81981F3B2BB763D621C2B829
                      SHA-256:F6652F5AC9FDE9F2FFD780ABECB2AB023F2647D6345EA5F314C72756A9AF95BD
                      SHA-512:88A73DCCB1D45E6B7B7B6A8222D3379F3FEAD3B8117A66CAEF3FCF26D59855C6B2651DD298E896D47D1F3223B0441689CCAFF7B173CEEB71CA0CB35777DA8044
                      Malicious:false
                      Preview:............'..P....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):27421
                      Entropy (8bit):5.416689836172129
                      Encrypted:false
                      SSDEEP:
                      MD5:429BAECC3C59B8086F7EBA85BB8420C4
                      SHA1:881F2C1EF00965CEC371F4B018B910A42F3B74E8
                      SHA-256:BA189E39F2105D34A86801C4B389F2323E5933264A2B2CC1071B233432C08275
                      SHA-512:97A8D64451C91029F861EFD66BEFC639D3C768B9458E271B2D63B78A58A74DAE98305162A7B4530B76E4F49F06039A4FC54E0E5A1EBE5501C33F19A48B0A16D7
                      Malicious:false
                      Preview:.n.............80.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/prefab/FlagEffect4_45.q.............11|12.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/prefab/FlagEffect4_45.q.............13|14.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/prefab/FlagEffect4_45.n.............37.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/prefab/FlagEffect4_45.q.............29|30.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/prefab/FlagEffect4_45.n.............82.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/prefab/FlagEffect4_45.n.............83.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/prefab/FlagEffect4_45.q.............31|32.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/prefab/FlagEffect4_45.n.............38.."Sprite/UI/Icon/UIAgeIcon/icon_age4...technology_development...UIEffect/p
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2667469
                      Entropy (8bit):4.935554022721998
                      Encrypted:false
                      SSDEEP:
                      MD5:B5DAFF19066D84B213A300D65901A2CB
                      SHA1:80A7A959AC496AA3A4C419590A2C6E1576A63711
                      SHA-256:1456F0DFEB4510F7141A8AB8494CFD1DD5EA8772F5766C40592751F4A4EF095A
                      SHA-512:9FE245B01D857BE6DC0EC3A686DE673CC6346515021B95D9255C0C51199A6F5ED1E69E2E7EF998AC056955A14F0A99BD71CEF8C68874ECADC674E3903EE5D84A
                      Malicious:false
                      Preview:................technology_name_1...Sprite/UI/Icon/TechIcon/Tech_2...technology_description_1......43........................................................................................................................................u....................................................................A.....43.d..".buffer_type................technology_name_1...Sprite/UI/Icon/TechIcon/Tech_2...technology_description_1......43.............................................................................................................................................................................................................4B.....43.....".buffer_type................technology_name_1...Sprite/UI/Icon/TechIcon/Tech_2...technology_description_1......43..............................................................................................................................................................................................................B.....43.....".buffer_type...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1431090
                      Entropy (8bit):5.235082544711006
                      Encrypted:false
                      SSDEEP:
                      MD5:557B25861912AA3C936E3361314C31A2
                      SHA1:81DF9B679A3A6A00833B20C05B7A012960031044
                      SHA-256:FBB72DB48B60000D64A82DFF35B53741284616FADB3D98EC7BBBA261D44FF2C6
                      SHA-512:ACCB3C4C6742B7A2C7D088BE8DEAF4F57B5EE6CE5D2E0BAB15A568649FB6AB999591C96487363387E2E41CE8B2153C32827C2C85F3952C7E24BA5231F0E3D736
                      Malicious:false
                      Preview:.....N.....N......military_10001..*Sprite/UI/Icon/MilitaryIcon/Military_10001...military_10001_attributes........................................................................................................................................................................'................................E.....104.d.....military_10001_description..!Sprite/UI/Frame/Frame_Military_01.....N.....N......military_10001..*Sprite/UI/Icon/MilitaryIcon/Military_10001...military_10001_attributes.......................................................................................................................................................................'..............................._F.....104........military_10001_description..!Sprite/UI/Frame/Frame_Military_01.....N.....N......military_10001..*Sprite/UI/Icon/MilitaryIcon/Military_10001...military_10001_attributes..............................................................................................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1171
                      Entropy (8bit):4.733817283257371
                      Encrypted:false
                      SSDEEP:
                      MD5:13F638EC345D1FFC79F4E5A59AF351B1
                      SHA1:CC70FDC96F0D32B12792B4E0026216EBD3C2C6C5
                      SHA-256:D5E4D78D62E4B54E6F74F0E7E9A78863D913CD201974C88DC0EA7EB40D4CD3EC
                      SHA-512:CED225FC2D6F01BA26717C4307CE1C4042E6E66DECD1C7054D5174035A35590950D1954E43D7F76B0ADDE191A3F8777063533729B1A0E68F63D7E5550CE3F589
                      Malicious:false
                      Preview:.........................................................................................................................................................................................................................................................................................................................................3.................!..........N.................$..........h.................'.............................*.............................-............................2.............................D.............................V.............................h............................z......................................................................................................................................................................................................................................................... .. ..................!..!.......... ......."..".........".......#..#..........#.......$..$..........$.......%..%..........%.......&.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2116
                      Entropy (8bit):5.320689869638144
                      Encrypted:false
                      SSDEEP:
                      MD5:16E4EFC3BFABDA4CA4C08C07C51D5C08
                      SHA1:7C20814B47D4A711E9507678EAA249CF5564964B
                      SHA-256:6A579F675D1BC8CBA0DBE67D66C8CC50449731C96725C16C05495791B0C8EB13
                      SHA-512:6CD667E05F8048E05D2FB75A0FDD1B7D820C80B2D48D4E87233725A8E694539FDF21019295D03668C0213815064C6EC8F99989567ACE4D3CCF5E07D5A75C3F5A
                      Malicious:false
                      Preview:.Z.............1x1..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone1x1......1;1...4;4..N....Z.............1x1..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone1x1......1;1...4;4..N....Z.............1x1..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone1x1......1;1...4;4..N....Z.............1x1..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone1x1......1;1...4;4..N....Z.............2x2..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone2x2......2;2...4;4..N....Z.............2x2..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone2x2......2;2...5;5..N....Z.............1x2..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone1x2..Z...2;1...5;5..N....Z.............1x2..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone1x2......1;2...5;5..N....Z.............1x2..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone1x2..Z...2;1...5;5..N....Z.............1x2..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone1x2......1;2...5;5..N....Z.............2x3..2Sprite/UI/Icon/DigTreasure/DigTreasure_Gemstone2x3......2;3
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):118750
                      Entropy (8bit):3.737212144986557
                      Encrypted:false
                      SSDEEP:
                      MD5:28C6D529EAC4E2350AEA6AA83985999A
                      SHA1:2EB07803185D8A15F4A83F0DD135FD2920DFEE57
                      SHA-256:F6B63216B1FB226321D982434B0BF391304178D28E6B06139AB54CCD869E8927
                      SHA-512:BD455348218C3CA58973967438982CDCF90BD3AB7A1151AD78B3B7FAABDCDBBB20D0D30D03945747F230AACE40D41A652784BBEC797F55B5631A3CCBED017CB5
                      Malicious:false
                      Preview:..........$2561:4000;2570:20000;2569:20000;4:30..$2561:4000;2570:20000;2569:20000;9:30..%2561:4000;2570:20000;2569:20000;14:30..%2561:4000;2570:20000;2569:20000;19:30..)2561:20000;2570:100000;2569:100000;951:50..)2561:20000;2570:100000;2569:100000;951:50..J5852:1;2561:40000;2570:200000;2569:200000;951:150;1727:60;2754:30;3161:450..$2561:4000;2570:20000;2569:20000;4:30..<2561:5000;2570:25000;2569:25000;951:22;1727:8;2754:5;3161:60..<2561:5000;2570:25000;2569:25000;951:22;1727:8;2754:5;3161:60..<2561:5000;2570:25000;2569:25000;951:22;1727:8;2754:5;3161:60..<2561:5000;2570:25000;2569:25000;951:22;1727:8;2754:5;3161:60..@2561:20000;2570:90000;2569:90000;951:68;1727:30;2754:15;3161:210..R10030:1;2561:60000;2570:200000;2569:200000;951:230;1727:75;2754:30;3161:450;4304:1..C2561:40000;2570:200000;2569:200000;951:150;1727:60;2754:30;3161:450..<2561:5000;2570:25000;2569:25000;951:22;1727:8;2754:5;3161:60..<2561:5000;2570:25000;2569:25000;951:22;1727:8;2754:5;3161:60..<2561:5000;2570:25000;2569:2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):180
                      Entropy (8bit):4.329620661870255
                      Encrypted:false
                      SSDEEP:
                      MD5:C7C5417BFAE3F8F7EF4257CC6D012658
                      SHA1:61E29013827EC26052D2CB5AC27E25527D5583B0
                      SHA-256:30493BE88D38F9473551494D691D27461437CC43C1EEAB27B2D420010FFCC00E
                      SHA-512:6447078B9214FBE5B021660A028F815CBF414A6CA21F7815DBF5BC125322020E5BE6760F48F8BBC9AA43691D4041E1C6CE5A483F8FB13FC4EE22A6AB297B6409
                      Malicious:false
                      Preview:..........age1................age2................age3................age4................age5................age6................age6.....#..........age6..$..(..........age6..)..-
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3736
                      Entropy (8bit):2.3084498397464492
                      Encrypted:false
                      SSDEEP:
                      MD5:2546338FB1B6A75CB8AFBD459B06575F
                      SHA1:0D9F00EDCA5CD4127E92F5534BB90D73419A3BFE
                      SHA-256:AA81186C176AC2787847FB39111426FEB5F1142AD9C9BD2766F1080F2A6EFFE2
                      SHA-512:D4376B5FCAB04EFDFBED4063C631057A1EF854D327F9C0B1A027DA5FEB00F829C30264A8BBDE3B43AC3F7D83D6E2B83123F773A3EBDD492A28F1A70F7D55CDB3
                      Malicious:false
                      Preview:........................d........d..................................................................................................................................................................................................................................................................................................................................................................................................................................................d.........d...................................................................................................................................................................................................................................................................................................................................................................................................................................................d.....................................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):55045
                      Entropy (8bit):5.838491937943685
                      Encrypted:false
                      SSDEEP:
                      MD5:5AE87E2DBE6482F4D243E490180A6A78
                      SHA1:004D095CA39C6ACCDF7AFB526D5F765120A3E637
                      SHA-256:23684D8F287486A8975E219FF3D30747833D5051E8F843F066F1E87D763FB118
                      SHA-512:8CD5CFA5DE643139B17734516873113D94DBA9203E3363FFD6BB39FE5535853B47E3F64C06D3E824C9B4D4BF88620441CC2A2684843A63A70A393C42478F618D
                      Malicious:false
                      Preview:........................................MainScene.............................................-1...-1...........................-1......new_guide_talk12..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a1........................................MainScene.............................................-1...-1..................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0........................................MainScene.............................................UIBuildingCreate...BtnPanel/BtnCreate..................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0.........................................MainScene.............................................-1...-1...........................-1......new_guide_talk13.."Prefabs/Guide/Evony{0:D}/General_1.............................@............0...c1................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):73823
                      Entropy (8bit):5.835810994902664
                      Encrypted:false
                      SSDEEP:
                      MD5:9493319181CDE7661D6E38ABE5CB672D
                      SHA1:906A897450B73C395CBEFD58AFB87667D2AC6B02
                      SHA-256:F4913B09805D134B7A62FD06854B24185E8D5E383AC736FBF781C93177AE13F5
                      SHA-512:B7BDFBB4B4A4392A8C7528CA7954931EBF0286D4355330D529477481816621A3CC6B8348BDDB1A04554EC04375C49F850861468DE4662CF4B8EEAC335A89BEB8
                      Malicious:false
                      Preview:......................1-1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role......................................?............0...............!.............................MainScene.............................................-1...-1...........................-1......mix_guide_talk1..%Prefabs/Guide/Evony{0:D}/Loading_role......................................?............0......................................MainScene.............................................-1...-1...........................-1......mix_guide_talk2.."Prefabs/Guide/Evony{0:D}/General_1......................................?............0...............0...............1-2..................MainScene.........................................5...GridLayer/GuideMask1...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role..........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):75060
                      Entropy (8bit):5.833603684210862
                      Encrypted:false
                      SSDEEP:
                      MD5:CFAD42D13F29D711E24B8E7963ADA6D2
                      SHA1:5D59C34C3EF48D223DD0D5BAD8786FBE0E62A64A
                      SHA-256:FE2B6ED59EFC1B08501A5A5AD2722FC9F37C83BB3F722BA2AF28BAB33A633C92
                      SHA-512:AC1DD0DF9E5D2366F3CECD0401EC9D74A6F052055A319384AFD83FE1AB945310B6FAB4FDD635C2A30DD2ECC307DF3F37C2C88EE2D3433EA1103EED02A7674AB7
                      Malicious:false
                      Preview:......................1-1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role......................................?............0...............!.............................MainScene.............................................-1...-1...........................-1......mix_guide_talk1_1..%Prefabs/Guide/Evony{0:D}/Loading_role......................................?............0......................................MainScene.............................................-1...-1...........................-1......mix_guide_talk1_2..%Prefabs/Guide/Evony{0:D}/Loading_role......................................?............0...............0...............1-2..................MainScene.........................................5...GridLayer/GuideMask1...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):80416
                      Entropy (8bit):5.848100858111014
                      Encrypted:false
                      SSDEEP:
                      MD5:82732C9D6D44F8116C336465501D0C2A
                      SHA1:39E55958C5C16E3D4BD276A714D0B61C73B5F58F
                      SHA-256:38255AE2AF7AC090AF5B80536DD5E080414E7B1DC448343A211B1FD3D91301D6
                      SHA-512:903820E40401775EE2C1349E70EBA719A002B06A3818DFB5376E899371D3C290B1866B3FBFEDA2E18D2C510953F3F9B4A6A72224815DD65299F334120DF7D9F9
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...a42........................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...c14.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):92841
                      Entropy (8bit):5.99634070779487
                      Encrypted:false
                      SSDEEP:
                      MD5:0113ABF42ABCB20BE55D88D089638063
                      SHA1:FDD440B4646942574310988EFDE4D2B3B76E32B0
                      SHA-256:3F26A37A1B78DAC84D472F85E55835EEBFC565F2690B2359CB23E7BE01B2FE5E
                      SHA-512:4FA0B362C022C37AC3CC40E790A477A11EA50F0D16B77770255C1A135757BF1677A50B8D390AD0EE983C254DB829C1762C714A55E7D6E83A4844783E0A6E0458
                      Malicious:false
                      Preview:...............(....1...........................MainScene.........................................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...1A1..............."......1...101...................MainScene.............................................101...-1...........................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...1A2...............7.................2...................MainScene.........................................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...2A1.........................1...................MainScene.........................................9...PeopleLayout/AATA_Event_1...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):83288
                      Entropy (8bit):5.840208320285697
                      Encrypted:false
                      SSDEEP:
                      MD5:0DE3694F32945E18ED5410297B171EC5
                      SHA1:614E27F383654CA8A400D92D9A38D7B15D3B3CA3
                      SHA-256:72A1C64C11B4DFEDE04C9564FDCCE916DC531CB3E3D97E0192645DAFF8ACB0DC
                      SHA-512:2CC4F7147E24E7104AE53ACDE7F2E3BFB937DEE00CC996C5F40AC9A461043C9AF805B860458132CD9BEDC7DD2BF01D587464205C57D5F6324FD5F109089189A0
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...a42........................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...c14.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):84111
                      Entropy (8bit):5.8396652946850045
                      Encrypted:false
                      SSDEEP:
                      MD5:ABA271326D05F7D1D12115B757E9B41A
                      SHA1:746F73988DD2B05026C7637BE39D79B20B6E0E0F
                      SHA-256:EC1E52189272104A71B01D7ECAE12CA15F5946EE4486D51670D421AE0842A0B6
                      SHA-512:632D22AE9FB71D1F3F7E08578163227F6D2CF900A4027AB60E43508746428CDF7BAD94388039C8BC0C1E8570D4909D315D1B20EF5248066DFE8E97331BA7F401
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...a42........................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...c14.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):91491
                      Entropy (8bit):5.860703346043048
                      Encrypted:false
                      SSDEEP:
                      MD5:FF414216427615587FCA419E266FCE09
                      SHA1:8645BD6C68FADFBD8E8DBB9D4CB213DA5023E801
                      SHA-256:AD19EAA75420D0E57EE500DAE9F348D4990AEA3E50B8E48982F1254031FB42B4
                      SHA-512:9ABB37E9E7085EF107AEE79326B77477507CC1FB7C7DFCDF6C319B7A5DF6E590F222CF505884E3D29C58C95E3333E433F822C146F3CC04F9DDDE27B0AAD9EC27
                      Malicious:false
                      Preview:.......................1...................MainScene.............................................1402...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0....................(1)....................MainScene.............................................-1...-1...........................-1......optional_guide_text3..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0.......................2...................MainScene.............................................903...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0....................(2)....................MainScene.............................................-1...-1...........................-1......optional_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):110184
                      Entropy (8bit):5.875749035273541
                      Encrypted:false
                      SSDEEP:
                      MD5:E791DA9239692ACA8BA37220A01A0D22
                      SHA1:3B3A1562DD8B696BE30183504074558EB9F925D5
                      SHA-256:973FE4807C116B3B4AAF75DBDA7BDFB8CFFF8D5B7A175FDFA4FFC729714B7F8E
                      SHA-512:966573C955EFE936F377A718C3CD4D8C389182A92BC268CC894A825ECE6251C266813E2E580EC60979FEFE8E2F38916B864487E9FA438E60D2A19A6E7891ACE8
                      Malicious:false
                      Preview:...............(....1...........................MainScene.........................................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...1F1........................1...................MainScene.........................................A...-1...-1..................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...1F2..................1..1.....................MainScene.........................................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...1F3...............$..............................MainScene.............................................UIGuideGameWindow1...Lock1/Button...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role............................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):105074
                      Entropy (8bit):5.86647703168176
                      Encrypted:false
                      SSDEEP:
                      MD5:016F8211421FF50E4A36D08BD8834C0B
                      SHA1:4A2F62D213A3BE8BCEED93AFF97676343AB275F2
                      SHA-256:E16C4EA1768D9D681BC117308DFEADE7A7A880B9CD83743F7E854E758C9BBD4A
                      SHA-512:01E5606DCBD9E4CD00FCF3523BEEE6D52C5C596A657A403BECC63E988D0C13593A7503DAA7332B8D678BB1DE3FD2ED6F4E49E23D1564570EAE27D84833A0ABD7
                      Malicious:false
                      Preview:...............(....1...........................MainScene.........................................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0........................1...................MainScene.........................................A...-1...-1..................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0..................1..1.....................MainScene.........................................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...............$..............................MainScene.............................................UIGuideGameWindow1...Lock1/Button...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):86333
                      Entropy (8bit):5.8709380297063705
                      Encrypted:false
                      SSDEEP:
                      MD5:DFC91CDF7C66862E8D41A43258F3C5FE
                      SHA1:37CEC3DC055A23C4935CED2CA2719079B637FC73
                      SHA-256:BE93B91E626847431E4276E5175965CDE616725C4B57B3ACD8BE0C1847CB1E3B
                      SHA-512:600967C34953C06862A6FEE498DAEF44BEDD08928D53B210822E7C4A5EFE4738E0286A6E5EBB4FA79DE237DEE90BA4F6D822F87612D792EEC0F8E1F3490F8B64
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...a42........................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...c14.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):100923
                      Entropy (8bit):5.913914724723395
                      Encrypted:false
                      SSDEEP:
                      MD5:A06F35D3E630B58677921279BDDD8927
                      SHA1:64E77B52695F1AE7000B732D4A5DFEB8B5B90D5D
                      SHA-256:9D7C375110CA4DCC8984A4B8FD180D9301BCEC4D9EC8BC68D2EF9D65EF7DFA0C
                      SHA-512:5A45BCC8C8EB93782B54587FF17EC7BF8DE567F1D5B940543F439766060B7F0728E5F9377C73F4C1984C91B59383FF0B7848C20AB22F219A08C47572CDE4C2F4
                      Malicious:false
                      Preview:........................1...................MainScene.........................................A...-1...-1..................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0..................1..1.....................MainScene.........................................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...............$..............................MainScene.............................................UIGuideGameWindow1...Lock1/Button...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0...............&..1..2..........................MainScene.......................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...............$......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):96405
                      Entropy (8bit):5.913303830709176
                      Encrypted:false
                      SSDEEP:
                      MD5:5E71A3DFB27860D5BE79653D30F13612
                      SHA1:6396A8EBB35D4EA534A9E5A5FF164E1681DD94A7
                      SHA-256:F12F1A4621E4E1FE5947FD84E0868631E9DE2D6057EE7EE68ECBF982F6DCC7B5
                      SHA-512:7254851D2AF024B765D7EF6476ED8603C289B97A57BE85C74EF8FE75AD69187238807B76A5EE6676B40CC60B31557812CD73C116C3DC3B79985F884B3E581B53
                      Malicious:false
                      Preview:...............&.....1601......A..................MainScene.........................................L...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............0...........................................MainScene.........................................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...............&....V3....--..1601..................MainScene.........................................9...PeopleLayout/AATA_Event_1601...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0........................................MainScene.............................................UIWorldMonsterPopWindowNew..4LayoutPanel/Panel/RewardPanelRoot/BtnPanel/BtnAttack...........................-1....."Prefabs/Guide/Evony{0:D}/
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):95897
                      Entropy (8bit):5.851245139278769
                      Encrypted:false
                      SSDEEP:
                      MD5:2D4B4B67AA05C2CE83CD128915BEABC2
                      SHA1:6C541860CA36A19AA6DD447BAF28DA51FC2175B5
                      SHA-256:BA42AB4E51DAAE68C6D78D4CB44EE2C813EA3649D7B7B7A263779409FDD46FD1
                      SHA-512:FB27A2FDA7CE973063FA9918F474482E3DE584DD65907FEE2DF2256C19F6B6236F12ACA7639EA8E7C53964682F9952A7A10953C1880ADF3F73B9D9AF23DB5675
                      Malicious:false
                      Preview:...............$..............................MainScene.........................................A...-1...-1..................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0.............../..1..2.............................MainScene.......................8...-1...-1....................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0......................................MainScene.............................................-1...-1...........................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0....................1..................MainScene.............................................101...-1...........................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................1....................Ma
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):90074
                      Entropy (8bit):5.911673570919913
                      Encrypted:false
                      SSDEEP:
                      MD5:06D06EC6C90EC38A6DB513BFA758F2D5
                      SHA1:E20C80E4F122F1837E2F28B22D53323BE8DB7017
                      SHA-256:60C7A8DA1BDE5656AC2257D2023B860588E029800F0B02DB9ED74E792CE9B350
                      SHA-512:3EFD347FF78031A3F14415294F1F6B5FC27225CAFDFED26BFF809D02C519446D7F4A0C2F50E5AF190B747AB1AC1D106D630E5D2E008F11C8E8CCF8BE8566D448
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.........................................N...100101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...102_Enter_puzzle_solving1........................................MainScene.............................................-1...-1...........................-1......new_guide_talk12..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a1........................................MainScene.............................................-1...-1..................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0.....................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):90680
                      Entropy (8bit):5.9095472605017045
                      Encrypted:false
                      SSDEEP:
                      MD5:2F1759EB2FDBB540C054235E4EA0E2A0
                      SHA1:4B52F20EE07D6035A832AC0A8D1A7533F0C5B452
                      SHA-256:337DCADF616D064915A6555D8DCD2B5052548526DF2E33AF77E5C0491B4792B2
                      SHA-512:419A4323CC147D3CD060CAB4F4827786AECE76646718C3078405F11A196F2379C06D34274463A854C8A412757EFF96EE69CB1CD09BB10A7FC8FDEAAC2A9E2BB8
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.............................................30001...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0........................................MainScene.............................................-1...-1...........................-1......new_guide_talk12..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a1........................................MainScene.............................................-1...-1..................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0........................................MainSc
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):86891
                      Entropy (8bit):5.955837008131853
                      Encrypted:false
                      SSDEEP:
                      MD5:C4F0C3245A23669DE33689BE328CB1CD
                      SHA1:CAB1F40C69C6A270E99F2E02250086AA1CCA43D5
                      SHA-256:F17F102BD3E288715766D64C4DE4CD5E59CF28981A226599687F4409280F9628
                      SHA-512:0828D021BEE0A7ECB5709B094938952DA90BFD73CA6E9B360864C500C26474677B3A48F92A3D159BBE1840A0F98D9ACBD69365281029A33EBD51E500481BD8B2
                      Malicious:false
                      Preview:...............%.....1601........................MainScene.........................................O...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............0...............<......................................MainScene.........................................8...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................--..1601..................MainScene.........................................9...PeopleLayout/AATA_Event_1601...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0....................--......................MainScene.........................................K...-1...-1..................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):87510
                      Entropy (8bit):5.942130312989916
                      Encrypted:false
                      SSDEEP:
                      MD5:324E9E8DA44819EE4789A6564C7F0EE9
                      SHA1:867C3500E937BC94474F1A9C9C228E6E1395EE63
                      SHA-256:3CD1D8A18AF8B91C0EDF068F55E30A228EAA25BA91E099E8AB42C692304A4B4E
                      SHA-512:91600DD62ACFFA54E76F3834CCD0D2007D1CEF51C5015B6E8BD2451C3D143D4B223EAEC4DA12B444F1A63CD31C7977F45BF4D3106244C4D889CE9ED65D505792
                      Malicious:false
                      Preview:...............%.....1601........................MainScene.........................................O...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............0...............<......................................MainScene.........................................8...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................--..1601..................MainScene.........................................9...PeopleLayout/AATA_Event_1601...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0....................--......................MainScene.........................................K...-1...-1..................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):89059
                      Entropy (8bit):5.926405372874234
                      Encrypted:false
                      SSDEEP:
                      MD5:C4E91925835AAEB844DA15029487CC5A
                      SHA1:4B266BFA73929581CA2638395A333080E15F7A97
                      SHA-256:88742AA050466E4AC37260E6C0CDDEBF315ED34001E9995E3C5328E3D8493966
                      SHA-512:1EE04B878491021395CAB49C279535BF317628373433FE43E4B1F32BE5105428231248EA496C316EC29222ADC74298056070C086C9CD3E7279E0DB8692975B64
                      Malicious:false
                      Preview:....................1..................MainScene.........................................N...120101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..<1F4-Battle_-_Event_1601_Mobile_Animation_-_Waiting_Animation...............%.....1602........................MainScene.........................................O...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............0...............<......................................MainScene.........................................8...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................--..1602..................MainScene.........................................9...PeopleLayout/AATA_Event_1602...-1...........................-1.....%Prefabs/Guide/Ev
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):94437
                      Entropy (8bit):5.958492142996858
                      Encrypted:false
                      SSDEEP:
                      MD5:962B272EBE1BB5F6BDCA0E1FF07DAF7B
                      SHA1:2C700D3F7189718F98359FF24623BF2D12E1F300
                      SHA-256:23A7DA21126F5F2113998617DB3D7D3297A379CBC1C5AF239DC09C6EA3C1DE41
                      SHA-512:D2E6B975F54C1711F33BA151F434A2421D1E1C75E8F870FDC4C4743EC6ED9A13E88EFE5609025AE1297B3662BED357E2A627100C15BC0A9F39D96508B316B5CD
                      Malicious:false
                      Preview:....................1..................MainScene.........................................N...220101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...102 Enter puzzle solving1...............%.....1602........................MainScene.........................................O...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............0...............<......................................MainScene.........................................8...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................--..1602..................MainScene.........................................9...PeopleLayout/AATA_Event_1602...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):91695
                      Entropy (8bit):5.97372072019796
                      Encrypted:false
                      SSDEEP:
                      MD5:5E297C67017D21941DE87586B5C49C39
                      SHA1:ABC08736C258636D3BC68A481B1CB498569B30D5
                      SHA-256:947AC39A251433BED9781C9BDBFE0C2D7DB481C62D35FFAD0B7F558BE56C54C0
                      SHA-512:F32A4B92B1230CAA1C35351523B8762612C37A3B6ACD4B0978A82CCAD64251D1A62FF04B312E5F9A404CEA4BAD52774D8802EB96296A3093166FAA45455FB985
                      Malicious:false
                      Preview:....................1..................MainScene.........................................N...220101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...102 Enter puzzle solving1...............%.....1602........................MainScene.........................................O...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............0...............<......................................MainScene.........................................8...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0..................--..1602..................MainScene.........................................9...PeopleLayout/AATA_Event_1602...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):82607
                      Entropy (8bit):5.850232191314794
                      Encrypted:false
                      SSDEEP:
                      MD5:912322DF0EC51737AF94CE6E27422C5F
                      SHA1:671AB13902B672BC073E302992044A666A712983
                      SHA-256:68498236DD8B1177632459BC833C461233A84F27E4177F2F744092B8A6F4629F
                      SHA-512:153B71C3C6D7C704E882D10EE22283BACE15DBAEEF070E5B0063322E9775600AA1F3B77A541B87DDEBD351ED80623BE8B6B678E2081110B10E02B2865B31BE27
                      Malicious:false
                      Preview:..................1..1..................MainScene.............................................-1...-1...........................-1......plot_chapters1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...pa1..................1..2..................MainScene.............................................-1...-1...........................-1......plot_chapters2..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...new:confirm...pa2....................1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0......................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...pc1.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):91183
                      Entropy (8bit):5.9711153057041715
                      Encrypted:false
                      SSDEEP:
                      MD5:72E69032CECE4C16B06D4E1B610443AD
                      SHA1:6D9F9001A8E20706BDF5BF2A3E7E068959204EE0
                      SHA-256:0D0B9D6915F2F1671CC243237992F9F1890466C02C337F9EE162CBDFBB5826B9
                      SHA-512:C3411AE74AC829C6D7B83DA2AD44ED57E1109CDCE90F147D354C4647D7A26328C4062861A5280F74E70898BEA0C730A98EC0678A6B80D57500E49446409BDC43
                      Malicious:false
                      Preview:....................1..................MainScene.........................................N...220101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...102 Enter puzzle solving1...............%.....1602........................MainScene.........................................O...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role............................@@............0...............<......................................MainScene.........................................8...-1...-1...................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...............'...............................MainScene.........................................U...-1...-1..................-1..............%Prefabs/Guide/Evony{0:D}/Loading_role...................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):80951
                      Entropy (8bit):5.8584976763067145
                      Encrypted:false
                      SSDEEP:
                      MD5:402691120E32D099B58EE0A81F4EBFE4
                      SHA1:419AF1875B7830F51EA98036DDCBD35BF331E080
                      SHA-256:87E063E11B2D8990EFE55AA04A4B03482EAE63D2B6CF3A6D729486A96DE476BF
                      SHA-512:547812B5CB146FB8C299226E007E02DE988945F173F4BDF6080207ABE2C50E7C4551C0ED2DA0F8E37F705A58C37A5E2A64B92545910208913C7892ED6AE16FB5
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...a42........................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...c14.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):63458
                      Entropy (8bit):5.855166138964037
                      Encrypted:false
                      SSDEEP:
                      MD5:C1FF303360F0FB35C7FD101C234FF375
                      SHA1:567246E276B7C047936A6B4052040561CB9C6CDB
                      SHA-256:015713044150E18F35A58EC875C6994D1519FA7672C581CDB89E0BD13DBBAE42
                      SHA-512:38C8E4DDED3F3DFBBA641A68386166CD367B1C8A33DA93A76148C568842606143A7E2D874503375DC67C76B6BBC5AAB0174FC6AEFB64A42DB87D97FBE584F69B
                      Malicious:false
                      Preview:........................................MainScene.............................................-1...-1...........................-1......new_guide_talk12..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a1........................................MainScene.............................................-1...-1..................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0........................................MainScene.............................................UIBuildingCreate...BtnPanel/BtnCreate..................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.................................0.........................................MainScene.............................................-1...-1...........................-1......new_guide_talk13.."Prefabs/Guide/Evony{0:D}/General_1.............................@............0...c1................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):86100
                      Entropy (8bit):5.873343293102591
                      Encrypted:false
                      SSDEEP:
                      MD5:4FCB8FF38D15BDA6C92480219B63EEB0
                      SHA1:C3D74F2A0EF593C3B67F4E1AE9856A787A1D6602
                      SHA-256:E58974489405330B181DD47C6254BEC556A51E53B2A5F341BE758041C670BF18
                      SHA-512:B928314719A37EEDB33FDE5170CA9907134C370BE796E2FAC3D51EC18F835266ED789332EC7D47EADA40F418AE972AE95BEB60A54F455759C3E3B49C93AF25FF
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0..................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...a42........................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...c14.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):86277
                      Entropy (8bit):5.861597735015981
                      Encrypted:false
                      SSDEEP:
                      MD5:5135818E37C2B236724AABA5B87A82FF
                      SHA1:60AB05880CFE629B9313B0731F6D6BD1DD20B0DF
                      SHA-256:0D2BB93E39DD750D2FF3A2D40AA6CAB45EA689B62346DB7CE9C09310AB695FDA
                      SHA-512:C7EECD41594D2D5C0D9106188E0B73468193B317B3058B0B9F22FA018CBBA68B36935E590E9EA6CD9216BF066A801D3A4948ECB2E080790A8E89B54CAD34C0A4
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..&Prefabs/Guide/Common/UIPrincessbeautlv.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....&Prefabs/Guide/Common/UIPrincessbeautlv.............................?............0..................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..&Prefabs/Guide/Common/UIPrincessbeautlv..........................................0...a42........................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...c14..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):81145
                      Entropy (8bit):5.851406930297259
                      Encrypted:false
                      SSDEEP:
                      MD5:414BC4149EA23E3F19459FF04130E31F
                      SHA1:3DDDEE2B0CA1B35F8A61EBA694C546240B8FBE8E
                      SHA-256:B3FFB3224C5E74F407CB5E11BBB66FED034ABA5D7747411179DC8029259777D3
                      SHA-512:CE26ABAB0B5316A1A0B2CF1E2CC04746ED4DF4027C6C205DE89C7BFC1AF4000B35F0820E89F228A3F343EEE1ED60D17CDE888DF8406B39E7D2E5F386ED4D5730
                      Malicious:false
                      Preview:..................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..&Prefabs/Guide/Common/UIPrincessbeautlv.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....&Prefabs/Guide/Common/UIPrincessbeautlv.............................?............0..................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..&Prefabs/Guide/Common/UIPrincessbeautlv..........................................0...a42........................................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text2.."Prefabs/Guide/Evony{0:D}/General_1.............................?............0...c14..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):89789
                      Entropy (8bit):5.841325208207709
                      Encrypted:false
                      SSDEEP:
                      MD5:7F0A8E741E08DDF6F85A5E4E279CAD9F
                      SHA1:4934A8772143F3EC68A1974B8EF35EAAB7DFE244
                      SHA-256:E037DB8E602BEF1EFCD36005C1C21262BF918048137746E31D09317F16F4501F
                      SHA-512:A1B6038FE64A0A96EAE0E03C820423A8875AB82F9983D64CE6CF7970CE0F2CADB8C692FC5558CCA56E417EA13FE93CB68B927E98B859F2B417B6B8F36EE38C6E
                      Malicious:false
                      Preview:....................1..................MainScene.........................................8...-1...-1....................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role...1.........................................................1....................MainScene.............................................-1...-1...........................-1......newriddle0_guide_text1..%Prefabs/Guide/Evony{0:D}/Loading_role.............................?............0...a41....................1..................MainScene.............................................101...-1...........................-1.....%Prefabs/Guide/Evony{0:D}/Loading_role...1.........................................................1....................MainScene.............................................-1...-1...........................-1......riddle_guide_tips..%Prefabs/Guide/Evony{0:D}/Loading_role..........................................0...a42...................UI..................MainScene...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):132784
                      Entropy (8bit):5.921344603200011
                      Encrypted:false
                      SSDEEP:
                      MD5:D1B55E7933C37780C581462C0304AF2F
                      SHA1:F97E3ECB5CFEFC4298CAEBD40F67012770E2B3E5
                      SHA-256:CAD9ABFDA82BB515B335F2D26240CADF9F4C31C9BF9741BBA7D4ED7733E2F2C7
                      SHA-512:931741B1C5EEF186314754625AF395841ADD38E98D0FCE639BCE31B62A1DA860EF2CEB72EB8803E0C332B3FD06B9A751C5FF5FABB7F51E6BD3345ED31E3524A1
                      Malicious:false
                      Preview:.....N.....N........+Sprite/UI/Banner/PlotPlay/bg_NarrativePlay2...Prefabs/GeneralModel/Model_237...150;-260;1300...officer_title11...1000;1000;1000.........kingkong_story1_text1.....#Sprite/UI/Icon/GeneralIcon/Icon_237...........N.....N........+Sprite/UI/Banner/PlotPlay/bg_NarrativePlay2...Prefabs/GeneralModel/Model_237...150;-260;1300...officer_title11...1000;1000;1000.........kingkong_story1_text2.....#Sprite/UI/Icon/GeneralIcon/Icon_237...........N.....N........+Sprite/UI/Banner/PlotPlay/bg_NarrativePlay2...Prefabs/GeneralModel/Model_237...150;-260;1300...officer_title11...1000;1000;1000.........kingkong_story1_text3.....#Sprite/UI/Icon/GeneralIcon/Icon_237...........N.....N........+Sprite/UI/Banner/PlotPlay/bg_NarrativePlay2...playerImage...150;-680;1200...title_monarch...1000;1000;1000.........kingkong_story1_text4......playerImage...........N.....N........+Sprite/UI/Banner/PlotPlay/bg_NarrativePlay2...Prefabs/GeneralModel/Model_237...150;-260;1300...officer_title11...1000;1000;1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2565
                      Entropy (8bit):5.945843465378475
                      Encrypted:false
                      SSDEEP:
                      MD5:F2AE6BA75C09691C7777F664C3A5C7F0
                      SHA1:B5813F6C3CD6DA27D6B55A2213EB3245EF5F7945
                      SHA-256:12DBEDE07AF0CF0C14097CC5DF82EC8545257AFCEDF4B57F231767FACA73EF6F
                      SHA-512:3BE5EA271A67D3AFAB8364599E017D13718BD7714F91FDE12B381A290FDC2A6A64838591D8B9FC12D7F0525F6119C43A3CD70009958E18B335FAC06EA963CBF4
                      Malicious:false
                      Preview:................peerages_name_1...peerages_description_1.........'...........Sprite/UI/TitleIcon/title_1...40.........36.........42.........87.........86.........26......'...41.........2000.....40.....".buff_type_1.....36.....".buff_type_2.....42.....".buff_type_3.....87....".buff_type_4.....86....".buff_type_5.....26....'".buff_type_6.....41.....".buff_type_7................peerages_name_2...peerages_description_2......................Sprite/UI/TitleIcon/title_2...40.........36.........42.........87.........86.........26......N...41.........270.....40.....".buff_type_1.....36.....".buff_type_2.....42.....".buff_type_3.....87....".buff_type_4.....86....".buff_type_5.....26....N".buff_type_6.....41.....".buff_type_7................peerages_name_3...peerages_description_3......................Sprite/UI/TitleIcon/title_3...40.........36.........42.........87.........86.........26......u...41.........170.....40.....".buff_type_1.....36.....".buff_type_2.....42.....".buff_type_3
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3610
                      Entropy (8bit):4.937426038966203
                      Encrypted:false
                      SSDEEP:
                      MD5:F4ADE8B1EA40C87A0534CC5D9C600944
                      SHA1:623E9123C260313D57D166AC10E339EF900567DA
                      SHA-256:A7F168E4C088F27C00C9204FA29CFB17148D89DD1680BF76900AA9980312D24B
                      SHA-512:F3F0604A5416EAD27E47BBC8550E09794836BEE7F0A02490AB808BD3CD4D02B52B7B9AEFD62CE2FF11A82CB1A6DB2C87985FDBF0B850A59AD880A05818FE64C9
                      Malicious:false
                      Preview:.0......N.........N.........2:1....................0......N.........N.........2:1..............d.....0......N.........N.........2:1..............d.....0......N.........N.........2:1..............d.....1......O.........O.....e...35:5....................1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............d.....0......P.........P.....f...2:3....................0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............e.....3......Q.........Q.....g...1623:8....................3......Q.........Q.....g...1623:8..............d.....3......Q.........Q.....g...1623:8..............d.....3......Q.........Q.....g...1623:8...........<..e.....3......Q.........Q.....g...1623:8..............d.....3......Q.........Q.....g...162
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):37722
                      Entropy (8bit):5.283235260500669
                      Encrypted:false
                      SSDEEP:
                      MD5:1F91F013D0C32ECE1ADC068E5BF7ED01
                      SHA1:0AC6A3DB40C5B0C9C988AC69DC4EB3416886F27A
                      SHA-256:D2173988D1334726208CEA70866B919D779FB820652E56F4F82EFAD170E7CE63
                      SHA-512:0AC951A12EE60EE87267A5D2B3F47ED780FF56CCDB134E1BDACF8FDF54658B0F6C5142B19175898E5CA92211E37465F24FF2A2CBEEDADD8C81ED5DF35A8EE003
                      Malicious:false
                      Preview:.0......N.........N.........2:1....................0......N.........N.........2:1..............d.....0......N.........N.........2:1..............d.....0......N.........N.........2:1..............d.....1......O.........O.....e...35:5....................1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............d.....0......P.........P.....f...2:3....................0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............e.....3......Q.........Q.....g...1623:8....................3......Q.........Q.....g...1623:8..............d.....3......Q.........Q.....g...1623:8..............d.....3......Q.........Q.....g...1623:8...........<..e.....3......Q.........Q.....g...1623:8..............d.....3......Q.........Q.....g...162
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3826
                      Entropy (8bit):4.944864877772489
                      Encrypted:false
                      SSDEEP:
                      MD5:F198AD0C659B48A617F6CC74027287D6
                      SHA1:EA7AAC9FBDC253E3D2ECCDAE6F53650513639CFC
                      SHA-256:63CE71ED4E5B26910C526630F984FAD048A248BFE47DE36661057E0CED1DBD03
                      SHA-512:E980C9143793B5A51C1710442CA5F4920A3E464BA81476ED30E838A294FBE8000E413FDA417C7B9A49CCD06488A96EACF9F38FACFECCBB4F2E72D1DBFC7EEA8D
                      Malicious:false
                      Preview:.0......N.........N.........2:1....................0......N.........N.........2:1..............d.....0......N.........N.........2:1..............d.....0......N.........N.........2:1..............d.....1......O.........O.....e...35:5....................1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............d.....0......P.........P.....f...2:3....................1......P.........P.....f...2:3.....................0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............d.....3......Q.........Q.....g...1623:8....................3......Q.........Q.....g...1623:8..............d.....3......Q.........Q.....g...1623:8..............d.....3......Q.........Q.....g...1623:8
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):71987
                      Entropy (8bit):5.478899448011194
                      Encrypted:false
                      SSDEEP:
                      MD5:F758C1B1C678A9E20EF7B1AA4481D14B
                      SHA1:E89F418DC9E5D263B89A2B3C0D49D44D36B6F2F4
                      SHA-256:9DF95383066112082B7F7959A5C2DC2833895E33339462FE76F01AD5887749F0
                      SHA-512:BE1AD7D74B131B0C974390968D89D86B86EB47670D6FC7A29B42486B45A3855AB6D384B37B311A17875E74B2688C089534DDF22702E4F50CE1348E7F738348F3
                      Malicious:false
                      Preview:.0......N.........N.........2:1....................0......N.........N.........2:1..............q.....0......N.........N.........2:1..............p.....0......N.........N.........2:1..............r.....1......O.........O.....e...35:5....................1......O.........O.....e...35:5..............p.....1......O.........O.....e...35:5..............q.....1......O.........O.....e...35:5..............r.....0......P.........P.....f...2:3....................0......P.........P.....f...2:3..............p.....0......P.........P.....f...2:3..............q.....0......P.........P.....f...2:3..............r.....0......P.........P.....f...2:3..............d.....0......P.........P.....f...2:3..............s.....3......Q.........Q.....g...1623:8....................3......Q.........Q.....g...1623:8..............q.....3......Q.........Q.....g...1623:8..............p.....3......Q.........Q.....g...1623:8...........<..s.....3......Q.........Q.....g...1623:8..............r.....3......Q.........Q.....g...162
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):71996
                      Entropy (8bit):5.479074770451707
                      Encrypted:false
                      SSDEEP:
                      MD5:EBD33F1050FE36AB8218085B8828C530
                      SHA1:14EF5B33DC1FE00ABB0520F7FBA947376C89193B
                      SHA-256:0866D459FFCDB245D3DAA1C860B094BB061D955B46D28F1759069C87779DA6C3
                      SHA-512:C833F607D96514C871FB89258090D878D465DB13F0C335C9569DB500132F875836CD8164E4FFD4E999DCFC521236A6C0ABCE5BE4C6DE1E04EE29857610238A13
                      Malicious:false
                      Preview:.0......N.........N.........2:1....................0......N.........N.........2:1..............q.....0......N.........N.........2:1..............p.....0......N.........N.........2:1..............r.....1......O.........O.....e...35:5....................1......O.........O.....e...35:5..............p.....1......O.........O.....e...35:5..............q.....1......O.........O.....e...35:5..............r.....1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............s.....0......P.........P.....f...2:3....................0......P.........P.....f...2:3..............p.....0......P.........P.....f...2:3..............q.....0......P.........P.....f...2:3..............r.....3......Q.........Q.....g...1623:8....................3......Q.........Q.....g...1623:8..............q.....3......Q.........Q.....g...1623:8..............p.....3......Q.........Q.....g...1623:8...........<..s.....3......Q.........Q.....g...1623:8..............r.....3......Q.........Q.....g...1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):125903
                      Entropy (8bit):5.5734487707596205
                      Encrypted:false
                      SSDEEP:
                      MD5:F2C800E3865D195AB89F01684A7B95CF
                      SHA1:528E45F16FC69DC20C4561C3A66C3EE36385F4B0
                      SHA-256:E598A9A2FBA53E98EB9AD8A3A56AA6696418BB65A6BAF587B5AA931F35C7D78B
                      SHA-512:13102730227CDDDA999AE6794830B2A233491E4168DA7F3D2A405F7A3068FFAD8B7AA51FAAB675529CCDCFD1A82DF6996E3B2EF3B57978CC4CD32C6836532EFC
                      Malicious:false
                      Preview:.0......N.........N.........2:1....................0......N.........N.........2:1..............q.....0......N.........N.........2:1..............p.....0......N.........N.........2:1..............r.....1......O.........O.....e...35:5....................1......O.........O.....e...35:5..............p.....1......O.........O.....e...35:5..............q.....1......O.........O.....e...35:5..............r.....1......O.........O.....e...35:5..............d.....1......O.........O.....e...35:5..............s.....0......P.........P.....f...2:3....................0......P.........P.....f...2:3..............p.....0......P.........P.....f...2:3..............q.....0......P.........P.....f...2:3..............r.....3......Q.........Q.....g...1623:8....................3......Q.........Q.....g...1623:8..............q.....3......Q.........Q.....g...1623:8..............p.....3......Q.........Q.....g...1623:8...........<..s.....3......Q.........Q.....g...1623:8..............r.....3......Q.........Q.....g...1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):258061
                      Entropy (8bit):5.609869804102961
                      Encrypted:false
                      SSDEEP:
                      MD5:28945926E6E2C2388B0B1CC0685C5DAC
                      SHA1:6CDDF02C04B1C2C08F14DA24833BC6E0E61433BA
                      SHA-256:DD542FAE964C40534CE2A1370081C32C21B18CABEEB301CC88775D77A7DB4E62
                      SHA-512:9FD1DD681143E4E2845235BB3CFB0D3A50EF11C32C1F574525A2CBC3087E7B3AA961216E0A348A4F83B807B3F3D82967FE42CE681BDAF2D6BAC9C4C88F8BD845
                      Malicious:false
                      Preview:.2.......N..........N.........2:1....................2.......N..........N.........2:1..............q.....2.......N..........N.........2:1..............p.....2.......N..........N.........2:1..............r.....5.......O..........O...........35:5....................5.......O..........O...........35:5..............p.....5.......O..........O...........35:5..............q.....5.......O..........O...........35:5..............r.....5.......O..........O...........35:5..............d.....5.......O..........O...........35:5..............s.....4.......P..........P...........2:3....................4.......P..........P...........2:3..............p.....4.......P..........P...........2:3..............q.....4.......P..........P...........2:3..............r.....7.......Q..........Q...........1623:8....................7.......Q..........Q...........1623:8..............q.....7.......Q..........Q...........1623:8..............p.....7.......Q..........Q...........1623:8...........<..s.....7.......Q........
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):757
                      Entropy (8bit):5.061758583316062
                      Encrypted:false
                      SSDEEP:
                      MD5:F0A56ABDCDC431D87E50CCDA8065B2EC
                      SHA1:68DC384E69E6D44159FC8F8B20FD523C70409216
                      SHA-256:78FE0DD064F3082A58688803C5A90460714A6AF2A5A4AD4B43538794BEF2EA40
                      SHA-512:48F74D96661C916180F5C602F1FA9B6515698B06C95C2F9E109C8AD89DB9B33DE8468F6D67669027BFD7275F2A9C4F0865C337E12DF812A0FAA19297A28F8A68
                      Malicious:false
                      Preview:.$........Prefabs/ClimbingTower/Player.%........Prefabs/ClimbingTower/Player2.(.d..d.. Prefabs/ClimbingTower/Monster100.(.e..e.. Prefabs/ClimbingTower/Monster101.(.f..f.. Prefabs/ClimbingTower/Monster102.(.n..n.. Prefabs/ClimbingTower/Monster110.(.o..o.. Prefabs/ClimbingTower/Monster111.(.p..p.. Prefabs/ClimbingTower/Monster112.(.q..q.. Prefabs/ClimbingTower/Monster113.(.r..r.. Prefabs/ClimbingTower/Monster114.(.s..s.. Prefabs/ClimbingTower/Monster115.(.t..t.. Prefabs/ClimbingTower/Monster116.,........."Prefabs/ClimbingTower/Equipment200.,........."Prefabs/ClimbingTower/Equipment201.6.........,Prefabs/ClimbingTower/TowerCell/FloorCell300.6.........,Prefabs/ClimbingTower/TowerCell/FloorCell301.6.........,Prefabs/ClimbingTower/TowerCell/FloorCell302
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):304
                      Entropy (8bit):5.530270924840784
                      Encrypted:false
                      SSDEEP:
                      MD5:3508FA567C5D5C740FA4ABB81A550115
                      SHA1:F78D9F859703CA56682FB8744130FC7AB63D115E
                      SHA-256:FE93551C00733BA5FFB47766D7EF18E7CDE5A808BDEEB7C0E2693363647706D7
                      SHA-512:DED4AF0BAF7B3F02418AE573F44CF3F022375613A834A6B1EF327E710F8772F3B3CAD6CF9AB485709316813403E61E4871FDEDBA3EEC80F15C28F9AFF3B12C79
                      Malicious:false
                      Preview:...........................Http.................Http................................................................. ............................ProtoBuf.................ProtoBuf.........................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):571
                      Entropy (8bit):4.553992521705521
                      Encrypted:false
                      SSDEEP:
                      MD5:06842AA90355A64C6B3AA2B5D151D355
                      SHA1:BF9C6D060DBB266E5B764626E6B42A7A83B3AED8
                      SHA-256:3F5C0F462124B1EE42D1587DE4824F4AD54ABCC7A14C4839D7982E5D0597E39D
                      SHA-512:A42692A6EC8E2274118E71E29D8D7BBDB68B98320834C345B72B406C05C058547D46D21694D9738652D07335DA52D816877AE2145206C26ED532E1744849576B
                      Malicious:false
                      Preview:.#..................(................(..........................15.............,............0..2.............................$...............2....................#............u.......................$................2....................$.....................................$....................................#...............d....................#....................................#............'.......................#............E......................."............1.....(................"............1.....(................#..................................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):537
                      Entropy (8bit):4.820719899634306
                      Encrypted:false
                      SSDEEP:
                      MD5:2C95C681C182278A7F8B34BA8826FA05
                      SHA1:E83AEC644949372497E2FADD4844AABC39899C09
                      SHA-256:7571A6E7D8CAEA53067E52A180E244F281459298FB656875FDB45D0FA09A53AB
                      SHA-512:35BCF3DF7646247374C2F91B49BA0CAF9081046162882E624F7A8B5045896366ED1820E02A90647A36F3D7FEB7E0A5F9071A7C28017026B188F4C8E1FF71C3FC
                      Malicious:false
                      Preview:..........N..........]..........m............................................................................................................................................................................................................................................................................................................................................. .. ........!..!........".."........#..#........$..$........%..%....$...&..&....)...'..'..../...(..(....5...)..)....;...*..*....A...+..+....F...,..,....L...-..-...R
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):438
                      Entropy (8bit):4.338944631555851
                      Encrypted:false
                      SSDEEP:
                      MD5:D4776B931D532C1A212631399E6D6DB0
                      SHA1:7FD47A4B59314F18E17ECEBFCADF27A8A2BB9FAD
                      SHA-256:E63357E459D2D1B81BE6D0B675279B99D0A74409007308CAF1340084C90DC95B
                      SHA-512:B94159EF5C3C7B6E0DA61C3ABA821E94E07D86604FED1EA963951DCD997862B55E6C1454729B31736E1DA3134A90CDA146B66BE34C6A3172133A4611594C17F6
                      Malicious:false
                      Preview:..............d..................d..................d..}..............d..d..............d.......-..-.....d..................d..C..............d..o..............d..................d................d................d..[..............d................d................d..[............d.......&..&.....d................d..................d..8............d................d................d..[............d................d................d..[
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3647
                      Entropy (8bit):5.7829488680448
                      Encrypted:false
                      SSDEEP:
                      MD5:4CB22D22630D23CA4ED5E0FBD28A3AD5
                      SHA1:627FFC682A9419AD66D63D07C82BE047A52BD656
                      SHA-256:F26F8ACA4DFAAC7B4DB06992F975B9BC17D306FC1B7B84BC1899C722540BF8AC
                      SHA-512:F41813F3068AE2112610A0FDF5459D371BB5BF4A27A5CDED9D03B8F86CE2EEFC96C31D8BE080227B8FD7FA8200A01E8937018B7C4912D247CE10A08C9B68E704
                      Malicious:false
                      Preview:...........arthall_treasure_title1...arthall_treasure_detail1............102.....@...105.....@...108.....@.."Sprite/UI/TreasureIcon/Treasure_01...arthall_collect_text3.....102.....".buff_id1.....105.....".buff_id2.....108.....".buff_id3.......................arthall_treasure_title2...arthall_treasure_detail2............1|2|3|4.....A...5|6|7|8|9.... A...144.... A.."Sprite/UI/TreasureIcon/Treasure_02...arthall_collect_text3.....1|2|3|4.....".buff_id1.....5|6|7|8|9.....".buff_id2.....144.....".buff_id3.......................arthall_treasure_title3...arthall_treasure_detail3............73.....A...74.....A...75.....@.."Sprite/UI/TreasureIcon/Treasure_03...arthall_collect_text3.....73.....".buff_id1.....74.....".buff_id2.....75.....".buff_id3.......................arthall_treasure_title4...arthall_treasure_detail4............40.... A...42.... A...43....pA.."Sprite/UI/TreasureIcon/Treasure_04...arthall_collect_text3.....40.....".buff_id1.....42.....".buff_id2.....43.....".buff_id3............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):27512
                      Entropy (8bit):5.737610427039932
                      Encrypted:false
                      SSDEEP:
                      MD5:6AD3C1A752B4F791D157C125EB18AE41
                      SHA1:417E3CD9E711F8C68750D02DC6C2FE64C3C50508
                      SHA-256:FE13E31C63E7E0BDEB462FF82238F883BD0484B422D1A27F51C22F4655CC7BBC
                      SHA-512:9220907B1FEE931BA87B22D83A5E3F7ED1B1763555767960DE1F2B9B3697A4FE00E87A2179A5DD755AC0A0412C91A3AA3F513E5D6899DEF18018475199125B98
                      Malicious:false
                      Preview:................arthall_treasure_title1...arthall_treasure_detail1.......................'Sprite/UI/Icon/TreasureIcon/Treasure_01...arthall_collect_text3..'8859:80;3219:40;3220:40;3221:40;3222:40.....102..........105..........108.....................arthall_treasure_title1...arthall_treasure_detail1.......................'Sprite/UI/Icon/TreasureIcon/Treasure_01...arthall_collect_text3..,8859:180;3219:100;3220:100;3221:100;3222:100.....102..........105..........108.....................arthall_treasure_title1...arthall_treasure_detail1.......................'Sprite/UI/Icon/TreasureIcon/Treasure_01...arthall_collect_text3..,8859:520;3219:250;3220:250;3221:250;3222:250.....102..........105..........108.....................arthall_treasure_title1...arthall_treasure_detail1.......................'Sprite/UI/Icon/TreasureIcon/Treasure_01...arthall_collect_text3..,8859:880;3219:450;3220:450;3221:450;3222:450.....102..........105..........108.....................arthall_treasure_title1...arthall
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1253546
                      Entropy (8bit):6.232815268045649
                      Encrypted:false
                      SSDEEP:
                      MD5:2F8BB6038F94CD0CD6A408BAFCE379BE
                      SHA1:3D1629CDF7241E273CD2539DADF1EDB628AA5FA0
                      SHA-256:C21B0335C8485EAC02E828EE1F0D22A595F5FFA09BA6AB9F8065169237BE8071
                      SHA-512:6636F80E75967D7E5A771C2BDF5680925B52818007320EF9CD94E7AA3FDAE7CFFCCE31FCADAE07CB651B4D7FB54123FE6940F932E64B795E457216C24DDE5B61
                      Malicious:false
                      Preview:.....=...=..........1....item_name_key3979...item_description_key3972...........d..........@.E....18:1:0.6:1:85;110:1:0.78:1:105;394:1:0.9:1:110;303:1:1.08:0:155;175:1:0.96:0:150;370:1:0.84:0:145;59:1:0.6:0:125;233:1:0.6:0:125....18:1:0.6:1:85;110:1:0.78:1:105;394:1:0.9:1:110;303:1:1.08:0:155;175:1:0.96:0:150;370:1:0.84:0:145;59:1:0.6:0:125;233:1:0.6:0:125............=...=........=...=..........2....item_name_key3979...item_description_key3972.......................@.F....18:1:1.05:1:85;110:1:1.365:1:105;394:1:1.575:1:110;303:1:1.89:0:155;175:1:1.68:0:150;370:1:1.47:0:145;59:1:1.05:0:125;233:1:1.05:0:125....18:1:1.05:1:85;110:1:1.365:1:105;394:1:1.575:1:110;303:1:1.89:0:155;175:1:1.68:0:150;370:1:1.47:0:145;59:1:1.05:0:125;233:1:1.05:0:125............=...=........=...=..........3....item_name_key3979...item_description_key3972.......................`jF..~18:1:1.5:1:85;110:1:1.95:1:105;394:1:2.25:1:110;303:1:2.7:0:155;175:1:2.4:0:150;370:1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):32880
                      Entropy (8bit):3.576619163231666
                      Encrypted:false
                      SSDEEP:
                      MD5:3F9F3DB09F1AA4E64D369BE4923BE9A3
                      SHA1:34584217BACD0AFEC0F9967CD086C24D279DB229
                      SHA-256:60250B9CFC155712DEC57C8ADAAF13BAEF43EBD7167C2F1869C65F68E625B9A4
                      SHA-512:D0158AE6B9074A09D2F450BC89ABC19A26323F2167BC231B59BE3069CB9CCAE96027637AA9D122D5701BD772F4E9405B5A5DD8EE5993FC51C7E1817C09AA3508
                      Malicious:false
                      Preview:..!................303.....".need_2.....302.....".need_4.....301.....".need_6..........7811;7812;7813;7814;7815;7816;7817;7818;7819;7820;7821;7822;7823;7824;7825;7826;7827;7828;7829;7830;11527;11528;11529;11530;11531;11532;11533;11534;11535;11536;11537;11538;11539;11540;11541;11542;11543;11544;11545;11546;11647;11648;11649;11650;11651;11652;11653;11654;11655;11656;11657;11658;11659;11660;11661;11662;11663;11664;11665;11666;11767;11768;11769;11770;11771;11772;11773;11774;11775;11776;11777;11778;11779;11780;11781;11782;11783;11784;11785;11786;11887;11888;11889;11890;11891;11892;11893;11894;11895;11896;11897;11898;11899;11900;11901;11902;11903;11904;11905;11906;16532;16533;16534;16535;16536;16537;16538;16539;16540;16541;16542;16543;16544;16545;16546;16547;16548;16549;16550;16551....7831;7832;7833;7834;7835;7836;7837;7838;7839;7840;7841;7842;7843;7844;7845;7846;7847;7848;7849;7850;11547;11548;11549;11550;11551;11552;11553;11554;11555;11556;11557;11558;11559;11560;11561;11562;11563;11564;11
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3914
                      Entropy (8bit):4.770296236439025
                      Encrypted:false
                      SSDEEP:
                      MD5:343391D5CB7D4716B3F4FF7938A0F960
                      SHA1:0BE1B23D3F944E808C28C2039732FD6B9160345E
                      SHA-256:855C819ECB0E7A60536583E5DB8793420B9314B7887C87316B08A5EE37341F20
                      SHA-512:4417CF6157561EF66B3CBD0EB683351500ABEB27D5132C957201DEB1ECB9DB34ED8B2094B2393080259137170E02FB18012C3E9A00721FD145E23C4FC7FAE267
                      Malicious:false
                      Preview:.*.................2...3036:15;951:20;9283:1.,......................3036:30;1012:15;9283:3.,......................3036:50;2330:45;9283:5.+......................3036:80;951:60;9283:6.-......................3036:100;1658:20;9283:8.-......................3036:120;1012:35;9283:9.-......................3036:150;2858:5;9283:10........................2561:1000;3712:5;9283:12.0......................2561:3000;4365:120;9283:18........................2561:5000;2493:1;9283:20.*.................2...3036:15;951:20;9283:1.,......................3036:32;1012:18;9283:4.,......................3036:60;2330:55;9283:5.+......................3036:90;951:80;9283:7.-......................3036:110;1658:25;9283:8........................3036:140;1012:40;9283:10.-......................3036:160;2858:8;9283:11........................2561:1500;3712:8;9283:13.0......................2561:3500;4365:150;9283:18........................2561:7000;2493:2;9283:20.*.................2...3036:15;951:20;9283:1.,.................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):576
                      Entropy (8bit):5.212063626576803
                      Encrypted:false
                      SSDEEP:
                      MD5:5307DD5FAB8726E88A03A2203A24A18E
                      SHA1:26BFE4511A893D5857B13A53252D2C1E908728F2
                      SHA-256:373EBF6A5BD1DD01E1D251E54B58C1A08140933EFA0947FE7806ED26358C795B
                      SHA-512:94EEB5A9F9376E76F9066CE76175FC962D269C1475313BB4B2D00FC8FD77AC1233B58EEA10FF41AB8FF84E274E568D1650FCF84A2D800E96207475616EEF7135
                      Malicious:false
                      Preview:.q......................."1:500;2:1000;3:2000;4:5000;5:10000..4Sprite/UI/Icon/GiftIcon/Activity_GeneralMobilization.q...........]..........."1:500;2:1000;3:2000;4:5000;5:10000..4Sprite/UI/Icon/GiftIcon/Activity_GeneralMobilization.r......................."1:500;2:1000;3:2000;4:5000;5:10000..4Sprite/UI/Icon/GiftIcon/Activity_GeneralMobilization.r........................"1:500;2:1000;3:2000;4:5000;5:10000..4Sprite/UI/Icon/GiftIcon/Activity_GeneralMobilization.p......................"1:500;2:1000;3:2000;4:5000;5:10000..4Sprite/UI/Icon/GiftIcon/Activity_GeneralMobilization
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):80678
                      Entropy (8bit):6.321879440295808
                      Encrypted:false
                      SSDEEP:
                      MD5:36F1070B16C03DD1A5B984C0516DB1D3
                      SHA1:380F8794F1EC1D43B823242EAC6E2BE260F0BA49
                      SHA-256:92B294C84B7A43B30D3D3D30E9FF90A6229DE19AA3C9A0C3293FA4E7FF95D97C
                      SHA-512:4AF6FE82D35D4CF62CCE3CC75627AE7DC26576DAEB8E5A2B1A39B5CFEF0CB77161023E8B7FBCD0973E1AAF3CECEDDC8810FB0853A180466A1B99F5C0F44794E5
                      Malicious:false
                      Preview:...................!Sprite/UI/Icon/Task/icon_Soldiers.....{0}......regression_activity_subhead18...regression_activity_task43..6.......=..d..2...86400.........................!Sprite/UI/Icon/Task/icon_Soldiers.....{0}......regression_activity_subhead18...regression_activity_task43..6.......z..d..7...86400.........................!Sprite/UI/Icon/Task/icon_Soldiers.....{0}......regression_activity_subhead18...regression_activity_task43..6...........d..<...86400.........................!Sprite/UI/Icon/Task/icon_Soldiers.....{0}......regression_activity_subhead18...regression_activity_task43..6...........d..F...86400.........................!Sprite/UI/Icon/Task/icon_Soldiers.....{0}......regression_activity_subhead18...regression_activity_task43..6...........d..U...86400.........................!Sprite/UI/Icon/Task/icon_Soldiers.....{0}......regression_activity_subhead18...regression_activity_task43..6...........d..s...86400......
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1123
                      Entropy (8bit):4.87126111882659
                      Encrypted:false
                      SSDEEP:
                      MD5:CC33F213D4AA2B2C06A0946BBD768311
                      SHA1:BCA074FFD05109EB32B2BD53411C0A70BB48191F
                      SHA-256:29974331FEC7C3F6866D69FEAAB3A092E5B591F37D96F44C99D1400185298FDA
                      SHA-512:D79A2AB81ABEB6A9FB30087520B5A3C25F2990847576F79B257BA4B7C65E0D97D6A8C5263B904AA305E331DABD9910BEEF13E899D02A12A82B5FE03640BE9531
                      Malicious:false
                      Preview:.&.................1623:20;39:20;1626:10.&.................1623:25;37:25;1626:15.&.................1623:25;35:25;1626:15.&.................1623:25;33:25;1626:15.'.................1623:25;949:25;1626:15.(.................1623:25;1648:25;1626:15.(.............'...1623:25;1644:25;1626:15.(.................1623:30;1655:30;1626:20.(.............6...1623:30;1646:30;1626:20.'.............B...1623:35;950:35;1626:25.(.............N...1623:35;1603:35;1626:25.(.............]...1623:40;1608:40;1626:30.(.............q...1623:45;1605:45;1626:35.).................1623:50;1601:50;1626:40.(..................1623:60;976:60;1626:40.(.................1624:30;963:30;1627:20.(..................1624:30;963:30;1627:20.(..................1624:30;963:30;1627:20.(..................1624:35;963:35;1627:20.(..................1624:35;963:35;1627:20.(.................1624:35;963:35;1627:20.(..................1624:40;951:40;1628:10.(..................1624:40;951:40;1628:10.(.................1624:40;951:40;1628:10.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):17353
                      Entropy (8bit):3.690248888731678
                      Encrypted:false
                      SSDEEP:
                      MD5:E0CB6902256B577D4CB653ABF6AEA92D
                      SHA1:47D9B515B8DE6482A6C1409ECAE3AAC0DA5C3730
                      SHA-256:55746842B218526C3C033BE02C5A65C2AEB3031C4287D951855D794280FC6272
                      SHA-512:E13B4E84427BAAB1CEF01AC7E06A279802BAC6E0C29A4B776C92DB55BD7A94D469AFFC7F757F390E2CB0F2390518BF3EA8607933478CAEA3973C315FF569599A
                      Malicious:false
                      Preview:............C3507:540;3506:25;3503:25;3504:25;3505:25;4365:350;5046:130;5068:280..C3507:430;3506:20;3503:20;3504:20;3505:20;4365:280;5046:110;5068:220..L3507:300;3646:550;3630:30;3631:30;3632:30;3633:30;4365:350;5046:130;5068:220..L3507:240;3646:450;3630:25;3631:25;3632:25;3633:25;4365:280;5046:110;5068:180..L3507:620;4303:130;3506:32;3503:32;3504:32;3505:32;4365:450;5046:150;5068:350..L3507:500;4303:100;3506:25;3503:25;3504:25;3505:25;4365:350;5046:130;5068:280..U3507:360;3646:680;4303:130;3630:40;3631:40;3632:40;3633:40;4365:420;5046:150;5068:250..U3507:290;3646:540;4303:110;3630:30;3631:30;3632:30;3633:30;4365:360;5046:120;5068:220..d3507:1100;3506:55;3503:55;3504:55;3505:55;9120:36;6988:36;8858:36;6244:36;4365:880;5046:290;5068:730..d3507:1000;3506:50;3503:50;3504:50;3505:50;9120:32;6988:32;8858:32;6244:32;4365:800;5046:270;5068:640..c3507:900;3506:44;3503:44;3504:44;3505:44;9120:26;6988:26;8858:26;6244:26;4365:700;5046:237;5068:580..c3507:750;3506:37;3503:37;3504:37;3505:37;9120:2
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):23391
                      Entropy (8bit):5.5644970293016165
                      Encrypted:false
                      SSDEEP:
                      MD5:116148F53EF2612F0D2BBB4BEA1778F8
                      SHA1:F513C132B3A5348917307387535920DEC467C4F7
                      SHA-256:FF6AEBD332EEEB2A5C6C10A5A1335AB7F732B874AD71BEA0B6AAC5FAA3C42CE7
                      SHA-512:8E1700235E0B97A35077ADBCF067497BD2FE04CC09D3B8D3861AD10AEDD8CB7E7A9D6E474FD2E3FC6F2C4732E88090773285783E6607699CBA8776378267211E
                      Malicious:false
                      Preview:..............62.....<...125.........-1...........................-1..................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1...........................-1.......................................244.........-1.............................62...<".buffer_type1.....125....".buffer_type2.....244.....".buffer_type21...,...,...-1.......................................1|1|1|-1|1...2|1|0|10...10|20|40;10;10;10;10........................62.....x...125.........1|2|3|4.........87.........-1...........................-1...........................-1...........................-1...........................-1...........................-1....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4787
                      Entropy (8bit):5.682217276116728
                      Encrypted:false
                      SSDEEP:
                      MD5:3C476283972CEC2323AEB9F4B02D5FD4
                      SHA1:CABE4BB31DA7A820B43ADB932252DE681661C78F
                      SHA-256:8799F5AD41E33C82DB99F46D51F773DAD81F53F6E2B5353E1E00F3D6D8439AB1
                      SHA-512:50663ECAFE4813AEAF60F0B99624EB3B529C8A6659FB2F810D78FBE5696230825514CC6322D460E6A0B03FD513BCABBD0D395EDF56F42A8775A625FA8A3BE891
                      Malicious:false
                      Preview:.F.........$...................1............0................F...............2......<......2000...........0................?...................d..2................0................9................d..P..<..............0................D.......................<..........500k......0................G..............................1............0................F................2..P..<......2000...........0................D.......................<..........500k......0................G................2.............1............0................D.......................<..........500k......0................B......................2.................0................>.......................<......200K........0................F.........(.....2......<......1............0................D.......................<..........500k......0................D.......................<....
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1119
                      Entropy (8bit):4.514044363684904
                      Encrypted:false
                      SSDEEP:
                      MD5:991586CC74ED52279BC81C7C7CC572C0
                      SHA1:A6D3844834DC5B2EAE0F1F061148FE52D5FD2D71
                      SHA-256:2EB860A16C865DC7E87B7EC2DE143B2DC3601E87EBAACE67F7FD5404FED041A0
                      SHA-512:52E2974F7A5284A3AF14E717411B156E872BDC0AEE93E98E3D52D26CD728DAEA17E4791BF9F2D91459EFD07FD063058869B3BAABD32882EA41574DCC2BA030F1
                      Malicious:false
                      Preview:..................................................................................'.......................6.......................F.......................U.......................e.......................}.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................. .. .....................!..!....................."..".....................#..#.....................$..$.....................%..%....(................&..&....3................'..'....@................(..(....O................)..)..
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):741
                      Entropy (8bit):4.816220869953833
                      Encrypted:false
                      SSDEEP:
                      MD5:C391EEA15B507A67992A46D56CCE2F5A
                      SHA1:6E99FAC6B46245708D5429ADECDE1EB7D13F21D9
                      SHA-256:6AA865869ADE16446F3E5D5425468C83EF7F4AA69E0100200CF95ABD3E13BB8C
                      SHA-512:EC53E317F3CD24BF01E24F767F4D222BBFD8264340FE3C0ED64BBB08DFFAB0C5EFFF8C1DA5C83E7027D8E84B4968FF970F32593CE352146B176ED941EE2E530B
                      Malicious:false
                      Preview:............N...............N...............N...............N...............N...............N..............N...............N...............N..............N...............N...............N..............N...............N...........$...N...........*...N...........0...N...........6...N...........=...N...........I...N...........U...N...........a...N...........m...N...........z...N...............N................N................N..............N..............N................N...............N...... ........N......!.........N......".........N......#.........N......$.........N......%........N......&.........N......'........N......(.........N......)........N......*.........N......+........N......,........N......-.........N...
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):36394
                      Entropy (8bit):4.07318181714569
                      Encrypted:false
                      SSDEEP:
                      MD5:1320393AB5C01A5EF50DDF28D5545E4B
                      SHA1:039AC10DCD2E9A268F643310A3FFA1E26F183A69
                      SHA-256:609BEA44C2666A1B336020B2F499D20615616E2C503057D32CE7461EE115A21B
                      SHA-512:23C9DC069CB56137267E0FDA2FB58B95AA96F15E7C7487893C29DC07D8968DACE7EE242F1E8858D2D4C347B69E69DAE72A6631D3A6F80CA4120D67677964A2A3
                      Malicious:false
                      Preview:.......................810|13|16|19:0:3800;12|15|18|21:0:3800;11|14|17|20:0:3800.....10|13|16|19...........12|15|18|21...........11|14|17|20..........180:1000000;181:1000000;182:1000000;183:1000000;147:1000;149:1000;151:1000;153:1000;146:1000;148:1000;150:1000;152:1000;123:1000;125:1000;127:1000;129:1000;122:1000;124:1000;126:1000;128:1000;10:1000;20:1000;30:1000;40:1000;9:1000;19:1000;29:1000;39:1000;8:1000;18:1000;28:1000;38:1000;7:1000;17:1000;27:1000;37:1000;6:1000;16:1000;26:1000;36:1000;5:1000;15:1000;25:1000;35:1000;4:1000;14:1000;24:1000;34:1000;3:1000;13:1000;23:1000;33:1000;2:1000;12:1000;22:1000;32:1000;1:1000;11:1000;21:1000;31:1000...146:980000...150:980000...148:980000...152:816666.._..i........L1;11;21;31;2;22;12;32;3;13;23;33;4;14;24;34;5;15;25;35;6;16;26;36;7;17;27;37..P..x......................................-1...26:1:100:1:600...........................810|13|16|19:0:3800;12|15|18|21:0:3800;11|14|17|20:0:3800.....10|13|16|19...........12|15|18|21...........11|14|1
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3576
                      Entropy (8bit):4.9861664133815395
                      Encrypted:false
                      SSDEEP:
                      MD5:C0283D6F4FF7D8D076832CB78417075D
                      SHA1:D66CCEDF5798E53DE862457380A5C2D391763E99
                      SHA-256:E6F857753E92CD159ADCFE74D178D1B105EF903EA35F9F2DDB2A32639D9F4904
                      SHA-512:1CE75910A829A2116225B18971E86C7860AD99F70CBE6C686977BC435DE0E37174FA6ACBECF8C46DC438437914C1E8AF2C0BB1C74167304709D837F0CD0AA7E7
                      Malicious:false
                      Preview:.2...................................................2...................................................2...................................................O.....watchtower_resource_amount.................................................O.....watchtower_resource_amount.................................................O.....watchtower_resource_amount.................................................O.....watchtower_resource_amount.................................................R.....watchtower_army_troops_number.................................................R.....watchtower_army_troops_number.................................................R.....watchtower_army_troops_number.................................................N.....watchtower_subcity_number.................................................N.....watchtower_subcity_number.................................................N.....watchtower_subcity_number.................................................Q.....watchtower_troops_num
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1552
                      Entropy (8bit):3.8550808760803306
                      Encrypted:false
                      SSDEEP:
                      MD5:662315DC19685EF47F063BF55DACF4F0
                      SHA1:41A90660B608A40646986C69C636D878A8F67C21
                      SHA-256:4AE9D602FCC7792DFCEA7D81E0EE17B817EB355433ECCE19751C01446B6ADBD9
                      SHA-512:0DB8B5FF4F44755DB74B701DA72E7F9041DB8FF8A33E5FB38D3A2F6380F832A014E9649B289CDD66FC0DEAAD12694B6AD68986696C7BB10A94E2B4417A068A37
                      Malicious:false
                      Preview:..........R2561:50000;2570:10000;2569:10000;36:160;34:160;38:160;42:160;40:160;44:160;3646:30..D2561:2000;1008:70;29:70;3712:10;951:150;2570:5000;2569:5000;3036:150..........P2561:45000;2570:8000;2569:8000;36:130;34:130;38:130;42:130;40:130;44:130;3646:25..C2561:1800;1008:60;29:60;3712:9;951:140;2570:4000;2569:4000;3036:140..........P2561:35000;2570:6000;2569:6000;36:110;34:110;38:110;42:110;40:110;44:110;3646:20..C2561:1600;1008:50;29:50;3712:8;951:130;2570:3000;2569:3000;3036:130..........J2561:30000;2570:4000;2569:4000;36:90;34:90;38:90;42:90;40:90;44:90;3646:18..C2561:1400;1008:40;29:40;3712:7;951:120;2570:2000;2569:2000;3036:120..........J2561:25000;2570:3500;2569:3500;36:80;34:80;38:80;42:80;40:80;44:80;3646:16..B2561:1200;1008:30;29:30;3712:6;951:110;2570:1750;2569:1750;3036:80..........J2561:20000;2570:3000;2569:3000;36:65;34:65;38:65;42:65;40:65;44:65;3646:14..B2561:1000;1008:25;29:25;3712:5;951:105;2570:1500;2569:1500;3036:85..........J2561:18000;2570:2500;2569:2500;36:60;34:
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):107707
                      Entropy (8bit):3.664793001866382
                      Encrypted:false
                      SSDEEP:
                      MD5:D58C6D1C7672F0174B1E1A9B2750845C
                      SHA1:BF51F4027AAC19D92C144B3B6FAB6616975161E0
                      SHA-256:4AFDCD9591A7322C1552139BDC8B8FDE9E8202833913FD4C3BCBFF344D700ACB
                      SHA-512:08CDCC710323A52D6EAB81C771E537B72A713D6BCE79BAD29DC8FBE63193A5FD6BD62D9D9ED480EC16BC4BFA07696D2F0AA0F4F75D3F4AA16DC433F1E464C11F
                      Malicious:false
                      Preview:..........Q2561:50000;3028:10;2694:5;3036:450;4365:450;3712:30;2753:75;980:75;3167:30;6667:5..Q2561:50000;3026:10;2694:5;3036:450;4365:450;3712:30;2753:75;980:75;3167:30;6667:5..Q2561:50000;3025:10;2694:5;3036:450;4365:450;3712:30;2753:75;980:75;3167:30;6667:5..Q2561:50000;3027:10;2694:5;3036:450;4365:450;3712:30;2753:75;980:75;3167:30;6667:5..;1659:15;4365:35;29:15;1008:15;3166:15;4:25;9:25;14:25;19:25..;1659:15;4365:35;29:15;1008:15;3166:15;4:25;9:25;14:25;19:25..;1659:15;4365:35;29:15;1008:15;3166:15;4:25;9:25;14:25;19:25..;1659:15;4365:35;29:15;1008:15;3166:15;4:25;9:25;14:25;19:25..\2561:50000;3028:10;2694:5;3036:450;4365:450;3712:30;2753:75;980:75;3167:30;6667:5;5487:85650..\2561:50000;3026:10;2694:5;3036:450;4365:450;3712:30;2753:75;980:75;3167:30;6667:5;5487:85650..\2561:50000;3025:10;2694:5;3036:450;4365:450;3712:30;2753:75;980:75;3167:30;6667:5;5487:85650..\2561:50000;3027:10;2694:5;3036:450;4365:450;3712:30;2753:75;980:75;3167:30;6667:5;5487:85650..Q2561:50000;3027:10;2694:3
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):107623
                      Entropy (8bit):3.6327494535430733
                      Encrypted:false
                      SSDEEP:
                      MD5:381F5AC2CF8071DD2D4BAAA2753368A0
                      SHA1:3CC71B09088F9D14963B17D5D4AE4551690BFFA2
                      SHA-256:1E620761F125829865BA3434554EDAF92CB00F4368BE09C8B05E0626E5803274
                      SHA-512:3EBC626F8AE8A48101094BE298F3AE05BC4F2AE40ADCF89CDEF1BC4B5FB6C2CB37EA788805695A9583BA5B348F1589AF31788EEB30E5BA054412634C65484AD5
                      Malicious:false
                      Preview:..........Q2561:50000;3028:10;2694:3;3036:300;4365:300;3712:20;2753:50;980:50;3167:20;6667:5..Q2561:50000;3026:10;2694:3;3036:300;4365:300;3712:20;2753:50;980:50;3167:20;6667:5..Q2561:50000;3025:10;2694:3;3036:300;4365:300;3712:20;2753:50;980:50;3167:20;6667:5..Q2561:50000;3027:10;2694:3;3036:300;4365:300;3712:20;2753:50;980:50;3167:20;6667:5..;1659:15;4365:35;29:15;1008:15;3166:15;4:25;9:25;14:25;19:25..;1659:15;4365:35;29:15;1008:15;3166:15;4:25;9:25;14:25;19:25..;1659:15;4365:35;29:15;1008:15;3166:15;4:25;9:25;14:25;19:25..;1659:15;4365:35;29:15;1008:15;3166:15;4:25;9:25;14:25;19:25..\2561:50000;3028:10;2694:3;3036:300;4365:300;3712:20;2753:50;980:50;3167:20;5487:57100;6667:5..\2561:50000;3026:10;2694:3;3036:300;4365:300;3712:20;2753:50;980:50;3167:20;5487:57100;6667:5..\2561:50000;3025:10;2694:3;3036:300;4365:300;3712:20;2753:50;980:50;3167:20;5487:57100;6667:5..\2561:50000;3027:10;2694:3;3036:300;4365:300;3712:20;2753:50;980:50;3167:20;5487:57100;6667:5..Q2561:50000;3027:10;2694:3
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):7742
                      Entropy (8bit):5.9452489373509705
                      Encrypted:false
                      SSDEEP:
                      MD5:62D55545D82A12A6AA76A1373BD453F2
                      SHA1:5C967E97D321A131FE4FD347476CE656731ED8C9
                      SHA-256:812FF3CA535360BA2D83DA228E285DB7BB106B416A17D89B94A38F050BBEF66B
                      SHA-512:2C328251F04D9B51903239290489FF8F06ABBED40756AF695251ACDDCDAC2FF00A2CAB42272ACC6D462536F2685F2F62305D1E22EB0EBF509A4475357449388D
                      Malicious:false
                      Preview:...........kingdom_building_name2...34:1:80;36:1:25;26:2:600000...-1......................................&Prefabs/Map/WorldBuilding/SamuraiTower...-1...-1...kingdom_building_effect2...-1...-1...-1...-1...-1...kingdom_building_details2..(Sprite/Map/castle_icon/icon_SamuraiTower.................34..>..".buff_win.....36.....".buff_win.....26.....$".buff_win.................kingdom_building_name3...36:1:25...-1......................................%Prefabs/Map/WorldBuilding/WizardTower...-1...-1...kingdom_building_effect3...-1...-1...-1...-1...-1...kingdom_building_details3..'Sprite/Map/castle_icon/icon_WizardTower.................36.....".buff_win.................kingdom_building_name1...-1...-1......................................"Prefabs/Map/WorldBuilding/Mangonel...-1...-1...kingdom_building_effect1...-1...-1...-1...-1...-1...kingdom_building_details1..$Sprite/Map/castle_icon/icon_Mangonel.............................temple_name3...209:1:25...209:1:-15...............#Prefabs/Map/Wor
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2659
                      Entropy (8bit):5.853096417297706
                      Encrypted:false
                      SSDEEP:
                      MD5:1018986DE327F5D0356C2BBEE9B2567D
                      SHA1:EA8C3F85AEB2DCB7DE48288BFF12AB9585474D6B
                      SHA-256:25F679F97CC0D24811F7CABC6A6EF6894C4922664161BC7FA318B80C585452CC
                      SHA-512:954E27F94FBA2CFDC8C052AABB1E0A9003BEBEF1B23FC12D1CDC90E4A231C833E28E232FD38AC1197B649DE6AD5EE4D4C47291D658704379F5FE5204DD67366B
                      Malicious:false
                      Preview:...........................resA..............guild_farm_name...guild_farm_des1...guild_farm_des2...Prefabs/Map/food_guild...Sprite/Map/world_food_guild..%Sprite/UI/UIGuildIcon/Frame_Resources.......................................resB..............guild_wood_name...guild_wood_des1...guild_wood_des2...Prefabs/Map/wood_guild...Sprite/Map/world_wood_guild..%Sprite/UI/UIGuildIcon/Frame_Resources.......................................resC..............guild_stone_name...guild_stone_des1...guild_stone_des2...Prefabs/Map/stone_guild...Sprite/Map/world_stone_guild..%Sprite/UI/UIGuildIcon/Frame_Resources.......................................resD..............guild_iron_name...guild_iron_des1...guild_iron_des2...Prefabs/Map/iron_guild...Sprite/Map/world_iron_guild..%Sprite/UI/UIGuildIcon/Frame_Resources.......................................resA...............guild_farm_name...guild_farm_des1...guild_farm_des2...Prefabs/Map/food_guild...Sprite/Map/wor
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):26660
                      Entropy (8bit):6.132672937611675
                      Encrypted:false
                      SSDEEP:
                      MD5:5BEAB46B908C2F05EA05580DFEAC0DE7
                      SHA1:8A227028BFAC5A87FE223D864D1678A82A2F1D15
                      SHA-256:B10C91F7A1E2B41CA81A1AA377397F02EB0D13C77DBB2845583553796C0F9314
                      SHA-512:38C6FB73034D883EB814168E2488DAE92B78C8ED2429F42EFA8949FB7C63B201D507BC299796C55AF5AAC0F708A76FE0B5B65975B52F211B3972A6E20F0CA5F8
                      Malicious:false
                      Preview:.............1....resource_point_name1...resource_point_des1...resource_name_resA.........resA...................................d..............2...Prefabs/Map/food...Sprite/Map/world_food..............2..............2...4111:1:1.............2....resource_point_name1...resource_point_des1...resource_name_resA.........resA...................................d..............2...Prefabs/Map/food...Sprite/Map/world_food..............2..............2...4111:1:1.............3....resource_point_name1...resource_point_des1...resource_name_resA.........resA....................................d..............2...Prefabs/Map/food...Sprite/Map/world_food..............2..............2...4111:1:10.............4....resource_point_name1...resource_point_des1...resource_name_resA.........resA....................................d......#...Prefabs/Map/food...Sprite/Map/world_food.....................2...4111:1:20.............5....resource_point_name1...resource_point_des1...r
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2423
                      Entropy (8bit):6.017819060610958
                      Encrypted:false
                      SSDEEP:
                      MD5:5B6036C1E19B3FAB055C99095D7D232B
                      SHA1:5FBCD9D846A31E7F2833A9E1FD84EB8FFD047018
                      SHA-256:EE264268BED5F8B159E3B347F1623ABA6AE9D09DE88A0935E4CDEC47B5FE159D
                      SHA-512:4D0507F12D0F813A4D278140EAFDB069A2A6150105849AB6648935666A7D531A549CFDD2DBFC26789A6757E425FF8A78C4C1DEC19BC7F23CBC29A0D9112C3C25
                      Malicious:false
                      Preview:.:................. Sprite/UI/UIMenuIcon/Icon_detail.@................... Sprite/UI/UIMenuIcon/Icon_detail.A..............1..... Sprite/UI/UIMenuIcon/Icon_detail.A..............2..... Sprite/UI/UIMenuIcon/Icon_detail.@................... Sprite/UI/UIMenuIcon/Icon_detail.@................... Sprite/UI/UIMenuIcon/Icon_detail.@................... Sprite/UI/UIMenuIcon/Icon_detail.@................... Sprite/UI/UIMenuIcon/Icon_detail.@................... Sprite/UI/UIMenuIcon/Icon_detail.@................... Sprite/UI/UIMenuIcon/Icon_detail.:................. Sprite/UI/UIMenuIcon/Icon_detail.F...................&Sprite/UI/UIGuildIcon/Icon_GuildMember.L.....................&Sprite/UI/UIGuildIcon/Icon_GuildMember.O......................&Sprite/UI/UIGuildIcon/Icon_GuildMember.R.......................&Sprite/
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2316
                      Entropy (8bit):4.3983015072778455
                      Encrypted:false
                      SSDEEP:
                      MD5:962398F5C52B278328180AF3A9D8005E
                      SHA1:E2D51C1C63AEC282225D97A6D98651CD737488F0
                      SHA-256:25BA573A86F69E481A9A2FCD8857CD4F2D5A529EBBD4EE2ECDFBA922386AF98C
                      SHA-512:72F93A788BE0316C4916530D7B46183B5AA0E99B1A359ACA06D28562183223653B2C6367A20BF6B80D5DAFD62FE26A766206EAB1DBAF6C511625EDB0AFBDC3E0
                      Malicious:false
                      Preview:. ............f...1................ ............g...1................ ............g...1................ ............g...1................ ............g...1................ ............g...1................ ............g...1................ ............g...1................ ............g...1................ ............g...1................ ...(.....(..g...1................ ............h...1................ ............h...1................ ............h...1................ ............h...1................ ...%.....%..h...1................ ...$.....$..h...1................ ............h...1................ ............h...1................!.................1................#...................1................#...................1................#...................1................#...................1................#...................1................#...................1................#...................1................#...................1................#...................1.
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1029
                      Entropy (8bit):4.530862488781122
                      Encrypted:false
                      SSDEEP:
                      MD5:BFAAAD03C640B29B7B1451201348BAE3
                      SHA1:EE970185A407F2A8E3CC002FDF45A8669753E00F
                      SHA-256:7C73ADA8D541FECC3D46CB9B1FF562CA95E6B293C8F51C8C8B4A2EFFCEBE1A73
                      SHA-512:F44744E74B9E43D8A8D75590F6C38232E66F12DCB725D49EE6DAF443C7164F067C3A17AD1197EF3F09B38DA3FA432AFDAE4F4D768B04D606F3F9D5177BC3B753
                      Malicious:false
                      Preview:. ................2.............................................."................106.............................................. ................6................ ................5.............................................. ................8................ ................1................$................19;20................!................23................"................103................&................102;104................c................C1010;1007;1004;17;1002;1001;1009;1008;1005;1003;1012;1011;1006;1013................w................W11;1014;1016;1017;1020;1021;1022;1025;1026;1027;1015;1018;1028;1029;1030;1019;1023;1024................!.................7................&................113;114..............................................%................3;9;21................*................110;111;112................%................18;107................).................13;12;105..................................15;14;26;25;24................*.............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1474
                      Entropy (8bit):5.071116650887781
                      Encrypted:false
                      SSDEEP:
                      MD5:F1C935986D641642E1B53B6D54B02C05
                      SHA1:BDFF752ABDD31F8F2B5DFF75868EC0617B8BFDE4
                      SHA-256:B766010E77B0BC18339FF3D25CBC2C3C854AC91DAF5563367F2D0E4B2C6E7CA9
                      SHA-512:E971903D68D15A9C99E5070D28C80CE391260D9625D9AB0E8B2B787948B0E3A9B48510A29288A741FEA66192E65D05DC14486276123B5E8812CC25D1A17BB576
                      Malicious:false
                      Preview:. ................2.............................................."................106..............................................5................6.................complete_task_01....5................5.................complete_task_01....1..............................complete_task_01.... ................8................5................1.................complete_task_01....9................19;20.................complete_task_01....6................23.................complete_task_01....7................103.................complete_task_01....;................102;104.................complete_task_01....b...............C1010;1007;1004;17;1002;1001;1009;1008;1005;1003;1012;1011;1006;1013................ ................7................;................113;114.................complete_task_01....1..............................complete_task_01....:................3;9;21.................complete_task_01....?................110;111;112.................complete_task_01....:..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1474
                      Entropy (8bit):5.082064481303175
                      Encrypted:false
                      SSDEEP:
                      MD5:7804AAD133DD69C769595D73CC2BF835
                      SHA1:B5D1BE4011972F1556CA29CFFE028EE77B6695C8
                      SHA-256:B842882FD7FBAC7371C9AC9FC2A7827D79BF5B1D4519B1179951B77B00565601
                      SHA-512:E5C6A4BBE9A4E16368D8D5F5E3324B1920D361AF4FD3ABFA4CA5B5A84F0F3A49E83A5BC7827A1E4DE1F6110BE124B20DAFEFD70A791997C9D9CBBA0E57595250
                      Malicious:false
                      Preview:. ................2.............................................."................106..............................................5................6.................complete_task_01....5................5.................complete_task_01....1..............................complete_task_01.... ................8................5................1.................complete_task_01....9................19;20.................complete_task_01....6................23.................complete_task_01....7................103.................complete_task_01....;................102;104.................complete_task_01....b...............C1010;1007;1004;17;1002;1001;1009;1008;1005;1003;1012;1011;1006;1013................ ................7................;................113;114.................complete_task_01....1..............................complete_task_01....:................3;9;21.................complete_task_01....?................110;111;112.................complete_task_01....:..............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1684
                      Entropy (8bit):5.10639655546311
                      Encrypted:false
                      SSDEEP:
                      MD5:3C6309EA3257001A1DA8427C0156250A
                      SHA1:4FFF291B449BB034688FA5E88AB5CC3D01020B7F
                      SHA-256:D35E23E3FF821CF0A2DDB3186E1EDB63AAD828343174BBB62F66867A96CEC859
                      SHA-512:4EA2CC6083022680F231584DCCF86D246E06CA7902872B4BBF2F4CB4C28996624E0A6A1DC639D4E09BF74D5BD58747429EDE784E6C4B614D8B2BECA67AAFD606
                      Malicious:false
                      Preview:.5................2.................complete_task_01....1..............................complete_task_01...."................106................1..............................complete_task_01....5................6.................complete_task_01....5................5.................complete_task_01....1..............................complete_task_01....5................8.................complete_task_01....5................1.................complete_task_01....9................19;20.................complete_task_01....6................23.................complete_task_01....7................103.................complete_task_01....;................102;104.................complete_task_01....w...............C1010;1007;1004;17;1002;1001;1009;1008;1005;1003;1012;1011;1006;1013.................complete_task_01....5................7.................complete_task_01....;................113;114.................complete_task_01....1..............................complete_task_01....:.............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1684
                      Entropy (8bit):5.10639655546311
                      Encrypted:false
                      SSDEEP:
                      MD5:E2EB04CE34B375F2880FF6B602CBBD9C
                      SHA1:8A7C6CD3F4C6CDAC9969DB9499BB4D1075A1B2D0
                      SHA-256:EA9D0D2AAA3E73F12B1AEBB7D5BA13A04E1FE5474152208F1F2ACC7AE9D41D7E
                      SHA-512:D39EA99732CCC90B1609F5A81D02A0A1B12F67C5ACF3A24A9CE4CBBAB22C1E517DDDC77B42EE7E94474A5AEA4C4E7C0B2933AE3E917A0FCECFD4024F02D1D164
                      Malicious:false
                      Preview:.5................2.................complete_task_01....1..............................complete_task_01...."................106................1..............................complete_task_01....5................6.................complete_task_01....5................5.................complete_task_01....1..............................complete_task_01....5................8.................complete_task_01....5................1.................complete_task_01....9................19;20.................complete_task_01....6................23.................complete_task_01....7................103.................complete_task_01....;................102;104.................complete_task_01....w...............C1010;1007;1004;17;1002;1001;1009;1008;1005;1003;1012;1011;1006;1013.................complete_task_01....5................7.................complete_task_01....;................113;114.................complete_task_01....1..............................complete_task_01....:.............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1684
                      Entropy (8bit):5.10639655546311
                      Encrypted:false
                      SSDEEP:
                      MD5:0426F9DFAB0A6FAED1F7042498611FC3
                      SHA1:D60C3B778AC0E6449ED21779754F35691B0B7C4A
                      SHA-256:3F241EF18EEAC6E72FF002AA638C89D863B330C55F45B1F899EF0138DB58456E
                      SHA-512:34C13EBDAE43E96ED50CF8D13C670C1BEB3F1B5E467290FCD6DD24E96218C0D9809BB757F480D3B858D67D0FB2E8B45BCC411B9E0E3182E06D53EE49FA105166
                      Malicious:false
                      Preview:.5................2.................complete_task_01....1..............................complete_task_01...."................106................1..............................complete_task_01....5................6.................complete_task_01....5................5.................complete_task_01....1..............................complete_task_01....5................8.................complete_task_01....5................1.................complete_task_01....9................19;20.................complete_task_01....6................23.................complete_task_01....7................103.................complete_task_01....;................102;104.................complete_task_01....w...............C1010;1007;1004;17;1002;1001;1009;1008;1005;1003;1012;1011;1006;1013.................complete_task_01....5................7.................complete_task_01....;................113;114.................complete_task_01....1..............................complete_task_01....:.............
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):32
                      Entropy (8bit):3.691428031846024
                      Encrypted:false
                      SSDEEP:
                      MD5:17B231D15AF63FF2BFB28D3CBD7712C2
                      SHA1:AE364D7299D1A0AC987A5C95C02FC1471BF050DB
                      SHA-256:BD6A59E4AA9E1F518A12A0443C8923F894A32B23C7698504923E16CC034BB2E8
                      SHA-512:50EDA8C5E181AB14809CC677ED7F6EA9B07AE59ACFBA3EAF29991D2E17539117E50EFEDCF58E2ED1B2652DDC06FF97A828FA28C6F74D368573078BC430EC9ED5
                      Malicious:false
                      Preview:e596f913526978b3de874d1d4e9fcb93
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):32
                      Entropy (8bit):3.7150182662886326
                      Encrypted:false
                      SSDEEP:
                      MD5:97CB42349A84AB3EFA25A1923F946A4B
                      SHA1:6E2C0E33A623F6ECDB30C55CA2D00FA9A899DFAE
                      SHA-256:4D67CE874A9C315D3C940D48F3161DCE1FED2B910FFBC6ED2840E50B7B5BA6C7
                      SHA-512:1DB89D453E343AB5BAC71CAD08B43D7EF82CDF5DFCE1466FFC51F4D58E44D1704245FC1B4072CA3EBE842CD9A2A5998E33B17ADCB6774C482291FDE46C259534
                      Malicious:false
                      Preview:dfbb5179cc57dd362efb6df431b2da0c
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1177
                      Entropy (8bit):5.224687036675884
                      Encrypted:false
                      SSDEEP:
                      MD5:326228EEB3AAEB4EBA8F0DF03E4E805C
                      SHA1:2A70C4E025752B8C8EE02D9D66480DB43A562569
                      SHA-256:ED4DF3A99B06A1EF7AC2A20C1F6E48E6ACC598D1CC78BD5BF38531A8F1F485BE
                      SHA-512:20AA2033AF5298E8EF8EAEFDB903A704CAB1B0AEC9CD5D5AE649777799749CD50F51052A0269470F53D9F09ADBD9051CD4C2AF3C63AFBE9D0F4C0A71AEF8A6B1
                      Malicious:false
                      Preview:.]......._..U..2..P..F..<..2..2..-..#.........1003:100...4:3...8978:2...8979:2......1;2.......I.Y......._..U..2..P..F..<..2..2..-..#.........9:2...10:2...8978:3...8979:3......3;4.......I.\......._..U..2..P..F..<..2..2..-..#.........951:5...981:5...8978:5...8979:5......5;6.......I.[......._..U..2..P..F..<..2..2..-..#.........19:3...972:2...8978:8...8979:8......7;8.......I.b......._..U..2..P..F..<..2..2..-..#.........3036:20...2754:2...8978:10...8979:10......9;10.......I.b......._..U..2..P..F..<..2..2..-..#.........951:2...1008:50...8978:15...8979:15......11;12.......I.f.............2........(..-..-..-..#.........4365:100...1003:500...8978:18...8979:18......13;14.........b.............2........(..-..-..-..#.........970:1...2858:50...8978:20...8979:20......15;16.........d.............2........(..-..-..-..#.........2754:1...4365:200...8978:25...8979:25......17;18.........c.............2........(..-..-..-..#.........1008:25...6189:1...8978:28...8979:28......19;20.........a..................
                      Process:C:\Program Files (x86)\Evony\evony.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):5
                      Entropy (8bit):2.321928094887362
                      Encrypted:false
                      SSDEEP:
                      MD5:64A06717A6162302FE96B3D4182E2A98
                      SHA1:709D64B89674BBE4EE2F3E26BCC37E5990FBA27B
                      SHA-256:5A47CE4B864B023BC5CE3D7C2E6F9C74C4B26620723F608A53C55C207DCCAF8A
                      SHA-512:317AD22247066554729BC439AC83EBDE2F0FB4A494F1884113F4A56EC339C6D6BC7D79FD33E409BAC13F3420DAB0BB22286F08EC99BB8869855C74AD4BCCB5DA
                      Malicious:false
                      Preview:1734.
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.152098741222171
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
                      File size:1'129'320 bytes
                      MD5:d24b89cd8ed0bf45794f5f6a1324cd64
                      SHA1:4218126f5f9f455af47a3c44552837357328d045
                      SHA256:13b11fea340a9312543a3f33cf271bdc340daec08a03d591aa9179eb95066dcd
                      SHA512:abcafa5687e9cccbcb84ac2955c4c6a4e6fdac671dfc40e9eb6dfdf5ce10ac3857f21328dffec076a13724659ecc210360f3a7d273661388cefcfec30ebfc1ab
                      SSDEEP:24576:sP1rI6/Mvvr0zKpevi2SP1FwWLgT13JYfXE:sPOz0zKpe6lPfwWLgT13GE
                      TLSH:9A358C22A7C6F823E0721271977ACBF5CF1DAC180B75E6CBA68570B695785C63538338
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$......._Y...8}..8}..8}.~^~..8}.~^x..8}.~^y..8}......8}.IPy..8}.IP~..8}.IPx.78}.~^|..8}..8|..8}..Qy.u8}..Qt..8}..Q...8}..8...8}..Q...8}
                      Icon Hash:d8dbdb5b5b9bdbf0
                      Entrypoint:0x44abde
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6451E53A [Wed May 3 04:38:18 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:4b17e4cea2dd608d88a7511de888ca48
                      Signature Valid:true
                      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                      Signature Validation Error:The operation completed successfully
                      Error Number:0
                      Not Before, Not After
                      • 26/07/2022 01:00:00 26/07/2023 00:59:59
                      Subject Chain
                      • CN=TOP GAMES INC., O=TOP GAMES INC., L=Sheung Wan, C=HK, SERIALNUMBER=57011747, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=HK
                      Version:3
                      Thumbprint MD5:A1641005122C45B1C99C3B43695498DE
                      Thumbprint SHA-1:0D963CE849D8CA79FAACF5B8A9C48B247869526D
                      Thumbprint SHA-256:970694B98E98796CFA6346F7DC159143616C612625B969A5858AB25BFBAE1213
                      Serial:070E2191E3BB538DC17408B79B1A75D2
                      Instruction
                      call 00007FE624C7B11Ah
                      jmp 00007FE624C7A20Fh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push edi
                      push esi
                      push ebx
                      xor edi, edi
                      mov eax, dword ptr [esp+14h]
                      or eax, eax
                      jnl 00007FE624C7A3A6h
                      inc edi
                      mov edx, dword ptr [esp+10h]
                      neg eax
                      neg edx
                      sbb eax, 00000000h
                      mov dword ptr [esp+14h], eax
                      mov dword ptr [esp+10h], edx
                      mov eax, dword ptr [esp+1Ch]
                      or eax, eax
                      jnl 00007FE624C7A3A6h
                      inc edi
                      mov edx, dword ptr [esp+18h]
                      neg eax
                      neg edx
                      sbb eax, 00000000h
                      mov dword ptr [esp+1Ch], eax
                      mov dword ptr [esp+18h], edx
                      or eax, eax
                      jne 00007FE624C7A3AAh
                      mov ecx, dword ptr [esp+18h]
                      mov eax, dword ptr [esp+14h]
                      xor edx, edx
                      div ecx
                      mov ebx, eax
                      mov eax, dword ptr [esp+10h]
                      div ecx
                      mov edx, ebx
                      jmp 00007FE624C7A3D3h
                      mov ebx, eax
                      mov ecx, dword ptr [esp+18h]
                      mov edx, dword ptr [esp+14h]
                      mov eax, dword ptr [esp+10h]
                      shr ebx, 1
                      rcr ecx, 1
                      shr edx, 1
                      rcr eax, 1
                      or ebx, ebx
                      jne 00007FE624C7A386h
                      div ecx
                      mov esi, eax
                      mul dword ptr [esp+1Ch]
                      mov ecx, eax
                      mov eax, dword ptr [esp+18h]
                      mul esi
                      add edx, ecx
                      jc 00007FE624C7A3A0h
                      cmp edx, dword ptr [esp+14h]
                      jnbe 00007FE624C7A39Ah
                      jc 00007FE624C7A399h
                      cmp eax, dword ptr [esp+10h]
                      jbe 00007FE624C7A393h
                      dec esi
                      xor edx, edx
                      mov eax, esi
                      dec edi
                      jne 00007FE624C7A399h
                      neg edx
                      neg eax
                      sbb edx, 00000000h
                      pop ebx
                      pop esi
                      pop edi
                      retn 0010h
                      push ebp
                      mov ebp, esp
                      push 00000000h
                      call dword ptr [0046D20Ch]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x7f04c0xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x830000x8cb48.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x1112000x2968.reloc
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1100000x42a0.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x7d5e00x70.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x7d6f00x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7d6500x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x6d0000x36c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x6bdcc0x6be0065cca875a3808f0166721798cb824340False0.5576047400057937data6.544341229535216IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x6d0000x131080x1320054b888515ecc5fc3b95eefe7b570fe93False0.42551317401960786data5.521649444668889IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x810000x1bdc0xe007d889d9e66a8f188ed18c926bb8509a2False0.21651785714285715data2.9301884075112516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x830000x8cb480x8cc003e3d40a7abf60a8c9126b1222a450e99False0.5651261378774423data7.164852165514222IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1100000x42a00x44002a37b7ced6cfb9d46559e149a87fb226False0.7339728860294118data6.644237864293816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_BITMAP0x90c800x1c9a8Device independent bitmap graphic, 320 x 122 x 24, image size 117120, resolution 3780 x 3780 px/mEnglishUnited States0.6338340730624786
                      RT_BITMAP0xad6280x1668Device independent bitmap graphic, 237 x 8 x 24, image size 5696, resolution 3780 x 3780 px/mEnglishUnited States0.6323221757322176
                      RT_BITMAP0xaec900x60ce8Device independent bitmap graphic, 560 x 236 x 24, image size 396480, resolution 3780 x 3780 px/mEnglishUnited States0.5898012710582063
                      RT_ICON0x834f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096ChineseChina0.800187617260788
                      RT_ICON0x845b00x115aPNG image data, 256 x 256, 8-bit colormap, non-interlacedChineseChina0.33340837460603334
                      RT_ICON0x857100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.09408315565031983
                      RT_ICON0x865b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.11507220216606498
                      RT_ICON0x86e600x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.12427745664739884
                      RT_ICON0x873c80x90bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.791792656587473
                      RT_ICON0x87cd80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.03235710911667454
                      RT_ICON0x8bf000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.04595435684647303
                      RT_ICON0x8e4a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.075046904315197
                      RT_ICON0x8f5500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.15070921985815602
                      RT_ICON0x8fbc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.800187617260788
                      RT_MENU0x8fa400x50dataChineseChina0.8375
                      RT_DIALOG0x8faa00x11cdataChineseChina0.6161971830985915
                      RT_STRING0x10f9780x44dataChineseChina0.6911764705882353
                      RT_ACCELERATOR0x8fa900x10dataChineseChina1.25
                      RT_GROUP_ICON0x845980x14dataChineseChina1.1
                      RT_GROUP_ICON0x8f9b80x84dataChineseChina0.6590909090909091
                      RT_GROUP_ICON0x90c680x14dataEnglishUnited States1.2
                      RT_MANIFEST0x10f9c00x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                      DLLImport
                      WLDAP32.dll
                      KERNEL32.dllCreateProcessW, HeapFree, InitializeCriticalSectionEx, HeapSize, HeapReAlloc, RaiseException, HeapAlloc, DecodePointer, DeleteCriticalSection, GetProcessHeap, GetModuleFileNameW, GetTempPathW, GetComputerNameW, WideCharToMultiByte, GetSystemTime, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, SetLastError, FormatMessageW, QueryPerformanceCounter, GetTickCount, EnterCriticalSection, LeaveCriticalSection, QueryPerformanceFrequency, GetSystemDirectoryW, FreeLibrary, GetModuleHandleW, GetProcAddress, LoadLibraryW, MultiByteToWideChar, MoveFileExW, WaitForSingleObjectEx, GetCurrentProcessId, GetStdHandle, GetFileType, ExitProcess, PeekNamedPipe, WaitForMultipleObjects, GetEnvironmentVariableA, SleepEx, VerSetConditionMask, GetModuleHandleA, VerifyVersionInfoW, GetCurrentDirectoryW, SetEndOfFile, SetStdHandle, FlushFileBuffers, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetFileSizeEx, GetConsoleCP, ReadConsoleW, GetConsoleMode, WriteFile, SetFilePointerEx, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, GetFileInformationByHandle, GetDriveTypeW, CreateFileW, CloseHandle, GetLastError, Sleep, WaitForSingleObject, CreateThread, GetUserDefaultUILanguage, GetFullPathNameW, FindClose, FindNextFileW, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, WriteConsoleW, GetStringTypeW, DeleteFileW, GetTimeZoneInformation, ReadFile, GetFileAttributesExW, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, EncodePointer, RtlUnwind, OutputDebugStringW, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetStartupInfoW, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, CreateEventW, InitializeCriticalSectionAndSpinCount
                      USER32.dllDefWindowProcW, GetMessageW, CreateWindowExW, GetSystemMetrics, RegisterClassExW, LoadAcceleratorsW, LoadStringW, ShowWindow, DispatchMessageW, SetTimer, SetMenu, LoadBitmapW, SetLayeredWindowAttributes, DestroyWindow, EndPaint, BeginPaint, InvalidateRect, UpdateWindow, PostQuitMessage, DrawTextW, SetWindowLongW, LoadCursorW, LoadIconW, TranslateMessage, TranslateAcceleratorW
                      GDI32.dllSelectObject, CreateCompatibleDC, StretchBlt, CreatePatternBrush, DeleteDC, SetTextColor, SetBkMode, GetObjectW, DeleteObject
                      ADVAPI32.dllCryptHashData, CryptEncrypt, CryptImportKey, CryptDestroyKey, CryptDestroyHash, CryptCreateHash, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegOpenKeyExW, RegQueryValueExW
                      SHELL32.dllShellExecuteW
                      WS2_32.dllsend, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents, closesocket, WSAGetLastError, ntohs, WSASetLastError, WSAStartup, WSACleanup, htons, socket, setsockopt, WSAIoctl, __WSAFDIsSet, select, getsockopt, accept, bind, getsockname, htonl, listen, gethostname, ioctlsocket, getpeername, sendto, recvfrom, freeaddrinfo, getaddrinfo, recv, connect
                      bcrypt.dllBCryptGenRandom
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      ChineseChina
                      Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:00:19:57
                      Start date:05/07/2024
                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe"
                      Imagebase:0x880000
                      File size:1'129'320 bytes
                      MD5 hash:D24B89CD8ED0BF45794F5F6A1324CD64
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:5
                      Start time:00:21:41
                      Start date:05/07/2024
                      Path:C:\Users\user\AppData\Local\Temp\evony_install.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\evony_install.exe"
                      Imagebase:0x400000
                      File size:142'621'912 bytes
                      MD5 hash:1E5D15442BC7EF8000317CD820C15FEC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:6
                      Start time:00:21:41
                      Start date:05/07/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-TKDSD.tmp\evony_install.tmp" /SL5="$B029A,142255846,116736,C:\Users\user\AppData\Local\Temp\evony_install.exe"
                      Imagebase:0x400000
                      File size:985'088 bytes
                      MD5 hash:A7FCD2C71C42B045367F56DF9C1EA82D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:true

                      Target ID:7
                      Start time:00:21:42
                      Start date:05/07/2024
                      Path:C:\Windows\SysWOW64\taskkill.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\taskkill.exe" /f /im evony.exe
                      Imagebase:0x510000
                      File size:74'240 bytes
                      MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:8
                      Start time:00:21:42
                      Start date:05/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x650000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:9
                      Start time:00:22:43
                      Start date:05/07/2024
                      Path:C:\Program Files (x86)\Evony\evony.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Evony\evony.exe"
                      Imagebase:0x7ff71c200000
                      File size:650'752 bytes
                      MD5 hash:B78BC21D6DEEE736214C8A9B48532663
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:10
                      Start time:00:22:43
                      Start date:05/07/2024
                      Path:C:\Program Files (x86)\Evony\UnityCrashHandler64.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Evony\UnityCrashHandler64.exe" --attach 6620 1500517896192
                      Imagebase:0x7ff674ba0000
                      File size:1'458'120 bytes
                      MD5 hash:9E1BD55580B0F983A43493DF89AE77FC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:7.5%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:7.6%
                        Total number of Nodes:1999
                        Total number of Limit Nodes:109
                        execution_graph 47971 88ea00 47972 88ea29 EnterCriticalSection LeaveCriticalSection 47971->47972 47973 88ea1f 47971->47973 47974 88ea91 47972->47974 47975 88ea42 47972->47975 48006 88e6a0 47974->48006 47990 88ecd0 47975->47990 47978 88ea9a 48010 8893c0 69 API calls 2 library calls 47978->48010 47980 88ea5a 48005 89d460 67 API calls 47980->48005 47981 88ea74 47994 88ebc0 47981->47994 47984 88ea60 47986 88ebc0 7 API calls 47984->47986 47987 88ea68 47986->47987 47989 88eb2c 47991 88ecdd 47990->47991 48011 8a7400 47991->48011 47993 88ea48 47993->47980 47993->47981 47995 88ebd0 EnterCriticalSection LeaveCriticalSection 47994->47995 47996 88ea7a 47994->47996 47997 88ec09 47995->47997 47998 88ebfd 47995->47998 48003 88ec14 47997->48003 48016 8a74e0 WaitForSingleObjectEx 47997->48016 48019 8a74d0 FindCloseChangeNotification 47998->48019 48002 88ec04 48004 88ec38 closesocket 48002->48004 48020 88ec70 DeleteCriticalSection closesocket ___scrt_fastfail 48003->48020 48004->47996 48005->47984 48007 88e6b0 QueryPerformanceCounter 48006->48007 48008 88e712 GetTickCount 48006->48008 48009 88e6d3 __alldvrm ___swprintf_l __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 48007->48009 48008->47978 48009->47978 48010->47989 48012 8a741a 48011->48012 48014 8a7449 48011->48014 48012->48014 48015 89c890 71 API calls _ValidateLocalCookies 48012->48015 48014->47993 48015->48014 48021 8a74d0 FindCloseChangeNotification 48016->48021 48018 8a74ff 48018->48003 48019->48002 48020->48002 48021->48018 48022 88e860 48023 88e895 48022->48023 48024 88e88f 48022->48024 48026 88e6a0 ___swprintf_l 2 API calls 48023->48026 48033 89cb40 48024->48033 48027 88e8c9 48026->48027 48038 88ede0 48027->48038 48029 88e8e2 48030 88e8e9 48029->48030 48055 896ca0 67 API calls 2 library calls 48029->48055 48032 88e903 48034 89cb4b 48033->48034 48035 89cb81 socket 48033->48035 48034->48023 48036 89cb92 48035->48036 48037 89cb97 closesocket 48035->48037 48036->48023 48037->48023 48039 88edf0 48038->48039 48040 88eeaa 48039->48040 48056 88eed0 48039->48056 48071 8d28bb 14 API calls _free 48040->48071 48043 88eeb2 48043->48029 48044 88ee3c 48045 88ee43 48044->48045 48048 88ee5e 48044->48048 48069 8d28bb 14 API calls _free 48045->48069 48047 88ee55 48047->48029 48049 88eea2 48048->48049 48066 8a74a0 48048->48066 48051 88ebc0 7 API calls 48049->48051 48051->48040 48053 88eebb 48053->48029 48055->48032 48057 88eee5 ___scrt_fastfail 48056->48057 48058 88ef18 InitializeCriticalSectionEx 48057->48058 48062 88ef32 48057->48062 48072 8a6c80 socket 48058->48072 48060 88ef5c 48101 88ec70 DeleteCriticalSection closesocket ___scrt_fastfail 48060->48101 48061 88ef4e closesocket 48061->48060 48062->48060 48062->48061 48065 88ef85 48062->48065 48064 88ef62 48064->48044 48065->48044 48146 8dacd6 48066->48146 48069->48047 48070 8d28bb 14 API calls _free 48070->48049 48071->48043 48073 8a6cb6 htonl setsockopt 48072->48073 48074 8a6e84 48072->48074 48076 8a6d0c bind 48073->48076 48077 8a6e72 closesocket closesocket closesocket 48073->48077 48075 8ca551 _ValidateLocalCookies 5 API calls 48074->48075 48078 8a6e94 48075->48078 48076->48077 48079 8a6d22 getsockname 48076->48079 48077->48074 48078->48062 48079->48077 48080 8a6d3a 48079->48080 48080->48077 48081 8a6d44 listen 48080->48081 48081->48077 48082 8a6d56 socket 48081->48082 48082->48077 48083 8a6d69 connect 48082->48083 48083->48077 48084 8a6d7f 48083->48084 48102 8c66a0 ioctlsocket 48084->48102 48086 8a6d87 48086->48077 48103 8a58f0 48086->48103 48088 8a6dae accept 48088->48077 48089 8a6dc8 48088->48089 48090 88e6a0 ___swprintf_l 2 API calls 48089->48090 48091 8a6dd1 send 48090->48091 48097 8a6df5 48091->48097 48092 8a58f0 13 API calls 48093 8a6e14 recv 48092->48093 48094 8a6e2b WSAGetLastError 48093->48094 48093->48097 48096 88e6a0 ___swprintf_l 2 API calls 48094->48096 48095 8a6ea4 48095->48077 48098 8a6ec1 closesocket 48095->48098 48096->48097 48097->48077 48097->48092 48097->48095 48129 8ca551 48098->48129 48100 8a6ed7 48100->48062 48101->48064 48102->48086 48104 8a592b 48103->48104 48105 8a5911 48103->48105 48143 8a5d20 WSASetLastError Sleep 48104->48143 48105->48104 48117 8a5948 48105->48117 48107 8a5936 48108 8ca551 _ValidateLocalCookies 5 API calls 48107->48108 48109 8a5944 48108->48109 48109->48088 48110 8a5ab5 48136 8a5d70 48110->48136 48111 8a5a96 WSASetLastError 48112 8ca551 _ValidateLocalCookies 5 API calls 48111->48112 48114 8a5ab1 48112->48114 48114->48088 48115 8a5adb 48116 8a5ae4 48115->48116 48128 8a5b0c 48115->48128 48118 8a5af9 48116->48118 48119 8a5ae9 WSAGetLastError 48116->48119 48117->48110 48117->48111 48120 8ca551 _ValidateLocalCookies 5 API calls 48118->48120 48119->48118 48122 8a5b08 48120->48122 48121 8a5b28 __WSAFDIsSet 48124 8a5b66 __WSAFDIsSet 48121->48124 48121->48128 48122->48088 48123 8a5bd6 48125 8ca551 _ValidateLocalCookies 5 API calls 48123->48125 48126 8a5b83 __WSAFDIsSet 48124->48126 48124->48128 48127 8a5be5 48125->48127 48126->48128 48127->48088 48128->48121 48128->48123 48128->48124 48128->48126 48130 8ca55c IsProcessorFeaturePresent 48129->48130 48131 8ca55a 48129->48131 48133 8cacd6 48130->48133 48131->48100 48145 8cac9a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48133->48145 48135 8cadb9 48135->48100 48137 8a5d86 48136->48137 48138 8a5de6 48137->48138 48141 8a5d9d 48137->48141 48144 8a5d20 WSASetLastError Sleep 48138->48144 48140 8a5df1 48140->48115 48142 8a5dd0 select 48141->48142 48142->48115 48143->48107 48144->48140 48145->48135 48147 8dacf7 48146->48147 48148 8dace3 48146->48148 48160 8dac84 48147->48160 48169 8d28bb 14 API calls _free 48148->48169 48151 8dace8 48170 8ceb9c 25 API calls __cftoe 48151->48170 48154 8dad0c CreateThread 48156 8dad37 48154->48156 48157 8dad2b GetLastError 48154->48157 48196 8dab78 48154->48196 48155 88ee8d 48155->48053 48155->48070 48172 8dabf6 48156->48172 48171 8d2885 14 API calls 2 library calls 48157->48171 48180 8e148c 48160->48180 48164 8daca2 48165 8daca9 GetModuleHandleExW 48164->48165 48166 8dacc6 48164->48166 48165->48166 48167 8dabf6 16 API calls 48166->48167 48168 8dacce 48167->48168 48168->48154 48168->48156 48169->48151 48170->48155 48171->48156 48173 8dac26 48172->48173 48174 8dac02 48172->48174 48173->48155 48175 8dac08 CloseHandle 48174->48175 48176 8dac11 48174->48176 48175->48176 48177 8dac17 FreeLibrary 48176->48177 48178 8dac20 48176->48178 48177->48178 48179 8df14f _free 14 API calls 48178->48179 48179->48173 48185 8e1499 _strftime 48180->48185 48181 8e14d9 48194 8d28bb 14 API calls _free 48181->48194 48182 8e14c4 RtlAllocateHeap 48183 8dac95 48182->48183 48182->48185 48187 8df14f 48183->48187 48185->48181 48185->48182 48193 8db204 EnterCriticalSection LeaveCriticalSection _strftime 48185->48193 48188 8df15a RtlFreeHeap 48187->48188 48189 8df183 _free 48187->48189 48188->48189 48190 8df16f 48188->48190 48189->48164 48195 8d28bb 14 API calls _free 48190->48195 48192 8df175 GetLastError 48192->48189 48193->48185 48194->48183 48195->48192 48197 8dab84 BuildCatchObjectHelperInternal 48196->48197 48198 8dab98 48197->48198 48199 8dab8b GetLastError ExitThread 48197->48199 48212 8deefd GetLastError 48198->48212 48204 8dabb4 48244 88ed00 48204->48244 48213 8def14 48212->48213 48214 8def1a 48212->48214 48266 8e118d 6 API calls pre_c_initialization 48213->48266 48237 8def20 SetLastError 48214->48237 48267 8e11cc 6 API calls pre_c_initialization 48214->48267 48217 8def38 48218 8e148c pre_c_initialization 14 API calls 48217->48218 48217->48237 48220 8def48 48218->48220 48221 8def67 48220->48221 48222 8def50 48220->48222 48269 8e11cc 6 API calls pre_c_initialization 48221->48269 48268 8e11cc 6 API calls pre_c_initialization 48222->48268 48223 8dab9d 48239 8e2f9a 48223->48239 48224 8defb4 48272 8deb65 37 API calls __CreateFrameInfo 48224->48272 48228 8def5e 48235 8df14f _free 14 API calls 48228->48235 48230 8def73 48231 8def88 48230->48231 48232 8def77 48230->48232 48271 8ded27 14 API calls pre_c_initialization 48231->48271 48270 8e11cc 6 API calls pre_c_initialization 48232->48270 48235->48237 48236 8def93 48238 8df14f _free 14 API calls 48236->48238 48237->48223 48237->48224 48238->48237 48240 8e2fac GetPEB 48239->48240 48241 8daba8 48239->48241 48240->48241 48242 8e2fbf 48240->48242 48241->48204 48265 8e13c2 5 API calls pre_c_initialization 48241->48265 48273 8e1053 48242->48273 48290 89a580 48244->48290 48248 88ed43 48249 88ed69 EnterCriticalSection 48248->48249 48250 88ed52 WSAGetLastError 48248->48250 48253 88ed93 48249->48253 48254 88ed77 LeaveCriticalSection 48249->48254 48251 88ed58 WSAGetLastError 48250->48251 48252 88ed5c 48250->48252 48251->48252 48252->48249 48256 88ed9b send 48253->48256 48257 88edb7 LeaveCriticalSection 48253->48257 48299 88ec70 DeleteCriticalSection closesocket ___scrt_fastfail 48254->48299 48256->48257 48259 88edb2 WSAGetLastError 48256->48259 48258 88ed85 48257->48258 48260 8ca551 _ValidateLocalCookies 5 API calls 48258->48260 48259->48257 48261 88edd5 48260->48261 48262 8dad5b 48261->48262 48304 8dac2d 48262->48304 48265->48204 48266->48214 48267->48217 48268->48228 48269->48230 48270->48228 48271->48236 48276 8e0f90 48273->48276 48277 8e0fbe 48276->48277 48281 8e0fba 48276->48281 48277->48281 48283 8e0ec7 48277->48283 48280 8e0fd8 GetProcAddress 48280->48281 48282 8e0fe8 __crt_fast_encode_pointer 48280->48282 48281->48241 48282->48281 48288 8e0ed8 try_get_first_available_module 48283->48288 48284 8e0ef6 LoadLibraryExW 48286 8e0f11 GetLastError 48284->48286 48284->48288 48285 8e0f83 48285->48280 48285->48281 48286->48288 48287 8e0f6c FreeLibrary 48287->48288 48288->48284 48288->48285 48288->48287 48289 8e0f44 LoadLibraryExW 48288->48289 48289->48288 48300 89a620 48290->48300 48293 8a6f10 getaddrinfo 48295 8a6f3f __fassign 48293->48295 48297 8a7056 48293->48297 48294 8a7079 WSASetLastError 48294->48297 48295->48294 48295->48295 48296 8a704b freeaddrinfo 48295->48296 48298 8a7052 48295->48298 48296->48298 48297->48248 48298->48294 48298->48297 48299->48258 48303 89ae50 40 API calls 3 library calls 48300->48303 48302 88ed2f 48302->48293 48303->48302 48313 8df054 GetLastError 48304->48313 48306 8dac7a ExitThread 48307 8dac38 48307->48306 48308 8dac51 48307->48308 48336 8e13fd 5 API calls pre_c_initialization 48307->48336 48309 8dac64 48308->48309 48311 8dac5d CloseHandle 48308->48311 48309->48306 48312 8dac70 FreeLibraryAndExitThread 48309->48312 48311->48309 48312->48306 48314 8df06b 48313->48314 48315 8df071 48313->48315 48337 8e118d 6 API calls pre_c_initialization 48314->48337 48335 8df077 SetLastError 48315->48335 48338 8e11cc 6 API calls pre_c_initialization 48315->48338 48318 8df08f 48319 8e148c pre_c_initialization 12 API calls 48318->48319 48318->48335 48320 8df09f 48319->48320 48322 8df0be 48320->48322 48323 8df0a7 48320->48323 48340 8e11cc 6 API calls pre_c_initialization 48322->48340 48339 8e11cc 6 API calls pre_c_initialization 48323->48339 48326 8df0b5 48331 8df14f _free 12 API calls 48326->48331 48327 8df0ca 48328 8df0df 48327->48328 48329 8df0ce 48327->48329 48342 8ded27 14 API calls pre_c_initialization 48328->48342 48341 8e11cc 6 API calls pre_c_initialization 48329->48341 48331->48335 48333 8df0ea 48334 8df14f _free 12 API calls 48333->48334 48334->48335 48335->48307 48336->48308 48337->48315 48338->48318 48339->48326 48340->48327 48341->48326 48342->48333 48343 8976a0 48344 8976bd 48343->48344 48345 8976c8 48343->48345 48347 897370 48344->48347 48348 897386 48347->48348 48349 8973a6 48348->48349 48351 8bc770 48348->48351 48349->48345 48352 8bc783 48351->48352 48356 8bc7c0 48351->48356 48353 8bc79b 48352->48353 48354 8bc7f0 closesocket 48352->48354 48352->48356 48353->48356 48357 8be060 48353->48357 48354->48356 48356->48349 48358 8be071 48357->48358 48359 8be0bb closesocket 48358->48359 48360 8be07b ___swprintf_l 48358->48360 48359->48356 48360->48356 48361 8963e0 48362 8963ed 48361->48362 48363 896405 48361->48363 48366 8bcaf0 48362->48366 48369 8a5bf0 48366->48369 48368 8963f8 48370 8a5c10 48369->48370 48373 8a5c37 48369->48373 48371 8a5c19 48370->48371 48370->48373 48381 8a5d20 WSASetLastError Sleep 48371->48381 48375 8a58f0 13 API calls 48373->48375 48374 8a5c24 48376 8ca551 _ValidateLocalCookies 5 API calls 48374->48376 48379 8a5c81 48375->48379 48377 8a5c33 48376->48377 48377->48368 48378 8ca551 _ValidateLocalCookies 5 API calls 48380 8a5d10 48378->48380 48379->48378 48380->48368 48381->48374 48382 892900 48393 892a60 48382->48393 48384 892915 ___scrt_fastfail 48397 893880 48384->48397 48386 892975 48387 892991 48387->48386 48464 889380 48387->48464 48388 892960 48388->48386 48388->48387 48463 893170 7 API calls ___swprintf_l 48388->48463 48391 8929b0 48468 8929d0 48391->48468 48394 892a73 48393->48394 48395 892aa9 48394->48395 48476 892540 48394->48476 48395->48384 48398 89389f 48397->48398 48399 8938c8 48398->48399 48979 893300 48398->48979 48399->48388 48401 8938dc 48431 8938e5 48401->48431 48989 893fb0 48401->48989 48404 893976 48404->48431 49006 895150 48404->49006 48405 8939a5 48405->48431 49016 894510 48405->49016 48407 8939b9 48407->48431 49026 894950 48407->49026 48409 8939e7 48410 893ab4 48409->48410 48414 893b41 48409->48414 48409->48431 48411 893b2b 48410->48411 49049 889330 48410->49049 48412 892b90 18 API calls 48411->48412 48416 893b35 48412->48416 48414->48431 49035 8957d0 48414->49035 48416->48388 48418 893d3b 48421 893dd7 48418->48421 49055 891d50 79 API calls 48418->49055 48420 893ae4 48423 895ee0 40 API calls 48420->48423 48420->48431 48424 893e59 48421->48424 49056 8912f0 40 API calls _ValidateLocalCookies 48421->49056 48426 893af7 48423->48426 48429 896d60 67 API calls 48424->48429 48425 893d70 48425->48421 48432 893d77 48425->48432 48427 893b00 48426->48427 49054 8a3980 69 API calls ___swprintf_l 48426->49054 48427->48388 48429->48431 48431->48388 48438 896d60 67 API calls 48432->48438 48433 893ec7 48437 889330 77 API calls 48433->48437 48434 893e09 48435 893e46 48434->48435 49057 891110 QueryPerformanceCounter GetTickCount ___swprintf_l 48434->49057 48435->48433 49058 8911c0 QueryPerformanceCounter GetTickCount ___swprintf_l 48435->49058 48441 893ed1 48437->48441 48439 893dcf 48438->48439 49040 892b90 48439->49040 48440 893e23 48443 893e4b 48440->48443 48444 893e3d 48440->48444 49059 890f50 40 API calls _ValidateLocalCookies 48441->49059 48448 896d60 67 API calls 48443->48448 48447 8929d0 77 API calls 48444->48447 48447->48435 48448->48424 48449 893eb3 48452 893ebe 48449->48452 48453 893f97 48449->48453 48450 893f43 49045 895ee0 48450->49045 48451 893efc 48451->48439 48459 896d60 67 API calls 48451->48459 48457 8929d0 77 API calls 48452->48457 48456 896d60 67 API calls 48453->48456 48455 893ed7 48455->48431 48455->48451 48458 896d60 67 API calls 48455->48458 48456->48424 48457->48433 48458->48451 48459->48439 48460 893f49 48460->48431 49060 8968a0 77 API calls 48460->49060 48462 893f8b 48462->48388 48463->48387 48465 889396 48464->48465 48466 88938f 48464->48466 48465->48391 49097 896800 77 API calls 48466->49097 48470 8929e4 48468->48470 48469 892a4b 48469->48386 48470->48469 48471 889330 77 API calls 48470->48471 48472 892a17 48471->48472 49098 893840 48472->49098 48474 892a45 48475 889380 77 API calls 48474->48475 48475->48469 48477 89254f 48476->48477 48494 8928ee 48476->48494 48477->48494 48496 889530 48477->48496 48479 892565 48480 889380 77 API calls 48479->48480 48481 89256b 48480->48481 48482 89257c 48481->48482 48558 889f00 91 API calls 48481->48558 48485 89258c 48482->48485 48502 889c50 48482->48502 48486 892a60 127 API calls 48485->48486 48487 8925cb ___swprintf_l 48486->48487 48511 88dbf0 48487->48511 48489 892680 48519 8992a0 48489->48519 48491 89269f 48536 899d90 48491->48536 48493 8926b9 ___swprintf_l 48555 8cebfd 48493->48555 48494->48395 48497 889542 48496->48497 48498 889584 48496->48498 48497->48498 48559 89de20 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48497->48559 48498->48479 48500 889571 48500->48498 48560 896d60 48500->48560 48503 889c74 48502->48503 48506 889c5f 48502->48506 48503->48485 48504 889ce6 48574 891040 48504->48574 48506->48503 48506->48504 48582 88a4f0 48506->48582 48508 889cf0 48509 889d1e WSACloseEvent 48508->48509 48510 889d34 48509->48510 48510->48485 48512 88dc00 48511->48512 48517 88dc41 48511->48517 48724 88db80 97 API calls 48512->48724 48514 88dc06 48725 88dd50 106 API calls ___swprintf_l 48514->48725 48516 88dc22 48516->48517 48518 896d60 67 API calls 48516->48518 48517->48489 48518->48517 48520 89937d 48519->48520 48521 8992b8 48519->48521 48520->48491 48521->48520 48726 8a6b50 102 API calls _ValidateLocalCookies 48521->48726 48523 8992f3 48524 899364 48523->48524 48727 8d30f6 65 API calls 3 library calls 48523->48727 48524->48491 48526 899309 48527 89932e 48526->48527 48728 899750 40 API calls _ValidateLocalCookies 48526->48728 48729 8cefb5 48527->48729 48530 899336 48530->48524 48531 899357 48530->48531 48532 899344 48530->48532 48531->48524 48743 8dcdc9 42 API calls 3 library calls 48531->48743 48742 8a6a80 22 API calls 2 library calls 48532->48742 48535 89934b 48535->48524 48535->48531 48537 899da4 48536->48537 48539 899dac 48536->48539 48537->48493 48538 899ebc 48538->48493 48553 899e58 48539->48553 48973 8a6b50 102 API calls _ValidateLocalCookies 48539->48973 48542 899de8 48542->48553 48974 8d30f6 65 API calls 3 library calls 48542->48974 48544 899dfe 48545 899e22 48544->48545 48975 89a190 40 API calls _ValidateLocalCookies 48544->48975 48547 8cefb5 67 API calls 48545->48547 48548 899e2a 48547->48548 48549 899e4b 48548->48549 48550 899e38 48548->48550 48548->48553 48549->48553 48977 8dcdc9 42 API calls 3 library calls 48549->48977 48976 8a6a80 22 API calls 2 library calls 48550->48976 48553->48538 48978 89a380 40 API calls 2 library calls 48553->48978 48554 899e3f 48554->48549 48554->48553 48556 8df14f _free 14 API calls 48555->48556 48557 8cec15 48556->48557 48557->48494 48558->48482 48559->48500 48561 896d7b 48560->48561 48570 896dc7 48560->48570 48564 89a620 ___swprintf_l 40 API calls 48561->48564 48561->48570 48562 8ca551 _ValidateLocalCookies 5 API calls 48563 896dd5 48562->48563 48563->48498 48565 896d9c 48564->48565 48566 896dd9 48565->48566 48567 896daf 48565->48567 48573 8cadbb 5 API calls ___report_securityfailure 48566->48573 48572 896c10 65 API calls ___swprintf_l 48567->48572 48570->48562 48571 896dde 48572->48570 48573->48571 48579 8910d8 48574->48579 48580 891062 48574->48580 48575 8ca551 _ValidateLocalCookies 5 API calls 48576 8910e8 48575->48576 48576->48508 48577 8910bb 48578 892540 127 API calls 48577->48578 48578->48579 48579->48575 48580->48577 48581 8929d0 77 API calls 48580->48581 48581->48580 48583 88a5de 48582->48583 48584 88a51f 48582->48584 48586 8ca551 _ValidateLocalCookies 5 API calls 48583->48586 48613 88eb40 48584->48613 48587 88a5fe 48586->48587 48587->48506 48589 88a591 48618 896820 48589->48618 48594 88a5b6 48595 889380 77 API calls 48594->48595 48596 88a5d2 48595->48596 48596->48583 48597 88a602 48596->48597 48625 89caa0 48597->48625 48599 88a627 ___swprintf_l 48600 88a6be 48599->48600 48603 88a75d 48599->48603 48601 89a580 ___swprintf_l 40 API calls 48600->48601 48602 88a70f 48601->48602 48632 891530 79 API calls ___swprintf_l 48602->48632 48604 8929d0 77 API calls 48603->48604 48606 88a74f 48604->48606 48612 8cebfd 14 API calls 48606->48612 48607 88a72a 48607->48606 48608 896d60 67 API calls 48607->48608 48608->48606 48609 88a79b 48610 8ca551 _ValidateLocalCookies 5 API calls 48609->48610 48611 88a7b7 48610->48611 48611->48506 48612->48609 48614 88eb6d 48613->48614 48615 88eb50 48613->48615 48615->48614 48633 88ef90 48615->48633 48617 88a525 48617->48589 48631 8a4770 72 API calls 48617->48631 48643 896bc0 48618->48643 48621 88c030 48622 88c061 48621->48622 48623 88c041 48621->48623 48622->48594 48708 8893c0 69 API calls 2 library calls 48623->48708 48627 89cab3 48625->48627 48630 89cae9 48625->48630 48627->48630 48709 8d2365 48627->48709 48630->48599 48631->48589 48632->48607 48634 8a74e0 2 API calls 48633->48634 48635 88efa6 48634->48635 48637 88ecd0 71 API calls 48635->48637 48638 88efba 48635->48638 48636 88efe8 48639 88ebc0 7 API calls 48636->48639 48637->48638 48638->48636 48642 89d460 67 API calls 48638->48642 48641 88eff9 48639->48641 48641->48617 48642->48636 48644 896bd4 48643->48644 48646 88a5ae 48644->48646 48647 896520 48644->48647 48646->48621 48648 896569 48647->48648 48650 89652d 48647->48650 48648->48644 48649 896562 48649->48644 48650->48649 48652 8bcd30 48650->48652 48653 8bcd41 48652->48653 48656 8bcd48 48652->48656 48653->48656 48657 8bda60 48653->48657 48655 8bcd92 48655->48650 48656->48650 48658 8bdaae 48657->48658 48659 8bda84 48657->48659 48658->48655 48663 8bdd70 48659->48663 48664 8cc010 ___scrt_fastfail 48663->48664 48665 8bddac getpeername 48664->48665 48666 8bddcd WSAGetLastError 48665->48666 48667 8bddf0 48665->48667 48668 885520 46 API calls 48666->48668 48669 897700 41 API calls 48667->48669 48680 8bdde7 48668->48680 48670 8bde12 48669->48670 48671 8bde47 48670->48671 48673 8d28bb _free 14 API calls 48670->48673 48672 8ca551 _ValidateLocalCookies 5 API calls 48671->48672 48675 8bdaa7 48672->48675 48676 8bde1e 48673->48676 48674 896ca0 67 API calls 48674->48671 48681 8bde90 48675->48681 48677 8d28bb _free 14 API calls 48676->48677 48678 8bde25 48677->48678 48679 885520 46 API calls 48678->48679 48679->48680 48680->48674 48682 8cc010 ___scrt_fastfail 48681->48682 48683 8bdecb getsockname 48682->48683 48684 8bdf2b 48683->48684 48685 8bdeec WSAGetLastError 48683->48685 48687 897700 41 API calls 48684->48687 48686 885520 46 API calls 48685->48686 48688 8bdf06 48686->48688 48689 8bdf4b 48687->48689 48690 896ca0 67 API calls 48688->48690 48691 8bdf9a 48689->48691 48692 8bdf52 48689->48692 48693 8bdf13 48690->48693 48694 8ca551 _ValidateLocalCookies 5 API calls 48691->48694 48695 8d28bb _free 14 API calls 48692->48695 48697 8ca551 _ValidateLocalCookies 5 API calls 48693->48697 48698 8bdfa8 48694->48698 48696 8bdf58 48695->48696 48699 8d28bb _free 14 API calls 48696->48699 48700 8bdf27 48697->48700 48698->48658 48701 8bdf5f 48699->48701 48700->48658 48702 885520 46 API calls 48701->48702 48703 8bdf73 48702->48703 48704 896ca0 67 API calls 48703->48704 48705 8bdf81 48704->48705 48706 8ca551 _ValidateLocalCookies 5 API calls 48705->48706 48707 8bdf96 48706->48707 48707->48658 48708->48622 48713 8d22e0 48709->48713 48711 89cad5 48712 89da20 5 API calls _ValidateLocalCookies 48711->48712 48712->48630 48714 8d22ef 48713->48714 48715 8d2306 48713->48715 48721 8d28bb 14 API calls _free 48714->48721 48720 8d22ff __alldvrm 48715->48720 48723 8e1265 6 API calls pre_c_initialization 48715->48723 48717 8d22f4 48722 8ceb9c 25 API calls __cftoe 48717->48722 48720->48711 48721->48717 48722->48720 48723->48720 48724->48514 48725->48516 48726->48523 48727->48526 48728->48526 48730 8cefc1 BuildCatchObjectHelperInternal 48729->48730 48731 8cefcb 48730->48731 48732 8cefe0 48730->48732 48761 8d28bb 14 API calls _free 48731->48761 48741 8cefdb __wsopen_s 48732->48741 48744 8d24cb EnterCriticalSection 48732->48744 48734 8cefd0 48762 8ceb9c 25 API calls __cftoe 48734->48762 48737 8ceffd 48745 8cef3e 48737->48745 48739 8cf008 48763 8cf025 LeaveCriticalSection __fread_nolock 48739->48763 48741->48530 48742->48535 48743->48524 48744->48737 48746 8cef4b 48745->48746 48748 8cef60 48745->48748 48796 8d28bb 14 API calls _free 48746->48796 48754 8cef5b 48748->48754 48764 8d902d 48748->48764 48749 8cef50 48797 8ceb9c 25 API calls __cftoe 48749->48797 48754->48739 48757 8cef83 48781 8de973 48757->48781 48760 8df14f _free 14 API calls 48760->48754 48761->48734 48762->48741 48763->48741 48765 8d9045 48764->48765 48766 8cef75 48764->48766 48765->48766 48767 8df189 __fread_nolock 25 API calls 48765->48767 48770 8df4f1 48766->48770 48768 8d9063 48767->48768 48798 8ddf79 48768->48798 48771 8cef7d 48770->48771 48772 8df508 48770->48772 48774 8df189 48771->48774 48772->48771 48773 8df14f _free 14 API calls 48772->48773 48773->48771 48775 8df1aa 48774->48775 48776 8df195 48774->48776 48775->48757 48917 8d28bb 14 API calls _free 48776->48917 48778 8df19a 48918 8ceb9c 25 API calls __cftoe 48778->48918 48780 8df1a5 48780->48757 48782 8de984 48781->48782 48787 8de999 48781->48787 48930 8d28a8 14 API calls _free 48782->48930 48784 8de9e2 48932 8d28a8 14 API calls _free 48784->48932 48786 8de989 48931 8d28bb 14 API calls _free 48786->48931 48787->48784 48790 8de9c0 48787->48790 48788 8de9e7 48933 8d28bb 14 API calls _free 48788->48933 48919 8de8f1 48790->48919 48793 8de9ef 48934 8ceb9c 25 API calls __cftoe 48793->48934 48794 8cef89 48794->48754 48794->48760 48796->48749 48797->48754 48799 8ddf85 BuildCatchObjectHelperInternal 48798->48799 48800 8ddf8d 48799->48800 48801 8ddfa5 48799->48801 48868 8d28a8 14 API calls _free 48800->48868 48803 8de040 48801->48803 48807 8ddfd7 48801->48807 48873 8d28a8 14 API calls _free 48803->48873 48804 8ddf92 48869 8d28bb 14 API calls _free 48804->48869 48823 8e244c EnterCriticalSection 48807->48823 48808 8de045 48874 8d28bb 14 API calls _free 48808->48874 48811 8ddfdd 48813 8de00e 48811->48813 48814 8ddff9 48811->48814 48812 8de04d 48875 8ceb9c 25 API calls __cftoe 48812->48875 48824 8de061 48813->48824 48870 8d28bb 14 API calls _free 48814->48870 48818 8ddf9a __wsopen_s 48818->48766 48819 8de009 48872 8de038 LeaveCriticalSection __wsopen_s 48819->48872 48820 8ddffe 48871 8d28a8 14 API calls _free 48820->48871 48823->48811 48825 8de09f 48824->48825 48826 8de083 48824->48826 48825->48819 48827 8de087 48826->48827 48829 8de0d7 48826->48829 48886 8d28a8 14 API calls _free 48827->48886 48831 8de0ea 48829->48831 48876 8daf4b 48829->48876 48830 8de08c 48887 8d28bb 14 API calls _free 48830->48887 48879 8ddc0a 48831->48879 48835 8de094 48888 8ceb9c 25 API calls __cftoe 48835->48888 48838 8de13f 48840 8de198 WriteFile 48838->48840 48841 8de153 48838->48841 48839 8de100 48842 8de129 48839->48842 48843 8de104 48839->48843 48846 8de1bc GetLastError 48840->48846 48848 8de11f 48840->48848 48844 8de15e 48841->48844 48845 8de188 48841->48845 48890 8dd7f4 43 API calls 5 library calls 48842->48890 48843->48848 48889 8ddba0 6 API calls __wsopen_s 48843->48889 48849 8de178 48844->48849 48850 8de163 48844->48850 48893 8ddc7d 7 API calls 2 library calls 48845->48893 48846->48848 48848->48825 48855 8de1e2 48848->48855 48860 8de20c 48848->48860 48892 8dde45 8 API calls 3 library calls 48849->48892 48850->48848 48853 8de168 48850->48853 48891 8ddd5a 7 API calls 2 library calls 48853->48891 48857 8de1e9 48855->48857 48858 8de200 48855->48858 48894 8d28bb 14 API calls _free 48857->48894 48896 8d2885 14 API calls 2 library calls 48858->48896 48859 8de176 48859->48848 48860->48825 48897 8d28bb 14 API calls _free 48860->48897 48864 8de224 48898 8d28a8 14 API calls _free 48864->48898 48865 8de1ee 48895 8d28a8 14 API calls _free 48865->48895 48868->48804 48869->48818 48870->48820 48871->48819 48872->48818 48873->48808 48874->48812 48875->48818 48899 8daeb2 48876->48899 48908 8e670b 48879->48908 48881 8ddc1b 48882 8deefd pre_c_initialization 37 API calls 48881->48882 48885 8ddc71 48881->48885 48883 8ddc3e 48882->48883 48884 8ddc58 GetConsoleMode 48883->48884 48883->48885 48884->48885 48885->48838 48885->48839 48886->48830 48887->48835 48888->48825 48889->48848 48890->48848 48891->48859 48892->48859 48893->48859 48894->48865 48895->48825 48896->48825 48897->48864 48898->48825 48900 8e26c0 __wsopen_s 25 API calls 48899->48900 48901 8daec4 48900->48901 48902 8daedd SetFilePointerEx 48901->48902 48903 8daecc 48901->48903 48905 8daef5 GetLastError 48902->48905 48906 8daed1 48902->48906 48904 8d28bb _free 14 API calls 48903->48904 48904->48906 48907 8d2885 __dosmaperr 14 API calls 48905->48907 48906->48831 48907->48906 48909 8e6718 48908->48909 48911 8e6725 48908->48911 48910 8d28bb _free 14 API calls 48909->48910 48912 8e671d 48910->48912 48913 8e6731 48911->48913 48914 8d28bb _free 14 API calls 48911->48914 48912->48881 48913->48881 48915 8e6752 48914->48915 48916 8ceb9c __cftoe 25 API calls 48915->48916 48916->48912 48917->48778 48918->48780 48920 8de8fd BuildCatchObjectHelperInternal 48919->48920 48935 8e244c EnterCriticalSection 48920->48935 48922 8de90b 48923 8de93d 48922->48923 48924 8de932 48922->48924 48951 8d28bb 14 API calls _free 48923->48951 48936 8dea02 48924->48936 48927 8de938 48952 8de967 LeaveCriticalSection __wsopen_s 48927->48952 48929 8de95a __wsopen_s 48929->48794 48930->48786 48931->48794 48932->48788 48933->48793 48934->48794 48935->48922 48953 8e26c0 48936->48953 48938 8dea12 48939 8dea18 48938->48939 48941 8dea4a 48938->48941 48944 8e26c0 __wsopen_s 25 API calls 48938->48944 48966 8e262f 15 API calls 3 library calls 48939->48966 48941->48939 48942 8e26c0 __wsopen_s 25 API calls 48941->48942 48945 8dea56 FindCloseChangeNotification 48942->48945 48943 8dea70 48946 8dea92 48943->48946 48967 8d2885 14 API calls 2 library calls 48943->48967 48947 8dea41 48944->48947 48945->48939 48948 8dea62 GetLastError 48945->48948 48946->48927 48950 8e26c0 __wsopen_s 25 API calls 48947->48950 48948->48939 48950->48941 48951->48927 48952->48929 48954 8e26cd 48953->48954 48955 8e26e2 48953->48955 48968 8d28a8 14 API calls _free 48954->48968 48959 8e2707 48955->48959 48970 8d28a8 14 API calls _free 48955->48970 48958 8e26d2 48969 8d28bb 14 API calls _free 48958->48969 48959->48938 48960 8e2712 48971 8d28bb 14 API calls _free 48960->48971 48963 8e26da 48963->48938 48964 8e271a 48972 8ceb9c 25 API calls __cftoe 48964->48972 48966->48943 48967->48946 48968->48958 48969->48963 48970->48960 48971->48964 48972->48963 48973->48542 48974->48544 48975->48544 48976->48554 48977->48553 48978->48553 48981 893314 48979->48981 48980 89331d 48980->48401 48981->48980 48982 88e6a0 ___swprintf_l 2 API calls 48981->48982 48983 89336d 48982->48983 48984 88e6a0 ___swprintf_l 2 API calls 48983->48984 48985 893380 48984->48985 48986 88e6a0 ___swprintf_l 2 API calls 48985->48986 48988 8934fd 48985->48988 48987 89355a 48986->48987 48987->48401 48988->48401 48994 893fd1 48989->48994 48990 894040 49002 894093 48990->49002 49062 8b8e80 GetEnvironmentVariableA 48990->49062 48992 894007 49061 896ca0 67 API calls 2 library calls 48992->49061 48994->48990 48994->48992 48999 894014 48994->48999 48995 89405d 48997 894078 48995->48997 49063 8b8e80 GetEnvironmentVariableA 48995->49063 49000 896d60 67 API calls 48997->49000 48997->49002 48999->48404 49000->49002 49001 8940b4 49003 8940bb 49001->49003 49065 8942d0 68 API calls _ValidateLocalCookies 49001->49065 49064 8bbb40 42 API calls 3 library calls 49002->49064 49003->48999 49005 896d60 67 API calls 49003->49005 49005->48999 49007 8951c1 49006->49007 49008 895173 49006->49008 49009 8ca551 _ValidateLocalCookies 5 API calls 49007->49009 49008->49007 49011 89a580 ___swprintf_l 40 API calls 49008->49011 49010 8951ce 49009->49010 49010->48405 49012 895193 49011->49012 49012->49007 49013 8951ad 49012->49013 49014 8ca551 _ValidateLocalCookies 5 API calls 49013->49014 49015 8951bd 49014->49015 49015->48405 49017 894535 49016->49017 49025 8945fc 49017->49025 49066 8bb2c0 96 API calls 49017->49066 49019 8945de 49020 894601 49019->49020 49021 8945e5 49019->49021 49020->49025 49067 896ca0 67 API calls 2 library calls 49020->49067 49022 896d60 67 API calls 49021->49022 49022->49025 49024 89460e 49024->48407 49025->48407 49027 894972 49026->49027 49029 894a26 49026->49029 49027->49029 49031 896d60 67 API calls 49027->49031 49034 894a95 49027->49034 49068 894b40 67 API calls 2 library calls 49027->49068 49029->49034 49069 898c60 26 API calls 49029->49069 49031->49027 49032 894a75 49033 896d60 67 API calls 49032->49033 49032->49034 49033->49034 49034->48409 49036 88e6a0 ___swprintf_l 2 API calls 49035->49036 49038 8957e2 49036->49038 49037 8958b2 49037->48418 49038->49037 49039 8929d0 77 API calls 49038->49039 49039->49038 49070 8897e0 49040->49070 49043 88e6a0 ___swprintf_l 2 API calls 49044 892bff 49043->49044 49044->48450 49046 895f05 49045->49046 49048 895f0d 49046->49048 49093 89a540 40 API calls 49046->49093 49048->48460 49052 889355 49049->49052 49094 8967e0 49052->49094 49053 890f50 40 API calls _ValidateLocalCookies 49053->48420 49054->48411 49055->48425 49056->48434 49057->48440 49058->48449 49059->48455 49060->48462 49061->48999 49062->48995 49063->48997 49064->49001 49065->49003 49066->49019 49067->49024 49068->49027 49069->49032 49071 8897f0 49070->49071 49072 8897fe 49070->49072 49075 8df345 49071->49075 49082 8cef33 49071->49082 49072->49043 49072->49044 49076 8df383 49075->49076 49081 8df353 _strftime 49075->49081 49090 8d28bb 14 API calls _free 49076->49090 49078 8df36e RtlAllocateHeap 49079 8df381 49078->49079 49078->49081 49079->49072 49081->49076 49081->49078 49089 8db204 EnterCriticalSection LeaveCriticalSection _strftime 49081->49089 49087 8df345 _strftime 49082->49087 49083 8df383 49092 8d28bb 14 API calls _free 49083->49092 49085 8df36e RtlAllocateHeap 49086 8df381 49085->49086 49085->49087 49086->49072 49087->49083 49087->49085 49091 8db204 EnterCriticalSection LeaveCriticalSection _strftime 49087->49091 49089->49081 49090->49079 49091->49087 49092->49086 49093->49048 49095 896bc0 77 API calls 49094->49095 49096 889373 49095->49096 49096->49053 49097->48465 49099 896d60 67 API calls 49098->49099 49100 893858 49099->49100 49100->48474 49101 8bc860 49102 8bc899 49101->49102 49103 8bc8af 49101->49103 49108 8ca551 _ValidateLocalCookies 5 API calls 49102->49108 49104 8bc8cb 49103->49104 49105 8bc8b5 49103->49105 49107 8bc9d3 49104->49107 49142 8bdb30 49104->49142 49106 8ca551 _ValidateLocalCookies 5 API calls 49105->49106 49109 8bc8c7 49106->49109 49111 8a5bf0 13 API calls 49107->49111 49112 8bc8ab 49108->49112 49114 8bc9e6 49111->49114 49113 8bc8e2 49115 8bc927 49113->49115 49173 8bde60 49113->49173 49114->49102 49116 8bc9f3 49114->49116 49118 8bc98b 49115->49118 49119 8bc93e WSASetLastError 49115->49119 49122 8bc9aa 49115->49122 49120 8bca2c 49116->49120 49121 8bca04 49116->49121 49118->49122 49127 8be060 closesocket 49118->49127 49180 885520 46 API calls 4 library calls 49119->49180 49176 8be2d0 SleepEx getsockopt 49120->49176 49121->49115 49131 8be2d0 3 API calls 49121->49131 49133 8ca551 _ValidateLocalCookies 5 API calls 49122->49133 49124 8bc902 49124->49107 49129 8bc90e WSAGetLastError 49124->49129 49126 8bc96d 49130 896d60 67 API calls 49126->49130 49127->49122 49179 8bd3c0 72 API calls _ValidateLocalCookies 49129->49179 49130->49118 49131->49115 49132 8bca49 49135 88e6a0 ___swprintf_l 2 API calls 49132->49135 49136 8bc9cf 49133->49136 49137 8bca55 49135->49137 49138 8bde90 75 API calls 49137->49138 49139 8bca6b 49138->49139 49140 8ca551 _ValidateLocalCookies 5 API calls 49139->49140 49141 8bca8a 49140->49141 49143 88e6a0 ___swprintf_l 2 API calls 49142->49143 49144 8bdb4f 49143->49144 49181 8be0d0 49144->49181 49146 8bdb70 49147 8bdc96 49146->49147 49186 8bdfb0 49146->49186 49148 8bdcac 49147->49148 49150 8be060 closesocket 49147->49150 49148->49113 49150->49148 49151 8bdb86 49151->49147 49152 896d60 67 API calls 49151->49152 49154 8bdbbc 49152->49154 49153 8bdbec 49213 8bd290 49153->49213 49154->49153 49205 8be250 setsockopt 49154->49205 49157 8bdbfc 49160 8bdc16 ___swprintf_l 49157->49160 49224 8be170 70 API calls _ValidateLocalCookies 49157->49224 49158 8bdc65 49225 8bd4b0 143 API calls 5 library calls 49158->49225 49160->49147 49160->49158 49161 8bdcc9 49160->49161 49223 8c66a0 ioctlsocket 49161->49223 49163 8bdcd2 49163->49147 49167 8bdcd9 49163->49167 49165 8bdc85 49165->49161 49166 8bdc8e 49165->49166 49166->49163 49168 8bdc93 49166->49168 49167->49148 49169 8bde90 75 API calls 49167->49169 49168->49147 49170 8bdce9 49169->49170 49171 88e6a0 ___swprintf_l 2 API calls 49170->49171 49172 8bdcf2 49171->49172 49172->49113 49174 8bde6f connect 49173->49174 49175 8bde84 49173->49175 49174->49124 49175->49124 49177 8be30d WSAGetLastError 49176->49177 49178 8bca3e 49176->49178 49177->49178 49178->49115 49178->49132 49179->49115 49180->49126 49182 8be110 socket 49181->49182 49185 8be0e2 ___swprintf_l 49181->49185 49183 8be12a 49182->49183 49182->49185 49184 8be130 socket 49183->49184 49183->49185 49184->49185 49185->49146 49226 897700 41 API calls 2 library calls 49186->49226 49188 8bdfe8 49189 8bdfef 49188->49189 49190 8be044 49188->49190 49227 8d28bb 14 API calls _free 49189->49227 49192 8ca551 _ValidateLocalCookies 5 API calls 49190->49192 49193 8be052 49192->49193 49193->49151 49194 8bdff5 49228 8d28bb 14 API calls _free 49194->49228 49196 8be002 49229 8d28bb 14 API calls _free 49196->49229 49198 8be009 49230 885520 46 API calls 4 library calls 49198->49230 49200 8be01d 49231 896ca0 67 API calls 2 library calls 49200->49231 49202 8be02b 49203 8ca551 _ValidateLocalCookies 5 API calls 49202->49203 49204 8be040 49203->49204 49204->49151 49206 8be28b WSAGetLastError 49205->49206 49207 8be2af 49205->49207 49232 885520 46 API calls 4 library calls 49206->49232 49208 8ca551 _ValidateLocalCookies 5 API calls 49207->49208 49210 8be2bd 49208->49210 49210->49153 49211 8be2a3 49212 896d60 67 API calls 49211->49212 49212->49207 49214 8bd2e2 49213->49214 49215 8bd2b4 49213->49215 49217 8bd327 49214->49217 49218 8bd2e7 getsockopt 49214->49218 49233 8c29b0 14 API calls 2 library calls 49215->49233 49217->49157 49220 8bd30e setsockopt 49218->49220 49221 8bd306 49218->49221 49219 8bd2c1 49219->49218 49222 8bd2c8 49219->49222 49220->49217 49221->49217 49221->49220 49222->49157 49223->49163 49224->49160 49225->49165 49226->49188 49227->49194 49228->49196 49229->49198 49230->49200 49231->49202 49232->49211 49233->49219 49234 88adc4 49235 88ae3a 49234->49235 49236 88adcb ___swprintf_l 49234->49236 49237 88aef1 49235->49237 49239 88ae7b 49235->49239 49249 88ae2e 49235->49249 49236->49235 49241 88ae0c 49236->49241 49238 88af09 49237->49238 49244 88afa4 pre_c_initialization 49237->49244 49263 8a3830 67 API calls 49238->49263 49243 88a4f0 91 API calls 49239->49243 49239->49249 49240 88aa42 pre_c_initialization 49250 88c030 69 API calls 49240->49250 49256 88b736 49240->49256 49257 889380 77 API calls 49240->49257 49260 8929d0 77 API calls 49240->49260 49261 88a860 91 API calls 49240->49261 49266 8a4bf0 72 API calls ___swprintf_l 49240->49266 49262 896ca0 67 API calls 2 library calls 49241->49262 49243->49249 49246 88a4f0 91 API calls 49244->49246 49244->49249 49246->49249 49247 88ae17 pre_c_initialization 49251 88a4f0 91 API calls 49247->49251 49248 88af16 pre_c_initialization 49252 88a4f0 91 API calls 49248->49252 49249->49240 49265 88a860 91 API calls 49249->49265 49250->49240 49251->49249 49254 88af35 49252->49254 49254->49249 49264 8a2c10 69 API calls 49254->49264 49257->49240 49260->49240 49261->49240 49262->49247 49263->49248 49264->49249 49265->49240 49266->49240 49267 8caa62 49268 8caa6e BuildCatchObjectHelperInternal 49267->49268 49293 8ca633 49268->49293 49270 8caa75 49271 8cabc8 49270->49271 49281 8caa9f ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 49270->49281 49321 8cb6d6 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 49271->49321 49273 8cabcf 49322 8db688 23 API calls __CreateFrameInfo 49273->49322 49275 8cabd5 49323 8db64c 23 API calls __CreateFrameInfo 49275->49323 49277 8cabdd 49278 8caabe 49279 8cab3f 49301 8cb7f0 49279->49301 49281->49278 49281->49279 49317 8db662 37 API calls 5 library calls 49281->49317 49282 8cab45 49305 884270 LoadStringW LoadStringW 49282->49305 49287 8cab61 49287->49273 49288 8cab65 49287->49288 49289 8cab6e 49288->49289 49319 8db63d 23 API calls __CreateFrameInfo 49288->49319 49320 8ca7c2 74 API calls 2 library calls 49289->49320 49292 8cab76 49292->49278 49294 8ca63c 49293->49294 49324 8cb52f IsProcessorFeaturePresent 49294->49324 49296 8ca648 49325 8cd2ec 10 API calls 3 library calls 49296->49325 49298 8ca64d 49300 8ca651 49298->49300 49326 8cd315 8 API calls 3 library calls 49298->49326 49300->49270 49327 8cc010 49301->49327 49304 8cb816 49304->49282 49329 884315 6 API calls 49305->49329 49310 8842b8 LoadAcceleratorsW 49312 8842f4 KiUserCallbackDispatcher 49310->49312 49311 884301 49313 8ca551 _ValidateLocalCookies 5 API calls 49311->49313 49312->49311 49314 8842ce TranslateAcceleratorW 49312->49314 49315 884311 49313->49315 49314->49312 49316 8842e0 TranslateMessage DispatchMessageW 49314->49316 49318 8cb826 GetModuleHandleW 49315->49318 49316->49312 49317->49279 49318->49287 49319->49289 49320->49292 49321->49273 49322->49275 49323->49277 49324->49296 49325->49298 49326->49300 49328 8cb803 GetStartupInfoW 49327->49328 49328->49304 49330 8ca551 _ValidateLocalCookies 5 API calls 49329->49330 49331 8842aa 49330->49331 49332 8843b4 KiUserCallbackDispatcher GetSystemMetrics CreateWindowExW 49331->49332 49333 88441a KiUserCallbackDispatcher SetWindowLongW SetLayeredWindowAttributes ShowWindow KiUserCallbackDispatcher 49332->49333 49334 8842b4 49332->49334 49342 881fe5 49333->49342 49334->49310 49334->49311 49336 884455 49352 881789 49336->49352 49343 881ff1 49342->49343 49345 88204c 49343->49345 49372 8ca562 49343->49372 49345->49336 49346 882001 ___scrt_fastfail 49382 881321 49346->49382 49348 882032 49349 8ca562 16 API calls 49348->49349 49350 882039 49349->49350 49386 882ddb 27 API calls 49350->49386 49353 8817c6 49352->49353 49354 881792 49352->49354 49358 881c77 49353->49358 49355 8ca562 16 API calls 49354->49355 49356 88179a 49355->49356 49357 881321 27 API calls 49356->49357 49357->49353 49359 881cb5 49358->49359 49360 881c80 49358->49360 49364 88311e 49359->49364 49361 8ca562 16 API calls 49360->49361 49362 881c88 49361->49362 49363 881321 27 API calls 49362->49363 49363->49359 49365 883127 49364->49365 49371 88318f 49364->49371 49366 8ca562 16 API calls 49365->49366 49367 883130 ___scrt_fastfail 49366->49367 49368 881321 27 API calls 49367->49368 49369 88317b 49368->49369 49370 881321 27 API calls 49369->49370 49370->49371 49371->49334 49374 8ca567 49372->49374 49373 8cef33 ___std_exception_copy 15 API calls 49373->49374 49374->49373 49375 8ca581 49374->49375 49378 8ca583 49374->49378 49387 8db204 EnterCriticalSection LeaveCriticalSection _strftime 49374->49387 49375->49346 49377 8cb511 49389 8cd27f RaiseException 49377->49389 49378->49377 49388 8cd27f RaiseException 49378->49388 49380 8cb52e 49383 881330 BuildCatchObjectHelperInternal 49382->49383 49384 881354 49382->49384 49383->49348 49390 88136a 27 API calls __fassign 49384->49390 49386->49345 49387->49374 49388->49377 49389->49380 49390->49383 49391 88ace7 49404 896710 49391->49404 49393 88ad06 49403 88aa42 pre_c_initialization 49393->49403 49416 88a860 91 API calls 49393->49416 49394 88acf5 pre_c_initialization 49394->49393 49395 88a4f0 91 API calls 49394->49395 49395->49393 49396 88c030 69 API calls 49396->49403 49399 88b736 49400 889380 77 API calls 49400->49403 49402 8929d0 77 API calls 49402->49403 49403->49396 49403->49399 49403->49400 49403->49402 49415 88a860 91 API calls 49403->49415 49417 8a4bf0 72 API calls ___swprintf_l 49403->49417 49405 89672e 49404->49405 49406 896737 49404->49406 49405->49394 49413 896779 49406->49413 49418 8974f0 49406->49418 49407 896751 49407->49413 49424 8968e0 77 API calls 49407->49424 49409 896767 49425 8968c0 77 API calls 49409->49425 49411 896770 49412 88e6a0 ___swprintf_l 2 API calls 49411->49412 49412->49413 49413->49394 49415->49403 49416->49403 49417->49403 49419 897501 49418->49419 49421 89750d 49418->49421 49419->49407 49420 89766d 49420->49407 49421->49420 49426 896ca0 67 API calls 2 library calls 49421->49426 49423 89768f 49423->49407 49424->49409 49425->49411 49426->49423 49427 8dedc2 49428 8dedcd 49427->49428 49429 8deddd 49427->49429 49433 8dede3 49428->49433 49432 8df14f _free 14 API calls 49432->49429 49434 8dedf8 49433->49434 49435 8dedfe 49433->49435 49436 8df14f _free 14 API calls 49434->49436 49437 8df14f _free 14 API calls 49435->49437 49436->49435 49438 8dee0a 49437->49438 49439 8df14f _free 14 API calls 49438->49439 49440 8dee15 49439->49440 49441 8df14f _free 14 API calls 49440->49441 49442 8dee20 49441->49442 49443 8df14f _free 14 API calls 49442->49443 49444 8dee2b 49443->49444 49445 8df14f _free 14 API calls 49444->49445 49446 8dee36 49445->49446 49447 8df14f _free 14 API calls 49446->49447 49448 8dee41 49447->49448 49449 8df14f _free 14 API calls 49448->49449 49450 8dee4c 49449->49450 49451 8df14f _free 14 API calls 49450->49451 49452 8dee57 49451->49452 49453 8df14f _free 14 API calls 49452->49453 49454 8dee65 49453->49454 49459 8dec2b 49454->49459 49456 8dee8b 49467 8dec8c 49456->49467 49458 8dedd5 49458->49432 49460 8dec37 BuildCatchObjectHelperInternal 49459->49460 49475 8e2190 EnterCriticalSection 49460->49475 49463 8dec41 49465 8df14f _free 14 API calls 49463->49465 49466 8dec6b 49463->49466 49464 8dec78 __wsopen_s 49464->49456 49465->49466 49476 8dec80 49466->49476 49468 8dec98 BuildCatchObjectHelperInternal 49467->49468 49480 8e2190 EnterCriticalSection 49468->49480 49470 8deca2 49481 8deeb2 49470->49481 49472 8decb5 49485 8deccb 49472->49485 49474 8decc3 __wsopen_s 49474->49458 49475->49463 49479 8e21d8 LeaveCriticalSection 49476->49479 49478 8dec8a 49478->49464 49479->49478 49480->49470 49482 8deec1 __cftoe 49481->49482 49484 8deee8 __cftoe 49481->49484 49482->49484 49488 8e5c1d 14 API calls 3 library calls 49482->49488 49484->49472 49489 8e21d8 LeaveCriticalSection 49485->49489 49487 8decd5 49487->49474 49488->49484 49489->49487 49490 88b291 49491 88b2b2 49490->49491 49492 88b38e 49491->49492 49498 88b538 49491->49498 49525 8a34c0 49492->49525 49494 88b39f 49497 88b3b1 49494->49497 49585 8a3830 67 API calls 49494->49585 49496 88b57a 49590 8893c0 69 API calls 2 library calls 49496->49590 49500 88b422 49497->49500 49504 88b3b6 pre_c_initialization 49497->49504 49505 88b40a pre_c_initialization 49497->49505 49498->49496 49499 88b56b 49498->49499 49589 8893c0 69 API calls 2 library calls 49499->49589 49503 88b519 49500->49503 49500->49505 49517 88b3e4 49503->49517 49588 8893c0 69 API calls 2 library calls 49503->49588 49507 88a4f0 91 API calls 49504->49507 49508 88b4b3 49505->49508 49509 88b445 49505->49509 49507->49517 49510 88a4f0 91 API calls 49508->49510 49509->49517 49586 8a2c10 69 API calls 49509->49586 49511 88b4e4 49510->49511 49587 8a2c10 69 API calls 49511->49587 49516 88b46e 49516->49517 49521 88a4f0 91 API calls 49516->49521 49524 88aa42 pre_c_initialization 49517->49524 49591 88a860 91 API calls 49517->49591 49518 88b736 49519 889380 77 API calls 49519->49524 49520 88c030 69 API calls 49520->49524 49521->49517 49523 8929d0 77 API calls 49523->49524 49524->49518 49524->49519 49524->49520 49524->49523 49584 88a860 91 API calls 49524->49584 49592 8a4bf0 72 API calls ___swprintf_l 49524->49592 49526 8a3510 49525->49526 49527 8a3546 49526->49527 49528 8a5bf0 13 API calls 49526->49528 49529 8a3553 49527->49529 49530 8a3575 49527->49530 49528->49527 49617 896ca0 67 API calls 2 library calls 49529->49617 49538 8a3592 49530->49538 49593 8a3be0 49530->49593 49532 8a355e 49533 8ca551 _ValidateLocalCookies 5 API calls 49532->49533 49537 8a3571 49533->49537 49536 88e6a0 ___swprintf_l 2 API calls 49554 8a35d2 49536->49554 49537->49494 49539 8a35be 49538->49539 49540 8a3804 49538->49540 49618 8a4240 83 API calls 3 library calls 49538->49618 49539->49536 49539->49540 49543 8ca551 _ValidateLocalCookies 5 API calls 49540->49543 49541 8a3647 49541->49540 49620 8a4bf0 72 API calls ___swprintf_l 49541->49620 49542 8a363e 49619 896860 77 API calls 49542->49619 49545 8a3822 49543->49545 49545->49494 49547 8a3658 49548 8a37ee 49547->49548 49621 8a5e00 69 API calls 49547->49621 49550 8ca551 _ValidateLocalCookies 5 API calls 49548->49550 49552 8a3800 49550->49552 49551 8a3675 49551->49540 49553 8a3689 49551->49553 49561 8a374d 49551->49561 49552->49494 49622 897b00 49553->49622 49554->49541 49554->49542 49556 896d60 67 API calls 49554->49556 49556->49542 49557 8a37e1 49640 8a4bf0 72 API calls ___swprintf_l 49557->49640 49558 8a3694 49558->49540 49564 8a36a9 49558->49564 49559 8a37ae 49559->49557 49563 8a37bd 49559->49563 49561->49557 49561->49559 49565 8a3783 49561->49565 49562 8a37e7 49562->49540 49562->49548 49639 896ca0 67 API calls 2 library calls 49563->49639 49567 8a3709 49564->49567 49568 8a36c2 49564->49568 49638 896ca0 67 API calls 2 library calls 49565->49638 49637 896ca0 67 API calls 2 library calls 49567->49637 49636 896ca0 67 API calls 2 library calls 49568->49636 49570 8a37c8 49573 8ca551 _ValidateLocalCookies 5 API calls 49570->49573 49571 8a3795 49572 8ca551 _ValidateLocalCookies 5 API calls 49571->49572 49574 8a37aa 49572->49574 49576 8a37dd 49573->49576 49574->49494 49576->49494 49578 8a3734 49580 8ca551 _ValidateLocalCookies 5 API calls 49578->49580 49579 8a36f0 49581 8ca551 _ValidateLocalCookies 5 API calls 49579->49581 49583 8a3749 49580->49583 49582 8a3705 49581->49582 49582->49494 49583->49494 49584->49524 49585->49497 49586->49516 49587->49517 49588->49517 49589->49517 49590->49517 49591->49524 49592->49524 49614 8a3c20 ___swprintf_l 49593->49614 49596 88e6a0 ___swprintf_l 2 API calls 49596->49614 49598 8a416a 49598->49538 49599 896d60 67 API calls 49599->49598 49600 8a40f4 49600->49598 49600->49599 49601 8a4103 49601->49600 49605 896d60 67 API calls 49601->49605 49603 896c10 65 API calls ___swprintf_l 49603->49614 49605->49600 49606 8a4128 49607 8a412d 49606->49607 49608 8a4147 49606->49608 49649 896ca0 67 API calls 2 library calls 49607->49649 49650 896ca0 67 API calls 2 library calls 49608->49650 49610 8a4138 49610->49538 49612 896d60 67 API calls 49612->49614 49613 8a4159 49613->49538 49614->49596 49614->49598 49614->49600 49614->49601 49614->49603 49614->49606 49614->49612 49616 896de0 77 API calls 49614->49616 49641 896df0 49614->49641 49644 8a4a70 7 API calls 2 library calls 49614->49644 49645 8a0e10 77 API calls ___swprintf_l 49614->49645 49646 89fdb0 67 API calls 49614->49646 49647 8c2c70 77 API calls ___swprintf_l 49614->49647 49648 8a9b10 77 API calls 49614->49648 49616->49614 49617->49532 49618->49539 49619->49541 49620->49547 49621->49551 49623 897b3b 49622->49623 49624 897b84 49623->49624 49626 897b99 49623->49626 49625 8ca551 _ValidateLocalCookies 5 API calls 49624->49625 49627 897b95 49625->49627 49628 88e6a0 ___swprintf_l 2 API calls 49626->49628 49629 897ba6 49626->49629 49627->49558 49628->49629 49630 897c6c 49629->49630 49631 897c56 49629->49631 49633 8ca551 _ValidateLocalCookies 5 API calls 49630->49633 49632 8ca551 _ValidateLocalCookies 5 API calls 49631->49632 49634 897c68 49632->49634 49635 897c7b 49633->49635 49634->49558 49635->49558 49636->49579 49637->49578 49638->49571 49639->49570 49640->49562 49651 8bcc10 recv 49641->49651 49644->49614 49645->49614 49646->49614 49647->49614 49648->49614 49649->49610 49650->49613 49652 8bcc7f WSAGetLastError 49651->49652 49653 8bccd1 49651->49653 49654 8bcc97 49652->49654 49661 8bcc8f 49652->49661 49659 88e6a0 ___swprintf_l 2 API calls 49653->49659 49653->49661 49662 885520 46 API calls 4 library calls 49654->49662 49655 8ca551 _ValidateLocalCookies 5 API calls 49657 896e3b 49655->49657 49657->49614 49658 8bcca9 49663 896ca0 67 API calls 2 library calls 49658->49663 49659->49661 49661->49655 49662->49658 49663->49661 49664 8958f0 49665 89594a 49664->49665 49673 895901 ___swprintf_l 49664->49673 49700 895bb0 67 API calls 49665->49700 49666 895924 49668 89593f 49666->49668 49669 895934 49666->49669 49685 895970 49668->49685 49676 895ab0 49669->49676 49670 89595b 49673->49665 49673->49666 49674 895939 49675 895944 49677 897b00 7 API calls 49676->49677 49678 895acd 49677->49678 49679 895afe 49678->49679 49701 89d3d0 49678->49701 49679->49674 49681 895b2f 49681->49674 49682 895b21 49682->49681 49706 896ca0 67 API calls 2 library calls 49682->49706 49684 895b70 49684->49674 49686 897b00 7 API calls 49685->49686 49687 89598d 49686->49687 49688 8959de 49687->49688 49689 89d3d0 133 API calls 49687->49689 49688->49675 49690 895a01 49689->49690 49691 895a0f 49690->49691 49692 895a79 49690->49692 49693 895a23 49690->49693 49691->49675 49692->49691 49782 896ca0 67 API calls 2 library calls 49692->49782 49694 88e6a0 ___swprintf_l 2 API calls 49693->49694 49697 895a2c 49694->49697 49696 895a9a 49696->49675 49781 896ca0 67 API calls 2 library calls 49697->49781 49699 895a6a 49699->49675 49700->49670 49702 89d3e2 49701->49702 49704 89d3ea 49702->49704 49707 89d110 49702->49707 49704->49682 49705 89d402 49705->49682 49706->49684 49708 89d155 49707->49708 49742 89d680 49708->49742 49710 89d16a 49711 896d60 67 API calls 49710->49711 49712 89d180 ___swprintf_l 49710->49712 49711->49712 49722 89d2f7 49712->49722 49741 89d30b 49712->49741 49757 8c3060 49712->49757 49713 8ca551 _ValidateLocalCookies 5 API calls 49715 89d32e 49713->49715 49715->49705 49716 89d1fd 49717 89d211 49716->49717 49771 8a71e0 htons 49716->49771 49719 8c3060 19 API calls 49717->49719 49723 89d332 49717->49723 49721 89d22a 49719->49721 49720 89d240 49720->49723 49725 89cb40 2 API calls 49720->49725 49729 89d25f 49720->49729 49721->49720 49772 8a71e0 htons 49721->49772 49727 8ca551 _ValidateLocalCookies 5 API calls 49722->49727 49776 89c890 71 API calls _ValidateLocalCookies 49723->49776 49725->49729 49728 89d307 49727->49728 49728->49705 49729->49722 49730 89d2cf 49729->49730 49732 89d28e 49729->49732 49774 89d830 21 API calls 49730->49774 49734 89d2ae 49732->49734 49736 89d29b 49732->49736 49733 89d2e1 49733->49741 49775 89d380 128 API calls 2 library calls 49733->49775 49766 8c3040 49734->49766 49773 8c3340 129 API calls 49736->49773 49737 89d2a9 49737->49722 49737->49723 49737->49733 49740 89d2f0 49740->49722 49740->49741 49741->49713 49777 89d620 40 API calls ___swprintf_l 49742->49777 49744 89d6b1 49745 89d7e8 49744->49745 49751 89d70a 49744->49751 49778 89d620 40 API calls ___swprintf_l 49744->49778 49747 8ca551 _ValidateLocalCookies 5 API calls 49745->49747 49746 8d2365 26 API calls 49749 89d754 49746->49749 49750 89d7f7 49747->49750 49749->49745 49752 89d774 49749->49752 49750->49710 49751->49745 49751->49746 49751->49749 49753 896d60 67 API calls 49752->49753 49754 89d77f 49753->49754 49755 8ca551 _ValidateLocalCookies 5 API calls 49754->49755 49756 89d7a1 49755->49756 49756->49710 49758 8c306b 49757->49758 49759 8c3090 49757->49759 49760 8c3080 49758->49760 49761 8c3070 49758->49761 49759->49716 49780 8c3160 5 API calls 2 library calls 49760->49780 49779 8d28bb 14 API calls _free 49761->49779 49764 8c3075 49764->49716 49765 8c308b 49765->49716 49767 8c305c 49766->49767 49768 8c304f 49766->49768 49767->49737 49769 89cb40 2 API calls 49768->49769 49770 8c3057 49769->49770 49770->49737 49771->49717 49772->49720 49773->49737 49774->49737 49775->49740 49776->49741 49777->49744 49778->49751 49779->49764 49780->49765 49781->49699 49782->49696 49783 897270 49784 897293 49783->49784 49785 897286 49783->49785 49788 8972a6 49784->49788 49822 898510 69 API calls ___swprintf_l 49784->49822 49786 8972ab 49788->49786 49797 8981c0 49788->49797 49790 8972df 49790->49786 49791 896520 77 API calls 49790->49791 49792 897329 49791->49792 49793 897347 49792->49793 49823 8a4a70 7 API calls 2 library calls 49792->49823 49824 893240 67 API calls 49793->49824 49796 897354 49806 8981f6 49797->49806 49798 88e6a0 ___swprintf_l 2 API calls 49798->49806 49800 8984f8 49801 8ca551 _ValidateLocalCookies 5 API calls 49800->49801 49804 89850a 49801->49804 49802 8983cc 49805 8983d0 49802->49805 49814 8983e9 49802->49814 49803 897b00 7 API calls 49803->49806 49804->49790 49809 8ca551 _ValidateLocalCookies 5 API calls 49805->49809 49806->49798 49806->49800 49806->49802 49806->49803 49807 898282 WSASetLastError 49806->49807 49808 8984b2 49806->49808 49825 897cf0 49806->49825 49829 897f40 69 API calls 49806->49829 49830 897ea0 69 API calls 2 library calls 49806->49830 49807->49806 49832 896ca0 67 API calls 2 library calls 49808->49832 49810 8983e5 49809->49810 49810->49790 49813 8984df 49815 8ca551 _ValidateLocalCookies 5 API calls 49813->49815 49831 896ca0 67 API calls 2 library calls 49814->49831 49816 8984f4 49815->49816 49816->49790 49819 89848a 49820 8ca551 _ValidateLocalCookies 5 API calls 49819->49820 49821 8984ae 49820->49821 49821->49790 49822->49788 49823->49793 49824->49796 49826 897d0a 49825->49826 49827 897d2e 49825->49827 49826->49827 49828 896d60 67 API calls 49826->49828 49827->49806 49828->49827 49829->49806 49830->49806 49831->49819 49832->49813 49833 88b591 49834 88b59b 49833->49834 49838 88b5b9 49833->49838 49835 88b5ad 49834->49835 49836 88c030 69 API calls 49834->49836 49837 88a4f0 91 API calls 49835->49837 49836->49835 49837->49838 49846 88aa42 pre_c_initialization 49838->49846 49848 88a860 91 API calls 49838->49848 49841 88b736 49842 889380 77 API calls 49842->49846 49843 88c030 69 API calls 49843->49846 49845 8929d0 77 API calls 49845->49846 49846->49841 49846->49842 49846->49843 49846->49845 49847 88a860 91 API calls 49846->49847 49849 8a4bf0 72 API calls ___swprintf_l 49846->49849 49847->49846 49848->49846 49849->49846 49850 89df30 49851 89df5e 49850->49851 49890 8a06d0 49851->49890 49853 89dfc3 49857 89e09e 49853->49857 49900 8a0bb0 49853->49900 49854 89df71 49854->49853 49889 89e36f ___swprintf_l 49854->49889 50061 89a540 40 API calls 49854->50061 49858 89e042 49858->49857 49863 89e091 49858->49863 50063 89a540 40 API calls 49858->50063 49859 89dfe2 49859->49858 49859->49889 50062 89a540 40 API calls 49859->50062 49863->49857 49907 89f140 49863->49907 49864 89e0cf 49864->49889 49914 8a1700 49864->49914 49866 89e0fe 49866->49889 49927 8a0ce0 49866->49927 49868 89e110 ___swprintf_l 49868->49889 49940 88f050 49868->49940 49872 89e168 49875 89e1a4 49872->49875 49872->49889 50064 89a540 40 API calls 49872->50064 49874 89e1ae ___swprintf_l 49875->49874 49876 88f050 40 API calls 49875->49876 49878 89e30c 49876->49878 49878->49889 49953 89fb20 49878->49953 49879 89e390 49879->49889 49963 89e990 49879->49963 49881 89e3a7 49881->49889 49985 89e690 49881->49985 49883 89e3bf 49883->49889 49989 89f330 49883->49989 49885 89e3f7 49885->49889 50065 8a4bf0 72 API calls ___swprintf_l 49885->50065 49887 89e45b 49888 896d60 67 API calls 49887->49888 49887->49889 49888->49889 49891 8a06e5 49890->49891 49892 8a0845 49891->49892 49897 8a0778 ___from_strstr_to_strchr BuildCatchObjectHelperInternal 49891->49897 49898 8a082c 49891->49898 49893 8a086e 49892->49893 49894 8a089d 49892->49894 50067 89a540 40 API calls 49893->50067 50068 89a540 40 API calls 49894->50068 49897->49898 50066 89a540 40 API calls 49897->50066 49898->49854 49902 8a0bd9 49900->49902 49901 8a0bf4 49901->49859 49902->49901 49904 8a0c47 49902->49904 50069 8a22e0 84 API calls 49902->50069 49906 8a0c69 49904->49906 50070 8a22e0 84 API calls 49904->50070 49906->49859 49908 89f165 49907->49908 49911 89f24a 49908->49911 49912 89f202 49908->49912 50071 88f8e0 40 API calls 49908->50071 49911->49864 49912->49911 50072 896ca0 67 API calls 2 library calls 49912->50072 49913 89f30d 49913->49864 49920 8a1711 ___swprintf_l 49914->49920 49915 8a1735 49915->49866 49916 8a17b2 50073 896ca0 67 API calls 2 library calls 49916->50073 49918 8a17bd 49918->49866 49919 8a17cc 49921 8a18a4 49919->49921 49924 8a1842 49919->49924 49920->49915 49920->49916 49920->49919 49920->49924 50075 896ca0 67 API calls 2 library calls 49921->50075 49923 8a18b1 49923->49866 49924->49915 50074 896ca0 67 API calls 2 library calls 49924->50074 49926 8a1895 49926->49866 49928 8a0cf1 49927->49928 49939 8a0d2d 49927->49939 49929 8a0d11 49928->49929 49931 8a0d3c 49928->49931 50076 89a540 40 API calls 49929->50076 49932 8a0da2 49931->49932 49933 8a0d89 49931->49933 49931->49939 49934 8a0dbb 49932->49934 49935 8a0dd9 49932->49935 50077 89a540 40 API calls 49933->50077 50078 89a540 40 API calls 49934->50078 50079 89a540 40 API calls 49935->50079 49939->49868 50080 88f1b0 49940->50080 49943 8a1ab0 49944 8a1ae9 49943->49944 49945 8a1c76 49943->49945 49944->49945 49948 8a1af6 49944->49948 49946 8a1c61 49945->49946 49947 88f050 40 API calls 49945->49947 49946->49872 49947->49946 49948->49946 50087 8b9420 40 API calls 2 library calls 49948->50087 49950 8a1b94 _strstr 49950->49946 49951 88f050 40 API calls 49950->49951 49952 8a1c55 49951->49952 49952->49872 49957 89fb41 49953->49957 49954 89fd7b ___swprintf_l 49954->49879 49955 88f050 40 API calls 49955->49954 49957->49954 49958 89fd05 ___swprintf_l 49957->49958 50088 88d7f0 68 API calls 49957->50088 49958->49954 49958->49955 49959 89fc49 ___swprintf_l 49959->49958 49960 89fd07 49959->49960 49961 88f050 40 API calls 49959->49961 49962 896d60 67 API calls 49960->49962 49961->49959 49962->49958 49964 89eab5 49963->49964 49965 89e9b6 49963->49965 49966 8ca551 _ValidateLocalCookies 5 API calls 49964->49966 50089 8a63c0 26 API calls 49965->50089 49968 89eac4 49966->49968 49968->49881 49969 89e9cb 49970 89e9f5 49969->49970 49971 89e9d4 49969->49971 49975 89ea0b 49970->49975 49978 89ea21 49970->49978 50090 896ca0 67 API calls 2 library calls 49971->50090 49973 89e9df 49974 8ca551 _ValidateLocalCookies 5 API calls 49973->49974 49976 89e9f1 49974->49976 49977 8ca551 _ValidateLocalCookies 5 API calls 49975->49977 49976->49881 49979 89ea1d 49977->49979 49978->49964 49980 89ea52 49978->49980 49979->49881 49981 89a580 ___swprintf_l 40 API calls 49980->49981 49982 89ea97 49981->49982 49983 8ca551 _ValidateLocalCookies 5 API calls 49982->49983 49984 89eab1 49983->49984 49984->49881 49987 89e6ad ___from_strstr_to_strchr 49985->49987 49986 89e95c ___swprintf_l 49986->49883 49987->49986 49988 88f050 40 API calls 49987->49988 49988->49987 49990 89f364 49989->49990 49993 89fa03 ___swprintf_l 49989->49993 49991 89f481 49990->49991 50003 89f65f 49990->50003 50005 89f36b 49990->50005 49996 89f4ea 49991->49996 49998 89f48d ___swprintf_l 49991->49998 49992 89fa68 49994 8ca551 _ValidateLocalCookies 5 API calls 49992->49994 49993->49992 50091 89ead0 49993->50091 49997 89fa7a 49994->49997 50009 89f535 49996->50009 50013 88f050 40 API calls 49996->50013 49997->49885 49998->49992 50000 89ead0 74 API calls 49998->50000 49999 89fa2e 50001 89fa37 49999->50001 50024 89f468 49999->50024 50006 89f4bc 50000->50006 50104 896ca0 67 API calls 2 library calls 50001->50104 50002 88f050 40 API calls 50002->50009 50004 88f050 40 API calls 50003->50004 50022 89f6c8 ___swprintf_l 50003->50022 50004->50022 50008 88f050 40 API calls 50005->50008 50018 89f3d7 ___swprintf_l 50005->50018 50010 89f4c9 50006->50010 50006->50024 50008->50018 50009->49992 50009->50002 50028 89f575 ___swprintf_l 50009->50028 50101 896ca0 67 API calls 2 library calls 50010->50101 50011 89fa42 50015 8ca551 _ValidateLocalCookies 5 API calls 50011->50015 50013->50009 50017 89fa54 50015->50017 50016 89f4d4 50019 8ca551 _ValidateLocalCookies 5 API calls 50016->50019 50017->49885 50018->49992 50020 89ead0 74 API calls 50018->50020 50021 89f4e6 50019->50021 50023 89f43e 50020->50023 50021->49885 50022->49992 50033 89f76f 50022->50033 50038 89f91d ___swprintf_l 50022->50038 50023->50024 50025 89f447 50023->50025 50105 8a3980 69 API calls ___swprintf_l 50024->50105 50100 896ca0 67 API calls 2 library calls 50025->50100 50027 89f452 50029 8ca551 _ValidateLocalCookies 5 API calls 50027->50029 50028->49992 50030 89ead0 74 API calls 50028->50030 50031 89f464 50029->50031 50032 89f631 50030->50032 50031->49885 50032->50024 50035 89f63e 50032->50035 50034 89f8c5 ___swprintf_l 50033->50034 50040 89f7a5 ___swprintf_l 50033->50040 50037 89f90c 50034->50037 50042 89f8ae 50034->50042 50102 896ca0 67 API calls 2 library calls 50035->50102 50041 8ca551 _ValidateLocalCookies 5 API calls 50037->50041 50038->49992 50038->50042 50046 89f95d 50038->50046 50039 89f649 50043 8ca551 _ValidateLocalCookies 5 API calls 50039->50043 50040->49992 50052 89a580 ___swprintf_l 40 API calls 50040->50052 50054 89f7c5 ___swprintf_l 50040->50054 50045 89f919 50041->50045 50044 89ead0 74 API calls 50042->50044 50047 89f65b 50043->50047 50048 89f9cc 50044->50048 50045->49885 50049 8ca551 _ValidateLocalCookies 5 API calls 50046->50049 50047->49885 50048->50024 50050 89f9d5 50048->50050 50053 89f96a 50049->50053 50103 896ca0 67 API calls 2 library calls 50050->50103 50052->50054 50053->49885 50054->50042 50057 89f89b 50054->50057 50055 89f9e0 50056 8ca551 _ValidateLocalCookies 5 API calls 50055->50056 50058 89f9f2 50056->50058 50059 8ca551 _ValidateLocalCookies 5 API calls 50057->50059 50058->49885 50060 89f8aa 50059->50060 50060->49885 50061->49853 50062->49858 50063->49863 50064->49875 50065->49887 50066->49898 50067->49898 50068->49898 50069->49904 50070->49906 50071->49912 50072->49913 50073->49918 50074->49926 50075->49923 50076->49939 50077->49939 50078->49939 50079->49939 50083 89a480 50080->50083 50082 88f062 50082->49889 50082->49943 50086 89ae50 40 API calls 3 library calls 50083->50086 50085 89a4a4 ___swprintf_l 50085->50082 50086->50085 50087->49950 50088->49959 50089->49969 50090->49973 50092 89eaeb ___swprintf_l __fassign 50091->50092 50095 89eb68 ___swprintf_l 50092->50095 50106 896e60 50092->50106 50095->49999 50097 89ec09 50099 89ec20 ___swprintf_l 50097->50099 50111 896c10 65 API calls ___swprintf_l 50097->50111 50099->49999 50100->50027 50101->50016 50102->50039 50103->50055 50104->50011 50105->49992 50107 896e79 50106->50107 50112 8bcb20 send 50107->50112 50110 896c10 65 API calls ___swprintf_l 50110->50097 50111->50099 50113 8bcb9f 50112->50113 50114 8bcb8f WSAGetLastError 50112->50114 50116 8ca551 _ValidateLocalCookies 5 API calls 50113->50116 50114->50113 50115 8bcba7 50114->50115 50121 885520 46 API calls 4 library calls 50115->50121 50118 896ea0 50116->50118 50118->50099 50118->50110 50119 8bcbb9 50122 896ca0 67 API calls 2 library calls 50119->50122 50121->50119 50122->50113 50123 8df891 50128 8de245 50123->50128 50126 8df8d0 50129 8de264 50128->50129 50130 8de277 50129->50130 50132 8de28c ___swprintf_l 50129->50132 50148 8d28bb 14 API calls _free 50130->50148 50135 8de3af 50132->50135 50150 8e6943 42 API calls 2 library calls 50132->50150 50133 8de27c 50149 8ceb9c 25 API calls __cftoe 50133->50149 50137 8de287 50135->50137 50153 8d28bb 14 API calls _free 50135->50153 50137->50126 50145 8d9b36 50137->50145 50138 8de460 50154 8ceb9c 25 API calls __cftoe 50138->50154 50141 8de3ff 50141->50135 50151 8e6943 42 API calls 2 library calls 50141->50151 50143 8de41d 50143->50135 50152 8e6943 42 API calls 2 library calls 50143->50152 50155 8d938d 50145->50155 50147 8d9b51 50147->50126 50148->50133 50149->50137 50150->50141 50151->50143 50152->50135 50153->50138 50154->50137 50157 8d9399 BuildCatchObjectHelperInternal 50155->50157 50156 8d93a0 50175 8d28bb 14 API calls _free 50156->50175 50157->50156 50159 8d93cb 50157->50159 50166 8d9ac6 50159->50166 50160 8d93a5 50176 8ceb9c 25 API calls __cftoe 50160->50176 50165 8d93af __wsopen_s 50165->50147 50178 8d94fb 50166->50178 50171 8d9afc 50173 8df14f _free 14 API calls 50171->50173 50174 8d93ef 50171->50174 50173->50174 50177 8d9418 LeaveCriticalSection __wsopen_s 50174->50177 50175->50160 50176->50165 50177->50165 50233 8cfe4d 50178->50233 50181 8d951f 50183 8d92c4 50181->50183 50244 8d9212 50183->50244 50186 8d9b6e 50269 8d989e 50186->50269 50189 8d9bb9 50287 8e2526 50189->50287 50190 8d9ba0 50301 8d28a8 14 API calls _free 50190->50301 50193 8d9bbe 50195 8d9bde 50193->50195 50196 8d9bc7 50193->50196 50194 8d9ba5 50302 8d28bb 14 API calls _free 50194->50302 50300 8d9809 CreateFileW 50195->50300 50303 8d28a8 14 API calls _free 50196->50303 50200 8d9bcc 50304 8d28bb 14 API calls _free 50200->50304 50202 8d9c94 GetFileType 50203 8d9c9f GetLastError 50202->50203 50204 8d9ce6 50202->50204 50307 8d2885 14 API calls 2 library calls 50203->50307 50309 8e246f 15 API calls 3 library calls 50204->50309 50205 8d9c69 GetLastError 50306 8d2885 14 API calls 2 library calls 50205->50306 50208 8d9c17 50208->50202 50208->50205 50305 8d9809 CreateFileW 50208->50305 50209 8d9cad CloseHandle 50209->50194 50213 8d9cd6 50209->50213 50212 8d9c5c 50212->50202 50212->50205 50308 8d28bb 14 API calls _free 50213->50308 50214 8d9d07 50216 8d9d53 50214->50216 50310 8d9a1a 71 API calls 4 library calls 50214->50310 50221 8d9d5a 50216->50221 50311 8d95b4 71 API calls 3 library calls 50216->50311 50217 8d9cdb 50217->50194 50220 8d9d88 50220->50221 50222 8d9d96 50220->50222 50224 8dea02 __wsopen_s 28 API calls 50221->50224 50223 8d9bb2 50222->50223 50225 8d9e12 CloseHandle 50222->50225 50223->50171 50224->50223 50312 8d9809 CreateFileW 50225->50312 50227 8d9e3d 50228 8d9e73 50227->50228 50229 8d9e47 GetLastError 50227->50229 50228->50223 50313 8d2885 14 API calls 2 library calls 50229->50313 50231 8d9e53 50314 8e262f 15 API calls 3 library calls 50231->50314 50234 8cfe6d 50233->50234 50240 8cfe64 50233->50240 50235 8deefd pre_c_initialization 37 API calls 50234->50235 50234->50240 50236 8cfe8d 50235->50236 50242 8e01da 37 API calls __cftoe 50236->50242 50238 8cfea3 50243 8e0207 37 API calls __cftoe 50238->50243 50240->50181 50241 8e1093 5 API calls __wsopen_s 50240->50241 50241->50181 50242->50238 50243->50240 50245 8d923a 50244->50245 50246 8d9220 50244->50246 50247 8d9241 50245->50247 50248 8d9260 50245->50248 50262 8d953c 14 API calls _free 50246->50262 50261 8d922a 50247->50261 50263 8d9556 15 API calls _strftime 50247->50263 50264 8e15c6 MultiByteToWideChar 50248->50264 50252 8d926f 50253 8d9276 GetLastError 50252->50253 50258 8d929c 50252->50258 50267 8d9556 15 API calls _strftime 50252->50267 50265 8d2885 14 API calls 2 library calls 50253->50265 50257 8d9282 50266 8d28bb 14 API calls _free 50257->50266 50258->50261 50268 8e15c6 MultiByteToWideChar 50258->50268 50259 8d92b3 50259->50253 50259->50261 50261->50171 50261->50186 50262->50261 50263->50261 50264->50252 50265->50257 50266->50261 50267->50258 50268->50259 50270 8d98bf 50269->50270 50271 8d98d9 50269->50271 50270->50271 50322 8d28bb 14 API calls _free 50270->50322 50315 8d982e 50271->50315 50274 8d98ce 50323 8ceb9c 25 API calls __cftoe 50274->50323 50276 8d9911 50277 8d9940 50276->50277 50324 8d28bb 14 API calls _free 50276->50324 50280 8d9993 50277->50280 50326 8dc390 25 API calls 2 library calls 50277->50326 50280->50189 50280->50190 50281 8d998e 50281->50280 50283 8d9a0d 50281->50283 50282 8d9935 50325 8ceb9c 25 API calls __cftoe 50282->50325 50327 8cebc9 11 API calls __CreateFrameInfo 50283->50327 50286 8d9a19 50288 8e2532 BuildCatchObjectHelperInternal 50287->50288 50330 8e2190 EnterCriticalSection 50288->50330 50290 8e2580 50331 8e2626 50290->50331 50291 8e255e 50334 8e2306 15 API calls 3 library calls 50291->50334 50292 8e2539 50292->50290 50292->50291 50297 8e25c3 EnterCriticalSection 50292->50297 50295 8e25a0 __wsopen_s 50295->50193 50296 8e2563 50296->50290 50335 8e244c EnterCriticalSection 50296->50335 50297->50290 50298 8e25d0 LeaveCriticalSection 50297->50298 50298->50292 50300->50208 50301->50194 50302->50223 50303->50200 50304->50194 50305->50212 50306->50194 50307->50209 50308->50217 50309->50214 50310->50216 50311->50220 50312->50227 50313->50231 50314->50228 50317 8d9846 50315->50317 50316 8d9861 50316->50276 50317->50316 50328 8d28bb 14 API calls _free 50317->50328 50319 8d9885 50329 8ceb9c 25 API calls __cftoe 50319->50329 50321 8d9890 50321->50276 50322->50274 50323->50271 50324->50282 50325->50277 50326->50281 50327->50286 50328->50319 50329->50321 50330->50292 50336 8e21d8 LeaveCriticalSection 50331->50336 50333 8e262d 50333->50295 50334->50296 50335->50290 50336->50333 50337 884474 50338 884483 __EH_prolog3_GS 50337->50338 50339 884498 50338->50339 50340 88465c SetTimer 50338->50340 50341 8844a1 50339->50341 50342 884652 PostQuitMessage 50339->50342 50343 88311e 27 API calls 50340->50343 50344 884519 BeginPaint 50341->50344 50345 8844a6 50341->50345 50346 884678 50342->50346 50347 884671 50343->50347 50350 884543 ___scrt_fastfail 50344->50350 50348 8844ad 50345->50348 50349 8844e4 50345->50349 50494 8eb238 50346->50494 50385 883c77 50347->50385 50352 8844be InvalidateRect InvalidateRect KiUserCallbackDispatcher 50348->50352 50353 8844b3 DefWindowProcW 50348->50353 50349->50346 50349->50353 50356 88450d DestroyWindow 50349->50356 50357 88311e 27 API calls 50350->50357 50352->50346 50353->50346 50356->50346 50359 88454b 50357->50359 50368 88125b 50359->50368 50369 881275 50368->50369 50369->50369 50370 881321 27 API calls 50369->50370 50371 881289 50370->50371 50372 881070 50371->50372 50373 8810bb 50372->50373 50374 88107f 50372->50374 50377 8810c0 50373->50377 50375 8ca562 16 API calls 50374->50375 50376 881086 GetUserDefaultUILanguage 50375->50376 50376->50373 50380 8810d7 _memcmp 50377->50380 50497 8812fe 50380->50497 50381 884682 50382 88469c ___scrt_initialize_default_local_stdio_options 50381->50382 50502 8d2295 50382->50502 50386 883c83 __EH_prolog3_GS 50385->50386 50536 8852e0 AcquireSRWLockExclusive 50386->50536 50388 883c8c 50539 884dff 50388->50539 50495 8ca551 _ValidateLocalCookies 5 API calls 50494->50495 50496 88467f 50495->50496 50498 881309 50497->50498 50499 88113a 50497->50499 50501 881422 25 API calls 50498->50501 50499->50381 50501->50499 50505 8cf4b5 50502->50505 50506 8cf4c1 50505->50506 50509 8cf4d9 50505->50509 50527 8d28bb 14 API calls _free 50506->50527 50508 8cf4c6 50528 8ceb9c 25 API calls __cftoe 50508->50528 50512 884587 11 API calls 50509->50512 50529 8d28bb 14 API calls _free 50509->50529 50512->50346 50513 8cf50f 50514 8cf515 50513->50514 50515 8cf56f 50513->50515 50516 8cf52f 50513->50516 50532 8ceb9c 25 API calls __cftoe 50514->50532 50533 8cf5a6 45 API calls 3 library calls 50515->50533 50530 8cf5a6 45 API calls 3 library calls 50516->50530 50520 8cf53f 50521 8cf547 50520->50521 50522 8cf590 50520->50522 50521->50512 50531 8d28bb 14 API calls _free 50521->50531 50534 8d28bb 14 API calls _free 50522->50534 50524 8cf595 50524->50512 50535 8d28bb 14 API calls _free 50524->50535 50527->50508 50528->50512 50529->50513 50530->50520 50531->50514 50532->50512 50533->50520 50534->50524 50535->50512 50757 885480 50536->50757 50538 8852f9 ReleaseSRWLockExclusive 50538->50388 50540 8cc010 ___scrt_fastfail 50539->50540 50541 884e34 GetTempPathW 50540->50541 50795 884711 WideCharToMultiByte 50541->50795 50758 885494 50757->50758 50759 885498 pre_c_initialization 50757->50759 50758->50538 50760 8854ed pre_c_initialization 50759->50760 50762 898ab0 50759->50762 50760->50538 50763 898b09 50762->50763 50764 898ac9 WSAStartup 50762->50764 50778 898900 GetModuleHandleW 50763->50778 50766 898adf 50764->50766 50767 898af6 50764->50767 50766->50763 50769 898af0 WSACleanup 50766->50769 50770 8ca551 _ValidateLocalCookies 5 API calls 50767->50770 50768 898b13 50772 898b3c 50768->50772 50773 898b1f GetProcAddress 50768->50773 50769->50767 50771 898b05 50770->50771 50771->50760 50794 8c29b0 14 API calls 2 library calls 50772->50794 50773->50772 50775 898b4b QueryPerformanceFrequency 50776 8ca551 _ValidateLocalCookies 5 API calls 50775->50776 50777 898b6e 50776->50777 50777->50760 50779 89891b 50778->50779 50780 898920 GetProcAddress 50778->50780 50779->50768 50781 898941 50780->50781 50782 898948 50781->50782 50783 89896c 50781->50783 50784 89895c LoadLibraryW 50782->50784 50785 89894c 50782->50785 50786 898970 GetProcAddress 50783->50786 50787 898995 GetSystemDirectoryW 50783->50787 50784->50768 50785->50768 50786->50787 50788 898982 LoadLibraryExW 50786->50788 50789 8989ac 50787->50789 50792 898a3c 50787->50792 50788->50768 50790 8989da GetSystemDirectoryW 50789->50790 50789->50792 50791 8989e8 50790->50791 50790->50792 50791->50792 50793 898a45 LoadLibraryW 50791->50793 50792->50768 50793->50792 50794->50775 50800 8ca994 50795->50800 51907 8df531 51908 8df189 __fread_nolock 25 API calls 51907->51908 51909 8df53f 51908->51909 51910 8df56d 51909->51910 51911 8df54e 51909->51911 51912 8df588 51910->51912 51913 8df57b 51910->51913 51935 8d28bb 14 API calls _free 51911->51935 51919 8df59b ___swprintf_l 51912->51919 51937 8df712 27 API calls __wsopen_s 51912->51937 51936 8d28bb 14 API calls _free 51913->51936 51917 8df61a 51924 8df646 51917->51924 51919->51917 51920 8df553 51919->51920 51921 8e670b __fread_nolock 25 API calls 51919->51921 51922 8df60d 51919->51922 51921->51922 51922->51917 51938 8e6a9a 15 API calls 2 library calls 51922->51938 51925 8df189 __fread_nolock 25 API calls 51924->51925 51926 8df655 51925->51926 51927 8df6f8 51926->51927 51928 8df668 51926->51928 51929 8ddf79 __wsopen_s 62 API calls 51927->51929 51930 8df685 51928->51930 51933 8df6a9 51928->51933 51932 8df692 51929->51932 51931 8ddf79 __wsopen_s 62 API calls 51930->51931 51931->51932 51932->51920 51933->51932 51939 8daf30 51933->51939 51935->51920 51936->51920 51937->51919 51938->51917 51942 8dadb0 51939->51942 51941 8daf46 51941->51932 51943 8dadbc BuildCatchObjectHelperInternal 51942->51943 51944 8daddc 51943->51944 51945 8dadc4 51943->51945 51947 8dae8d 51944->51947 51952 8dae11 51944->51952 51968 8d28a8 14 API calls _free 51945->51968 51973 8d28a8 14 API calls _free 51947->51973 51948 8dadc9 51969 8d28bb 14 API calls _free 51948->51969 51951 8dae92 51974 8d28bb 14 API calls _free 51951->51974 51967 8e244c EnterCriticalSection 51952->51967 51953 8dadd1 __wsopen_s 51953->51941 51956 8dae9a 51975 8ceb9c 25 API calls __cftoe 51956->51975 51957 8dae17 51959 8dae3b 51957->51959 51960 8dae50 51957->51960 51970 8d28bb 14 API calls _free 51959->51970 51961 8daeb2 __wsopen_s 27 API calls 51960->51961 51963 8dae4b 51961->51963 51972 8dae85 LeaveCriticalSection __wsopen_s 51963->51972 51964 8dae40 51971 8d28a8 14 API calls _free 51964->51971 51967->51957 51968->51948 51969->51953 51970->51964 51971->51963 51972->51953 51973->51951 51974->51956 51975->51953

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 195 8a6c80-8a6cb0 socket 196 8a6cb6-8a6d06 htonl setsockopt 195->196 197 8a6e84-8a6e97 call 8ca551 195->197 199 8a6d0c-8a6d1c bind 196->199 200 8a6e72-8a6e82 closesocket * 3 196->200 199->200 202 8a6d22-8a6d34 getsockname 199->202 200->197 202->200 203 8a6d3a-8a6d3e 202->203 203->200 204 8a6d44-8a6d50 listen 203->204 204->200 205 8a6d56-8a6d63 socket 204->205 205->200 206 8a6d69-8a6d79 connect 205->206 206->200 207 8a6d7f-8a6d8c call 8c66a0 206->207 207->200 210 8a6d92-8a6dc2 call 8a58f0 accept 207->210 210->200 213 8a6dc8-8a6def call 88e6a0 send 210->213 216 8a6df5-8a6e29 call 8a58f0 recv 213->216 219 8a6e2b-8a6e5e WSAGetLastError call 88e6a0 call 88e750 216->219 220 8a6e98-8a6e9b 216->220 219->200 231 8a6e60 219->231 221 8a6e9d-8a6e9f 220->221 222 8a6ea4-8a6eaf 220->222 221->216 224 8a6eb0-8a6eb4 222->224 224->200 226 8a6eb6-8a6ebf 224->226 226->224 228 8a6ec1-8a6ed2 closesocket call 8ca551 226->228 232 8a6ed7-8a6eda 228->232 233 8a6e69-8a6e70 231->233 234 8a6e62-8a6e67 231->234 233->200 233->216 234->200 234->233
                        APIs
                        • socket.WS2_32(00000002,00000001,00000006), ref: 008A6CA9
                        • htonl.WS2_32(7F000001), ref: 008A6CCC
                        • setsockopt.WS2_32(00000000,0000FFFF,000000FB,?,00000004), ref: 008A6CFD
                        • bind.WS2_32(00000000,0088EF32,00000010), ref: 008A6D13
                        • getsockname.WS2_32(00000000,0088EF32,00000010), ref: 008A6D2B
                        • listen.WS2_32(00000000,00000001), ref: 008A6D47
                        • socket.WS2_32(00000002,00000001,00000000), ref: 008A6D5C
                        • connect.WS2_32(00000000,0088EF32,00000010), ref: 008A6D70
                          • Part of subcall function 008C66A0: ioctlsocket.WS2_32(00000000,8004667E,008A6D87), ref: 008C66BA
                        • accept.WS2_32(00000000,00000000,00000000), ref: 008A6DB6
                          • Part of subcall function 0088E6A0: QueryPerformanceCounter.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,00889B40,00000000,00000000,00000000,00000008,00002712), ref: 0088E6B5
                          • Part of subcall function 0088E6A0: __alldvrm.LIBCMT ref: 0088E6CE
                          • Part of subcall function 0088E6A0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088E6F7
                        • send.WS2_32(0088EF32,?,00000010,00000000), ref: 008A6DEF
                        • recv.WS2_32(C73279C0,?,00000010,00000000), ref: 008A6E20
                        • WSAGetLastError.WS2_32 ref: 008A6E2B
                        • closesocket.WS2_32(00000000), ref: 008A6E79
                        • closesocket.WS2_32(0088EF32), ref: 008A6E7D
                        • closesocket.WS2_32(C73279C0), ref: 008A6E82
                        • closesocket.WS2_32(00000000), ref: 008A6EC2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: closesocket$socket$CounterErrorLastPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@acceptbindconnectgetsocknamehtonlioctlsocketlistenrecvsendsetsockopt
                        • String ID: 3'
                        • API String ID: 681415703-280543908
                        • Opcode ID: eafb69e10d44f63db8c7fce08983ddc80fd5134292fe150ec7d1e48b6f078e18
                        • Instruction ID: 4f86481cd67c4a772ad3bf0fde3c2f3bc61bbbf301e0e7068aaa24489c137ddf
                        • Opcode Fuzzy Hash: eafb69e10d44f63db8c7fce08983ddc80fd5134292fe150ec7d1e48b6f078e18
                        • Instruction Fuzzy Hash: 4861D071D00308ABEB10DBB8CC85BAEB778FF05320F640715F525EA5D0E7B1A9A48B51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 235 89f330-89f35e 236 89fa03-89fa15 call 88f070 235->236 237 89f364 235->237 253 89fa6d-89fa7d call 8ca551 236->253 254 89fa17-89fa29 call 89ead0 236->254 238 89f36b-89f378 237->238 239 89f65f-89f669 237->239 240 89f481-89f48b 237->240 242 89f37a-89f385 238->242 243 89f387-89f38d 238->243 247 89f678-89f67e 239->247 248 89f66b-89f676 239->248 244 89f4ea-89f505 240->244 245 89f48d-89f49f call 88f070 240->245 251 89f393-89f39e 242->251 243->251 249 89f540-89f54a 244->249 250 89f507-89f50e 244->250 245->253 273 89f4a5-89f4c3 call 89ead0 245->273 255 89f684-89f68f 247->255 248->255 262 89f54c 249->262 263 89f575-89f587 call 8a27b0 249->263 250->249 256 89f510-89f522 call 8a27b0 250->256 258 89f3a0-89f3a7 251->258 259 89f3e5-89f3eb 251->259 274 89fa2e-89fa35 254->274 264 89f691-89f698 255->264 265 89f6d3-89f6e5 call 8a27b0 255->265 256->249 302 89f524-89f53a call 88f050 256->302 258->259 272 89f3a9-89f3b0 258->272 267 89f3ed-89f3fa call 8a1e60 259->267 268 89f400-89f412 call 88f070 259->268 275 89f550-89f562 call 88f050 262->275 291 89f589-89f5a6 call 89edc0 263->291 292 89f5a8-89f5ac 263->292 264->265 276 89f69a-89f6a1 264->276 294 89f6ff-89f711 call 8a27b0 265->294 295 89f6e7-89f6f9 call 88f070 265->295 267->253 267->268 268->253 318 89f418-89f445 call 8a4950 call 89ead0 268->318 284 89f3b2-89f3c4 call 8a27b0 272->284 285 89f3c6-89f3dc call 88f050 272->285 287 89fa58 273->287 313 89f4c9-89f4e9 call 896ca0 call 8ca551 273->313 274->287 288 89fa37-89fa57 call 896ca0 call 8ca551 274->288 275->253 319 89f568-89f573 275->319 277 89f6a3-89f6b5 call 8a27b0 276->277 278 89f6b7-89f6cd call 88f050 276->278 277->265 277->278 278->253 278->265 284->285 326 89f3e2 284->326 285->253 285->326 300 89fa5a-89fa6b call 8a3980 287->300 332 89f5d7-89f5e9 call 88f070 291->332 308 89f5ae 292->308 309 89f5c2-89f5d1 call 8a1e60 292->309 334 89f713-89f730 call 89edc0 294->334 335 89f732-89f736 294->335 295->253 295->294 300->253 302->249 302->253 321 89f5b9-89f5c0 308->321 322 89f5b0-89f5b7 308->322 309->253 309->332 355 89f468-89f46e 318->355 356 89f447-89f467 call 896ca0 call 8ca551 318->356 319->263 319->275 321->332 322->309 322->321 326->259 332->253 352 89f5ef-89f638 call 8a4950 call 89ead0 332->352 353 89f761-89f769 334->353 342 89f738 335->342 343 89f74c-89f75b call 8a1e60 335->343 348 89f73a-89f741 342->348 349 89f743-89f74a 342->349 343->253 343->353 348->343 348->349 349->353 352->355 381 89f63e-89f65e call 896ca0 call 8ca551 352->381 360 89f91d-89f92f call 88f070 353->360 361 89f76f-89f779 353->361 357 89f478-89f47c 355->357 358 89f470-89f473 355->358 357->300 358->300 360->253 375 89f935-89f93b 360->375 366 89f77f-89f786 361->366 367 89f8c5-89f906 call 8a4950 call 88f070 361->367 366->367 372 89f78c-89f790 366->372 387 89f9a9-89f9af 367->387 391 89f90c-89f91c call 8ca551 367->391 372->367 377 89f796 372->377 379 89f93d-89f947 375->379 380 89f96e-89f97a 375->380 382 89f798-89f79f 377->382 383 89f7a5-89f7b7 call 88f070 377->383 379->380 386 89f949-89f95b call 88f070 379->386 380->387 388 89f97c-89f986 380->388 382->367 382->383 383->253 397 89f7bd-89f7c3 383->397 386->387 406 89f95d-89f96d call 8ca551 386->406 396 89f9b2-89f9d3 call 89ead0 387->396 393 89f988-89f98b 388->393 394 89f98d-89f9a2 call 8a4950 388->394 393->394 394->387 414 89f9a4-89f9a7 394->414 415 89f9d5-89f9f5 call 896ca0 call 8ca551 396->415 416 89f9f6-89fa01 396->416 403 89f7ea-89f7f2 397->403 404 89f7c5-89f7e5 call 88f070 397->404 411 89f871-89f87a 403->411 412 89f7f4-89f816 call 89a580 call 88f020 403->412 423 89f897-89f899 404->423 421 89f87d-89f893 call 88f070 411->421 429 89f89b-89f8ad call 8ca551 412->429 436 89f81c-89f81f 412->436 414->387 416->300 421->423 423->429 430 89f8ae-89f8c0 call 8a4950 423->430 430->396 438 89f822-89f827 436->438 438->438 439 89f829-89f84f call 88f070 438->439 442 89f851-89f861 call 88f070 439->442 443 89f863-89f86d 439->443 442->443 443->429 445 89f86f 443->445 445->421
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: %s$%x$0$100-continue$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Type$Content-Type: application/x-www-form-urlencoded$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request
                        • API String ID: 0-502057143
                        • Opcode ID: 61dc854efd643f82b9c4f032c66330de71ea7ac3bd3280952c8db0fa2966ed1a
                        • Instruction ID: a37dd74a3f4a184c3831e4c7cf5f19fb4120febfe54d722f812a9e2e7002ea4e
                        • Opcode Fuzzy Hash: 61dc854efd643f82b9c4f032c66330de71ea7ac3bd3280952c8db0fa2966ed1a
                        • Instruction Fuzzy Hash: F5220971A00709BFDF14AB689C42FAAB7E4FF14318F184235FA19E6283E775E9508791

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 560 898900-898919 GetModuleHandleW 561 89891b-89891f 560->561 562 898920-898946 GetProcAddress call 8d8c70 560->562 565 898948-89894a 562->565 566 89896c-89896e 562->566 567 89895c-89896b LoadLibraryW 565->567 568 89894c-89895b 565->568 569 898970-898980 GetProcAddress 566->569 570 898995-8989a6 GetSystemDirectoryW 566->570 569->570 571 898982-898994 LoadLibraryExW 569->571 572 898a58-898a60 570->572 573 8989ac-8989ae 570->573 575 8989b1-8989ba 573->575 575->575 576 8989bc-8989d8 575->576 578 8989da-8989e6 GetSystemDirectoryW 576->578 579 898a4e-898a55 576->579 578->579 580 8989e8-8989ed 578->580 579->572 582 8989f0-8989f9 580->582 582->582 583 8989fb-898a0b 582->583 584 898a10-898a19 583->584 584->584 585 898a1b-898a23 584->585 586 898a25-898a33 585->586 586->586 587 898a35-898a3a 586->587 588 898a3c-898a43 587->588 589 898a45-898a46 LoadLibraryW 587->589 590 898a4c 588->590 589->590 590->579
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32,?,00898B13,iphlpapi.dll), ref: 0089890E
                        • GetProcAddress.KERNEL32(00000000,LoadLibraryExW), ref: 00898928
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: AddDllDirectory$LoadLibraryExW$kernel32
                        • API String ID: 1646373207-3974551115
                        • Opcode ID: 2cbd01736a41ae2af7f1015a77a7c95e6e1799de376bd6218b7c467c154ecfa5
                        • Instruction ID: 0d4f08869f664541e4f567631e9f9e7c51f988d067e5a79b60a0f17954a155d0
                        • Opcode Fuzzy Hash: 2cbd01736a41ae2af7f1015a77a7c95e6e1799de376bd6218b7c467c154ecfa5
                        • Instruction Fuzzy Hash: A84129357003069BDF106F68AC85B7AB7A8FF45315F1C406AED06DB291EE7299068751

                        Control-flow Graph

                        APIs
                        • LoadStringW.USER32(?,00000067,TopLoader,00000064), ref: 00884295
                        • LoadStringW.USER32(?,0000006D,TOPLOADER,00000064), ref: 008842A1
                          • Part of subcall function 00884315: LoadIconW.USER32(?,0000006B), ref: 0088434B
                          • Part of subcall function 00884315: LoadCursorW.USER32(00000000,00007F00), ref: 0088435B
                          • Part of subcall function 00884315: LoadIconW.USER32(?,0000006C), ref: 0088437E
                          • Part of subcall function 00884315: LoadBitmapW.USER32(?,00000086), ref: 0088438D
                          • Part of subcall function 00884315: CreatePatternBrush.GDI32(00000000), ref: 00884394
                          • Part of subcall function 00884315: RegisterClassExW.USER32(00000030), ref: 008843A1
                          • Part of subcall function 008843B4: KiUserCallbackDispatcher.NTDLL(00000000), ref: 008843CE
                          • Part of subcall function 008843B4: GetSystemMetrics.USER32(00000001), ref: 008843D4
                          • Part of subcall function 008843B4: CreateWindowExW.USER32(00000000,TOPLOADER,TopLoader,0800000E,-00000232,-FFFFFF12,00000232,000000EE,00000000,00000000,?,00000000), ref: 0088440E
                          • Part of subcall function 008843B4: KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 0088441C
                          • Part of subcall function 008843B4: SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00884426
                          • Part of subcall function 008843B4: SetLayeredWindowAttributes.USER32(00000000,00FFFFFF,000000FF,00000003,?,?,?,008842B4), ref: 00884439
                          • Part of subcall function 008843B4: ShowWindow.USER32(00000000,?,?,?,?,008842B4), ref: 00884443
                          • Part of subcall function 008843B4: KiUserCallbackDispatcher.NTDLL(00000000), ref: 0088444A
                        • LoadAcceleratorsW.USER32(?,0000006D), ref: 008842BC
                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 008842D6
                        • TranslateMessage.USER32(?), ref: 008842E4
                        • DispatchMessageW.USER32(?), ref: 008842EE
                        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 008842FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Load$CallbackDispatcherUserWindow$CreateIconMessageStringTranslate$AcceleratorAcceleratorsAttributesBitmapBrushClassCursorDispatchLayeredLongMetricsPatternRegisterShowSystem
                        • String ID: TOPLOADER$TopLoader
                        • API String ID: 4086216904-3504760908
                        • Opcode ID: b7d6a1dbff09b626750f26e1fdb582ff3a2e497c08def438aaee6343f76732a3
                        • Instruction ID: 22bfe3af4f8ce59ef800440b8478eee6d06912adc2602438e1e062a1e12b045f
                        • Opcode Fuzzy Hash: b7d6a1dbff09b626750f26e1fdb582ff3a2e497c08def438aaee6343f76732a3
                        • Instruction Fuzzy Hash: C7112172B00219AFDB10EBA59C85EBEB7BDFB88754F04001AFA01F7190DB75E8059B61
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9f69ed32e2756251c127f7a313d1f417e5470c56358979b3908da19819de498b
                        • Instruction ID: 00b31db19f35ba69bc4b1b26e3ee531d72fdb5aaef5b270ba1e8237c8bd530b8
                        • Opcode Fuzzy Hash: 9f69ed32e2756251c127f7a313d1f417e5470c56358979b3908da19819de498b
                        • Instruction Fuzzy Hash: 3F225C71A002299FEB24DF69CC80BA9B7B5FF88314F0441E9EA49E7291D7349E85CF51
                        APIs
                        • WSASetLastError.WS2_32(00002726,00000000,?,?), ref: 008A5A9B
                        • WSAGetLastError.WS2_32(?,?,?,00000000,?,?), ref: 008A5AE9
                        • __WSAFDIsSet.WS2_32(?,?), ref: 008A5B30
                        • __WSAFDIsSet.WS2_32(?,?), ref: 008A5B70
                        • __WSAFDIsSet.WS2_32(?,?), ref: 008A5B8D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: 4f4b39be43ebc6d3e6909f983b8300bb09792157c02ce17c10e96cdd7255c2aa
                        • Instruction ID: 20c83bb933069d4d7d4c5644b888469ce4e43388b6c3ee1657a3809d71bb17a4
                        • Opcode Fuzzy Hash: 4f4b39be43ebc6d3e6909f983b8300bb09792157c02ce17c10e96cdd7255c2aa
                        • Instruction Fuzzy Hash: 2681D531A00A2C8BEB258F2DD8807EDB7B5FF09320F1446AEE899D7590D7749EC18B51
                        APIs
                          • Part of subcall function 0088323C: __EH_prolog3_GS.LIBCMT ref: 00883243
                          • Part of subcall function 0088323C: CreateProcessW.KERNELBASE(00000000), ref: 0088329E
                          • Part of subcall function 0088323C: GetLastError.KERNEL32 ref: 008832A8
                        • Sleep.KERNELBASE(00000BB8), ref: 00883546
                        • ExitProcess.KERNEL32 ref: 00883553
                          • Part of subcall function 00883339: ShellExecuteW.SHELL32(00000000,open,00000000), ref: 00883378
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Process$CreateErrorExecuteExitH_prolog3_LastShellSleep
                        • String ID:
                        • API String ID: 3524472871-0
                        • Opcode ID: 9eb4173240cee658112f3b868a0a9a922c2d4ac88058f2e136215ef73d0d95d4
                        • Instruction ID: dd5014cd350d29dabc7536cad55d6560447ad55e6860c654531ce64c63cab8b5
                        • Opcode Fuzzy Hash: 9eb4173240cee658112f3b868a0a9a922c2d4ac88058f2e136215ef73d0d95d4
                        • Instruction Fuzzy Hash: 74E0EDB5940348A7DE14BBBD9D0BBAD3628FF11762F800454FA05CA293EF615B0A47E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ad9bdd2d56a55273eae8e43d5c6af002cd6849f5192e3e8b950d01c1ec1ac8b7
                        • Instruction ID: 8e9d37f46ecd92c1252f1d3c887fd7f16de789351c20e23d7547954755f7e0c8
                        • Opcode Fuzzy Hash: ad9bdd2d56a55273eae8e43d5c6af002cd6849f5192e3e8b950d01c1ec1ac8b7
                        • Instruction Fuzzy Hash: B4F03032A25268DFCB36DB8DD809B59B3BCFB46B61F11419AF904DB250C7B09D4097D1

                        Control-flow Graph

                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00882208
                          • Part of subcall function 008CA562: __CxxThrowException@8.LIBVCRUNTIME ref: 008CB50C
                          • Part of subcall function 008CA562: __CxxThrowException@8.LIBVCRUNTIME ref: 008CB529
                        • CreateThread.KERNELBASE(00000000,00000000,Function_00002177,00000000,00000000,?), ref: 008825D5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Exception@8Throw$CreateH_prolog3_Thread
                        • String ID: /pixel.jpg?$00000000000000000000000000000000$Nums=$Source=$client=u3d$compileType=release$eventAction=$eventSubType=$eventType=$hd=0$http://emcl.evony.com$icp=0$is50mClient=1$isAmazon=0$model=$newbie=0$os=120$others=$project=EM$subId=$tid=0$type=0$user_id=1020291$version=0.4.0
                        • API String ID: 2782263355-66166145
                        • Opcode ID: 2bcba4c502c78d72e5f1171f7d4c9db2244ff2528b6e410b55bbb98358e85ef1
                        • Instruction ID: 047f13352659b3d89506bce55d42ecf12833f9a33a10991a03418e698fa4b0b2
                        • Opcode Fuzzy Hash: 2bcba4c502c78d72e5f1171f7d4c9db2244ff2528b6e410b55bbb98358e85ef1
                        • Instruction Fuzzy Hash: 59A16E607112586ADF49F768CC9AEBEB65FFF84340F044009F611E62C6DFA81E069763

                        Control-flow Graph

                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0088447E
                        • InvalidateRect.USER32(?,00901BE0,00000001,00000130), ref: 008844CC
                        • InvalidateRect.USER32(?,00901BD0,00000001), ref: 008844D6
                        • KiUserCallbackDispatcher.NTDLL(?), ref: 008844D9
                        • DefWindowProcW.USER32(?,00000111,?,?,00000130), ref: 00884502
                        • DestroyWindow.USER32(?,00000130), ref: 0088450E
                        • BeginPaint.USER32(?,?,00000130), ref: 00884521
                        • SetBkMode.GDI32(00000000,00000001), ref: 0088458F
                        • SetTextColor.GDI32(00000000,00A4DDF1), ref: 0088459B
                        • DrawTextW.USER32(00000000,?,00000000,00901BD0,00002011), ref: 008845B4
                        • CreateCompatibleDC.GDI32(00000000), ref: 008845BB
                        • LoadBitmapW.USER32(00000083), ref: 008845CE
                        • SelectObject.GDI32(00000000,00000000), ref: 008845D8
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 008845E8
                        • StretchBlt.GDI32(?,0000010E,000000C7,00000000,?,00000000,00000000,00000000,00000000,?,00CC0020), ref: 00884629
                        • DeleteObject.GDI32(00000000), ref: 00884630
                        • DeleteDC.GDI32(00000000), ref: 00884637
                        • EndPaint.USER32(?,?), ref: 0088464A
                        • PostQuitMessage.USER32(00000000), ref: 00884654
                        • SetTimer.USER32(?,00000064,000003E8,00000000), ref: 00884666
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Object$DeleteInvalidatePaintRectTextWindow$BeginBitmapCallbackColorCompatibleCreateDestroyDispatcherDrawH_prolog3_LoadMessageModePostProcQuitSelectStretchTimerUser
                        • String ID: %s %d%%$install_key
                        • API String ID: 2862724187-2076656217
                        • Opcode ID: e4501e2f0d5f81431cb2286a2bc903d815a0e993a960cde0cdf7b543d7b0ff19
                        • Instruction ID: ff37e326093ef59b33a843746340afd563d681c80b16e96dc513e543826f26aa
                        • Opcode Fuzzy Hash: e4501e2f0d5f81431cb2286a2bc903d815a0e993a960cde0cdf7b543d7b0ff19
                        • Instruction Fuzzy Hash: E851DF72940349ABEB21BB749C8EFAE3B39FF45701F040140FA06EA1A1DB759A45DB21

                        Control-flow Graph

                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00883C7E
                          • Part of subcall function 008852E0: AcquireSRWLockExclusive.KERNEL32(00901D78), ref: 008852E9
                          • Part of subcall function 008852E0: ReleaseSRWLockExclusive.KERNEL32(00901D78), ref: 00885303
                          • Part of subcall function 00884DFF: GetTempPathW.KERNEL32(00000400,?,?,?,00000000), ref: 00884E43
                          • Part of subcall function 008831A0: __EH_prolog3_GS.LIBCMT ref: 008831A7
                          • Part of subcall function 008849EE: __EH_prolog3_GS.LIBCMT ref: 008849F8
                          • Part of subcall function 008849EE: RegOpenKeyExW.KERNELBASE(80000001,00000000), ref: 00884A2A
                          • Part of subcall function 008849EE: RegQueryValueExW.KERNELBASE(?,00000000), ref: 00884A76
                          • Part of subcall function 008849EE: RegCloseKey.ADVAPI32(?), ref: 00884A84
                          • Part of subcall function 00884EE7: __EH_prolog3_GS.LIBCMT ref: 00884EF1
                          • Part of subcall function 00884AA7: GetModuleFileNameW.KERNEL32(00000000,?,00000400), ref: 00884B02
                          • Part of subcall function 008817CD: __EH_prolog3_GS.LIBCMT ref: 008817D4
                          • Part of subcall function 00884B72: __EH_prolog3_GS.LIBCMT ref: 00884B79
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_$ExclusiveLock$AcquireCloseFileModuleNameOpenPathQueryReleaseTempValue
                        • String ID: New User $Old User $ $AABBCCDDEEF$IDFA$NewUser$OldUser$ShortID$UUID$shortId :
                        • API String ID: 4098337469-2143291339
                        • Opcode ID: a6b9b01d31391804dee6fc8ea2f92893b8c701148cd47d366d23b6707b0d4d87
                        • Instruction ID: 533b85c19f27be4295e4f0e7fa01ce1695785828faa37fa59d3d674373dd2091
                        • Opcode Fuzzy Hash: a6b9b01d31391804dee6fc8ea2f92893b8c701148cd47d366d23b6707b0d4d87
                        • Instruction Fuzzy Hash: 307116A1D01248EADF04FBFCC94B6DCBA79FF55714F904089E515AB282DF741A098BA3

                        Control-flow Graph

                        APIs
                        • KiUserCallbackDispatcher.NTDLL(00000000), ref: 008843CE
                        • GetSystemMetrics.USER32(00000001), ref: 008843D4
                        • CreateWindowExW.USER32(00000000,TOPLOADER,TopLoader,0800000E,-00000232,-FFFFFF12,00000232,000000EE,00000000,00000000,?,00000000), ref: 0088440E
                        • KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 0088441C
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00884426
                        • SetLayeredWindowAttributes.USER32(00000000,00FFFFFF,000000FF,00000003,?,?,?,008842B4), ref: 00884439
                        • ShowWindow.USER32(00000000,?,?,?,?,008842B4), ref: 00884443
                        • KiUserCallbackDispatcher.NTDLL(00000000), ref: 0088444A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$CallbackDispatcherUser$AttributesCreateLayeredLongMetricsShowSystem
                        • String ID: TOPLOADER$TopLoader
                        • API String ID: 2702607048-3504760908
                        • Opcode ID: 3bf9a6d0231cfaa1187f16635c8cff272dd26a9d8b34321fd8cc896dbd299150
                        • Instruction ID: 000f81b2ce2b6af5fe96efd55b02edca3684ee2d2e86bb75f46d441bb5fa25f8
                        • Opcode Fuzzy Hash: 3bf9a6d0231cfaa1187f16635c8cff272dd26a9d8b34321fd8cc896dbd299150
                        • Instruction Fuzzy Hash: C6118272641755BFD3222B699C4EF9F3A2DFF82B11F000215F601DE1E0CFA4A9068BA5

                        Control-flow Graph

                        APIs
                        • LoadIconW.USER32(?,0000006B), ref: 0088434B
                        • LoadCursorW.USER32(00000000,00007F00), ref: 0088435B
                        • LoadIconW.USER32(?,0000006C), ref: 0088437E
                        • LoadBitmapW.USER32(?,00000086), ref: 0088438D
                        • CreatePatternBrush.GDI32(00000000), ref: 00884394
                        • RegisterClassExW.USER32(00000030), ref: 008843A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Load$Icon$BitmapBrushClassCreateCursorPatternRegister
                        • String ID: 0$TOPLOADER$m
                        • API String ID: 3235492421-1654760247
                        • Opcode ID: 57a4c2077fd4b0d7a0293e93871e10adaf0638af1ac4a1d50594a7f75c026f82
                        • Instruction ID: 0c83f781344a5b80efe5108e5e589bf33a135f129381ff01114dc280e1b697c8
                        • Opcode Fuzzy Hash: 57a4c2077fd4b0d7a0293e93871e10adaf0638af1ac4a1d50594a7f75c026f82
                        • Instruction Fuzzy Hash: D611F7B1D01309AFDF00DFE4D989BAEBBF5BB48705F104119E201BA290CBB996098F55

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 769 8d9b6e-8d9b9e call 8d989e 772 8d9bb9-8d9bc5 call 8e2526 769->772 773 8d9ba0-8d9bab call 8d28a8 769->773 778 8d9bde-8d9c27 call 8d9809 772->778 779 8d9bc7-8d9bdc call 8d28a8 call 8d28bb 772->779 780 8d9bad-8d9bb4 call 8d28bb 773->780 789 8d9c29-8d9c32 778->789 790 8d9c94-8d9c9d GetFileType 778->790 779->780 787 8d9e93-8d9e99 780->787 794 8d9c69-8d9c8f GetLastError call 8d2885 789->794 795 8d9c34-8d9c38 789->795 791 8d9c9f-8d9cd0 GetLastError call 8d2885 CloseHandle 790->791 792 8d9ce6-8d9ce9 790->792 791->780 808 8d9cd6-8d9ce1 call 8d28bb 791->808 798 8d9ceb-8d9cf0 792->798 799 8d9cf2-8d9cf8 792->799 794->780 795->794 800 8d9c3a-8d9c67 call 8d9809 795->800 803 8d9cfc-8d9d4a call 8e246f 798->803 799->803 804 8d9cfa 799->804 800->790 800->794 811 8d9d4c-8d9d58 call 8d9a1a 803->811 812 8d9d69-8d9d91 call 8d95b4 803->812 804->803 808->780 811->812 818 8d9d5a 811->818 819 8d9d96-8d9dd7 812->819 820 8d9d93-8d9d94 812->820 821 8d9d5c-8d9d64 call 8dea02 818->821 822 8d9dd9-8d9ddd 819->822 823 8d9df8-8d9e06 819->823 820->821 821->787 822->823 827 8d9ddf-8d9df3 822->827 824 8d9e0c-8d9e10 823->824 825 8d9e91 823->825 824->825 828 8d9e12-8d9e45 CloseHandle call 8d9809 824->828 825->787 827->823 832 8d9e79-8d9e8d 828->832 833 8d9e47-8d9e73 GetLastError call 8d2885 call 8e262f 828->833 832->825 833->832
                        APIs
                          • Part of subcall function 008D9809: CreateFileW.KERNELBASE(00000000,00000000,?,008D9C17,?,?,00000000,?,008D9C17,00000000,0000000C), ref: 008D9826
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,008A607E), ref: 008D9C82
                        • __dosmaperr.LIBCMT ref: 008D9C89
                        • GetFileType.KERNELBASE(00000000), ref: 008D9C95
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,008A607E), ref: 008D9C9F
                        • __dosmaperr.LIBCMT ref: 008D9CA8
                        • CloseHandle.KERNEL32(00000000), ref: 008D9CC8
                        • CloseHandle.KERNEL32(00000000), ref: 008D9E15
                        • GetLastError.KERNEL32 ref: 008D9E47
                        • __dosmaperr.LIBCMT ref: 008D9E4E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                        • String ID:
                        • API String ID: 4237864984-0
                        • Opcode ID: bdb066fd6f2d184d1cb4e5b6ec5687be1b97347883131ce570ee801b7af8da46
                        • Instruction ID: 0a0682f303cee46556a7853443b6968a77c4bd5266f7da7312713573fd016cfa
                        • Opcode Fuzzy Hash: bdb066fd6f2d184d1cb4e5b6ec5687be1b97347883131ce570ee801b7af8da46
                        • Instruction Fuzzy Hash: 96A13632A141599FCF19DF68DC91BAE7BA1FB06320F14025AE851EF3A1DB358C02D752

                        Control-flow Graph

                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00883724
                        • Sleep.KERNEL32(00000BB8), ref: 00883786
                        • ExitProcess.KERNEL32 ref: 00883793
                          • Part of subcall function 008835A7: __EH_prolog3_GS.LIBCMT ref: 008835AE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_$ExitProcessSleep
                        • String ID: GetInstallFileAddressCallback : $LogRequestFileFailed : $.exe$evony_install.exe
                        • API String ID: 4036175049-2108988068
                        • Opcode ID: 0f79bd8ac2e9c3035db9d39f60e133af314f43c8250e50cda767702f0513b953
                        • Instruction ID: 243b2afdfb7d3d1f6b091b2b3888a474bd6c8e74954e0c155151250b9d48651f
                        • Opcode Fuzzy Hash: 0f79bd8ac2e9c3035db9d39f60e133af314f43c8250e50cda767702f0513b953
                        • Instruction Fuzzy Hash: 8E816C70A01248AACF05FBBC891B69D7BA5FF45B00F548189F515EB293CF745B0A87A3

                        Control-flow Graph

                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00883243
                          • Part of subcall function 008846B3: __EH_prolog3_GS.LIBCMT ref: 008846BA
                          • Part of subcall function 008846B3: __cftoe.LIBCMT ref: 008846F9
                        • CreateProcessW.KERNELBASE(00000000), ref: 0088329E
                        • GetLastError.KERNEL32 ref: 008832A8
                        • WaitForSingleObject.KERNEL32(?,00000BB8), ref: 008832EE
                        • CloseHandle.KERNEL32(?), ref: 008832FD
                        • CloseHandle.KERNEL32(?), ref: 00883302
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseH_prolog3_Handle$CreateErrorLastObjectProcessSingleWait__cftoe
                        • String ID: create
                        • API String ID: 519166116-2413224187
                        • Opcode ID: c848c8d832ce3e05b371b10936b97309af191a0971b4dc060f4f82d73b231702
                        • Instruction ID: 13ffcb73d977cb5966a9417540afc82155b657ab385bdd37e3ff44593ce44e9c
                        • Opcode Fuzzy Hash: c848c8d832ce3e05b371b10936b97309af191a0971b4dc060f4f82d73b231702
                        • Instruction Fuzzy Hash: 9A212A71900348AADB00FBFCC94AA9DBBB9FF15300F504059E619EF252DA754A098BA3

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1009 88ed00-88ed50 call 89a580 call 8a6f10 1014 88ed69-88ed75 EnterCriticalSection 1009->1014 1015 88ed52-88ed56 WSAGetLastError 1009->1015 1018 88ed93-88ed99 1014->1018 1019 88ed77-88ed91 LeaveCriticalSection call 88ec70 1014->1019 1016 88ed58-88ed5a WSAGetLastError 1015->1016 1017 88ed5c-88ed66 1015->1017 1016->1017 1017->1014 1021 88ed9b-88edb0 send 1018->1021 1022 88edb7-88edc0 LeaveCriticalSection 1018->1022 1023 88edc6-88edd8 call 8ca551 1019->1023 1021->1022 1025 88edb2-88edb4 WSAGetLastError 1021->1025 1022->1023 1025->1022
                        APIs
                        • ___swprintf_l.LIBCMT ref: 0088ED2A
                          • Part of subcall function 008A6F10: getaddrinfo.WS2_32(?,?,?,?), ref: 008A6F2E
                        • WSAGetLastError.WS2_32 ref: 0088ED52
                        • WSAGetLastError.WS2_32 ref: 0088ED58
                        • EnterCriticalSection.KERNEL32(?), ref: 0088ED6B
                        • LeaveCriticalSection.KERNEL32(?), ref: 0088ED79
                        • send.WS2_32(?,?,00000001,00000000), ref: 0088EDA8
                        • WSAGetLastError.WS2_32 ref: 0088EDB2
                        • LeaveCriticalSection.KERNEL32(?), ref: 0088EDC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalErrorLastSection$Leave$Enter___swprintf_lgetaddrinfosend
                        • String ID:
                        • API String ID: 1963704972-0
                        • Opcode ID: 59118c69d9d81c2f899acf1653fdade7dff4a41328ccaf1db3673970b3eccba6
                        • Instruction ID: 4d395b5ad59c67c1bd7c7b8bf3ba0ed59e7b9a545dfe4f34c7417ae067352709
                        • Opcode Fuzzy Hash: 59118c69d9d81c2f899acf1653fdade7dff4a41328ccaf1db3673970b3eccba6
                        • Instruction Fuzzy Hash: 8A217F715007059FDB20AFA9CC85AABBBF9FF44300F044A29E955D7260EB71E9498B91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1029 8e0ec7-8e0ed3 1030 8e0f7a-8e0f7d 1029->1030 1031 8e0ed8-8e0ee9 1030->1031 1032 8e0f83 1030->1032 1033 8e0eeb-8e0eee 1031->1033 1034 8e0ef6-8e0f0f LoadLibraryExW 1031->1034 1035 8e0f85-8e0f8b 1032->1035 1036 8e0f77 1033->1036 1037 8e0ef4 1033->1037 1038 8e0f61-8e0f6a 1034->1038 1039 8e0f11-8e0f1a GetLastError 1034->1039 1036->1030 1041 8e0f73-8e0f75 1037->1041 1040 8e0f6c-8e0f6d FreeLibrary 1038->1040 1038->1041 1042 8e0f1c-8e0f2e call 8deba9 1039->1042 1043 8e0f51 1039->1043 1040->1041 1041->1036 1044 8e0f8c-8e0f8e 1041->1044 1042->1043 1049 8e0f30-8e0f42 call 8deba9 1042->1049 1046 8e0f53-8e0f55 1043->1046 1044->1035 1046->1038 1047 8e0f57-8e0f5f 1046->1047 1047->1036 1049->1043 1052 8e0f44-8e0f4f LoadLibraryExW 1049->1052 1052->1046
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 0-537541572
                        • Opcode ID: bb3b05d0be2d82dffb68e1b05bd71f3d591feb8453452596498031304dfb272b
                        • Instruction ID: 92876fdbfed11f47e3237bc64f892c118a103a96f640a47a1d5feb2423a3c54c
                        • Opcode Fuzzy Hash: bb3b05d0be2d82dffb68e1b05bd71f3d591feb8453452596498031304dfb272b
                        • Instruction Fuzzy Hash: F521F631A05295ABCB314A269C80B6A7768FB02760F290911FD59EB2D1DEF1EC50CDE1
                        APIs
                        • WSAStartup.WS2_32(00000202,?), ref: 00898AD5
                        • WSACleanup.WS2_32 ref: 00898AF0
                        • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 00898B25
                        • QueryPerformanceFrequency.KERNEL32(00902BB8), ref: 00898B5C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressCleanupFrequencyPerformanceProcQueryStartup
                        • String ID: if_nametoindex$iphlpapi.dll
                        • API String ID: 1406996172-3097795196
                        • Opcode ID: 2ce6e58d0a31f9edb9dec83041316bd75aaacffaa98891ca59ec3931420a85b6
                        • Instruction ID: ab751f6b5185843e0d64dd0a2730951f29aa932222c2b62a0fe0cd45c7b77255
                        • Opcode Fuzzy Hash: 2ce6e58d0a31f9edb9dec83041316bd75aaacffaa98891ca59ec3931420a85b6
                        • Instruction Fuzzy Hash: EB1173707503499FDB10AFA8AC5BB6937B5FB46700F4800A9ED0ADA2D3EAB0D905C752
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00883A4A
                          • Part of subcall function 00881CBC: __EH_prolog3_GS.LIBCMT ref: 00881CC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID: GetIDFACallback : $IDFA$UUID
                        • API String ID: 2427045233-1021936933
                        • Opcode ID: 4dbfdf4d4c1e1dc3a26c8ff938249150cdc3b40112eb527b9c56dcf7cc791498
                        • Instruction ID: 906985316f8973e2297c550f930fadd66e5faa1afea1b2b6a9afe71cf3779739
                        • Opcode Fuzzy Hash: 4dbfdf4d4c1e1dc3a26c8ff938249150cdc3b40112eb527b9c56dcf7cc791498
                        • Instruction Fuzzy Hash: 0E51F561D002889ADF05FBFCC95AAADBB79FF15310F544089E515EB282DF345B0A87A3
                        APIs
                        • getsockname.WS2_32(?,?,00000080), ref: 008BDEE2
                        • WSAGetLastError.WS2_32(?,00000000,?), ref: 008BDEEC
                          • Part of subcall function 00885520: GetLastError.KERNEL32 ref: 00885527
                        Strings
                        • getsockname() failed with errno %d: %s, xrefs: 008BDF08
                        • ssloc inet_ntop() failed with errno %d: %s, xrefs: 008BDF76
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$getsockname
                        • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                        • API String ID: 3066790409-2605427207
                        • Opcode ID: cdcc00d4e64b7016b6e199eeab689068b22018e71cdff2a2c9e1a0c14657a31c
                        • Instruction ID: e92264b900583ec0041bac1d29c0b4871282f807860987282491850c3767f386
                        • Opcode Fuzzy Hash: cdcc00d4e64b7016b6e199eeab689068b22018e71cdff2a2c9e1a0c14657a31c
                        • Instruction Fuzzy Hash: 6B314872900518BBDB10FB68DC41FEE73ACFB04314F444199F90DD7252EE319A544791
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 008848F6
                          • Part of subcall function 008846B3: __EH_prolog3_GS.LIBCMT ref: 008846BA
                          • Part of subcall function 008846B3: __cftoe.LIBCMT ref: 008846F9
                        • RegCreateKeyExW.KERNELBASE(80000001,00000000,?,?,?,?,?,?,?,?,?,?,?,00901C60), ref: 00884944
                        • RegQueryValueExW.KERNELBASE(?,00000000), ref: 008849A3
                        • RegCloseKey.KERNELBASE(?), ref: 008849B1
                          • Part of subcall function 00884711: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,00000038,00000038,00000038,?,00884E56), ref: 0088472B
                          • Part of subcall function 00884711: WideCharToMultiByte.KERNEL32(00000000,00000000,00884E56,000000FF,00000000,00000000,00000000,00000000,?,00884E56,?,?,00000000), ref: 00884749
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ByteCharH_prolog3_MultiWide$CloseCreateQueryValue__cftoe
                        • String ID:
                        • API String ID: 660744412-0
                        • Opcode ID: fe6a829298fe615a1d0f28f3030c656a4b39adc7ced3393ecc517419d4f49253
                        • Instruction ID: 621a7d54ea3b888ec752195fa3cbf88058a44b6423a7e9834cc999d8cb62fcbc
                        • Opcode Fuzzy Hash: fe6a829298fe615a1d0f28f3030c656a4b39adc7ced3393ecc517419d4f49253
                        • Instruction Fuzzy Hash: 9B2131B2D4011DABDB20FBA88C89EEE7A7CFF64350F400195F909E6156DB304E458BA2
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 008847D8
                          • Part of subcall function 008846B3: __EH_prolog3_GS.LIBCMT ref: 008846BA
                          • Part of subcall function 008846B3: __cftoe.LIBCMT ref: 008846F9
                        • RegCreateKeyExW.KERNELBASE(80000001,00000000,?,?,?,?,?,?,?,?,?,?,?,00901C60), ref: 00884813
                        • RegSetValueExW.KERNELBASE(?,00000000), ref: 0088485C
                        • RegCloseKey.ADVAPI32(?), ref: 00884867
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_$CloseCreateValue__cftoe
                        • String ID:
                        • API String ID: 776060579-0
                        • Opcode ID: fa1bb27aefff0ad5770a4b5f7fcd3b105de83f4a8c6a2b41395bbce0c63ab8a1
                        • Instruction ID: 8a32f55f4428ab481b92e2154dd732939c7e38714661c04bd27827120330231d
                        • Opcode Fuzzy Hash: fa1bb27aefff0ad5770a4b5f7fcd3b105de83f4a8c6a2b41395bbce0c63ab8a1
                        • Instruction Fuzzy Hash: 95111CB1A00109ABDF14FFA8CC9AEAE3A6CFF15390F800015F901D6156EB259D5987E2
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 008849F8
                          • Part of subcall function 008846B3: __EH_prolog3_GS.LIBCMT ref: 008846BA
                          • Part of subcall function 008846B3: __cftoe.LIBCMT ref: 008846F9
                        • RegOpenKeyExW.KERNELBASE(80000001,00000000), ref: 00884A2A
                        • RegQueryValueExW.KERNELBASE(?,00000000), ref: 00884A76
                        • RegCloseKey.ADVAPI32(?), ref: 00884A84
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_$CloseOpenQueryValue__cftoe
                        • String ID:
                        • API String ID: 2160134017-0
                        • Opcode ID: 5cb9b46b940353c70eb1b5b1b59aa0321fdd0c4d2f5646c22b1858268b60b6fa
                        • Instruction ID: 27e73975552b23fee7293ae17a21673e448f6f0dc5b39a0202a65f2d778e3117
                        • Opcode Fuzzy Hash: 5cb9b46b940353c70eb1b5b1b59aa0321fdd0c4d2f5646c22b1858268b60b6fa
                        • Instruction Fuzzy Hash: A11151B290011CABDF10FB68CC46DEE376CFF15340F448065B945D6142EE308E4A4BE2
                        APIs
                          • Part of subcall function 0088E6A0: QueryPerformanceCounter.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,00889B40,00000000,00000000,00000000,00000008,00002712), ref: 0088E6B5
                          • Part of subcall function 0088E6A0: __alldvrm.LIBCMT ref: 0088E6CE
                          • Part of subcall function 0088E6A0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088E6F7
                        • WSASetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0089828B
                        Strings
                        • Failed to connect to %s port %u after %I64d ms: %s, xrefs: 0089847F
                        • Connection timeout after %ld ms, xrefs: 008984D4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CounterErrorLastPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                        • String ID: Connection timeout after %ld ms$Failed to connect to %s port %u after %I64d ms: %s
                        • API String ID: 4159349166-1645060987
                        • Opcode ID: 9362da67eeda098fe5a34a50e87a4953a381990d6a1a0b21bb119cdf585e0bd3
                        • Instruction ID: 590e77b1ea8562fdd9318d5726e21f5ce643d5fc6aa4302674e0a807b323aae4
                        • Opcode Fuzzy Hash: 9362da67eeda098fe5a34a50e87a4953a381990d6a1a0b21bb119cdf585e0bd3
                        • Instruction Fuzzy Hash: A3B17171E0421ADFEF11EFA8C941BAEB7B4FF5A314F194199E845F7202DA31AD808791
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: Connection #%ld to host %s left intact$2m
                        • API String ID: 48624451-2205184418
                        • Opcode ID: 9cdd59908e49d0c40d9946b1d1d459177d8496e6112cb311936f2124eb259dc6
                        • Instruction ID: ae0ffdb25bef0b8b1bf0da42a6d4cd6ed9919019ec4a348d47dfeab0fe7cfaa0
                        • Opcode Fuzzy Hash: 9cdd59908e49d0c40d9946b1d1d459177d8496e6112cb311936f2124eb259dc6
                        • Instruction Fuzzy Hash: AE71B770600704ABFB29FB28DC49BEA77E4FF11304F08401AE59A96192E775A994CB97
                        Strings
                        • connect to %s port %u failed: %s, xrefs: 008BC97B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: connect to %s port %u failed: %s
                        • API String ID: 0-2835513649
                        • Opcode ID: ef9c46ee181d616e446db81567a0091067b49e6133ca5365c512c1a05f86fec0
                        • Instruction ID: 5a4b42661b7f6ae98f78e7a7da836529c03fa374cb3c2739b55f4fafd2f8b8ec
                        • Opcode Fuzzy Hash: ef9c46ee181d616e446db81567a0091067b49e6133ca5365c512c1a05f86fec0
                        • Instruction Fuzzy Hash: DD511B31500608AFEB209B78DC41BEAB7A4FF15320F0442A9F9ADD6392DB716DD4CB51
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00881DC5
                          • Part of subcall function 00881CBC: __EH_prolog3_GS.LIBCMT ref: 00881CC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID: Response : $CURLcode : %d
                        • API String ID: 2427045233-2394376863
                        • Opcode ID: c08cb087da9a58b5a4a63e7f7b7b16f07a2575484a168c5b88c6441098380ba6
                        • Instruction ID: deda457c541c79a93c2ee2110325b8ad7bb271e26aadc1fbf3ccc82df85cb143
                        • Opcode Fuzzy Hash: c08cb087da9a58b5a4a63e7f7b7b16f07a2575484a168c5b88c6441098380ba6
                        • Instruction Fuzzy Hash: 8F218E31900248EACF10FBBC884AB9DBA79FF01740F104599E505E7282DF705B468BA3
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastrecv
                        • String ID: Recv failure: %s
                        • API String ID: 2514157807-4276829032
                        • Opcode ID: 0aff084a5416a5ec9e5dbe92643931810bfd3f34aa287eadda0134e626ed2c98
                        • Instruction ID: 08bb8623b70933815241761f7d6b0d85ae88f16d0e0b0ace05f0cb58a2acbefe
                        • Opcode Fuzzy Hash: 0aff084a5416a5ec9e5dbe92643931810bfd3f34aa287eadda0134e626ed2c98
                        • Instruction Fuzzy Hash: D5315C749006189FDB21DF28C880BE9BBB4FF1D314F004699E999A7352D771AA94CF81
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastsend
                        • String ID: Send failure: %s
                        • API String ID: 1802528911-857917747
                        • Opcode ID: 8bd943e2d8704a18dcaede6888c0e573581126bc0f3f74d2555b0fb4263522a0
                        • Instruction ID: 69b27d2198b15a5d42f6a0626d978bce603b32703d5bb85a8a2f7b8a3c79ef5b
                        • Opcode Fuzzy Hash: 8bd943e2d8704a18dcaede6888c0e573581126bc0f3f74d2555b0fb4263522a0
                        • Instruction Fuzzy Hash: D3210775A002189FCB11EF28C881BE9B7B4FF49324F0046A9E9589B351D7B1AE908F91
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00882063
                          • Part of subcall function 00884DFF: GetTempPathW.KERNEL32(00000400,?,?,?,00000000), ref: 00884E43
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_PathTemp
                        • String ID: ab+$evony_weblog.txt
                        • API String ID: 3218844505-291610844
                        • Opcode ID: 8438ebdd86a0e2224e415e92246b51816add7c96c061e31692840dd9dee22a75
                        • Instruction ID: 7b2c37dc4a5d69fb5b5e7e3a3a10bc06a7669b39b87e7af6249cc708f2ca7e34
                        • Opcode Fuzzy Hash: 8438ebdd86a0e2224e415e92246b51816add7c96c061e31692840dd9dee22a75
                        • Instruction Fuzzy Hash: 78010971D10108ABCF11FBA8C856EDEB7B9FF14340F908029FA11E6182DF759A45CBA2
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 008831A7
                          • Part of subcall function 00884DFF: GetTempPathW.KERNEL32(00000400,?,?,?,00000000), ref: 00884E43
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_PathTemp
                        • String ID: ab+$evony_task.txt
                        • API String ID: 3218844505-2947477237
                        • Opcode ID: 70030ec9b2594cd96f5c748dcb924878ec00eb3a42f047b2e3e7d8cb9d6d6769
                        • Instruction ID: de0ca6a8d2d5a389a6fcdfec6d7c4cc0cbcfae38b21fea7c6d5a192bc63e25e4
                        • Opcode Fuzzy Hash: 70030ec9b2594cd96f5c748dcb924878ec00eb3a42f047b2e3e7d8cb9d6d6769
                        • Instruction Fuzzy Hash: C7010C71D10108AACF11FBA8C856EDE77B9FF14341F904025FA11F6182DF759A45CBA2
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 008817D4
                          • Part of subcall function 00884DFF: GetTempPathW.KERNEL32(00000400,?,?,?,00000000), ref: 00884E43
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_PathTemp
                        • String ID: ab+$evony_download.txt
                        • API String ID: 3218844505-2981912541
                        • Opcode ID: 1756fa499399863b943fab3631379e3becacd4d10ecef6a45d70f414501f24e7
                        • Instruction ID: 5421c365835711c92469adf5cdc337410cfb3f64edc336c5d01823b595f06cbc
                        • Opcode Fuzzy Hash: 1756fa499399863b943fab3631379e3becacd4d10ecef6a45d70f414501f24e7
                        • Instruction Fuzzy Hash: 05010C71D10108AACF11FBA8C856EDE77B9FF14340F504029FA11E6182DF759A45CBA2
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00881CC3
                          • Part of subcall function 00884DFF: GetTempPathW.KERNEL32(00000400,?,?,?,00000000), ref: 00884E43
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_PathTemp
                        • String ID: ab+$evony_httprequest.txt
                        • API String ID: 3218844505-2671027422
                        • Opcode ID: 9120d31063e88d26e237b6f2f602cd34614df9e960689c2e28f7517fca9bdec7
                        • Instruction ID: 8d549dc093ef7f455a29d2d19c3e439394c61da96fc18cbbd5a09e579dbf67b4
                        • Opcode Fuzzy Hash: 9120d31063e88d26e237b6f2f602cd34614df9e960689c2e28f7517fca9bdec7
                        • Instruction Fuzzy Hash: 5A010971D10108AACF11FBA8C856EDEB7B9FF14340F908029FA11E6192DF759A45CBA2
                        APIs
                        • setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 008BE281
                        • WSAGetLastError.WS2_32(?,00000100), ref: 008BE297
                          • Part of subcall function 00885520: GetLastError.KERNEL32 ref: 00885527
                        Strings
                        • Could not set TCP_NODELAY: %s, xrefs: 008BE2A4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$setsockopt
                        • String ID: Could not set TCP_NODELAY: %s
                        • API String ID: 3136324617-4027281243
                        • Opcode ID: 343d3254bae90a3c296a648e4fac1a39ddd042f4a4885c154f6d3da3c58d2761
                        • Instruction ID: b876e3191b7db8f34a9d50edc61685133a97f786a9a52713bd80f3989d6c17b3
                        • Opcode Fuzzy Hash: 343d3254bae90a3c296a648e4fac1a39ddd042f4a4885c154f6d3da3c58d2761
                        • Instruction Fuzzy Hash: D3F09671A0421CAFDB10AF64DC46FED777CFB04704F400095FA58EB190EAB1AA844B92
                        APIs
                          • Part of subcall function 008DD7F4: GetConsoleCP.KERNEL32(008CF1D4,00000000,?), ref: 008DD83C
                        • WriteFile.KERNELBASE(?,?,00000000,008FED70,00000000,00000000,00000000,00000000,?,008FED70,00000010,008CF1D4,00000000,00000000,00000000,00000001), ref: 008DE1B2
                        • GetLastError.KERNEL32 ref: 008DE1BC
                        • __dosmaperr.LIBCMT ref: 008DE201
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ConsoleErrorFileLastWrite__dosmaperr
                        • String ID:
                        • API String ID: 251514795-0
                        • Opcode ID: 1872d7b752e37e580810ce9a742aa31fc30745beae9d57b6a950a8622bb40c72
                        • Instruction ID: b14758955edf8b7611e19b16fbc83d31177ad702cb8218b0ed88983e94076ced
                        • Opcode Fuzzy Hash: 1872d7b752e37e580810ce9a742aa31fc30745beae9d57b6a950a8622bb40c72
                        • Instruction Fuzzy Hash: D6518071A00609AAEF11ABA8C885BEEBBB9FF09355F140257E400EB352D6709D41DB61
                        APIs
                        • getaddrinfo.WS2_32(?,?,?,?), ref: 008A6F2E
                        • freeaddrinfo.WS2_32(?,?,?,008EEF04,?), ref: 008A704C
                        • WSASetLastError.WS2_32(00002AF9,?,?,008EEF04,?), ref: 008A707F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastfreeaddrinfogetaddrinfo
                        • String ID:
                        • API String ID: 1817844550-0
                        • Opcode ID: 527144c5b5eb16c3f7c71230e0429e6f46622b2dac6e08aee03b67636619a84a
                        • Instruction ID: 9d68e17aebd6259b2e16fb70bdc18be75e89c4ac2902230789c471050c247ef4
                        • Opcode Fuzzy Hash: 527144c5b5eb16c3f7c71230e0429e6f46622b2dac6e08aee03b67636619a84a
                        • Instruction Fuzzy Hash: F0417B71A04A059FEB20CFA9D884A6AB7F5FF05300B188569E859D7B10EB31ED14DBD1
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,0088DAE8,?,008DE938,0088DAE8,008FEDB0,0000000C,008DE9E0,008FEA08), ref: 008DEA58
                        • GetLastError.KERNEL32(?,008DE938,0088DAE8,008FEDB0,0000000C,008DE9E0,008FEA08), ref: 008DEA62
                        • __dosmaperr.LIBCMT ref: 008DEA8D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                        • String ID:
                        • API String ID: 490808831-0
                        • Opcode ID: 5e945a5f75b585d32660ec1801e1cd908570825b3f4c36809ec9905ea633b542
                        • Instruction ID: 68a35062e799a829e82d073728fddced5992510c8a464cd18bc01929e8d77372
                        • Opcode Fuzzy Hash: 5e945a5f75b585d32660ec1801e1cd908570825b3f4c36809ec9905ea633b542
                        • Instruction Fuzzy Hash: AB0144336042761AD62537386C4673E6749FBB3734F29031BE814DF2E2DA608C8142A5
                        APIs
                        • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,?,0088EFF9,?), ref: 0088EBE0
                        • LeaveCriticalSection.KERNEL32(?,?,?,0088EFF9,?), ref: 0088EBF3
                        • closesocket.WS2_32(?), ref: 0088EC3C
                          • Part of subcall function 008A74D0: FindCloseChangeNotification.KERNELBASE(?,?,008A74FF,?,?,0088EFA6,?,?,0000001C,?,?,0088EB68,?,00000000,00000000), ref: 008A74D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalSection$ChangeCloseEnterFindLeaveNotificationclosesocket
                        • String ID:
                        • API String ID: 1918131445-0
                        • Opcode ID: 391b268defb0b7659e86ea3ed7f7575d36cf0f7a9a95ca77010da7d4a3e13424
                        • Instruction ID: 0f3b636326cdcd3f5a9cf2376f6ff65c52c2b76f0366ecd4d8068f71fbcf091c
                        • Opcode Fuzzy Hash: 391b268defb0b7659e86ea3ed7f7575d36cf0f7a9a95ca77010da7d4a3e13424
                        • Instruction Fuzzy Hash: 1A119175800600EFCB11AF64EC89B99BF75FF09311F040054E908DB621E732B9A4DBE2
                        APIs
                        • CreateThread.KERNELBASE(0088ED00,0088EE8D,Function_0005AB78,00000000,00000000,0088ED00), ref: 008DAD1F
                        • GetLastError.KERNEL32(?,?,?,008A74B6,00000000,00000000,0088ED00,0088EE8D,00000000,00000000), ref: 008DAD2B
                        • __dosmaperr.LIBCMT ref: 008DAD32
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateErrorLastThread__dosmaperr
                        • String ID:
                        • API String ID: 2744730728-0
                        • Opcode ID: f1c65a975594864a30e3aefcff637096bd5e048efb150e54caa2cdc40761ce36
                        • Instruction ID: 1fb9b67812e9b3182b8c9ada13dafc44338096976520cc408af665c918ec62d2
                        • Opcode Fuzzy Hash: f1c65a975594864a30e3aefcff637096bd5e048efb150e54caa2cdc40761ce36
                        • Instruction Fuzzy Hash: 27018C32510209AFDF19AFA4DC05AAE7B66FF04332F20426AFC01DA350DB758D50DB92
                        APIs
                        • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,?,008DAF61,00000000,00000000,00000002,00000000), ref: 008DAEEB
                        • GetLastError.KERNEL32(?,008DAF61,00000000,00000000,00000002,00000000,?,008DE0EA,00000000,00000000,00000000,00000002,00000000,00000000,00000000,?), ref: 008DAEF5
                        • __dosmaperr.LIBCMT ref: 008DAEFC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer__dosmaperr
                        • String ID:
                        • API String ID: 2336955059-0
                        • Opcode ID: ebc24948396dc58fc203a36ee487e282b330ee4c4642c06c8580ba2048ce05d9
                        • Instruction ID: 232da8378ed7e83165599a3e7590d6bdd1739bbd3ea5ec7858817c82c5cff4df
                        • Opcode Fuzzy Hash: ebc24948396dc58fc203a36ee487e282b330ee4c4642c06c8580ba2048ce05d9
                        • Instruction Fuzzy Hash: 6201D433610559AFCF099FA9DC45CAE7B2AFB85321B34034AF811DB390EA719D0197A2
                        APIs
                        • SleepEx.KERNELBASE(00000000,00000000), ref: 008BE2E8
                        • getsockopt.WS2_32(00000004,0000FFFF,00001007,00000000,00000004), ref: 008BE303
                        • WSAGetLastError.WS2_32 ref: 008BE30D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastSleepgetsockopt
                        • String ID:
                        • API String ID: 3033474312-0
                        • Opcode ID: a5f8c1361267d7510af0f68cec27b1623f1d2aedb9cd7f27b9588218b1b9f7ba
                        • Instruction ID: 5707442cd8d5d93e586ee1846a32b25f6750d716ffbb88eeac0943ddd0ca8dda
                        • Opcode Fuzzy Hash: a5f8c1361267d7510af0f68cec27b1623f1d2aedb9cd7f27b9588218b1b9f7ba
                        • Instruction Fuzzy Hash: 0CF06D3064020AEFEB109F90D885BEE7BF8FB05704F604168EA44DB390D771EA089B91
                        APIs
                        • AcquireSRWLockExclusive.KERNEL32(00901D78,00000000,?,00881B99,?,00000000,00000000,?,00881DF7,?,008FCC78), ref: 00885219
                        • ReleaseSRWLockExclusive.KERNEL32(00901D78,?,008FCC78), ref: 0088523D
                        • ReleaseSRWLockExclusive.KERNEL32(00901D78,?,00881B99,?,00000000,00000000,?,00881DF7,?,008FCC78), ref: 0088524E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExclusiveLock$Release$Acquire
                        • String ID:
                        • API String ID: 1021914862-0
                        • Opcode ID: 78aed0ac1fc9f2e43ea9b9afe88c7bc3c16b6e0bf7a3fd8e263b0aa90e2f9ff1
                        • Instruction ID: 445b47b5fc6cb12d31854f10fec5c81c6efffb3e2f98d2f5f3e5225748492d6e
                        • Opcode Fuzzy Hash: 78aed0ac1fc9f2e43ea9b9afe88c7bc3c16b6e0bf7a3fd8e263b0aa90e2f9ff1
                        • Instruction Fuzzy Hash: DFF0EC30780B086FDB00B7A8EC4E759329AFF8430AF440164F80DD51D1FF61DD459292
                        APIs
                          • Part of subcall function 008DF054: GetLastError.KERNEL32(?,?,?,008D28C0,008DF388,?,?,008CA57C,?,?,00881DD4,00000008,00000084), ref: 008DF059
                          • Part of subcall function 008DF054: SetLastError.KERNEL32(00000000,00000006,000000FF,?,008D28C0,008DF388,?,?,008CA57C,?,?,00881DD4,00000008,00000084), ref: 008DF0F7
                        • CloseHandle.KERNEL32(?,?,?,008DAD68,?,?,008DABD6,00000000), ref: 008DAC5E
                        • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,008DAD68,?,?,008DABD6,00000000), ref: 008DAC74
                        • ExitThread.KERNEL32 ref: 008DAC7D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                        • String ID:
                        • API String ID: 1991824761-0
                        • Opcode ID: f6094c7d390ab3d38b06988aec71781c63368749f945cda28204522ea36c7f46
                        • Instruction ID: 664dc8508377abb85ccf6000ef7e18005aab9ff6bf5af310f5ab7141b80b922e
                        • Opcode Fuzzy Hash: f6094c7d390ab3d38b06988aec71781c63368749f945cda28204522ea36c7f46
                        • Instruction Fuzzy Hash: 41F05830010740ABCB296B79C94CB5A7BA8FF01370F284B11B825CB3E2CB35EC45C692
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID: UUIDSeed
                        • API String ID: 2427045233-1239208658
                        • Opcode ID: 581fb4ac9fddfc166dba2848ff12790ffc834f3ab5fd4baa96cdd5287499c635
                        • Instruction ID: fd85a77fd991e92bacd2c5ac45d68d5d44bc5a8503efaed4a90d2c9df42fef58
                        • Opcode Fuzzy Hash: 581fb4ac9fddfc166dba2848ff12790ffc834f3ab5fd4baa96cdd5287499c635
                        • Instruction Fuzzy Hash: 3C31D771D102589ACF15FBB8C89AAEDBB79FF15304F90016DE505E7282DF341A4ACB52
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID: CURLcode : %d
                        • API String ID: 2427045233-2781382427
                        • Opcode ID: 5d1f0e347181e8c941835fd7030a574e703ca3b0a3f0acf035b8478cab18be1e
                        • Instruction ID: 5ba0f57724eaa5b0c87b16dd543a5a829e08d9157d2f9d566f2f6b1ff3c198ef
                        • Opcode Fuzzy Hash: 5d1f0e347181e8c941835fd7030a574e703ca3b0a3f0acf035b8478cab18be1e
                        • Instruction Fuzzy Hash: FE118F72A00204ABDF24FBB8C84AF9E767AFF41710F104558F210EB2C2DF7599018BA6
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0088217E
                          • Part of subcall function 0088205C: __EH_prolog3_GS.LIBCMT ref: 00882063
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID: CURLcode : %d
                        • API String ID: 2427045233-2781382427
                        • Opcode ID: b94839b5c5230b5ce6aee0657b0cb5edcda0025738eb249961f2e3b0c2d0b233
                        • Instruction ID: f0b8dc78c59216dc23ed703cdc03755dcbdd8fabb67461c85417bc2305abfab4
                        • Opcode Fuzzy Hash: b94839b5c5230b5ce6aee0657b0cb5edcda0025738eb249961f2e3b0c2d0b233
                        • Instruction Fuzzy Hash: BA017171900708E6CB20BFB9894A99EBB79FF45750F20462DF315E72C2CE359A018752
                        APIs
                        • InitializeCriticalSectionEx.KERNEL32(00000000,00000000,00000001,?,?,?,?), ref: 0088EF1D
                          • Part of subcall function 008A6C80: socket.WS2_32(00000002,00000001,00000006), ref: 008A6CA9
                          • Part of subcall function 008A6C80: htonl.WS2_32(7F000001), ref: 008A6CCC
                          • Part of subcall function 008A6C80: setsockopt.WS2_32(00000000,0000FFFF,000000FB,?,00000004), ref: 008A6CFD
                          • Part of subcall function 008A6C80: bind.WS2_32(00000000,0088EF32,00000010), ref: 008A6D13
                          • Part of subcall function 008A6C80: getsockname.WS2_32(00000000,0088EF32,00000010), ref: 008A6D2B
                          • Part of subcall function 008A6C80: listen.WS2_32(00000000,00000001), ref: 008A6D47
                          • Part of subcall function 008A6C80: socket.WS2_32(00000002,00000001,00000000), ref: 008A6D5C
                          • Part of subcall function 008A6C80: connect.WS2_32(00000000,0088EF32,00000010), ref: 008A6D70
                          • Part of subcall function 008A6C80: accept.WS2_32(00000000,00000000,00000000), ref: 008A6DB6
                        • closesocket.WS2_32(?), ref: 0088EF4F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: socket$CriticalInitializeSectionacceptbindclosesocketconnectgetsocknamehtonllistensetsockopt
                        • String ID:
                        • API String ID: 2232683494-0
                        • Opcode ID: 7351297fd58b30bf675decfd0231eca8c1f463648bf441733fd1160bcc066763
                        • Instruction ID: 4e124063bd11537793b6e14f34af5dd88566837edc66f1a564b699a3ed06e8b7
                        • Opcode Fuzzy Hash: 7351297fd58b30bf675decfd0231eca8c1f463648bf441733fd1160bcc066763
                        • Instruction Fuzzy Hash: 37219F71900B06ABE720AF28DD45B95B764FF05324F004714FA28EA6D1EB71F1A5CB91
                        APIs
                        • socket.WS2_32(008AC5CB,CCC35D5E,CCCCCCCC), ref: 008BE11B
                        • socket.WS2_32(008AC5CB,00000002,CCCCCCCC), ref: 008BE137
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: socket
                        • String ID:
                        • API String ID: 98920635-0
                        • Opcode ID: 955f9a3615ac3f5d066006b713e8fc13fa210031256235bf60e260caf50024bb
                        • Instruction ID: f80dc8873c709076f9ae97b3f0a665d2018d3e27208e74f38842270b912dc815
                        • Opcode Fuzzy Hash: 955f9a3615ac3f5d066006b713e8fc13fa210031256235bf60e260caf50024bb
                        • Instruction Fuzzy Hash: E3116D35600306EFEB219F69DC84BD6BBE4FF49321F144425F568CB250D371A850DB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f7f57d1a68e88bbf926d3438810e36c36723574263d628eda361a829fd7d65da
                        • Instruction ID: d35de9bdd60a0a84500431fa032bfaaa58c4f90a00a81fb78e90819c9a6e4700
                        • Opcode Fuzzy Hash: f7f57d1a68e88bbf926d3438810e36c36723574263d628eda361a829fd7d65da
                        • Instruction Fuzzy Hash: A5014C333186969FDF26CE6EEC4495B3396FBC27207244921F914CB194EE31D8819B41
                        APIs
                        • socket.WS2_32(00000017,00000002,00000000), ref: 0089CB87
                          • Part of subcall function 0089CB40: closesocket.WS2_32(00000000), ref: 0089CB98
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: closesocketsocket
                        • String ID:
                        • API String ID: 2760038618-0
                        • Opcode ID: dd5cc85871a9dcf34fb8f18ddb4c8885f54373c8948df76ab09013ac49d984a0
                        • Instruction ID: ca85ba14f5d4f1b9be42b9669738813e95388300e58efee201a0cc64b323162d
                        • Opcode Fuzzy Hash: dd5cc85871a9dcf34fb8f18ddb4c8885f54373c8948df76ab09013ac49d984a0
                        • Instruction Fuzzy Hash: A0F024329043941FDE10A77CB84AFD53BC4BB11775F0845A1F61AAB1D2C391AC818781
                        APIs
                        • GetLastError.KERNEL32(008FEC30,0000000C), ref: 008DAB8B
                        • ExitThread.KERNEL32 ref: 008DAB92
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorExitLastThread
                        • String ID:
                        • API String ID: 1611280651-0
                        • Opcode ID: d957330fd12101ef91ffdd6fd0ebb60709c9a6bc591468b1620c71db5ce0bfcb
                        • Instruction ID: d19b6560f8216727f38b7b671351bf9b982189f8433d65d4d75b449df0fbc1b5
                        • Opcode Fuzzy Hash: d957330fd12101ef91ffdd6fd0ebb60709c9a6bc591468b1620c71db5ce0bfcb
                        • Instruction Fuzzy Hash: 68F0C271900648AFDB15ABB4C84AE2E7B76FF41310F20064AF022DB361CB399901CBA3
                        APIs
                        • getsockopt.WS2_32(0088BBD3,0000FFFF,00001008,0088BBD3,?), ref: 0088C342
                        • send.WS2_32(00000001,00000000,00000000,00000000), ref: 0088C358
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: getsockoptsend
                        • String ID:
                        • API String ID: 1606514552-0
                        • Opcode ID: 2512c84340d7a516ffe33b233a827a5dbdc0e302f1754d2beb13f78c7a113a48
                        • Instruction ID: b74878e9ba7a4348b17a1c9762201020cc02b856f03c5a6d8e6fc8caaa3d9e6c
                        • Opcode Fuzzy Hash: 2512c84340d7a516ffe33b233a827a5dbdc0e302f1754d2beb13f78c7a113a48
                        • Instruction Fuzzy Hash: 4EE0E571900208FBEF20AE50DD459BA7BACEB04315F004165BE04E5260E6719A599BA1
                        APIs
                        • AcquireSRWLockExclusive.KERNEL32(00901D78,00883551), ref: 00885295
                        • ReleaseSRWLockExclusive.KERNEL32(00901D78), ref: 008852D0
                          • Part of subcall function 00898A70: FreeLibrary.KERNEL32(00000000), ref: 00898A7D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExclusiveLock$AcquireFreeLibraryRelease
                        • String ID:
                        • API String ID: 3655034073-0
                        • Opcode ID: 8b6eb5d83c2c15c5f7d0d3fd4d40da9636b82392fcbcc78d6a9147582aa40f81
                        • Instruction ID: ef21cffef56261b6c7a620154f279b1004ae27716248470bced9e05ee547c897
                        • Opcode Fuzzy Hash: 8b6eb5d83c2c15c5f7d0d3fd4d40da9636b82392fcbcc78d6a9147582aa40f81
                        • Instruction Fuzzy Hash: 04E01770554E018FDF01BF38EE0A7043AA0FB41748B040114E401C61E2FB209A89EB16
                        APIs
                        • AcquireSRWLockExclusive.KERNEL32(00901D78), ref: 008852E9
                        • ReleaseSRWLockExclusive.KERNEL32(00901D78), ref: 00885303
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExclusiveLock$AcquireRelease
                        • String ID:
                        • API String ID: 17069307-0
                        • Opcode ID: 03b3e978445c622e9c4b64fef6bb8f6303c1be0509fc467414e590931b7a233c
                        • Instruction ID: 9259eb968e9d752ab039825bfa611878249ceee5640df9a4dd4024ff166ff211
                        • Opcode Fuzzy Hash: 03b3e978445c622e9c4b64fef6bb8f6303c1be0509fc467414e590931b7a233c
                        • Instruction Fuzzy Hash: 59D013357907147FC71037D9BC4E9957E14FF417EAF440020FA0CD91D1E551895557D1
                        APIs
                        • EnterCriticalSection.KERNEL32(?), ref: 0088EA2C
                        • LeaveCriticalSection.KERNEL32(?), ref: 0088EA38
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave
                        • String ID:
                        • API String ID: 3168844106-0
                        • Opcode ID: cf10fc99c3fc6f5de5ad8a97ca4dde9d50365df02207fedc5671ed348cc011e2
                        • Instruction ID: 3f4e637b82b8be34514d65e15127e7cdd00e8fda5f3a74ad5ccc77ddb2c5d352
                        • Opcode Fuzzy Hash: cf10fc99c3fc6f5de5ad8a97ca4dde9d50365df02207fedc5671ed348cc011e2
                        • Instruction Fuzzy Hash: 48310272B006149BDB10BF6CD8417AAF365FB95724F048675EC0CEB602EB31B89487D2
                        APIs
                        • WSACloseEvent.WS2_32(70A1EC8B), ref: 00889D27
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseEvent
                        • String ID:
                        • API String ID: 2624557715-0
                        • Opcode ID: 589af48d2206a3d1702bcd83117582386d4ab4f35c51ebf506f1ef33245d7bce
                        • Instruction ID: aee2c943e94d131c54b7385c908a9bb3694e3b4f3b4714907f63257a7cffd637
                        • Opcode Fuzzy Hash: 589af48d2206a3d1702bcd83117582386d4ab4f35c51ebf506f1ef33245d7bce
                        • Instruction Fuzzy Hash: 3221D3724007009FEF21BFA4DC89BA677D8FF01314F080465E989DA246D777E844CBA6
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateEvent
                        • String ID:
                        • API String ID: 2692171526-0
                        • Opcode ID: 651a06c7e8c7b9c7f7a232012e6a91f653e4ff5fc64e4d5b8d4850245856c879
                        • Instruction ID: e9a47561d3981823f85bd44d9816f0ca1696f6355ab4bd60d28df82281b40a1a
                        • Opcode Fuzzy Hash: 651a06c7e8c7b9c7f7a232012e6a91f653e4ff5fc64e4d5b8d4850245856c879
                        • Instruction Fuzzy Hash: 0F21D17210074A6ADB20BBB9DC46FEB77ACFF00354F04081AF699E6142E736F04487A6
                        APIs
                        • select.WS2_32(?,00000000,00000000,00000000,00000000), ref: 008A5DD9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: select
                        • String ID:
                        • API String ID: 1274211008-0
                        • Opcode ID: cdacd968a4d86863c28077033db62bb2442830ef42011445c72fb572092db59d
                        • Instruction ID: 995545163b3fffe8e606563124ef12d1048473cc14d49da00192858baee4611a
                        • Opcode Fuzzy Hash: cdacd968a4d86863c28077033db62bb2442830ef42011445c72fb572092db59d
                        • Instruction Fuzzy Hash: FE11A332900B1ADBEF315E99E848BA7BBA9FB96311F040035FD04C2540E3318CE1C691
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: __wsopen_s
                        • String ID:
                        • API String ID: 3347428461-0
                        • Opcode ID: 42816c6032f7f48ab28f6aeadcd7405d3548ae8391751bd3d21e6f01c6b44c97
                        • Instruction ID: b0ce868add6f41e55af8733a8ae669c332bb4bd9db96a1016f76126bb8656484
                        • Opcode Fuzzy Hash: 42816c6032f7f48ab28f6aeadcd7405d3548ae8391751bd3d21e6f01c6b44c97
                        • Instruction Fuzzy Hash: CD114871904109AFCB05DF58E941A9B7BF8FF48300F0541AAF809EB312D631EA219BA5
                        APIs
                        • CreateThread.KERNELBASE(00000000,00000000,Function_000018A3,00000000,00000000,00000000), ref: 008819C6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateThread
                        • String ID:
                        • API String ID: 2422867632-0
                        • Opcode ID: deeb7994f07cf3288c8e20e160cbc05392d145ab3b6fef78ab209fe0a0bebadc
                        • Instruction ID: 7960fcb8592bf714f0209991ea0ff417eb5d26093b824a36d4ada6c6763faadd
                        • Opcode Fuzzy Hash: deeb7994f07cf3288c8e20e160cbc05392d145ab3b6fef78ab209fe0a0bebadc
                        • Instruction Fuzzy Hash: BD016DB1500308AFD710EFA8D885DABBBFCFB04358B40852DF556D7201CB74EA098BA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: closesocket
                        • String ID:
                        • API String ID: 2781271927-0
                        • Opcode ID: 1275e51d919bce8182ebeae3261e110c691547f5b187440adc47704b05d08497
                        • Instruction ID: 19918d5373c491b2f26a94e0ee8436eb547f06be96253da74c780e03e3a18745
                        • Opcode Fuzzy Hash: 1275e51d919bce8182ebeae3261e110c691547f5b187440adc47704b05d08497
                        • Instruction Fuzzy Hash: 12F08132601614ABDF207E99ED85BEB7B5CFF55721F080025FE08D6251D7A1A8518BE2
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: closesocket
                        • String ID:
                        • API String ID: 2781271927-0
                        • Opcode ID: 85dae54871f58b4f74b5acfe1990ce4f11a4a6ea7c999f73a4cbbefcc95d90ea
                        • Instruction ID: a3618d394747c887282a93f207905f4a109e9ad27b3fe2c1cf8775fc95463632
                        • Opcode Fuzzy Hash: 85dae54871f58b4f74b5acfe1990ce4f11a4a6ea7c999f73a4cbbefcc95d90ea
                        • Instruction Fuzzy Hash: B6114630500B41ABC3298F28D484BE2FBA5FF45324F248B09E8BA466D2C770B9A48790
                        APIs
                        • CreateThread.KERNELBASE(00000000,00000000,Function_00001DBB,00000000), ref: 00881F3E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateThread
                        • String ID:
                        • API String ID: 2422867632-0
                        • Opcode ID: 33aa60af4cd4e033b1d53ff55ec89fe5296065ca692676a816747b4f96678929
                        • Instruction ID: 89687e55fc3857916ab801800664b3555e25b58d232af76825b95e3e38bf9b93
                        • Opcode Fuzzy Hash: 33aa60af4cd4e033b1d53ff55ec89fe5296065ca692676a816747b4f96678929
                        • Instruction Fuzzy Hash: 500167B1500218BFDB04BF998C89DAFB7BCFB45758B50411DF505D7241CB749D498BA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d786f8529e23f29d7280f9ee78b27b56014b817c999498a109911e2198da8ec0
                        • Instruction ID: 14546684a00f14ba0bae86813be421fb7cb6f107b8184bc0b167c0bac7554380
                        • Opcode Fuzzy Hash: d786f8529e23f29d7280f9ee78b27b56014b817c999498a109911e2198da8ec0
                        • Instruction Fuzzy Hash: C1F0D6325116146ADA32362DD805F5A3768FF41335F20476EF965D63C2CE74D8029593
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: a7d03b7a5cc6d06de728ae8d2d5703435c1fe1cfe2d618c95793fda37994ff89
                        • Instruction ID: 99cc0f66ecd11d5353e829b77c54a20609a3445b3d2065ee0a05350dec47d83d
                        • Opcode Fuzzy Hash: a7d03b7a5cc6d06de728ae8d2d5703435c1fe1cfe2d618c95793fda37994ff89
                        • Instruction Fuzzy Hash: 3301EC72C05159EFCF01AFA89C01AEE7FB5FB08320F154267FE58E2251E6318A61DB91
                        APIs
                        • CreateThread.KERNELBASE(00000000,00000000,Function_00001DBB), ref: 00881FB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateThread
                        • String ID:
                        • API String ID: 2422867632-0
                        • Opcode ID: 1a841a8707ed231840b265ae39b519a2e19047b75a6b32cd5946d6b99f0964a9
                        • Instruction ID: f35b309519059dddbcaaefd365b0f710695a60d3761a01d091b11311dd3adfcd
                        • Opcode Fuzzy Hash: 1a841a8707ed231840b265ae39b519a2e19047b75a6b32cd5946d6b99f0964a9
                        • Instruction Fuzzy Hash: FCF081B1500208AED710AF998C85DABFAFCFF41358740452DF445D2211DA709D098B61
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,008DF09F,00000001,00000364,00000006,000000FF,?,008D28C0,008DF388,?,?,008CA57C,?), ref: 008E14CD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 947e88b76e4184885d81da98d6829941c80b27c3815fd68e3f3b334f1be612c5
                        • Instruction ID: 59b0950706f784c47131f88049acd93702e19166c092d43e5939b2ca4cec6e33
                        • Opcode Fuzzy Hash: 947e88b76e4184885d81da98d6829941c80b27c3815fd68e3f3b334f1be612c5
                        • Instruction Fuzzy Hash: FEF0BB31504569AAEF212A67DD0DA5A375AFB42774F198151AC16DB3C0CA30D80096E9
                        APIs
                        • GetComputerNameW.KERNEL32(?,00000400), ref: 00884EB5
                          • Part of subcall function 00884711: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,00000038,00000038,00000038,?,00884E56), ref: 0088472B
                          • Part of subcall function 00884711: WideCharToMultiByte.KERNEL32(00000000,00000000,00884E56,000000FF,00000000,00000000,00000000,00000000,?,00884E56,?,?,00000000), ref: 00884749
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ComputerName
                        • String ID:
                        • API String ID: 85476001-0
                        • Opcode ID: 5db8f3c3aa5a3a89703ca0d1db7d51e86061cc319e0ed5cfdf36d44747ea6339
                        • Instruction ID: 6dab3745d56df61e56b940b4c27ea6e6c5693f5916e2cdd652ee9d667ef96c7f
                        • Opcode Fuzzy Hash: 5db8f3c3aa5a3a89703ca0d1db7d51e86061cc319e0ed5cfdf36d44747ea6339
                        • Instruction Fuzzy Hash: 8EF03172A4022CDBCB90EB688D45BDE7BF8FB44714F008095E689E6240DF749A8D8BD1
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,008CA57C,?,?,00881DD4,00000008,00000084), ref: 008DF377
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: d9249bad323b0838ca7346f9124d258c8cb098ca873aa8ac3c635d744e06a596
                        • Instruction ID: 8fd509ad6f9aa2abcc9b1206c3d521482beb99251fa0bb64e308d45bc40a6748
                        • Opcode Fuzzy Hash: d9249bad323b0838ca7346f9124d258c8cb098ca873aa8ac3c635d744e06a596
                        • Instruction Fuzzy Hash: 9FE0A021100215AAD7283779AC00B5E7748FB413B0F0A0333EE52DA382CB248880F2E5
                        APIs
                        • WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,?,?,0088EFA6,?,?,0000001C,?,?,0088EB68,?,00000000,00000000), ref: 008A74EE
                          • Part of subcall function 008A74D0: FindCloseChangeNotification.KERNELBASE(?,?,008A74FF,?,?,0088EFA6,?,?,0000001C,?,?,0088EB68,?,00000000,00000000), ref: 008A74D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotificationObjectSingleWait
                        • String ID:
                        • API String ID: 92520688-0
                        • Opcode ID: d7a8d7bf9e7b51f969270e2416bd3d29e62c1aa5d054ab7890fabeaa988b7376
                        • Instruction ID: 0dbc85a6cbed06eb02d64aabe6ce0f202ae86935a78e09b93f5d402977456add
                        • Opcode Fuzzy Hash: d7a8d7bf9e7b51f969270e2416bd3d29e62c1aa5d054ab7890fabeaa988b7376
                        • Instruction Fuzzy Hash: E7D0C236144116A7DB005B59EC01B85BF69EB45770F200231F519831E0D732612487D1
                        APIs
                        • connect.WS2_32(000000FF,?,00000000), ref: 008BDE7C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: connect
                        • String ID:
                        • API String ID: 1959786783-0
                        • Opcode ID: dd423d5f26e4f3f49828c88e041f1bfe8520eb24c6ff21d57c8f944d9875ff92
                        • Instruction ID: 64df550f6e3614c467960cac501f0bcc638590aa2ca02ed30fef03a57df33c35
                        • Opcode Fuzzy Hash: dd423d5f26e4f3f49828c88e041f1bfe8520eb24c6ff21d57c8f944d9875ff92
                        • Instruction Fuzzy Hash: BAD01230000249ABCF018F54D844AA13B99EB00328F244294F41C4E6A3D773D857C790
                        APIs
                        • CreateFileW.KERNELBASE(00000000,00000000,?,008D9C17,?,?,00000000,?,008D9C17,00000000,0000000C), ref: 008D9826
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 0693681c1d5b3e0b39e424224c051bb97f7cc50b4002b8925adb90388d608a82
                        • Instruction ID: c3ed36c6beeb32fea28c9d06c2e2a7f18ac4e578cb56b4d2b5d442c8eb58c6c5
                        • Opcode Fuzzy Hash: 0693681c1d5b3e0b39e424224c051bb97f7cc50b4002b8925adb90388d608a82
                        • Instruction Fuzzy Hash: 45D06C3200024DBFDF028F84DD46EDA3BAAFB48714F014000BA2856020C732E821AB90
                        APIs
                        • ioctlsocket.WS2_32(00000000,8004667E,008A6D87), ref: 008C66BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ioctlsocket
                        • String ID:
                        • API String ID: 3577187118-0
                        • Opcode ID: 096be7f87113da78444af3396518adaa0af6511f604c25cb8475c6130f64c1ed
                        • Instruction ID: 3313196991ce5fca2f27783986fbe6f359cec26a1fd95d182f0d7ec53f5614ea
                        • Opcode Fuzzy Hash: 096be7f87113da78444af3396518adaa0af6511f604c25cb8475c6130f64c1ed
                        • Instruction Fuzzy Hash: F7D0EA7250020CEF8B019FB1D8458DA7BADEA44225B05C43AB9199A121FA39AA64DF95
                        APIs
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEDF9
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE05
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE10
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE1B
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE26
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE31
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE3C
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE47
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE52
                          • Part of subcall function 008DEDE3: _free.LIBCMT ref: 008DEE60
                        • _free.LIBCMT ref: 008DEDD8
                          • Part of subcall function 008DF14F: RtlFreeHeap.NTDLL(00000000,00000000,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?), ref: 008DF165
                          • Part of subcall function 008DF14F: GetLastError.KERNEL32(?,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?,?), ref: 008DF177
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 1b7536861e40de0d2d0c3e422ffced93d4525d2c9806644ebd1cf6c2a8642aa3
                        • Instruction ID: 1f1a9c091148e742bdd7be504b13c0fc820ecaee7495c8452d1aebb52c344b50
                        • Opcode Fuzzy Hash: 1b7536861e40de0d2d0c3e422ffced93d4525d2c9806644ebd1cf6c2a8642aa3
                        • Instruction Fuzzy Hash: 46C01232008208AADB063A0CE806A593B96EB80750F148137B50C896619E3299A1D585
                        APIs
                        • _free.LIBCMT ref: 008CEC10
                          • Part of subcall function 008DF14F: RtlFreeHeap.NTDLL(00000000,00000000,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?), ref: 008DF165
                          • Part of subcall function 008DF14F: GetLastError.KERNEL32(?,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?,?), ref: 008DF177
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast_free
                        • String ID:
                        • API String ID: 1353095263-0
                        • Opcode ID: 534aebd3787aaa6ada94c96784685880370157dcae18fea5bfd7df3ee679a66b
                        • Instruction ID: b3e3a9ec82194b5c7e9f23b037cb595832c549b7332be3813e0a0c93564fcbdf
                        • Opcode Fuzzy Hash: 534aebd3787aaa6ada94c96784685880370157dcae18fea5bfd7df3ee679a66b
                        • Instruction Fuzzy Hash: 2AC08C3140420CFBCF00DF89E806A5EBBA8EB80320F200299FC0C47301DA72AE10A6C1
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(?,?,008A74FF,?,?,0088EFA6,?,?,0000001C,?,?,0088EB68,?,00000000,00000000), ref: 008A74D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: 84500e8feb5940457d6874ba995a9f6e5175bada5b0cd79e748d76395de8346e
                        • Instruction ID: 0111d429a6c7cca585926391f1e760175a35bc522801c215b16c31c53b77f1d7
                        • Opcode Fuzzy Hash: 84500e8feb5940457d6874ba995a9f6e5175bada5b0cd79e748d76395de8346e
                        • Instruction Fuzzy Hash: B6A0113000020CAB8A022B82EC0888ABF2CEA002A2B000020F82C0A0208B22A8A08A80
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008AFA0C
                        • _strncpy.LIBCMT ref: 008AFA2B
                        • ___from_strstr_to_strchr.LIBCMT ref: 008AFA40
                        • ___from_strstr_to_strchr.LIBCMT ref: 008AFABC
                        • ___from_strstr_to_strchr.LIBCMT ref: 008AFAE4
                        • getsockname.WS2_32(?,?,?), ref: 008AFBED
                        • WSAGetLastError.WS2_32(?,00000100), ref: 008AFC03
                        • WSAGetLastError.WS2_32 ref: 008AFCFA
                        • bind.WS2_32(FFFFFFFF,00000017,00000080), ref: 008AFD9A
                        • WSAGetLastError.WS2_32 ref: 008AFDA8
                        • getsockname.WS2_32(?,00000017,00000080), ref: 008AFE15
                        • WSAGetLastError.WS2_32(?,00000100), ref: 008AFE60
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast___from_strstr_to_strchr$getsockname$_strncpybind
                        • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                        • API String ID: 2127715558-3876000827
                        • Opcode ID: 0f7d27e4be3ac1dd36d99a9800ebb7ae57037c20755c6b17b904c68d182dbb78
                        • Instruction ID: aa5fdec8420d18cc7459bb4e77b12b3cee7f7f0d164367636b915d6ab71ecdc8
                        • Opcode Fuzzy Hash: 0f7d27e4be3ac1dd36d99a9800ebb7ae57037c20755c6b17b904c68d182dbb78
                        • Instruction Fuzzy Hash: E132E571D402299FEF209F688C45BEB7779FF45314F0401E5EA08E7242DA769E918FA1
                        Strings
                        • warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %u, xrefs: 008C0BD6
                        • SOCKS5 sub-negotiation response, xrefs: 008C0ED0
                        • initial SOCKS5 response, xrefs: 008C0C83
                        • unknown, xrefs: 008C0AEA
                        • SOCKS5 connect to %s:%d (remotely resolved), xrefs: 008C1259
                        • SOCKS5 reply has wrong address type., xrefs: 008C13F7
                        • Failed to resolve "%s" for SOCKS5 connect., xrefs: 008C1176
                        • Can't complete SOCKS5 connection to %s. (%d), xrefs: 008C132F
                        • SOCKS5 GSSAPI per-message authentication is not supported., xrefs: 008C0D4C
                        • User was rejected by the SOCKS5 server (%d %d)., xrefs: 008C0F07
                        • SOCKS5: connecting to HTTP proxy %s port %d, xrefs: 008C0B8C
                        • Received invalid version in initial SOCKS5 response., xrefs: 008C0CB0
                        • initial SOCKS5 request, xrefs: 008C0C0F, 008C0C51
                        • Excessive password length for proxy auth, xrefs: 008C0E42
                        • SOCKS5 connect request, xrefs: 008C1292
                        • No authentication method was acceptable., xrefs: 008C0D74
                        • SOCKS5 sub-negotiation request, xrefs: 008C0E92
                        • :%d, xrefs: 008C0FE5
                        • SOCKS5 connect to IPv6 %s (locally resolved), xrefs: 008C1128
                        • SOCKS5 connect request ack, xrefs: 008C12D0
                        • Undocumented SOCKS5 mode attempted to be used by server., xrefs: 008C0D98
                        • SOCKS5 reply has wrong version, version should be 5., xrefs: 008C12FD
                        • SOCKS5 connect request address, xrefs: 008C13A6
                        • SOCKS5 request granted., xrefs: 008C13D2
                        • SOCKS5 connect to IPv4 %s (locally resolved), xrefs: 008C1055
                        • Excessive user name length for proxy auth, xrefs: 008C0DE5
                        • SOCKS5 connection to %s not supported, xrefs: 008C1151
                        • SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu], xrefs: 008C0BB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: :%d$Can't complete SOCKS5 connection to %s. (%d)$Excessive password length for proxy auth$Excessive user name length for proxy auth$Failed to resolve "%s" for SOCKS5 connect.$No authentication method was acceptable.$Received invalid version in initial SOCKS5 response.$SOCKS5 GSSAPI per-message authentication is not supported.$SOCKS5 connect request$SOCKS5 connect request ack$SOCKS5 connect request address$SOCKS5 connect to %s:%d (remotely resolved)$SOCKS5 connect to IPv4 %s (locally resolved)$SOCKS5 connect to IPv6 %s (locally resolved)$SOCKS5 connection to %s not supported$SOCKS5 reply has wrong address type.$SOCKS5 reply has wrong version, version should be 5.$SOCKS5 request granted.$SOCKS5 sub-negotiation request$SOCKS5 sub-negotiation response$SOCKS5: connecting to HTTP proxy %s port %d$SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu]$Undocumented SOCKS5 mode attempted to be used by server.$User was rejected by the SOCKS5 server (%d %d).$initial SOCKS5 request$initial SOCKS5 response$unknown$warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %u
                        • API String ID: 0-1119927907
                        • Opcode ID: 9a86f13eeef2535eca72ee3ae734f758c3edb669cd3b4aa72337ffc5699e6ee6
                        • Instruction ID: ed3c18c67e977f578a2b38a6a0078045a3b535d7f528d43fbd571fef2ce6fcc5
                        • Opcode Fuzzy Hash: 9a86f13eeef2535eca72ee3ae734f758c3edb669cd3b4aa72337ffc5699e6ee6
                        • Instruction Fuzzy Hash: 93320D71A002489BCF209F289C86FFA7BB4FF56748F0440ADF94DDA243E635D9558B62
                        APIs
                        Strings
                        • getsockname() failed with errno %d: %s, xrefs: 008BD9B7
                        • bind failed with errno %d: %s, xrefs: 008BD9FD
                        • Local Interface %s is ip %s using address family %i, xrefs: 008BD688
                        • Couldn't bind to interface '%s', xrefs: 008BD728
                        • Couldn't bind to '%s', xrefs: 008BD863
                        • Name '%s' family %i resolved to '%s' family %i, xrefs: 008BD7CB
                        • Local port: %hu, xrefs: 008BDA25
                        • Bind to local port %hu failed, trying next, xrefs: 008BD924
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: htons$ErrorLastbind$___from_strstr_to_strchrgetsockname
                        • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                        • API String ID: 3019491166-586563453
                        • Opcode ID: fdbedaa53b1f80d0ac92781ed420d9db47ef3348d9fd79789c373a6342ce972f
                        • Instruction ID: 2df6511195e8175ab6a15f8d2c1aa7ab679c852fd1d15843921ad94468d7733e
                        • Opcode Fuzzy Hash: fdbedaa53b1f80d0ac92781ed420d9db47ef3348d9fd79789c373a6342ce972f
                        • Instruction Fuzzy Hash: 60E1A075A00219ABDB219F68DC89BEA77B8FF15304F0440EAF90DD7342EB319E459B61
                        APIs
                          • Part of subcall function 008B5110: ___swprintf_l.LIBCMT ref: 008B5184
                        • WSACreateEvent.WS2_32 ref: 008B4D92
                        • WSAGetLastError.WS2_32 ref: 008B4D9F
                        • WSAEventSelect.WS2_32(?,00000000,00000021), ref: 008B4DCE
                        • WSACloseEvent.WS2_32(?), ref: 008B4DDD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Event$CloseCreateErrorLastSelect___swprintf_l
                        • String ID: $Time-out$WSACloseEvent failed (%d)$WSACreateEvent failed (%d)$WSAEnumNetworkEvents failed (%d)
                        • API String ID: 3393810788-2457143120
                        • Opcode ID: fc8264514e1a00790e974a3949f6854571c2d47597567e50c4d4f4c29094b6eb
                        • Instruction ID: 1761af47295a6c606a42a4893780946c79151799144b125e1b02f2e556c2a20f
                        • Opcode Fuzzy Hash: fc8264514e1a00790e974a3949f6854571c2d47597567e50c4d4f4c29094b6eb
                        • Instruction Fuzzy Hash: A8A1E631A00A09AFDB21ABA8DC45BEEBBB5FF45310F140129F915D7392DB369D46CB81
                        APIs
                          • Part of subcall function 008846B3: __EH_prolog3_GS.LIBCMT ref: 008846BA
                          • Part of subcall function 008846B3: __cftoe.LIBCMT ref: 008846F9
                        • ShellExecuteW.SHELL32(00000000,open,00000000), ref: 00883378
                        • Sleep.KERNEL32(000003E8), ref: 008833CD
                        • ShellExecuteW.SHELL32(00000000,runas,00000000), ref: 008833FC
                        • Sleep.KERNEL32(000003E8), ref: 00883443
                        • ShellExecuteW.SHELL32(00000000,open,cmd,00000000), ref: 00883479
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExecuteShell$Sleep$H_prolog3___cftoe
                        • String ID: /c $cmd$cmd$open$open$runas$runas$savecred / user:administrator
                        • API String ID: 1063778220-2936438267
                        • Opcode ID: f3c858c4dde18cc1a2ee43a98a09b830b1833ba1b2bb8dcfb6720d68fc320692
                        • Instruction ID: 190886fbb34bc46597a3b6c498dd793661a73092bb9a66397171b0fcf15bede3
                        • Opcode Fuzzy Hash: f3c858c4dde18cc1a2ee43a98a09b830b1833ba1b2bb8dcfb6720d68fc320692
                        • Instruction Fuzzy Hash: AB415150A45348AADB01FBFC894B76D7A69FB22700F504088F659EB283DEB45B0953A7
                        Strings
                        • Too long SOCKS proxy user name, can't use, xrefs: 008C0713
                        • Hostname '%s' was found, xrefs: 008C0685
                        • connect request ack, xrefs: 008C08A1
                        • Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown., xrefs: 008C0A5D
                        • SOCKS4%s: connecting to HTTP proxy %s port %d, xrefs: 008C05A7
                        • SOCKS4 connect request, xrefs: 008C0866
                        • Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids., xrefs: 008C0A16
                        • SOCKS4 connect to IPv4 %s (locally resolved), xrefs: 008C079E
                        • SOCKS4 non-blocking resolve of %s, xrefs: 008C0621
                        • SOCKS4 connection to %s not supported, xrefs: 008C06C6
                        • SOCKS4 reply has wrong version, version should be 0., xrefs: 008C08DC
                        • Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed., xrefs: 008C0988
                        • SOCKS4 communication to %s:%d, xrefs: 008C05C2
                        • Failed to resolve "%s" for SOCKS4 connect., xrefs: 008C07BD
                        • Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client., xrefs: 008C09CF
                        • SOCKS4%s request granted., xrefs: 008C0944
                        • SOCKS4: too long host name, xrefs: 008C0900
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Hostname '%s' was found$SOCKS4 communication to %s:%d$SOCKS4 connect request$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: too long host name$Too long SOCKS proxy user name, can't use$connect request ack
                        • API String ID: 0-2902477134
                        • Opcode ID: bb163917ed54769f7e55a32ae472dc728917ec78d4a24bf82d008aeaa1b9cf1c
                        • Instruction ID: 771625a3b8b68bfa6175660a5d741c4f4f24d8f05dd6adba50577e8ae21336b8
                        • Opcode Fuzzy Hash: bb163917ed54769f7e55a32ae472dc728917ec78d4a24bf82d008aeaa1b9cf1c
                        • Instruction Fuzzy Hash: 71F12D71A002489ECB14DFA89881F7EBBF8FF45344F08809DF959DA243D635D5159B62
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: %.*s%%25%s]$%25$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                        • API String ID: 0-4261736843
                        • Opcode ID: 520a6e47c54cd6c9062660c7ddd99fd9ded37cd84ab21a7924d765e2f3e36643
                        • Instruction ID: aea419346369655cab874517c7897b80143ad92e32676284e6ab01cb042e146f
                        • Opcode Fuzzy Hash: 520a6e47c54cd6c9062660c7ddd99fd9ded37cd84ab21a7924d765e2f3e36643
                        • Instruction Fuzzy Hash: 9312ED71A002099BDF25DFA8C881BEEBBB8FF49314F140169EA99E7341D7319D04CBA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr___swprintf_l
                        • String ID: HTTP$WORKSTATION$incoming NTLM message too big$user + domain + host name too big
                        • API String ID: 1035537661-4159436325
                        • Opcode ID: 0dfbc7689bc3d898011cdf0d476fa7e265e204412ce100090f7afea36cc20f3f
                        • Instruction ID: 4cf67e8cbf95ae899e1a1d22f9e3a917aa7ccef245288561c4cb6f3e4d98fa1a
                        • Opcode Fuzzy Hash: 0dfbc7689bc3d898011cdf0d476fa7e265e204412ce100090f7afea36cc20f3f
                        • Instruction Fuzzy Hash: D5E12FB1D00218AFDF64DB58CC45FE9B7F8FB05300F5481D9E588E6281EA75EA948FA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: alnum$alpha$blank$digit$graph$lower$print$space$upper$xdigit
                        • API String ID: 0-2602438971
                        • Opcode ID: 4e4f70c6bfe7c2331d18cf52231bb48ad15e33fe2c5154f24520ace043750c2a
                        • Instruction ID: 6eb5017f1e5f443522542fd623eede7bf76f1b529e0260dd3d22cac4d913e52e
                        • Opcode Fuzzy Hash: 4e4f70c6bfe7c2331d18cf52231bb48ad15e33fe2c5154f24520ace043750c2a
                        • Instruction Fuzzy Hash: E1C1B7216080888ACB11DB789499BFA7BB6FB66358F5840EDDDC6DB242D633DD0CC351
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 1ef2521016d9437006dd397597e571068e510c2890b3a437b3a38cbab3d38465
                        • Instruction ID: d2c1a6df1f22ee861f4e98b401218708091b00f186cad916c39fecfa445a2beb
                        • Opcode Fuzzy Hash: 1ef2521016d9437006dd397597e571068e510c2890b3a437b3a38cbab3d38465
                        • Instruction Fuzzy Hash: 9CC24A71E086698FDB25CE29DD407EAB7B5FB4A304F1441EAD84DE7240E778AE818F41
                        APIs
                        • CryptAcquireContextW.ADVAPI32(00000002,00000000,00000000,00000001,F0000040,008C52F6,00000000,00000000), ref: 008C918E
                        • CryptImportKey.ADVAPI32(00000002,00000208,00000014,00000000,00000000,?), ref: 008C91DE
                        • CryptReleaseContext.ADVAPI32(00000002,00000000), ref: 008C91EC
                        • CryptEncrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000008,00000008), ref: 008C9222
                        • CryptDestroyKey.ADVAPI32(?), ref: 008C922B
                        • CryptReleaseContext.ADVAPI32(00000002,00000000), ref: 008C9236
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                        • String ID:
                        • API String ID: 3016261861-0
                        • Opcode ID: f5af7df8deb584856e95dcc6e3658c5d03f1cd2489cad8bd2bbe6aef019d3e8c
                        • Instruction ID: 3fe476aca913051c3f05ea9e0b46c31d809ec78817cf6938c753a3a9bddba0f2
                        • Opcode Fuzzy Hash: f5af7df8deb584856e95dcc6e3658c5d03f1cd2489cad8bd2bbe6aef019d3e8c
                        • Instruction Fuzzy Hash: DC314C71A4020CABDF10DF94DC45FEEB7B8FF08704F104059FA15B6190D772A9058B64
                        APIs
                        • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000), ref: 008C93DC
                        • CryptGetHashParam.ADVAPI32(00000020,00000002,?,00000020,00000000), ref: 008C93F6
                        • CryptDestroyHash.ADVAPI32(00000020), ref: 008C9404
                        • CryptReleaseContext.ADVAPI32(00000020,00000000), ref: 008C9414
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Crypt$Hash$Param$ContextDestroyRelease
                        • String ID:
                        • API String ID: 2110207923-3916222277
                        • Opcode ID: 4fb3c273e8ef8e11953727052f4ae75891c853cb3ab4f738780c605d9dc573a7
                        • Instruction ID: 773dd9282473f301128e82cff6cee6360d1e9922d9e5fee18dfea10a4fface83
                        • Opcode Fuzzy Hash: 4fb3c273e8ef8e11953727052f4ae75891c853cb3ab4f738780c605d9dc573a7
                        • Instruction Fuzzy Hash: 76F03C71640308FBEB208F90DD49F9A77BCFB04701F108094F945EA190D771EE059A64
                        APIs
                        • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000,?,?,?,008CA350,?,?,?,?,00000000,?), ref: 008C7B4C
                        • CryptGetHashParam.ADVAPI32(?,00000002,?,00000010,00000000,?,?,008CA350,?,?,?,?,00000000,?), ref: 008C7B66
                        • CryptDestroyHash.ADVAPI32(?,?,?,008CA350,?,?,?,?,00000000,?), ref: 008C7B74
                        • CryptReleaseContext.ADVAPI32(?,00000000,?,008CA350,?,?,?,?,00000000,?), ref: 008C7B84
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Crypt$Hash$Param$ContextDestroyRelease
                        • String ID:
                        • API String ID: 2110207923-0
                        • Opcode ID: 690350cc4293f66df0f6f77e1cfb516d71fe35696b5300153fd2ab1d1a08ed5e
                        • Instruction ID: 38ec9f7932ac09856d6031d599c5b137d6446bd369f753987eeb2414599bb826
                        • Opcode Fuzzy Hash: 690350cc4293f66df0f6f77e1cfb516d71fe35696b5300153fd2ab1d1a08ed5e
                        • Instruction Fuzzy Hash: 0DF0F974640708FBEB209F94DD4AF9ABBBCFB04B11F144458F909EA290D771EE059B60
                        APIs
                        • bind.WS2_32(?,00000030,?), ref: 008B6881
                        • WSAGetLastError.WS2_32(?,00000100), ref: 008B6897
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastbind
                        • String ID: bind() failed; %s
                        • API String ID: 2328862993-1141498939
                        • Opcode ID: 4d4cf10f27b84e0b397fab0f6b43cc1214678a034b93528877a739fd8728b059
                        • Instruction ID: 1b23e317eaa9a20ff9ef7c996b21d8a29ce3d98527ff593855ebbc53a259b3f5
                        • Opcode Fuzzy Hash: 4d4cf10f27b84e0b397fab0f6b43cc1214678a034b93528877a739fd8728b059
                        • Instruction Fuzzy Hash: C351C131A003089FDB20DF68D885BEAB7F4FB04314F0401B9E95DDB341EB7599948B91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$+
                        • API String ID: 0-2119060706
                        • Opcode ID: 986464289cc45ad63ed48970d4bcedd32c89ed8fbbd10783fb37c8407b18057a
                        • Instruction ID: cd33e99b8df4847f8a94d38a51a236f327bea2e619503d31be3b00c4bb8f1c94
                        • Opcode Fuzzy Hash: 986464289cc45ad63ed48970d4bcedd32c89ed8fbbd10783fb37c8407b18057a
                        • Instruction Fuzzy Hash: A4D1B171D002088BEF24DEACC8855EDBBB6FF5A324F18432AE425E76D8E7309D558B51
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,008CA515), ref: 008CEAE6
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,008CA515), ref: 008CEAF0
                        • UnhandledExceptionFilter.KERNEL32(-00000319,?,?,?,?,?,008CA515), ref: 008CEAFD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 09bb8d1541321a7a41346000cb87133d6dae3ef3caa4c1d42bfe0bf9212defe9
                        • Instruction ID: 92f42df43a0da18b85df188ffc966f2ff4dcc3a950945e01bee6219baf9572f2
                        • Opcode Fuzzy Hash: 09bb8d1541321a7a41346000cb87133d6dae3ef3caa4c1d42bfe0bf9212defe9
                        • Instruction Fuzzy Hash: F331927590122C9BCB21DF68D889B99BBB8FF18310F5041EAE81CA6251EB709F858F45
                        APIs
                        • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000040), ref: 008C7AD3
                        • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 008C7AEC
                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 008C7AF9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Crypt$Context$AcquireCreateHashRelease
                        • String ID:
                        • API String ID: 4045725610-0
                        • Opcode ID: b2c2dc820bf273af8a78d0cf7e02c74abbda2ba0a9c524a83b101563afa0d0f9
                        • Instruction ID: 5a44672f8f4ee133998c103c2b3fd8f014fda0c52c8c67fe0894e7c0c61ece38
                        • Opcode Fuzzy Hash: b2c2dc820bf273af8a78d0cf7e02c74abbda2ba0a9c524a83b101563afa0d0f9
                        • Instruction Fuzzy Hash: 14F06D31340714BBFB305A60EC05FA6BBACFB04B90F140025FB48EA0D0D6A2E9019AA8
                        APIs
                        • GetCurrentProcess.KERNEL32(?,?,008DB587,?,?,?,?,?,008D8085), ref: 008DB5AA
                        • TerminateProcess.KERNEL32(00000000,?,008DB587,?,?,?,?,?,008D8085), ref: 008DB5B1
                        • ExitProcess.KERNEL32 ref: 008DB5C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: f3b95de012ee0c2c6e1bea7ce390104feebb143db64147e03184dbfe33e571a6
                        • Instruction ID: 0229081fdbe508af2f589e339bf9648622e1601ccd45b8893c8364c99a53d29a
                        • Opcode Fuzzy Hash: f3b95de012ee0c2c6e1bea7ce390104feebb143db64147e03184dbfe33e571a6
                        • Instruction Fuzzy Hash: 51E0B631000689EFCB126F68ED49A593B79FB51351F114515F909CA231CB75EE82CB81
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: %lx
                        • API String ID: 48624451-1448181948
                        • Opcode ID: 39f294025eb2d898c960cff3fe4e3fba5e8e449dafb1c39bade50df7665059e2
                        • Instruction ID: f37bbcb8cff53a636f74c688bc0fb7b01bc12157db4b68b1167896aa6a6d2785
                        • Opcode Fuzzy Hash: 39f294025eb2d898c960cff3fe4e3fba5e8e449dafb1c39bade50df7665059e2
                        • Instruction Fuzzy Hash: 35710B32A005598FCB24CE7CC4846EDB7A2FF85324F194369D86ADB3D5E7709A45C781
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30f564046f9c29f751bea5a085f641fea3df757803c94df499156210e6dae666
                        • Instruction ID: 10a02a579a28fac881b91846d90ed21cbd8175eb74c293f67aa31d68bdc94bef
                        • Opcode Fuzzy Hash: 30f564046f9c29f751bea5a085f641fea3df757803c94df499156210e6dae666
                        • Instruction Fuzzy Hash: 5D022C75E002199FDF14CFA9D9806AEB7B1FF48314F25826AD819EB344E731AE51CB90
                        APIs
                        • htons.WS2_32(0000FEED), ref: 008B314D
                        • GetCurrentProcessId.KERNEL32(?,008B34D8,0000FF0D,?,?,?,?,?), ref: 008B3184
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CurrentProcesshtons
                        • String ID:
                        • API String ID: 2530476045-0
                        • Opcode ID: 01dfb2c33ed457c86b5e865f0f71ee954b03393b77dff1ef0c1a53573b6a923d
                        • Instruction ID: 5a786f90232bfbec5eabf34dcf216e5e86ac3258458b77ac7e6a9fe4e8eb7407
                        • Opcode Fuzzy Hash: 01dfb2c33ed457c86b5e865f0f71ee954b03393b77dff1ef0c1a53573b6a923d
                        • Instruction Fuzzy Hash: 4E0156795143808BCB008FA9D4806A6B7E4FF19310F09D28AEC4C8F317E370E990C7A5
                        APIs
                        • CryptAcquireContextW.ADVAPI32(008CA32F,00000000,00000000,00000001,F0000040,00000000,?,?,008CA32F,?,?,?,?), ref: 008CA383
                        • CryptCreateHash.ADVAPI32(008CA32F,00008002,00000000,00000000,008CA333,?,008CA32F,?,?,?,?), ref: 008CA399
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Crypt$AcquireContextCreateHash
                        • String ID:
                        • API String ID: 1914063823-0
                        • Opcode ID: 906cb9376556fb4a6703c608fa9804da9c4fd2fca9e947562ab2822857c95f43
                        • Instruction ID: 5d8eabbac035cb11d1e6e7025aef9ea353c38eaae7e96f25a194f8278cfc4cec
                        • Opcode Fuzzy Hash: 906cb9376556fb4a6703c608fa9804da9c4fd2fca9e947562ab2822857c95f43
                        • Instruction Fuzzy Hash: 73E01231280344BAEB300F56DC0AF867BA8EB85B51F204019B748BA1D0D7F1A8048BA9
                        APIs
                        • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000040), ref: 008C9393
                        • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 008C93AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Crypt$AcquireContextCreateHash
                        • String ID:
                        • API String ID: 1914063823-0
                        • Opcode ID: a22b033f741f5fa32c4aa1360ebcc5ab91425bcf40b30ad4433b3bd6e50f7ece
                        • Instruction ID: 604d1df17f54cd1850cc273d117ccdab9b7869b5e57ec3050e414047dcf0b95d
                        • Opcode Fuzzy Hash: a22b033f741f5fa32c4aa1360ebcc5ab91425bcf40b30ad4433b3bd6e50f7ece
                        • Instruction Fuzzy Hash: AAE08C31280744BAF6305A909C06F82379CAB08B51F104410F744EA0D0C6A0F50447A8
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?), ref: 008DCB40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 529f639fd2dd887cc54a556f8ef79bdbb6229d11114564418ca6910c6869081d
                        • Instruction ID: eadac1950febc26634e80ae01cff81defed0f34f79104b0131b671177556584e
                        • Opcode Fuzzy Hash: 529f639fd2dd887cc54a556f8ef79bdbb6229d11114564418ca6910c6869081d
                        • Instruction Fuzzy Hash: 3CB13A7122060ADFDB15CF28C486B657BA0FF45365F25865AE8DACF3A1C335E992CB40
                        APIs
                        • BCryptGenRandom.BCRYPT(00000000,00000004,?,00000002,?,00000004,?,0089D54C,?,00000000), ref: 008A763D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CryptRandom
                        • String ID:
                        • API String ID: 2662593985-0
                        • Opcode ID: 82a704c7cfdd38fe48221cd5e69e239fa128a753adfafa08e5296a5a36ac826e
                        • Instruction ID: 03f21b03fd14e2b2509456a3f11dac9295cb44c9f1687eb3dee2af95ef9439d4
                        • Opcode Fuzzy Hash: 82a704c7cfdd38fe48221cd5e69e239fa128a753adfafa08e5296a5a36ac826e
                        • Instruction Fuzzy Hash: B7D0C93619060CB6DF112EE8EC03F993F65EB04B64F40C014FA1C9C0E2D676D6606682
                        APIs
                        • CryptHashData.ADVAPI32(00000000,00000000,?,00000000,?,008CA344,?,?,00000000,?,?,?,?,?), ref: 008C7B21
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CryptDataHash
                        • String ID:
                        • API String ID: 4245837645-0
                        • Opcode ID: 63ed01c6ffead24f246585ed6acfee416586e93be35d66554ead6ae269664de2
                        • Instruction ID: 83fcea4367e34dcca1c92abf908aba0ad635d953a2176a03362174b64ed0f1f4
                        • Opcode Fuzzy Hash: 63ed01c6ffead24f246585ed6acfee416586e93be35d66554ead6ae269664de2
                        • Instruction Fuzzy Hash: 24C00236140248BBCF015F84DC45F997BAABB08610F088450BA184A161C772E5209B44
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_0004B875,008CAA55), ref: 008CB86E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 89599db9535002a86c8b8a61101b1831357a1e285d4958f3d84f35930b880344
                        • Instruction ID: 951c1294394c4dfb3af560b68678f8cabfa9c4478fb24bc89525ada19dcd77d7
                        • Opcode Fuzzy Hash: 89599db9535002a86c8b8a61101b1831357a1e285d4958f3d84f35930b880344
                        • Instruction Fuzzy Hash:
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 3c914f7814d80f047153fc8ac631b10664170b0e6d4f629e332436b6b6f1ed66
                        • Instruction ID: 8c1b0bf227351daa217a82f321ba2872a7e535cb88915d828a3b9c2c08608c59
                        • Opcode Fuzzy Hash: 3c914f7814d80f047153fc8ac631b10664170b0e6d4f629e332436b6b6f1ed66
                        • Instruction Fuzzy Hash: B561AB70B4064876DF38AA69898DBBEB3A5FF41304F54471FEA42DB381DB229D85C342
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 292b530de0c4d23679d86583cc15a544eb13d65052c2f2b3e6abfb1ac411d415
                        • Instruction ID: d62f0ec258986cb128684e311ea9803916fcaaa2f273a754b2fb2ec25d579196
                        • Opcode Fuzzy Hash: 292b530de0c4d23679d86583cc15a544eb13d65052c2f2b3e6abfb1ac411d415
                        • Instruction Fuzzy Hash: 08516B70624B4C6ADF388AAC84997BE679BFF12304F54071FD886DB392C611ED49DE12
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: ee5d5574ad03eecb72804002ff5797c347c6b7be818884f3846433ae843ab4a4
                        • Instruction ID: 9527d0daab9024c90a8eb9f90ba32a02bdc7a39e0775ea11005b57dc609d6546
                        • Opcode Fuzzy Hash: ee5d5574ad03eecb72804002ff5797c347c6b7be818884f3846433ae843ab4a4
                        • Instruction Fuzzy Hash: 37514B3060064DAADF389A6C84997BEA79AFF41304F640F1FE482D73C2DA11AD449F56
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: GetSystemTimePreciseAsFileTime
                        • API String ID: 0-595813830
                        • Opcode ID: 5c8f8c751d70aa38239e9113b6fb8498660f12114794fe7cf81f15f7b262969a
                        • Instruction ID: 548ad2d3f11958577dcef86f0d00ab418c58110553f879a0d229c72cf80ba72a
                        • Opcode Fuzzy Hash: 5c8f8c751d70aa38239e9113b6fb8498660f12114794fe7cf81f15f7b262969a
                        • Instruction Fuzzy Hash: 6CE0CD326503686783103ED66C45B7ABFC4F740BF1F040021FB24D5340D56518108AF1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fc2120c2c0e161f2f234969d1d07e0af2fb9852c93e277f8b8b6cf07d23c1ff0
                        • Instruction ID: 126ae07632cfc5e0cb9baeeb90e0db62467ebf9bb1514d434a048b37eae3cbb4
                        • Opcode Fuzzy Hash: fc2120c2c0e161f2f234969d1d07e0af2fb9852c93e277f8b8b6cf07d23c1ff0
                        • Instruction Fuzzy Hash: 97610131A042588BDB29DF2CD851BE8B7B5FF95304F0481EED98AD7252EA709EC1CB40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4db0593658e9479021a2efde49b333c41bc96925742926f25f845373bf4c774c
                        • Instruction ID: 4c3a39e4c006eddd314d899fafb4e56b9f81f65f3b0700bd3451eb18130857c9
                        • Opcode Fuzzy Hash: 4db0593658e9479021a2efde49b333c41bc96925742926f25f845373bf4c774c
                        • Instruction Fuzzy Hash: 8A517D71E00119EFDF04CF99C981AAEBBB2FF88314F19819AE815AB341C7359E51CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e50dcb93d3fda1474bb5313aa7ebc8e29503cf9bc882e246afe5c654c4a05cca
                        • Instruction ID: d9752e12f7b5dca9282c99e6dd3c404955ee79cbd2a3c02dbd53912d6fa6c932
                        • Opcode Fuzzy Hash: e50dcb93d3fda1474bb5313aa7ebc8e29503cf9bc882e246afe5c654c4a05cca
                        • Instruction Fuzzy Hash: 6B21C473F204384B770CC47E8C5327DB6E1C68C511744827AE8A6EA2C1E968D917E2E4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c3deaa37790a2578ca2e2f5b0a436ae1ddef19b299564e50318d9711bc6f226b
                        • Instruction ID: 1b28728ab908600b5b8231bd2f99bbc09dcc54fa77fa40ed4f76ab61b9616ec7
                        • Opcode Fuzzy Hash: c3deaa37790a2578ca2e2f5b0a436ae1ddef19b299564e50318d9711bc6f226b
                        • Instruction Fuzzy Hash: 96117B23F30C295B675C816D8C17279A5D6EBD815070F537ADC26E7284E954DE23D290
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction ID: 941377383f9a700feae015564dc76d55b15b18e3827f9a7ca2b5c51d5ae2de44
                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction Fuzzy Hash: D411087724038143E614AA2DD9B8FB7F7B5FAC6325B2D827FD041CBB54D132DA459500
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9c68a8d4a0846ebc4b09b0a145e38f1195cbc43887bcb385cbd8187a09426d5f
                        • Instruction ID: b0acc6a7603fe8ffe6fa68ea47aef5e83ed9a34e1171576b8b111d5b4c54c80f
                        • Opcode Fuzzy Hash: 9c68a8d4a0846ebc4b09b0a145e38f1195cbc43887bcb385cbd8187a09426d5f
                        • Instruction Fuzzy Hash: 14F0E22200292407EF13583D60C1BF3A79BCFE7928BA12465948C43AD2865F780FE3E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d13528613f3d186702b8748f0aa8f33204dab5f991e90667f1a69b4863009cd0
                        • Instruction ID: cac43b75da2e468efb629e4bbf93d5e8ff3463c2dfe7ed596c9eaaa90f70dec6
                        • Opcode Fuzzy Hash: d13528613f3d186702b8748f0aa8f33204dab5f991e90667f1a69b4863009cd0
                        • Instruction Fuzzy Hash: 0CE08C32A116A8EBCB24DBCDC90899AF7ECFB4AB10B11459AF904D3210C674DE00CBD1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strncpy
                        • String ID: Address already in use$Address family not supported$Address not available$Bad access$Bad argument$Bad file$Bad message size$Bad protocol$Bad quota$Blocking call in progress$Call interrupted$Call would block$Connection refused$Connection was aborted$Connection was reset$Descriptor is not a socket$Disconnected$Host down$Host not found$Host not found, try again$Host unreachable$Invalid arguments$Loop??$Name too long$Need destination address$Network down$Network has been reset$Network unreachable$No buffer space$No data record of requested type$Not empty$Operation not supported$Out of file descriptors$Process limit reached$Protocol family not supported$Protocol is unsupported$Protocol option is unsupported$Remote error$Socket has been shut down$Socket is already connected$Socket is not connected$Socket is unsupported$Something is stale$Timed out$Too many references$Too many users$Unrecoverable error in call to nameserver$Winsock library is not ready$Winsock library not initialised$Winsock version not supported
                        • API String ID: 2961919466-3442644082
                        • Opcode ID: ee3dab45b0b25bc9064933bcaffa3d1128fdf77a2624f8e7f6510be27b1387a9
                        • Instruction ID: e20097613c4da36fecbb1005d0d8654b209542e4490add400e1dc850c3c4433d
                        • Opcode Fuzzy Hash: ee3dab45b0b25bc9064933bcaffa3d1128fdf77a2624f8e7f6510be27b1387a9
                        • Instruction Fuzzy Hash: CF415831228E98C7E720289EDF0412515C4F722B9CFA84672B607CA2A4F016FF49E757
                        APIs
                        • ___swprintf_l.LIBCMT ref: 008A4E7A
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A4EA3
                        • ___swprintf_l.LIBCMT ref: 008A4EB5
                        • __allrem.LIBCMT ref: 008A4EDA
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A4EE8
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A4EF8
                        • ___swprintf_l.LIBCMT ref: 008A4F0A
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A4F30
                        • ___swprintf_l.LIBCMT ref: 008A4F42
                        • __allrem.LIBCMT ref: 008A4F64
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A4F72
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A4F82
                        • ___swprintf_l.LIBCMT ref: 008A4F94
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A4FB9
                        • ___swprintf_l.LIBCMT ref: 008A4FCB
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A4FF0
                        • ___swprintf_l.LIBCMT ref: 008A5002
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A5019
                        • ___swprintf_l.LIBCMT ref: 008A502B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$___swprintf_l$__allrem
                        • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                        • API String ID: 2797256748-2102732564
                        • Opcode ID: 5c229f414529ff1fcd2799207edd02957b4717acbbc1f6d2c86a3b399643665c
                        • Instruction ID: c69656a170df5a5e5ca3a55847410a520e03087a1e603a0eae337a725ea025ab
                        • Opcode Fuzzy Hash: 5c229f414529ff1fcd2799207edd02957b4717acbbc1f6d2c86a3b399643665c
                        • Instruction Fuzzy Hash: 5B417476B806643AFD20659D6C03FBB521DFBC2F65F091029FB14F7582D6A5AD1002EB
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B4A0F
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B4A5C
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B4A6E
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B4A83
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B4AEF
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B4B04
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B4B19
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B4B32
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.88.1%sQUIT$CLIENT libcurl 7.88.1DEFINE %s %sQUIT$CLIENT libcurl 7.88.1MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                        • API String ID: 601868998-1837057609
                        • Opcode ID: c28b4d60cdcf8e4abc6187659500c5121b117fc423bd68c079e545e948243372
                        • Instruction ID: da79375556592318dc5c386d42385cd1981577f6a679649df7331a10b49091ba
                        • Opcode Fuzzy Hash: c28b4d60cdcf8e4abc6187659500c5121b117fc423bd68c079e545e948243372
                        • Instruction Fuzzy Hash: 7F710871E402097ADB222A649C03FAB7E64FF51754F185064FE58EA393FB75CE118392
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$netascii$octet$tftp_send_first: internal error$timeout$tsize
                        • API String ID: 48624451-119092532
                        • Opcode ID: 1412b586d624948f9bded26a974e7ccc4faf7f81b82907e8daa3dfca37c5f90d
                        • Instruction ID: a69b1d5125c6ee24765e82e86e8327819aad6c2a5b73f20f55404770e6df5d42
                        • Opcode Fuzzy Hash: 1412b586d624948f9bded26a974e7ccc4faf7f81b82907e8daa3dfca37c5f90d
                        • Instruction Fuzzy Hash: 3EC1E671A00608ABDB20EF6CDC85BEEB7B8FF45304F0001A9E55DD7352EB35AA548B91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l$ErrorLastsend
                        • String ID: %127[^,]%1[,]%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s$%c%s%c%s$Sending data failed (%d)
                        • API String ID: 1939966535-3533120981
                        • Opcode ID: bb94758998c2cb1e25b3e532147e14054e8073e5183bc0fd3a471fa95f8dfbfd
                        • Instruction ID: 1e15b88c0f4318b62436caab07640ba7770273215a236e0183ca1eba9cfb2fa2
                        • Opcode Fuzzy Hash: bb94758998c2cb1e25b3e532147e14054e8073e5183bc0fd3a471fa95f8dfbfd
                        • Instruction Fuzzy Hash: A771D976740219BFEB20DB28CC46FEB776CFB44704F0401A5F649E7283EA75AA548B91
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A5274
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A530D
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A5331
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A5344
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A5385
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A53E3
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A5410
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A5423
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A547D
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A559F
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A55AF
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A55D5
                        Strings
                        • ** Resuming transfer from byte position %I64d, xrefs: 008A52A0
                        • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 008A56A4
                        • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 008A52B3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                        • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                        • API String ID: 885266447-664487449
                        • Opcode ID: ee61f68870c69d1a6c4bac300c3b5c4de0c414fe21298e4cb37c9bf225e05f07
                        • Instruction ID: 1ca5ccf54a948bea2df5c2f649584b41417398f628cc350ac712616d65faaa49
                        • Opcode Fuzzy Hash: ee61f68870c69d1a6c4bac300c3b5c4de0c414fe21298e4cb37c9bf225e05f07
                        • Instruction Fuzzy Hash: 32D17CB5D00B099FEB209B68CC81FAAB7BAFF89304F144518F95DE3251DA75A990CF11
                        APIs
                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 008CA83F
                          • Part of subcall function 008CA866: InitializeCriticalSectionAndSpinCount.KERNEL32(00901DB8,00000FA0,87477601,?,?,?,?,008ECD41,000000FF), ref: 008CA895
                          • Part of subcall function 008CA866: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,008ECD41,000000FF), ref: 008CA8A0
                          • Part of subcall function 008CA866: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,008ECD41,000000FF), ref: 008CA8B1
                          • Part of subcall function 008CA866: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 008CA8C7
                          • Part of subcall function 008CA866: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 008CA8D5
                          • Part of subcall function 008CA866: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 008CA8E3
                          • Part of subcall function 008CA866: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008CA90E
                          • Part of subcall function 008CA866: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008CA919
                        • ___scrt_fastfail.LIBCMT ref: 008CA860
                          • Part of subcall function 008CA825: __onexit.LIBCMT ref: 008CA82B
                        Strings
                        • kernel32.dll, xrefs: 008CA8AC
                        • WakeAllConditionVariable, xrefs: 008CA8DB
                        • InitializeConditionVariable, xrefs: 008CA8C1
                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 008CA89B
                        • SleepConditionVariableCS, xrefs: 008CA8CD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                        • API String ID: 66158676-1714406822
                        • Opcode ID: 1c9ce9660ec371afa263812db056159974b2c025650bc9866715f952e2266dc9
                        • Instruction ID: 4321d379ad5174b189fbd9c0db58c00fab823d49f3c3931c68a85a72fd9747e9
                        • Opcode Fuzzy Hash: 1c9ce9660ec371afa263812db056159974b2c025650bc9866715f952e2266dc9
                        • Instruction Fuzzy Hash: 38212632644759AFC7181BB8EC86F697BB8FB40B68F04423EF921DA2D0DA74CC054652
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID: Instalando$Instalarea$Instalatzen$Installation$Installazione$Installerar$Installerer$Installieren$Installing$Memasang$Menginstal$ci $install_key
                        • API String ID: 2931989736-3701843162
                        • Opcode ID: cbd8060d300eed869439c13d970b047af453118e966def7d042b90a95250f380
                        • Instruction ID: 21ed6cc28e96258169c2023ae011a5caabe18ca90bfa4c0a1ae6adfe5e45d9e5
                        • Opcode Fuzzy Hash: cbd8060d300eed869439c13d970b047af453118e966def7d042b90a95250f380
                        • Instruction Fuzzy Hash: F7313E3EC8412E924EA979BC8B4C078390DF501368F9922729B4DEB658CE16CE0B9781
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: AUTH %s$CCC$Entry path is '%s'$Failed to figure out path$Got a %03d ftp-server response when 220 was expected$PROT %c$SYST$unsupported parameter to CURLOPT_FTPSSLAUTH: %d
                        • API String ID: 0-2528806524
                        • Opcode ID: aa9b41de9a147b19f99ce7b767136d7aee4c0a85cde591e2289243ffb2bbd65b
                        • Instruction ID: 10ff00f9ff344aefbcead7186f4fc0a0d29ba0d05ff5bece9e374064604e5219
                        • Opcode Fuzzy Hash: aa9b41de9a147b19f99ce7b767136d7aee4c0a85cde591e2289243ffb2bbd65b
                        • Instruction Fuzzy Hash: A4D13671B012086FE7109AACAC45BFBF798FF02319F040276F918D6352EB7659648BD6
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strncpy$___swprintf_l
                        • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$1$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                        • API String ID: 1627702573-1116758244
                        • Opcode ID: c630ac1e2d5dbb7a8177342d51b9d0bb4ddb0b7a1760da87cd4648af00d1a143
                        • Instruction ID: 2c6ff56c7b8736866e9f40d7646ee762fcd3aa3b7ac17ccbb740c5806dd9842e
                        • Opcode Fuzzy Hash: c630ac1e2d5dbb7a8177342d51b9d0bb4ddb0b7a1760da87cd4648af00d1a143
                        • Instruction Fuzzy Hash: 7D71B071900608ABDF20AB64DC42FDBB3F8FF14308F4444AAF559D6342EF75AA548B92
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 0089CCD9
                        • ___from_strstr_to_strchr.LIBCMT ref: 0089CD76
                        Strings
                        • (non-permanent), xrefs: 0089CF13
                        • *, xrefs: 0089CF42
                        • RESOLVE %s:%d is - old addresses discarded, xrefs: 0089CE98
                        • %255[^:]:%d, xrefs: 0089CC1F
                        • Couldn't parse CURLOPT_RESOLVE entry '%s', xrefs: 0089D008
                        • Resolve address '%s' found illegal, xrefs: 0089CFC5
                        • RESOLVE %s:%d is wildcard, enabling wildcard checks, xrefs: 0089CF61
                        • Added %s:%d:%s to DNS cache%s, xrefs: 0089CF34
                        • +, xrefs: 0089CF0C
                        • Couldn't parse CURLOPT_RESOLVE removal entry '%s', xrefs: 0089CC34
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: (non-permanent)$%255[^:]:%d$*$+$Added %s:%d:%s to DNS cache%s$Couldn't parse CURLOPT_RESOLVE entry '%s'$Couldn't parse CURLOPT_RESOLVE removal entry '%s'$RESOLVE %s:%d is - old addresses discarded$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal
                        • API String ID: 601868998-1491845622
                        • Opcode ID: c0e76c92360aec9fa8c693266fa8eaea14b536403f9064cb29bde296ab1ce059
                        • Instruction ID: f013f68df30d620dbd94442f1f4f77bf382608e62dc414fe5af028b3ddde32ca
                        • Opcode Fuzzy Hash: c0e76c92360aec9fa8c693266fa8eaea14b536403f9064cb29bde296ab1ce059
                        • Instruction Fuzzy Hash: ECC1D3719002199FDF31AB28CC45BAAB7B9FF45304F1800E5E94AE7242E7769E85CF91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $-$0123456789-$<DIR>$>$rwx-tTsS
                        • API String ID: 0-2637997468
                        • Opcode ID: ee567d044adfc63b39c97256a84242e6e0e3c7db7bb86a48bc64096ed24ca421
                        • Instruction ID: cd4e6a6ef4282ad949d56a7e66de5ee12df20e1902ffd96a69a660339f972668
                        • Opcode Fuzzy Hash: ee567d044adfc63b39c97256a84242e6e0e3c7db7bb86a48bc64096ed24ca421
                        • Instruction Fuzzy Hash: 7BD1E0B0944A05CFD720CF29D588B22BBF1FB15308F544A2DD496CBA91DB76E858CB91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l$___from_strstr_to_strchr$_strcspn_strncpy
                        • String ID: %s: %s$Host$X-%s-Date$host:%s$x-%s-date:%s
                        • API String ID: 3366692856-564785004
                        • Opcode ID: 46b6595620d39735adfd9bfa4647428903de6d27d00b42522ca26270a520cb0e
                        • Instruction ID: 9b91d1c60e46b48cc01a1dba2f00eb854f60e8396e901b72b3d1276368538e75
                        • Opcode Fuzzy Hash: 46b6595620d39735adfd9bfa4647428903de6d27d00b42522ca26270a520cb0e
                        • Instruction Fuzzy Hash: FFA18071A00259ABDF219B289C41FAA7BB8FF15704F0841BDE949E7343F731D9648BA1
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008AE740
                        Strings
                        • Weirdly formatted EPSV reply, xrefs: 008AE7EE
                        • Illegal port number in EPSV reply, xrefs: 008AE79C
                        • Bad PASV/EPSV response: %03d, xrefs: 008AEB7A
                        • %u,%u,%u,%u,%u,%u, xrefs: 008AE860
                        • Skip %u.%u.%u.%u for data connection, re-use %s instead, xrefs: 008AE8EF
                        • Can't resolve new host %s:%hu, xrefs: 008AEA59
                        • Can't resolve proxy host %s:%hu, xrefs: 008AE999
                        • Couldn't interpret the 227-response, xrefs: 008AE879
                        • %u.%u.%u.%u, xrefs: 008AE910
                        • %c%c%c%u%c, xrefs: 008AE767
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                        • API String ID: 601868998-4245554271
                        • Opcode ID: 77fd41ee47a574db901e23e5bff4396b73655b4a309c19d2b09db7393cc1b5c3
                        • Instruction ID: 9af7c2859e36ef1cf589d78e00e19bb47a67eb357b28f46b371f3c1da5e469a6
                        • Opcode Fuzzy Hash: 77fd41ee47a574db901e23e5bff4396b73655b4a309c19d2b09db7393cc1b5c3
                        • Instruction Fuzzy Hash: D4D1E671900209ABFF20ABA8DC85BFFB7B8FF45315F040829F91AE2642E73599548761
                        APIs
                        Strings
                        • Remembering we are in dir "%s", xrefs: 008AC74F
                        • partial download completed, closing connection, xrefs: 008AC8F4
                        • server did not report OK, got %d, xrefs: 008AC92F
                        • ABOR, xrefs: 008AC7B5
                        • control connection looks dead, xrefs: 008AC8A8
                        • Received only partial file: %I64d bytes, xrefs: 008ACA5C
                        • No data was received, xrefs: 008ACA42
                        • Uploaded unaligned file size (%I64d out of %I64d bytes), xrefs: 008AC9CD
                        • Failure sending ABOR command: %s, xrefs: 008AC7D9
                        • Exceeded storage allocation, xrefs: 008AC94A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: ABOR$Exceeded storage allocation$Failure sending ABOR command: %s$No data was received$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                        • API String ID: 48624451-265991785
                        • Opcode ID: ba952fab2cb9cfd09d052e71936e06b6b137614b524c3c7fd86330499926afd4
                        • Instruction ID: 18a7a33110e149591bdd6795d0aa7f014fb6236b1312e154a780d4870ca7057f
                        • Opcode Fuzzy Hash: ba952fab2cb9cfd09d052e71936e06b6b137614b524c3c7fd86330499926afd4
                        • Instruction Fuzzy Hash: A3E1C3B0900248AFFF21DF2CC885BBA7BA5FF42314F184169E859DB653D775A940CBA1
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 008E5C61
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E5835
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E5847
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E5859
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E586B
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E587D
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E588F
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E58A1
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E58B3
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E58C5
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E58D7
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E58E9
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E58FB
                          • Part of subcall function 008E5818: _free.LIBCMT ref: 008E590D
                        • _free.LIBCMT ref: 008E5C56
                          • Part of subcall function 008DF14F: RtlFreeHeap.NTDLL(00000000,00000000,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?), ref: 008DF165
                          • Part of subcall function 008DF14F: GetLastError.KERNEL32(?,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?,?), ref: 008DF177
                        • _free.LIBCMT ref: 008E5C78
                        • _free.LIBCMT ref: 008E5C8D
                        • _free.LIBCMT ref: 008E5C98
                        • _free.LIBCMT ref: 008E5CBA
                        • _free.LIBCMT ref: 008E5CCD
                        • _free.LIBCMT ref: 008E5CDB
                        • _free.LIBCMT ref: 008E5CE6
                        • _free.LIBCMT ref: 008E5D1E
                        • _free.LIBCMT ref: 008E5D25
                        • _free.LIBCMT ref: 008E5D42
                        • _free.LIBCMT ref: 008E5D5A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: ea921dcc7c39563448e58976303d404883c5c0b01a2c83b145a3486ba097d217
                        • Instruction ID: 88adf2937f6a0d2744f66936edc0314eb3ad0b9ec09edee361c4ea4efd43a7d0
                        • Opcode Fuzzy Hash: ea921dcc7c39563448e58976303d404883c5c0b01a2c83b145a3486ba097d217
                        • Instruction Fuzzy Hash: 99317A31600B84DFEB22AA3ADC45B5A73E9FF42314F24452AE15AC7292DF31EC809B11
                        APIs
                        • GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo), ref: 008C29D6
                        • GetProcAddress.KERNEL32(00000000), ref: 008C29DD
                        • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000004,?,?,?,?), ref: 008C2AB8
                        • VerSetConditionMask.KERNEL32(00000000,?,00000001,00000004,?,?,?), ref: 008C2AC4
                        • VerSetConditionMask.KERNEL32(00000000,?,00000010,00000005,?,00000020,00000005,?,00000001,00000004,?,?,?), ref: 008C2AE3
                        • VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,00000005,?,00000020,00000005,?,00000001,00000004,?,?,?), ref: 008C2AF1
                        • RtlVerifyVersionInfo.NTDLL(0000011C,00000033,00000000), ref: 008C2B15
                        • VerifyVersionInfoW.KERNEL32(0000011C,00000033,00000000), ref: 008C2B1E
                        • VerifyVersionInfoW.KERNEL32(0000011C,00000004,00000000), ref: 008C2B9D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ConditionMask$InfoVerifyVersion$AddressHandleModuleProc
                        • String ID: RtlVerifyVersionInfo$ntdll
                        • API String ID: 574519269-1699696460
                        • Opcode ID: 9ed93a787cac50f3a22e4ffc93d9aa6305e14d6d2f7b72a10f35f61f116b4983
                        • Instruction ID: 15d9111caf7a8c1fb4638ea6486d9ea22460b79776b1e60c4ea44b56b1e62711
                        • Opcode Fuzzy Hash: 9ed93a787cac50f3a22e4ffc93d9aa6305e14d6d2f7b72a10f35f61f116b4983
                        • Instruction Fuzzy Hash: 0B51C371A41228EFDB219F68DC45FE97BB8FB49310F04009AF909E72D1C6B1DD948B51
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: __vfwprintf_l
                        • String ID: %s, algorithm=%s$%s, opaque="%s"$%s, userhash=true$%s:%s$%s:%s:%08x:%s:%s:%s$%s:%s:%s$auth-int$username="%s", realm="%s", nonce="%s", uri="%s", cnonce="%s", nc=%08x, qop=%s, response="%s"$username="%s", realm="%s", nonce="%s", uri="%s", response="%s"
                        • API String ID: 1051920573-3681598253
                        • Opcode ID: 7e9cd1057bcc31828aae71cc70aec18daeb95872cc797af201c8956e252c335c
                        • Instruction ID: 2df6b4808e75dc105419e8aaacf823597eff752826e8c56878ef85c93b7aa12a
                        • Opcode Fuzzy Hash: 7e9cd1057bcc31828aae71cc70aec18daeb95872cc797af201c8956e252c335c
                        • Instruction Fuzzy Hash: 7AE19271A00219AFDF159FA4CC54FEAB7B8FF09304F044198EA09E7241EB35DE858BA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                        • API String ID: 48624451-2994854565
                        • Opcode ID: f7459262ffa442c9f38443d150c9facd852800fe335ea87ee746bfcefd38ed8d
                        • Instruction ID: bd27c79619eca19e9df63d7ebe2e6aed96eca2e34ab217c5c5bdf8f9b1068005
                        • Opcode Fuzzy Hash: f7459262ffa442c9f38443d150c9facd852800fe335ea87ee746bfcefd38ed8d
                        • Instruction Fuzzy Hash: 9DB1C171A00208AFEB10EF68DC45BEE7BB8FF45314F184029F949D7252E735AA44CB91
                        APIs
                          • Part of subcall function 0089FA90: ___from_strstr_to_strchr.LIBCMT ref: 0089FABB
                        • ___swprintf_l.LIBCMT ref: 008A2AE1
                        Strings
                        • Successfully compiled trailers., xrefs: 008A28DA
                        • operation aborted by callback, xrefs: 008A2960
                        • Signaling end of chunked upload after trailers., xrefs: 008A2BCC
                        • Signaling end of chunked upload via terminating chunk., xrefs: 008A2B36
                        • Read callback asked for PAUSE when not supported, xrefs: 008A29F7
                        • operation aborted by trailing headers callback, xrefs: 008A298A
                        • %zx%s, xrefs: 008A2AC4
                        • Moving trailers state machine from initialized to sending., xrefs: 008A285D
                        • read function returned funny value, xrefs: 008A2A50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr___swprintf_l
                        • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                        • API String ID: 1035537661-2219359609
                        • Opcode ID: e8993e47af9e0ae206a831065e23b4b4262ce59809179f997fa272f8f59d02b7
                        • Instruction ID: c85d016167782695c65ee9c6cb3bf52cfcffad5c6ce570fabe3eb690bb7c82cf
                        • Opcode Fuzzy Hash: e8993e47af9e0ae206a831065e23b4b4262ce59809179f997fa272f8f59d02b7
                        • Instruction Fuzzy Hash: 94A1E431B00209ABEB24EF7CC886BFEFBA5FF56314F040229F918D6242D77558558B92
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 0089E739
                        • ___from_strstr_to_strchr.LIBCMT ref: 0089E74F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: %s$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                        • API String ID: 601868998-2985882615
                        • Opcode ID: af9f71b72e3776f121fb9fce47c10d4b874b8f8ab1a4fa73387b3aca6cd69f80
                        • Instruction ID: 31390d2152fdd9946915b8d6f98bcbba22c96b7ed034da71dc9c13868f5c8550
                        • Opcode Fuzzy Hash: af9f71b72e3776f121fb9fce47c10d4b874b8f8ab1a4fa73387b3aca6cd69f80
                        • Instruction Fuzzy Hash: D981F635A002096BEF21EA689C45BEA7F91FF66308F1C8074EC48DB246E776DD46C752
                        APIs
                        Strings
                        • %04d%02d%02d%02d%02d%02d, xrefs: 008AE4C4
                        • Skipping time comparison, xrefs: 008AE6A7
                        • unsupported MDTM reply format, xrefs: 008AE46B
                        • %04d%02d%02d %02d:%02d:%02d GMT, xrefs: 008AE501
                        • MDTM failed: file does not exist or permission problem, continuing, xrefs: 008AE47E
                        • The requested document is not old enough, xrefs: 008AE6A0
                        • The requested document is not new enough, xrefs: 008AE655
                        • Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT, xrefs: 008AE5D5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: %04d%02d%02d %02d:%02d:%02d GMT$%04d%02d%02d%02d%02d%02d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT$MDTM failed: file does not exist or permission problem, continuing$Skipping time comparison$The requested document is not new enough$The requested document is not old enough$unsupported MDTM reply format
                        • API String ID: 48624451-3776558615
                        • Opcode ID: 3ab7a4c6b875797c1a56d9be90ca056d58c352cc754d91c8e94fdb1e265ab6b7
                        • Instruction ID: 9dc09bece7d69570a5e54f67ff646311b82b15a1a0f664c19c21dd7b1c3ce414
                        • Opcode Fuzzy Hash: 3ab7a4c6b875797c1a56d9be90ca056d58c352cc754d91c8e94fdb1e265ab6b7
                        • Instruction Fuzzy Hash: 7961C431A00618ABEF21DB68CC45FEAB3B9FF66304F044C99F559D2642E731AA44CF52
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A571F
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A575D
                        • ___swprintf_l.LIBCMT ref: 008A57B5
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A57CD
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008A5802
                        • ___swprintf_l.LIBCMT ref: 008A5817
                        • ___swprintf_l.LIBCMT ref: 008A5832
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$___swprintf_l
                        • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd
                        • API String ID: 2070094197-564197712
                        • Opcode ID: cca40eb52ecdf04e6b60f69dae591d2b942a2f12d27f392bdb3b607b6e4ded9a
                        • Instruction ID: e7367b21dcecf88151aa0ca5bca26fdd3e3434fd3c0b87860210980b5872fe82
                        • Opcode Fuzzy Hash: cca40eb52ecdf04e6b60f69dae591d2b942a2f12d27f392bdb3b607b6e4ded9a
                        • Instruction Fuzzy Hash: D041F773B006187AEB14596D8C42FAEBB69EB84B60F050169FD08EB291E5B19D5042D1
                        APIs
                        • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 008B72DF
                        • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 008B738D
                        • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 008B749E
                        Strings
                        • Received unexpected DATA packet block %d, expecting block %d, xrefs: 008B732B
                        • tftp_rx: internal error, xrefs: 008B74BD
                        • Received last DATA packet block %d again., xrefs: 008B728E
                        • Timeout waiting for block %d ACK. Retries = %d, xrefs: 008B73D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: sendto
                        • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                        • API String ID: 1876886790-2298932677
                        • Opcode ID: a4f8383a7420da0de848147ec98590bf2c81b1576f0bf2d4d58d6ce040857ee0
                        • Instruction ID: 63e298959b0102c170c3b02ce36a3c0a1f9d19f614dbc4437c3ab1ac585dab76
                        • Opcode Fuzzy Hash: a4f8383a7420da0de848147ec98590bf2c81b1576f0bf2d4d58d6ce040857ee0
                        • Instruction Fuzzy Hash: 2F718071700605BBD714AF78DC42BEAB7A8FF44315F40012AFA2DD6291E735A97487D2
                        APIs
                        Strings
                        • REST %I64d, xrefs: 008AF1DD
                        • Offset (%I64d) was beyond file size (%I64d), xrefs: 008AF156
                        • RETR %s, xrefs: 008AF20C
                        • File already completely downloaded, xrefs: 008AF191
                        • Maximum file size exceeded, xrefs: 008AF0B1
                        • Instructs server to resume from offset %I64d, xrefs: 008AF1C3
                        • ftp server doesn't support SIZE, xrefs: 008AF0EE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: File already completely downloaded$Instructs server to resume from offset %I64d$Maximum file size exceeded$Offset (%I64d) was beyond file size (%I64d)$REST %I64d$RETR %s$ftp server doesn't support SIZE
                        • API String ID: 48624451-1529409809
                        • Opcode ID: a3b80c14a56c54211cdb80a9ba02223d06e3c3cd350556fb48b195b365b9b5a8
                        • Instruction ID: a611f8a2cc018590b962ad965afca04c293318892152a8b2d39243eb4e0a85ad
                        • Opcode Fuzzy Hash: a3b80c14a56c54211cdb80a9ba02223d06e3c3cd350556fb48b195b365b9b5a8
                        • Instruction Fuzzy Hash: EF512A75B00A04ABEB119FACDC41AAEB7E4FF46324F144239FA28D2742EB34B9544791
                        APIs
                        • _free.LIBCMT ref: 008DEDF9
                          • Part of subcall function 008DF14F: RtlFreeHeap.NTDLL(00000000,00000000,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?), ref: 008DF165
                          • Part of subcall function 008DF14F: GetLastError.KERNEL32(?,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?,?), ref: 008DF177
                        • _free.LIBCMT ref: 008DEE05
                        • _free.LIBCMT ref: 008DEE10
                        • _free.LIBCMT ref: 008DEE1B
                        • _free.LIBCMT ref: 008DEE26
                        • _free.LIBCMT ref: 008DEE31
                        • _free.LIBCMT ref: 008DEE3C
                        • _free.LIBCMT ref: 008DEE47
                        • _free.LIBCMT ref: 008DEE52
                        • _free.LIBCMT ref: 008DEE60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 722d48124e38c9aa3bbaeaa5dc7b066a75e130d23686cea677ba71905e4a716e
                        • Instruction ID: 99e7fdbe12ee46ac828b92fb8c4acf69df89d61e4999f1edea374dcee96cc455
                        • Opcode Fuzzy Hash: 722d48124e38c9aa3bbaeaa5dc7b066a75e130d23686cea677ba71905e4a716e
                        • Instruction Fuzzy Hash: 77216776910148EFCF42EF98C881DDE7BB9FF48350B0146A6B615DB222DB31EA549B81
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: %02x$CATE$auth$md5-sess$username="%s",realm="%s",nonce="%s",cnonce="%s",nc="%s",digest-uri="%s",response=%s,qop=%s
                        • API String ID: 48624451-1073696028
                        • Opcode ID: 7b3cac79a5bf898515ce8156b18db722e17fd9ec120d1e80fdf8a1febbd9904d
                        • Instruction ID: 483b424e27c9a5818322afb6f2c11a0c40d76c1aa5956c7e67c3858a79221d5d
                        • Opcode Fuzzy Hash: 7b3cac79a5bf898515ce8156b18db722e17fd9ec120d1e80fdf8a1febbd9904d
                        • Instruction Fuzzy Hash: 79E122729042186ADF15AB788C96FFE773DFF06304F044198F944E6143EA76DB498BA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strstr
                        • String ID: $ $ $ $0123456789-$<DIR>$rwx-tTsS
                        • API String ID: 2882301372-3290461796
                        • Opcode ID: b1dde5c0395d8eb2c4a483412970eb3799490e9559b89ac5b3ea9ebb6c280cb0
                        • Instruction ID: 8cfeabc1266bf9972b7e1f46073424d785f45b6e4709a17779186cfae66893f0
                        • Opcode Fuzzy Hash: b1dde5c0395d8eb2c4a483412970eb3799490e9559b89ac5b3ea9ebb6c280cb0
                        • Instruction Fuzzy Hash: 4EC102B0944A05CFD730CF29D588B26BBF1FB15308F548A2DD496CBA91DB36E858CB91
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008BA157
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: ../$..?$/..$/../$/..?$/./$/.?
                        • API String ID: 601868998-4105558521
                        • Opcode ID: 9003014659c5aede255f5a88907de72849157836d1f2ef043f0de69748da36d6
                        • Instruction ID: 2a412c3bff1197cc990e7e764d2e530f9622393f0a36aeaf446f4d7065d24219
                        • Opcode Fuzzy Hash: 9003014659c5aede255f5a88907de72849157836d1f2ef043f0de69748da36d6
                        • Instruction Fuzzy Hash: 3481F611A0828516DB3A5E389C92BF77BEAFF66744F18406AED85CB342E623CD44C253
                        APIs
                        Strings
                        • path contains control characters, xrefs: 008AD950
                        • Request has same path as previous transfer, xrefs: 008ADBCF
                        • Uploading to a URL without a file name, xrefs: 008ADB26
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr$_strncpy
                        • String ID: Request has same path as previous transfer$Uploading to a URL without a file name$path contains control characters
                        • API String ID: 280326283-4131979473
                        • Opcode ID: 26ff8a477d46cc7b6e2615fae82faac2117dd2b43f581d43a72b430bfbfbca81
                        • Instruction ID: 05cdb5af8a10b274b65bec8fa948d81f24465c8d50406b8f8438e58295f64f9a
                        • Opcode Fuzzy Hash: 26ff8a477d46cc7b6e2615fae82faac2117dd2b43f581d43a72b430bfbfbca81
                        • Instruction Fuzzy Hash: 3B912B70A04306AFEB15CF78D885BAABBB5FF06314F040174E90AE7A42D7319D15C7A1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: APPE %s$Could not seek stream$Failed to read data$File already completely uploaded$SIZE %s$STOR %s
                        • API String ID: 48624451-2774612732
                        • Opcode ID: af5fb4fce246e8a6f88cb25441ec0d7c7f8d8b704e51ae7a2ed93e98c76dc656
                        • Instruction ID: 9e23f9c51119ab9eb19a35f3a4d4cde7e28c2d54695a8806738f26608933e3a5
                        • Opcode Fuzzy Hash: af5fb4fce246e8a6f88cb25441ec0d7c7f8d8b704e51ae7a2ed93e98c76dc656
                        • Instruction Fuzzy Hash: E4513A357006055BFB249BAC8C41BEEB7A1FF86314F144238EA69D2742E73569448791
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                        • API String ID: 48624451-2300960079
                        • Opcode ID: cdb43194a6da99772d751d34c730b6d7e165a3fce403dcaa5231deca82db246d
                        • Instruction ID: e839ba40503ecccc1b6c73eb62760eed223bd3d94b85ff5721dc9c880381244f
                        • Opcode Fuzzy Hash: cdb43194a6da99772d751d34c730b6d7e165a3fce403dcaa5231deca82db246d
                        • Instruction Fuzzy Hash: ED411470A0010C6BEF259E69CC92BBA7BA9FF53354F084069ED48DB713E762DD448791
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$_strrchr$_strncpy
                        • String ID: Unknown error %d (%#x)
                        • API String ID: 1320708361-2414550090
                        • Opcode ID: 35bfbe5bbbc1d0e5627e01b2986daf626294f9857734822c98e5c2c71fad7445
                        • Instruction ID: bec7329965e7df8b70aaa97e7c24b0748cbc8ecdac1636532f1d406df1d74a84
                        • Opcode Fuzzy Hash: 35bfbe5bbbc1d0e5627e01b2986daf626294f9857734822c98e5c2c71fad7445
                        • Instruction Fuzzy Hash: C721D371A00A54ABEB117B789C86B6E7BAAFF62315F140169FC05D7342EA30DD0187B3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ffca0743935f20c59946a360238096eb8bc96d5562afc36cd48dc0d28caaef72
                        • Instruction ID: 7c59a27ffe59c3e9d6a512dc160f51e781b56b074aafc1ef63c472f7da88803d
                        • Opcode Fuzzy Hash: ffca0743935f20c59946a360238096eb8bc96d5562afc36cd48dc0d28caaef72
                        • Instruction Fuzzy Hash: 71C1EF74E04349AFDB15DF99D880BAEBBB0FF59304F04429AE805EB392C7709901CBA1
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008A07BD
                        • ___from_strstr_to_strchr.LIBCMT ref: 008A07CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s
                        • API String ID: 601868998-2673429991
                        • Opcode ID: 6b62ff1dc6225c2e606a01455d74b96354ffd3cf3ae723d6b0263a6c8c9029d9
                        • Instruction ID: d87cdb5092428306e78e2a6cc039d24d02f2fb9639737905361901f1e1d68e71
                        • Opcode Fuzzy Hash: 6b62ff1dc6225c2e606a01455d74b96354ffd3cf3ae723d6b0263a6c8c9029d9
                        • Instruction Fuzzy Hash: FD511774604648AFFB215B789C81BF67BA9FF57304F084039EA89C6602D736A815CFA1
                        APIs
                        Strings
                        • SOCKS5 reply has wrong version, version should be 5., xrefs: 008C12FD
                        • SOCKS5 connect request, xrefs: 008C1292
                        • SOCKS5 connect request ack, xrefs: 008C12D0
                        • SOCKS5 connect to IPv4 %s (locally resolved), xrefs: 008C1055
                        • :%d, xrefs: 008C0FE5
                        • SOCKS5: hostname '%s' found, xrefs: 008C10A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: :%d$SOCKS5 connect request$SOCKS5 connect request ack$SOCKS5 connect to IPv4 %s (locally resolved)$SOCKS5 reply has wrong version, version should be 5.$SOCKS5: hostname '%s' found
                        • API String ID: 48624451-2676376539
                        • Opcode ID: 773281e0b3dec39683a8c22e1e9e156e3d1af445126b90d17db6bb389118b731
                        • Instruction ID: 0b58fed29b72fbad6b53d73f112558f90d5d520d3d90a071073f291213041e77
                        • Opcode Fuzzy Hash: 773281e0b3dec39683a8c22e1e9e156e3d1af445126b90d17db6bb389118b731
                        • Instruction Fuzzy Hash: C051DB706002445ACF259F68CC86FBABBB4FF56704F0840EDE949DA243E636D955CB62
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLasthtonssend
                        • String ID: Sending data failed (%d)
                        • API String ID: 2027122571-2319402659
                        • Opcode ID: 49f568703fcc86b5cb5cc08a0196923b17de5bdca92c95d69a3d96b67f80e1ed
                        • Instruction ID: a6cd6b676b84e601655e86fc99aecf9ea59d4b894e5b152938989bde5cae5108
                        • Opcode Fuzzy Hash: 49f568703fcc86b5cb5cc08a0196923b17de5bdca92c95d69a3d96b67f80e1ed
                        • Instruction Fuzzy Hash: A041B2716446459FEB02CF28CC81EE57BB9FF18310F680695E95ACB392E730EA10CB60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: %s%02x%02x$CNAME: %s$DoH A: %u.%u.%u.%u$DoH AAAA: $TTL: %u seconds
                        • API String ID: 48624451-408633105
                        • Opcode ID: b8850d29a1280f7e377b30cc048d162a0c56fd229ea8a9b208ae77f07b78a38b
                        • Instruction ID: 3792a7c6197c901eeb839b696a5cba9116faba3b442e998be4dd948b57496b41
                        • Opcode Fuzzy Hash: b8850d29a1280f7e377b30cc048d162a0c56fd229ea8a9b208ae77f07b78a38b
                        • Instruction Fuzzy Hash: 3741B471900129AFDB209F6C8C95FAA77B8FF09300F5441A5F958E7243E735DA948BA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: ACCT %s$ACCT requested but none available$Access denied: %03d$PASS %s
                        • API String ID: 48624451-2304280848
                        • Opcode ID: 7afafaff0df247356e5cffa7b134d7071f221ae57b981ef1d681708c19843f8b
                        • Instruction ID: 977c0a5d637456dd50dacaa5b73bf503424eb067c0b366fc141a827e3c4704c5
                        • Opcode Fuzzy Hash: 7afafaff0df247356e5cffa7b134d7071f221ae57b981ef1d681708c19843f8b
                        • Instruction Fuzzy Hash: 01310525B006002BFB14616EAC06FFB73C9FFD2329F088035F60CD6741F6659A5907A2
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free$___from_strstr_to_strchr
                        • String ID:
                        • API String ID: 3409252457-0
                        • Opcode ID: 7a261b5fe476c8c1f86466f8a4a9bb164321e7b690f9cf48ef7e58eff2b69adb
                        • Instruction ID: 6680c98945b478d425cc59e1ba5e077204679f50d014bc7f5b816a19e66cf3f9
                        • Opcode Fuzzy Hash: 7a261b5fe476c8c1f86466f8a4a9bb164321e7b690f9cf48ef7e58eff2b69adb
                        • Instruction Fuzzy Hash: 7C51EB75904685AFDF21AF7ADC85A6D7BA4FF03318F14426EFA14DB282E7318900DB52
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strstr
                        • String ID: bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                        • API String ID: 2882301372-4221839532
                        • Opcode ID: d6b105e64e453a6e44049b788ef746e2d943be5aba30738b13fffa115fcffcfc
                        • Instruction ID: b6b3c14f8dd0c22d938920250d73786640c7a3ad1e80df8640aa97fb7b8badbc
                        • Opcode Fuzzy Hash: d6b105e64e453a6e44049b788ef746e2d943be5aba30738b13fffa115fcffcfc
                        • Instruction Fuzzy Hash: 01512B31A006589EFB319E3CD845BEE7BA5FB43311F08496AF868C7B82D6319A548752
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strstr
                        • String ID: ;type=$;type=%c$?%s$ftp$http
                        • API String ID: 2882301372-3547414
                        • Opcode ID: a463d8f463d2b1048e7178b04bc13d7b547202e9f647315c67ef04617d25d496
                        • Instruction ID: 00f849d99efd2adb290acb24a28046a2b2fe80ba2ab5731257468435d229e09f
                        • Opcode Fuzzy Hash: a463d8f463d2b1048e7178b04bc13d7b547202e9f647315c67ef04617d25d496
                        • Instruction Fuzzy Hash: 2741E971A803146BFF316A289D86FBA3399FB52761F080074FE48DA643F761DD1182A2
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr_strrchr$_strstr
                        • String ID:
                        • API String ID: 4240772140-0
                        • Opcode ID: 29afa32ffc8b9185f99cdbe7d5fa1f6095094a901ff16fff03a22960a2366758
                        • Instruction ID: 2b8a4013438e249128e3d6f5c97174e40b8e0f58a612b493145a5b7933a44413
                        • Opcode Fuzzy Hash: 29afa32ffc8b9185f99cdbe7d5fa1f6095094a901ff16fff03a22960a2366758
                        • Instruction Fuzzy Hash: 6E513961D4438679EB325A6C8C49BF67BA9FF12340F0C4478EEE8C6347E679C8459362
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 008CD3AB
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 008CD3B3
                        • _ValidateLocalCookies.LIBCMT ref: 008CD441
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 008CD46C
                        • _ValidateLocalCookies.LIBCMT ref: 008CD4C1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: 2a0f8d3d1bbe8978cc71a2abeb06ef37db1a0a1a49ead064a7263198e5943b7b
                        • Instruction ID: 608cf7c38c455fbae04b008b3523550192717d788865e7e3c2d1569bf82575ff
                        • Opcode Fuzzy Hash: 2a0f8d3d1bbe8978cc71a2abeb06ef37db1a0a1a49ead064a7263198e5943b7b
                        • Instruction Fuzzy Hash: A2418E35A003089BCB04EF68C884F9EBBB5FF44324F148169E915EB392D735EA15CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: %s: %s, %02d %s %4d %02d:%02d:%02d GMT$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified
                        • API String ID: 0-4153637960
                        • Opcode ID: 66dca4304dd96d8efa866765f5cf05a0eacdacbfe96ac77f88ed5b1205169c50
                        • Instruction ID: 052b517c38fc24f9b90e712d37831d06496bb72bb1ed5f732b7b6fe6f489b449
                        • Opcode Fuzzy Hash: 66dca4304dd96d8efa866765f5cf05a0eacdacbfe96ac77f88ed5b1205169c50
                        • Instruction Fuzzy Hash: CC31A332A0021C9BCF11EBFC9C45ABE7BB9FB55314F180069FA09D7252EA32DA149B51
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: LIST$NLST$PRET %s$PRET RETR %s$PRET STOR %s
                        • API String ID: 48624451-294979158
                        • Opcode ID: 8ea338340f1850957b4ada2049bbb2153fc0b2f1801d055ec6d55bb2390c1418
                        • Instruction ID: c063fd1ac84036d82521aa4538a9e8bf9a9e798ac7b1cbb3fa3cb6148b50be38
                        • Opcode Fuzzy Hash: 8ea338340f1850957b4ada2049bbb2153fc0b2f1801d055ec6d55bb2390c1418
                        • Instruction Fuzzy Hash: 6E11E970B506042BF7255268AC05FF73389FB82328F084879F749DA682F662695583A6
                        APIs
                          • Part of subcall function 008E597F: _free.LIBCMT ref: 008E59A4
                        • _free.LIBCMT ref: 008E5A05
                          • Part of subcall function 008DF14F: RtlFreeHeap.NTDLL(00000000,00000000,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?), ref: 008DF165
                          • Part of subcall function 008DF14F: GetLastError.KERNEL32(?,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?,?), ref: 008DF177
                        • _free.LIBCMT ref: 008E5A10
                        • _free.LIBCMT ref: 008E5A1B
                        • _free.LIBCMT ref: 008E5A6F
                        • _free.LIBCMT ref: 008E5A7A
                        • _free.LIBCMT ref: 008E5A85
                        • _free.LIBCMT ref: 008E5A90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 4592a1c548bbb28a260b4fd5580d4ef971329771ec541c91dff9521fe09323d7
                        • Instruction ID: 228663b2c51803afa99a82a1214dc3c6381894aaf1bb02b59db3bb06445e69a3
                        • Opcode Fuzzy Hash: 4592a1c548bbb28a260b4fd5580d4ef971329771ec541c91dff9521fe09323d7
                        • Instruction Fuzzy Hash: AD117F31540B84EAD921B7B5DC07FCB7B9CFF42B10F400926B69FF6253EA24B5059692
                        APIs
                        • GetConsoleCP.KERNEL32(008CF1D4,00000000,?), ref: 008DD83C
                        • __fassign.LIBCMT ref: 008DDA1B
                        • __fassign.LIBCMT ref: 008DDA38
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 008DDA80
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 008DDAC0
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 008DDB6C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ConsoleErrorLast
                        • String ID:
                        • API String ID: 4031098158-0
                        • Opcode ID: b63a7720e60bcca5aeb3f69c94d591a8d0d844697c2bc5ca38051b4c91d53755
                        • Instruction ID: c18877ad0a63b66c8b96105f2fa44dc5773b27d83e2703638e7f4d48985f05eb
                        • Opcode Fuzzy Hash: b63a7720e60bcca5aeb3f69c94d591a8d0d844697c2bc5ca38051b4c91d53755
                        • Instruction Fuzzy Hash: 9BD19A75D00298AFCF15CFA8C8809EDBBB5FF49314F28426AE855FB352D631A946CB50
                        APIs
                        • GetLastError.KERNEL32(?,?,008CD534,008CBC96), ref: 008CD54B
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 008CD559
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008CD572
                        • SetLastError.KERNEL32(00000000,?,008CD534,008CBC96), ref: 008CD5C4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 54f087d3de02fc28fe45f4132bbd975e5e5dd5164877541755f49bfa397ee2c6
                        • Instruction ID: 9f80898c579e4eecc84ac695cc20b35d39d5c37eb5fae1436c294f39d93e158c
                        • Opcode Fuzzy Hash: 54f087d3de02fc28fe45f4132bbd975e5e5dd5164877541755f49bfa397ee2c6
                        • Instruction Fuzzy Hash: 4F01923612D325ADE614367CBC85E6A26A4FB11778720023EF520C51E0EF31C8016559
                        APIs
                        • WSAGetLastError.WS2_32(?,?,?,?,?), ref: 008C68DB
                        Strings
                        • Excessive server response line length received, %zd bytes. Stripping, xrefs: 008C69CB
                        • 8, xrefs: 008C68D4
                        • response reading failed (errno: %d), xrefs: 008C68E2
                        • cached response data too big to handle, xrefs: 008C6A8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed (errno: %d)
                        • API String ID: 1452528299-4161256678
                        • Opcode ID: 29789c42f3d8cc2ed1d1ef0d42fdfd17847950ba8c15e9f9d35eddb8ae943204
                        • Instruction ID: c042a3ad37fa2d3148817454e644fab9bfa3ec97aff2344f8ce01910c0d706a0
                        • Opcode Fuzzy Hash: 29789c42f3d8cc2ed1d1ef0d42fdfd17847950ba8c15e9f9d35eddb8ae943204
                        • Instruction Fuzzy Hash: 58816971A002099FDF10CF68D881BAABBF5FF88314F14846DE999E7211E731E965CB91
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 00894891
                        Strings
                        • %25, xrefs: 00894804
                        • No valid port number in connect to host string (%s), xrefs: 008948D1
                        • Please URL encode %% as %%25, see RFC 6874., xrefs: 00894818
                        • Invalid IPv6 address format, xrefs: 0089487E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                        • API String ID: 601868998-4202423297
                        • Opcode ID: 1dd049d80b05782539be55007b83f58c9dbc61dfd5b20b2a74506f46c1f3351f
                        • Instruction ID: 9c544d1781e8c00670d46f22cabf85455ae7b81e4721c7ec1821f08e21b83e2a
                        • Opcode Fuzzy Hash: 1dd049d80b05782539be55007b83f58c9dbc61dfd5b20b2a74506f46c1f3351f
                        • Instruction Fuzzy Hash: 065135749402CE6BCF31BE5CA851EAA7B95FB03354F5C2276E894DB312E221C9578392
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: __vfwprintf_l
                        • String ID: %sAuthorization: NTLM %s$HTTP$Proxy-
                        • API String ID: 1051920573-3667642693
                        • Opcode ID: 4b5e3c85b79a0d4977614045877ecf0d3d6fe6e2b6df96b36a292ce69ead60fe
                        • Instruction ID: d61c46231e4221ca061de9fb3c717e0160d908426ab6f9c01e1e6f5f9e419d43
                        • Opcode Fuzzy Hash: 4b5e3c85b79a0d4977614045877ecf0d3d6fe6e2b6df96b36a292ce69ead60fe
                        • Instruction Fuzzy Hash: C67128B5E00109ABDF11DFE8C845AEEBBB9FF08354F148075EA54E7212E735DA148BA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strspn
                        • String ID: /:#?!@{}[]\$'"^`*<>=;,+&()$%u.%u.%u.%u$0123456789abcdefABCDEF:.
                        • API String ID: 3684824311-414481020
                        • Opcode ID: b459f26b966acb79ade891932c71fc6fb0e4569f74b15eaac111517b0ca302e8
                        • Instruction ID: 9bc82424c6b9b98b1b3183c92ca1c3b992dac9b0b8bdb07dd5fb9650594a0dcd
                        • Opcode Fuzzy Hash: b459f26b966acb79ade891932c71fc6fb0e4569f74b15eaac111517b0ca302e8
                        • Instruction Fuzzy Hash: A951D575A042494BDF28DFAC98817FDBBB4FF26304F1401AADC49DB342EA22D9468753
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: RETR %s$SIZE %s
                        • API String ID: 48624451-1273946937
                        • Opcode ID: e375b5ceaaf281b4b6d3d111f642f14a981d80a7ebc4d3ed9f4f2d820569f6c8
                        • Instruction ID: b4737bde61a41a5214db16ae90a0ec3c43f5a250340dba96bb1748f46aa85403
                        • Opcode Fuzzy Hash: e375b5ceaaf281b4b6d3d111f642f14a981d80a7ebc4d3ed9f4f2d820569f6c8
                        • Instruction Fuzzy Hash: 32512435B006156BF714DA6DEC01BAAB7D5FB83315F08C46AF91DC6A01EB36D92087E1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l_strrchr
                        • String ID: %s%s%s$LIST$NLST
                        • API String ID: 1900075015-959297966
                        • Opcode ID: 408aa220fdb535718e3a9023c8321df1e39b65596fb5cdcdf613153d3dfb271f
                        • Instruction ID: 8aa7a7176badc81bff1c832581c1db7746a9f6bf97064549e30b5e325769ff24
                        • Opcode Fuzzy Hash: 408aa220fdb535718e3a9023c8321df1e39b65596fb5cdcdf613153d3dfb271f
                        • Instruction Fuzzy Hash: FF21CEB17002486BEF209A69DC45BBB7BECFB86315F040438FE0AC7342E671DE1096A1
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008B79AA
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008B7A01
                        Strings
                        • gfff, xrefs: 008B79C2
                        • set timeouts for state %d; Total % I64d, retry %d maxtry %d, xrefs: 008B7A22
                        • Connection time-out, xrefs: 008B7971
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                        • String ID: Connection time-out$gfff$set timeouts for state %d; Total % I64d, retry %d maxtry %d
                        • API String ID: 885266447-1150704995
                        • Opcode ID: 87006a0fb94b8b3559a33c9c2cbcff6e64b9021d8564738c144483272c50bd51
                        • Instruction ID: dff203ac7805b1939dc92601f997fb2629b20ff4051f475566cd2fabe9266916
                        • Opcode Fuzzy Hash: 87006a0fb94b8b3559a33c9c2cbcff6e64b9021d8564738c144483272c50bd51
                        • Instruction Fuzzy Hash: 5921F3726047046BEB245E69CC41BAB7AADFBC4350F04053DF989CB391E77AED448791
                        APIs
                        • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 008BE1A4
                        • WSAIoctl.WS2_32(?,98000004,00000001,0000000C,00000000,00000000,?,00000000,00000000), ref: 008BE21D
                        • WSAGetLastError.WS2_32 ref: 008BE227
                        Strings
                        • Failed to set SO_KEEPALIVE on fd %d, xrefs: 008BE1AF
                        • Failed to set SIO_KEEPALIVE_VALS on fd %d: %d, xrefs: 008BE22F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorIoctlLastsetsockopt
                        • String ID: Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d
                        • API String ID: 1819429192-3022933585
                        • Opcode ID: fb41197faf3220d021aef4111908d7088d833b99f939c670a58285c34becd442
                        • Instruction ID: 02adef01feab58a7df4438775a4f68a7d6d1ea56f91978b72c846a1e2cbf79e9
                        • Opcode Fuzzy Hash: fb41197faf3220d021aef4111908d7088d833b99f939c670a58285c34becd442
                        • Instruction Fuzzy Hash: 0B21B671A00209AFDB11AFB89C42FFF77B8FF45710F10016AF919EA280EA7596148792
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _wcsrchr
                        • String ID: .bat$.cmd$.com$.exe
                        • API String ID: 1752292252-4019086052
                        • Opcode ID: 081dca498ebadc4b7f82b44fad286fb0f074d9e4b1828282f5ca263c1c2350c5
                        • Instruction ID: 01b270af81823c964fded35abe9ab098824d4c9a3138272ee0c5075e50ac75c1
                        • Opcode Fuzzy Hash: 081dca498ebadc4b7f82b44fad286fb0f074d9e4b1828282f5ca263c1c2350c5
                        • Instruction Fuzzy Hash: EC01042B60422A25A618606DBC0263E17A8FBD2BB0735012BFC54E73C1EE88DC428197
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: %s %s$LIST$RETR
                        • API String ID: 48624451-469064825
                        • Opcode ID: 797127fc9a6ec3616208eb0f47af638ca1effb7adced1b7985e002be519931da
                        • Instruction ID: bf7e0f334a1046ba1cf34204c583ceb1527a2d098c5ba3ff8a8616ecdcb4b40c
                        • Opcode Fuzzy Hash: 797127fc9a6ec3616208eb0f47af638ca1effb7adced1b7985e002be519931da
                        • Instruction Fuzzy Hash: 99119A656042482FFB2696698C40BB337DDFF87314F188065ED44CBA42E3679C65C3B2
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,008DB5BF,?,?,008DB587,?,?,?), ref: 008DB5DF
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 008DB5F2
                        • FreeLibrary.KERNEL32(00000000,?,?,008DB5BF,?,?,008DB587,?,?,?), ref: 008DB615
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 782901fb2d55cad788481969b58ccee15733de29a5a34fe924dccc7009103f23
                        • Instruction ID: 805b118bfda6aeec79698ac256e32218406f67a7c5ef289d3dc216f481726f49
                        • Opcode Fuzzy Hash: 782901fb2d55cad788481969b58ccee15733de29a5a34fe924dccc7009103f23
                        • Instruction Fuzzy Hash: DCF08C31A00318FBCB119B91ED09BAEBF78FB00752F190161F804E62A0CB758E04DB95
                        APIs
                        • GetFileType.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,008DA3D9,00000000,?), ref: 008DA172
                        • GetFileInformationByHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,008DA3D9,00000000), ref: 008DA1CC
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,008DA3D9,00000000,?,?,00000000,?,?), ref: 008DA25A
                        • __dosmaperr.LIBCMT ref: 008DA261
                        • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,008DA3D9), ref: 008DA29E
                          • Part of subcall function 008DA554: __dosmaperr.LIBCMT ref: 008DA598
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                        • String ID:
                        • API String ID: 1206951868-0
                        • Opcode ID: 4eeaff815331e2ab04d433da5ec12b939e9fb79519f31d932e8df2db7385cfcf
                        • Instruction ID: 808427cec7521dd1defd209f4b17e869d9eda1473155b30a10270da9c69bd7e3
                        • Opcode Fuzzy Hash: 4eeaff815331e2ab04d433da5ec12b939e9fb79519f31d932e8df2db7385cfcf
                        • Instruction Fuzzy Hash: EB412E71900744AFDB28DFA6D8459ABBBF9FF89310B14862EF856D3710E6329845CB12
                        APIs
                        • _free.LIBCMT ref: 008DBED0
                        • _free.LIBCMT ref: 008DBEF0
                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008DBF51
                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008DBF63
                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008DBF70
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: __crt_fast_encode_pointer$_free
                        • String ID:
                        • API String ID: 366466260-0
                        • Opcode ID: 11f9e4ce03aaa88b7813b323671de1f9f4fd19afa4087f248f20ab9cf98d23f6
                        • Instruction ID: 1c3d15cb0ed114a480e6fe21784aa7194bbfe74615cb2f05c0fe38b628424ef8
                        • Opcode Fuzzy Hash: 11f9e4ce03aaa88b7813b323671de1f9f4fd19afa4087f248f20ab9cf98d23f6
                        • Instruction Fuzzy Hash: AE41B236A00204DFCB14DF68C881A5EB7F6FF88714B5682AAE505EB351EB31ED01CB81
                        APIs
                        • _free.LIBCMT ref: 008E592E
                          • Part of subcall function 008DF14F: RtlFreeHeap.NTDLL(00000000,00000000,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?), ref: 008DF165
                          • Part of subcall function 008DF14F: GetLastError.KERNEL32(?,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?,?), ref: 008DF177
                        • _free.LIBCMT ref: 008E5940
                        • _free.LIBCMT ref: 008E5952
                        • _free.LIBCMT ref: 008E5964
                        • _free.LIBCMT ref: 008E5976
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 2a8a6caf0b6c194d933bf9f8eb79f4d9c7c0036d29f196c5dac593fa7fe3d467
                        • Instruction ID: 2bd17a0ef1289e9fd87178989d349c661d15348048c0269cac6ccb0ead105fe3
                        • Opcode Fuzzy Hash: 2a8a6caf0b6c194d933bf9f8eb79f4d9c7c0036d29f196c5dac593fa7fe3d467
                        • Instruction Fuzzy Hash: 0BF06232615680EBCA21FB69F585C5A7BDDFA45B64768081AF10ED7A03C730FC805665
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: __freea$_free
                        • String ID: a/p$am/pm
                        • API String ID: 3432400110-3206640213
                        • Opcode ID: 005aaca98c4ba7fe4f728fca5429d16e79655aedf3af0e196d9c1e7407f7bd73
                        • Instruction ID: 5c845724aaa27018e60c14da8e5aebe8d901af0bde43bafd1bc6461845f72913
                        • Opcode Fuzzy Hash: 005aaca98c4ba7fe4f728fca5429d16e79655aedf3af0e196d9c1e7407f7bd73
                        • Instruction Fuzzy Hash: B5C11530D0069ADBCB64CF6AC8896BAB7B0FF4B704F244159E619EB650D335DE41CB91
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B8943
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B8A11
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B8A48
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: LDAP
                        • API String ID: 601868998-85733941
                        • Opcode ID: 48cd5fceb2737bba19a0b764b2e2197801c1101895df7719ab34c5e6bdabf608
                        • Instruction ID: dec80afecd2367135725262bbc62946ade85dbff10d8d80f34ec85d0613206ac
                        • Opcode Fuzzy Hash: 48cd5fceb2737bba19a0b764b2e2197801c1101895df7719ab34c5e6bdabf608
                        • Instruction Fuzzy Hash: D68160B0A00215EFEF119F68DC85BE97BA8FF05305F040176EA09DA352EB71DA50CB92
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: %ld$.%ld
                        • API String ID: 48624451-3262811310
                        • Opcode ID: d6819ac85ed28820712853a80294a1074921f32a849dc17a0cf95215db221ac1
                        • Instruction ID: 99225f9060cdf2d2f4153ef6552819a5f5605a359401cb88da6aabaf44cba7d6
                        • Opcode Fuzzy Hash: d6819ac85ed28820712853a80294a1074921f32a849dc17a0cf95215db221ac1
                        • Instruction Fuzzy Hash: 3A919A3090426A8EDF319E28D9407E9BBB4FF49344F1842EAD889E7681E7315E85DF51
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008C31CF
                        • ___from_strstr_to_strchr.LIBCMT ref: 008C31E8
                          • Part of subcall function 008C30A0: ___from_strstr_to_strchr.LIBCMT ref: 008C30CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: 0123456789ABCDEF$0123456789abcdef
                        • API String ID: 601868998-885041942
                        • Opcode ID: f0aaab980564316fb6b34542fe9dfd2a8e1ed1f8e5b10e33405f5c5721e701c4
                        • Instruction ID: 7964e88fcd9f1a6982d878aa0608404f96bfdcf48b4e1965c3a9e648a5a25ffc
                        • Opcode Fuzzy Hash: f0aaab980564316fb6b34542fe9dfd2a8e1ed1f8e5b10e33405f5c5721e701c4
                        • Instruction Fuzzy Hash: 73516F71E042498BCF11CFA8D581AEEBBB1FB59304F54816ED859F7202E732DA46CB61
                        APIs
                        • recvfrom.WS2_32(?,?,?,00000000,?,?), ref: 008B7041
                        Strings
                        • TFTP error: %s, xrefs: 008B7192
                        • Internal error: Unexpected packet, xrefs: 008B71C7
                        • Received too short packet, xrefs: 008B7089
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: recvfrom
                        • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                        • API String ID: 846543921-343195773
                        • Opcode ID: be831d22945b3d5dd57fa99de1afec5c1935f1c2ad4ffbca886b32afc516c207
                        • Instruction ID: 10e04711a76c4363b755a8d3a76b62ed596cf9bc83dfc85140fed556966952f5
                        • Opcode Fuzzy Hash: be831d22945b3d5dd57fa99de1afec5c1935f1c2ad4ffbca886b32afc516c207
                        • Instruction Fuzzy Hash: FC51CA71A00109ABDB10EF6CDC42FEAB7B8FF44314F444166F91DD6242E735E9648BA2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr___swprintf_l
                        • String ID: Content-Length: %I64d$The file does not exist
                        • API String ID: 1035537661-3816122970
                        • Opcode ID: b144b5642fc204b69822c99cf0320b3e96ec33b175271346eeb9f7ab40637281
                        • Instruction ID: 65ce5aaa241399c2da4b85f2219f776b06f9bc2af44a0f9d8d2089124452a68c
                        • Opcode Fuzzy Hash: b144b5642fc204b69822c99cf0320b3e96ec33b175271346eeb9f7ab40637281
                        • Instruction Fuzzy Hash: 0141EA31A0110C5AEF24AAA89C52BFEB379FF05310F4441AAF94DD7683EE359E404792
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B900F
                        • ___from_strstr_to_strchr.LIBCMT ref: 008B905A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: %ld
                        • API String ID: 601868998-1112595699
                        • Opcode ID: 99c7227daf00a2b28c285df3f4c411c9539c6a42ec6684bf4bfe7c21661ef336
                        • Instruction ID: deb4baf942f50c71bbf00d0050e8b2e858b06689791ec4aa9534f13100512ab2
                        • Opcode Fuzzy Hash: 99c7227daf00a2b28c285df3f4c411c9539c6a42ec6684bf4bfe7c21661ef336
                        • Instruction Fuzzy Hash: AC31A331A045495BDB24EA6C9C42BEE77A4FB45320F1401AAED4EDB342DA36DD468392
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 00898847
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: %.*s$%sAuthorization: Digest %s$Proxy-
                        • API String ID: 601868998-541442569
                        • Opcode ID: 691856d9eccc657e295ebe67969596b8622264ec3eaf6231bbddba4da8e037b9
                        • Instruction ID: b53cefc011281ed9cea02f369c30cb0b1f565686b52f216fedf7083f5f63757d
                        • Opcode Fuzzy Hash: 691856d9eccc657e295ebe67969596b8622264ec3eaf6231bbddba4da8e037b9
                        • Instruction Fuzzy Hash: 0D417271A00209AFDF00DFA8D880BAEBBF8FF05304F544079E905E7252E735AA559B61
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen20.45289.27589.26669.exe
                        • API String ID: 0-2960141889
                        • Opcode ID: df15f69862bcef24895750fb4bd2c68d527a5e749408e292fe2408bfe596bf75
                        • Instruction ID: 1c848edc9bfc14298c0fa2790117f27096f37f60f2e907f149faeb8069752e55
                        • Opcode Fuzzy Hash: df15f69862bcef24895750fb4bd2c68d527a5e749408e292fe2408bfe596bf75
                        • Instruction Fuzzy Hash: 6A416D75A04258EFCB21AF99DC85DAEBBF8FB94710B11426BE804DB310E7708E40DB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: %02x$APOP %s %s
                        • API String ID: 0-177642706
                        • Opcode ID: b14e1ccb93a89277c48c14701419420400c21a37595024a5b57ba9039b022b4d
                        • Instruction ID: 514afd976e1ff3fe8204a1ea2716770c18d793a8b9b21e94854221e7e1ce503d
                        • Opcode Fuzzy Hash: b14e1ccb93a89277c48c14701419420400c21a37595024a5b57ba9039b022b4d
                        • Instruction Fuzzy Hash: 2F31E671900208ABDB14EFA89C41FBE7779FB45314F444469FC1AE6602EB32991597A2
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 008835AE
                          • Part of subcall function 00884DFF: GetTempPathW.KERNEL32(00000400,?,?,?,00000000), ref: 00884E43
                          • Part of subcall function 008CA562: __CxxThrowException@8.LIBVCRUNTIME ref: 008CB50C
                          • Part of subcall function 008CA562: __CxxThrowException@8.LIBVCRUNTIME ref: 008CB529
                          • Part of subcall function 00881950: CreateThread.KERNELBASE(00000000,00000000,Function_000018A3,00000000,00000000,00000000), ref: 008819C6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Exception@8Throw$CreateH_prolog3_PathTempThread
                        • String ID: emggcdn1.ucimg.co/client/$evony_install.exe$pc1.evony.com/download/
                        • API String ID: 333038842-3114744518
                        • Opcode ID: b1cf23bb2d5836230d35a2f8defc724bcf2dfb35abff8e868a41b6b90dcab0db
                        • Instruction ID: a484a87d2550bbf76b44a895dcf28bf4c7cbcf9225850dbd1584b35f6abc20f2
                        • Opcode Fuzzy Hash: b1cf23bb2d5836230d35a2f8defc724bcf2dfb35abff8e868a41b6b90dcab0db
                        • Instruction Fuzzy Hash: 16412371900248DADF15FBF8C95AAEDBBB9FF14700F100148E102EB292DF745A0A8B63
                        APIs
                        • getsockname.WS2_32(?,?,?), ref: 008AD075
                        • accept.WS2_32(?,?,00000080), ref: 008AD098
                          • Part of subcall function 008C66A0: ioctlsocket.WS2_32(00000000,8004667E,008A6D87), ref: 008C66BA
                        Strings
                        • Connection accepted from server, xrefs: 008AD0D5
                        • Error accept()ing server connect, xrefs: 008AD0B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: acceptgetsocknameioctlsocket
                        • String ID: Connection accepted from server$Error accept()ing server connect
                        • API String ID: 36920154-1795061160
                        • Opcode ID: 10fe6e7e41d851bca461c0c559638f956de21d98fda038dcc4e6c605b9e160ca
                        • Instruction ID: 431235f0c93ebca4d5ae1842b07172f6de623431df5da33909d4c963b2edab21
                        • Opcode Fuzzy Hash: 10fe6e7e41d851bca461c0c559638f956de21d98fda038dcc4e6c605b9e160ca
                        • Instruction Fuzzy Hash: 2931A631A00218ABEB20AE68DC81FEEB778FB45314F4081A5F95DD7181EF319D559BA2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: __vfwprintf_l
                        • String ID: %s:%s$%sAuthorization: Basic %s$Proxy-
                        • API String ID: 1051920573-2961970465
                        • Opcode ID: 807063636466b847cb17917c9aeb5ae242c592ed3bdbfa5bb1e6c683cae36fb6
                        • Instruction ID: f7fa95480dd7bc81df76e442c9c71097d6d13cd3cf8f77f47c7f732149ae1ae2
                        • Opcode Fuzzy Hash: 807063636466b847cb17917c9aeb5ae242c592ed3bdbfa5bb1e6c683cae36fb6
                        • Instruction Fuzzy Hash: 7F31CF76B00148AFDF119B98DC44AF977B4EB86351F0441B5EE09DB211EB319E049BD1
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00893795
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008937F5
                        Strings
                        • Too old connection (%ld seconds idle), disconnect it, xrefs: 008937B4
                        • Too old connection (%ld seconds since creation), disconnect it, xrefs: 00893815
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                        • String ID: Too old connection (%ld seconds idle), disconnect it$Too old connection (%ld seconds since creation), disconnect it
                        • API String ID: 885266447-3566769605
                        • Opcode ID: 0083d77052cb93ce5a6420e5f168ee6d8117b9b6cc918f5378b8ff001ff5b3b3
                        • Instruction ID: adf125e2f203061bcaa7de0a862b98d0e308b49b290d73636247edeb2c01d103
                        • Opcode Fuzzy Hash: 0083d77052cb93ce5a6420e5f168ee6d8117b9b6cc918f5378b8ff001ff5b3b3
                        • Instruction Fuzzy Hash: 56210776F4024467EB11366C9C42ABA3368FB95318F088175F92CE7243F9216AD002E2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: DATA$RCPT failed: %d$RCPT failed: %d (last error)
                        • API String ID: 48624451-1745847639
                        • Opcode ID: cae4d9120165768f1eced4141cce801f7fc0d9e089c339e0a6d386fa8356ba0c
                        • Instruction ID: 9e2e849c859b7f8aaaad5049f32c01e9e6a27e110a7d5c5d06eda151d735d50f
                        • Opcode Fuzzy Hash: cae4d9120165768f1eced4141cce801f7fc0d9e089c339e0a6d386fa8356ba0c
                        • Instruction Fuzzy Hash: FC215B72B416096AFB00566DFC01BA9B7C8FB93328F088032F40CD7B01E766E92487D6
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: CWD %s$MKD %s$Server denied you to change to the given directory
                        • API String ID: 48624451-1542016562
                        • Opcode ID: 0f57e5f6ce038e4a63e1320f5d1ed43506d953123ac774a4d4fadacdf4d0430b
                        • Instruction ID: b41f85d035e5cf4d8354240a6d01629b6b041a45134c720bdd7481fd1564f719
                        • Opcode Fuzzy Hash: 0f57e5f6ce038e4a63e1320f5d1ed43506d953123ac774a4d4fadacdf4d0430b
                        • Instruction Fuzzy Hash: 0E21F5327066562FE718AA78AC85BEAF784FB40319F04027FE91DD6342D776592087C1
                        APIs
                        • getpeername.WS2_32(?,?,00000080), ref: 008BDDC3
                        • WSAGetLastError.WS2_32 ref: 008BDDCD
                          • Part of subcall function 00885520: GetLastError.KERNEL32 ref: 00885527
                        Strings
                        • getpeername() failed with errno %d: %s, xrefs: 008BDDE9
                        • ssrem inet_ntop() failed with errno %d: %s, xrefs: 008BDE3C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$getpeername
                        • String ID: getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                        • API String ID: 664652874-4047410615
                        • Opcode ID: 21cd74ce51aed39c3fe9108aa2bc4fa8088aaa98f348938a655af5dcad5d68e4
                        • Instruction ID: 8ffa1d28bb00bf63b810bb3f54798eb02e97003d255210cd612044af59464948
                        • Opcode Fuzzy Hash: 21cd74ce51aed39c3fe9108aa2bc4fa8088aaa98f348938a655af5dcad5d68e4
                        • Instruction Fuzzy Hash: 9B216571900618BBDB10AB54DC41FEAB77CFF04314F4441A5F949E7252EE70AF558BA2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                        • API String ID: 48624451-579818044
                        • Opcode ID: 8e006079854845564719b8613fb32ab50f5fdedb92324c511790abf68a6c8259
                        • Instruction ID: 2846782118250fcaded2415948a8d769dff91b76de191dd8f08dea8922024d8a
                        • Opcode Fuzzy Hash: 8e006079854845564719b8613fb32ab50f5fdedb92324c511790abf68a6c8259
                        • Instruction Fuzzy Hash: 6901E576900208ABEB00AB28DC85FA73768FF55314F040154FD09E7213FA71B95486A1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: Failed EPSV attempt, exiting$Failed EPSV attempt. Disabling EPSV$PASV
                        • API String ID: 48624451-1523041377
                        • Opcode ID: 71fd8552295b80c30007ae2ef4c963dd716a0f8aa0b9a649206ddfed5b7414c9
                        • Instruction ID: 6d71566eab35d85113d25de6fec6181fccd4424f13b3178d45d3c96264040de8
                        • Opcode Fuzzy Hash: 71fd8552295b80c30007ae2ef4c963dd716a0f8aa0b9a649206ddfed5b7414c9
                        • Instruction Fuzzy Hash: 95012D30B8034836FB2172398C02FEA7B98FB93754F08401AF95DE1642E7E9755543A2
                        APIs
                        • send.WS2_32(?,008B5006,00000003,00000000), ref: 008B5C59
                        • WSAGetLastError.WS2_32(?,008B605D,008B5006,000000FE,?,00000000,?,008B54CF,008B5006,00000000,00000001), ref: 008B5C63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastsend
                        • String ID: SENT$Sending data failed (%d)
                        • API String ID: 1802528911-3459338696
                        • Opcode ID: 5e5113dc32693f38ab6db80c16321e7edb07b81480bfa3b499e208b1ce7bdd25
                        • Instruction ID: 71f8b9934ba6623d84143fe183b6e779a7636fd4d75565467ae42ce3b88a0170
                        • Opcode Fuzzy Hash: 5e5113dc32693f38ab6db80c16321e7edb07b81480bfa3b499e208b1ce7bdd25
                        • Instruction Fuzzy Hash: 1FF09072644348BBDB02AF58DC81EEA7B58FF18754F048154FA688F292D271A66087A5
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: AUTH %s$AUTH %s %s
                        • API String ID: 48624451-306427787
                        • Opcode ID: 10af1bbc043871044f6bb91e0fea626400cd7888e33653b2dafcc593c5b82879
                        • Instruction ID: 01c9bb29934035078a5ba1aca297a41591241052a95e28c147f6fd951a2075ee
                        • Opcode Fuzzy Hash: 10af1bbc043871044f6bb91e0fea626400cd7888e33653b2dafcc593c5b82879
                        • Instruction Fuzzy Hash: BFE0657750012877DA00299EAC01DBB7B2CEF91675B088031FE1CE2203E677E53496F6
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: cda856a6741e3d9894c0b49ebdb9e7bb9d2dd01dc3b4082a035c99359f5d7c80
                        • Instruction ID: 65adbddbc6e08632630e8deac1995b11172bb458cf6ddd031f0b5b0913e756c2
                        • Opcode Fuzzy Hash: cda856a6741e3d9894c0b49ebdb9e7bb9d2dd01dc3b4082a035c99359f5d7c80
                        • Instruction Fuzzy Hash: 63B1253190028A9FDB11CF6AC881BAEBBF5FF56304F14496AD955EB341D2B48D81CF61
                        APIs
                        • _free.LIBCMT ref: 008E2847
                        • _free.LIBCMT ref: 008E2870
                        • SetEndOfFile.KERNEL32(00000000,008D9AA0,00000000,008DF955,?,?,?,?,?,?,?,008D9AA0,008DF955,00000000), ref: 008E28A2
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,008D9AA0,008DF955,00000000,?,?,?,?,00000000,008A607E), ref: 008E28BE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free$ErrorFileLast
                        • String ID:
                        • API String ID: 1547350101-0
                        • Opcode ID: 2597078c9a3566b524879d4c35404d3604f38510af20e3c5d8985e628e3844d1
                        • Instruction ID: ef1fbbedee0c7631e2bbabe222ae34e3706c724b6a82c423a76a465c6988f927
                        • Opcode Fuzzy Hash: 2597078c9a3566b524879d4c35404d3604f38510af20e3c5d8985e628e3844d1
                        • Instruction Fuzzy Hash: 8841D932900695ABDB15ABBECC42B9E776DFF56320F240675F815E73A1EA30CC418762
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7cdfa240b6f7a1a0f96a314f32077fc2fd4df861e46ecc3befa25cdfb92e524e
                        • Instruction ID: 9551ab15916ddd7f8917c0e9aacb101236f3b76b0a16846408c77da153425562
                        • Opcode Fuzzy Hash: 7cdfa240b6f7a1a0f96a314f32077fc2fd4df861e46ecc3befa25cdfb92e524e
                        • Instruction Fuzzy Hash: C141E671A40308BFD7289E7CCC11B6ABBA9FB48720F20872FE565DB391D67199408792
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9cf501f1bd03eabbb9f28eca32943f34ef7415667917d2a1f429f7e48ce41d9f
                        • Instruction ID: a92cec8618523db75581834f61dd1355679aea5c8a0048eaef71bafda95c65d4
                        • Opcode Fuzzy Hash: 9cf501f1bd03eabbb9f28eca32943f34ef7415667917d2a1f429f7e48ce41d9f
                        • Instruction Fuzzy Hash: A1217C71600A09FEDB20AB799C8092BB7ADFE613647124726F835D7350EB31EC4097A2
                        APIs
                        • GetLastError.KERNEL32(?,?,?,008CFE8D,?,?,00000000,?,008D8085,008D8BB9,?,?,00000000), ref: 008DEF02
                        • _free.LIBCMT ref: 008DEF5F
                        • _free.LIBCMT ref: 008DEF95
                        • SetLastError.KERNEL32(00000000,00000006,000000FF,?,008D8085,008D8BB9,?,?,00000000), ref: 008DEFA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast_free
                        • String ID:
                        • API String ID: 2283115069-0
                        • Opcode ID: 2065438f2cee919dc3c41b3cb75df73725bbd30806a48940074d1204f51284ab
                        • Instruction ID: 7d465fb7b2984f038f09a8dbdc09a20dfc801829b69668ddedd68e9ca2d26652
                        • Opcode Fuzzy Hash: 2065438f2cee919dc3c41b3cb75df73725bbd30806a48940074d1204f51284ab
                        • Instruction Fuzzy Hash: E111CA322042457EDA1137799D89E7A379AF7C2778B280366F624CE3F2DE318C055125
                        APIs
                        • GetLastError.KERNEL32(?,?,?,008D28C0,008DF388,?,?,008CA57C,?,?,00881DD4,00000008,00000084), ref: 008DF059
                        • _free.LIBCMT ref: 008DF0B6
                        • _free.LIBCMT ref: 008DF0EC
                        • SetLastError.KERNEL32(00000000,00000006,000000FF,?,008D28C0,008DF388,?,?,008CA57C,?,?,00881DD4,00000008,00000084), ref: 008DF0F7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast_free
                        • String ID:
                        • API String ID: 2283115069-0
                        • Opcode ID: c3a71b9e87226ddf4d59983a3f734dde3e1b668c96e6a22a64d0d6704ddef743
                        • Instruction ID: da2aeb7ba036711bb15d38b04b2c3e605ebbbf54726a95828706088534a07e7b
                        • Opcode Fuzzy Hash: c3a71b9e87226ddf4d59983a3f734dde3e1b668c96e6a22a64d0d6704ddef743
                        • Instruction Fuzzy Hash: 5911A332204A417EDA11377E9D85A6A379AFBC2374B280336F725C73E3DE318C056111
                        APIs
                        • QueryPerformanceCounter.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,00889B40,00000000,00000000,00000000,00000008,00002712), ref: 0088E6B5
                        • __alldvrm.LIBCMT ref: 0088E6CE
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0088E6F7
                        • GetTickCount.KERNEL32 ref: 0088E712
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CountCounterPerformanceQueryTickUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 1296068966-0
                        • Opcode ID: 974b586c1041556ea33ea547defe2467db02fb47a9086185a624607c1cfb94d7
                        • Instruction ID: 14d7a10b027441226e58ff1490bf1b7def0c1cab46e71b79aeac90b335ab24b2
                        • Opcode Fuzzy Hash: 974b586c1041556ea33ea547defe2467db02fb47a9086185a624607c1cfb94d7
                        • Instruction Fuzzy Hash: EC119471608308AFCB45DFA8EC85A59BFF9FB49304F1481BDB90CC7261D67299119B41
                        APIs
                        • ___BuildCatchObject.LIBVCRUNTIME ref: 008CD80F
                          • Part of subcall function 008CD75C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 008CD78B
                          • Part of subcall function 008CD75C: ___AdjustPointer.LIBCMT ref: 008CD7A6
                        • _UnwindNestedFrames.LIBCMT ref: 008CD824
                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 008CD835
                        • CallCatchBlock.LIBVCRUNTIME ref: 008CD85D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                        • String ID:
                        • API String ID: 737400349-0
                        • Opcode ID: ec6b9096392aca0d3da68b4b796ae7b58ab84235d9f40ea6e8dd17ed88f0eb17
                        • Instruction ID: 1670839ef0210d48261779e8f83c06d0ca774d049f18aa1bca75665e3f79c48b
                        • Opcode Fuzzy Hash: ec6b9096392aca0d3da68b4b796ae7b58ab84235d9f40ea6e8dd17ed88f0eb17
                        • Instruction Fuzzy Hash: 0901D372500248BBDF126E99CC42FEB7B79FF88754F054428FE18A6121D732E8619BA1
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00000000,?,00000000,008E2B21,00000000,?,008E8C85,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 008E29D2
                        • GetLastError.KERNEL32(?,008E8C85,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,008E2B21,00000000,00000104,?), ref: 008E29DC
                        • __dosmaperr.LIBCMT ref: 008E29E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFullLastNamePath__dosmaperr
                        • String ID:
                        • API String ID: 2398240785-0
                        • Opcode ID: d4410e0e089b2242ce53a89007de65fcf1007d0678a3f74f967640f0a7803976
                        • Instruction ID: 90a026f2fb4be0de89dc6e40401060df8edb84dbff9f982da4b3a1761e568b7b
                        • Opcode Fuzzy Hash: d4410e0e089b2242ce53a89007de65fcf1007d0678a3f74f967640f0a7803976
                        • Instruction Fuzzy Hash: BDF06D326002A9BB8B206BA6DC08D5AFF6DFF463B03108225F529DB121CB31E85197D0
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00000000,?,00000000,008E2B21,00000000,?,008E8C10,00000000,00000000,008E2B21,?,?,00000000,00000000,00000001), ref: 008E2A3B
                        • GetLastError.KERNEL32(?,008E8C10,00000000,00000000,008E2B21,?,?,00000000,00000000,00000001,00000000,00000000,?,008E2B21,00000000,00000104), ref: 008E2A45
                        • __dosmaperr.LIBCMT ref: 008E2A4C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFullLastNamePath__dosmaperr
                        • String ID:
                        • API String ID: 2398240785-0
                        • Opcode ID: afd6b74db852e62461a6fbbc7e2a71855c57cfcfc090d63c56f734e6ff072fc9
                        • Instruction ID: 8a4bf1c4610584d0ebde9b98d7009490f994e6595b8ea1719d900a8b363d1858
                        • Opcode Fuzzy Hash: afd6b74db852e62461a6fbbc7e2a71855c57cfcfc090d63c56f734e6ff072fc9
                        • Instruction Fuzzy Hash: BEF0313260026ABB8B206FA7DC0885BFF6DFF963A13158625F919CB120DB31E811D7D0
                        APIs
                        • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,008E677F,00000000,00000001,00000000,00000000,?,008DDBCB,?,008CF1D4,00000000), ref: 008E9998
                        • GetLastError.KERNEL32(?,008E677F,00000000,00000001,00000000,00000000,?,008DDBCB,?,008CF1D4,00000000,?,00000000,?,008DE11F,?), ref: 008E99A4
                          • Part of subcall function 008E996A: CloseHandle.KERNEL32(FFFFFFFE,008E99B4,?,008E677F,00000000,00000001,00000000,00000000,?,008DDBCB,?,008CF1D4,00000000,?,00000000), ref: 008E997A
                        • ___initconout.LIBCMT ref: 008E99B4
                          • Part of subcall function 008E992C: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,008E995B,008E676C,00000000,?,008DDBCB,?,008CF1D4,00000000,?), ref: 008E993F
                        • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,008E677F,00000000,00000001,00000000,00000000,?,008DDBCB,?,008CF1D4,00000000,?), ref: 008E99C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: 6fe64fca51bc7ff859f9243a25513926b317aab0a9ac658838e6b771b287054d
                        • Instruction ID: 0439eedd1eaee799c195bd842a670d87f235ca7b544f365202f5d63416e0cd37
                        • Opcode Fuzzy Hash: 6fe64fca51bc7ff859f9243a25513926b317aab0a9ac658838e6b771b287054d
                        • Instruction Fuzzy Hash: 4CF0C03A504194FFCF223F96DC44A9A7F6AFB0A3A1F044014FE58D9132D7728820AB91
                        APIs
                        • _free.LIBCMT ref: 008DC197
                          • Part of subcall function 008DF14F: RtlFreeHeap.NTDLL(00000000,00000000,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?), ref: 008DF165
                          • Part of subcall function 008DF14F: GetLastError.KERNEL32(?,?,008E59A9,?,00000000,?,?,?,008E59D0,?,00000007,?,?,008E5DB6,?,?), ref: 008DF177
                        • _free.LIBCMT ref: 008DC1AA
                        • _free.LIBCMT ref: 008DC1BB
                        • _free.LIBCMT ref: 008DC1CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 28f09af45d21dfcade99e060536ef385bf1984664019b4150aae13a4d773f79a
                        • Instruction ID: 82bffbce101bdbad12e9ebd9d4fe067d3862df1c17d9b571000cf6eb3f1d8bcf
                        • Opcode Fuzzy Hash: 28f09af45d21dfcade99e060536ef385bf1984664019b4150aae13a4d773f79a
                        • Instruction Fuzzy Hash: 86E0B679829160DECE027F28FC0D4493BA2F784B003054227F9595B336C7711552BB82
                        APIs
                        • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,008ADE3A), ref: 008AD355
                        Strings
                        • FTP response timeout, xrefs: 008AD376
                        • FTP response aborted due to select/poll error: %d, xrefs: 008AD35C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout
                        • API String ID: 1452528299-4057338436
                        • Opcode ID: cd41b47969014ea78b23269209f06e65e32260f78eac9b15fda6b1e98c696e69
                        • Instruction ID: adab1c22340e14aac1b6bd8df3bf1728b05ea2763371ce1b0c3fcc16584ad68a
                        • Opcode Fuzzy Hash: cd41b47969014ea78b23269209f06e65e32260f78eac9b15fda6b1e98c696e69
                        • Instruction Fuzzy Hash: 5841E075A00309ABEF109E4DDC40BAE77A4FF86325F148179EC1AD6A91E771DA10C7A2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: OS/400$SITE NAMEFMT 1
                        • API String ID: 48624451-2049154998
                        • Opcode ID: 946d5f1702e483cd6f2160ef55a04201feb5fcc275e8764fa51a79c4ac7806a4
                        • Instruction ID: c496ff2bf714dc867deb049c6ae13f59f1fd93a5dd32ab638c54b1b0894a465a
                        • Opcode Fuzzy Hash: 946d5f1702e483cd6f2160ef55a04201feb5fcc275e8764fa51a79c4ac7806a4
                        • Instruction Fuzzy Hash: 9D310432B081045FEB119E6CBC417EDFB94FF1231AF048276ED59C6311E67289628BD1
                        Strings
                        • missing share in URL path for SMB, xrefs: 008B323E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: missing share in URL path for SMB
                        • API String ID: 0-1744139770
                        • Opcode ID: 802d39847d3bb0009f8be18eacfcef83f8e1c9d1e2377e415514c2d09289a6b3
                        • Instruction ID: 235743302f34410364417d4527ab0767c87c3bc5b4a63577b8ccc33e3ed16e95
                        • Opcode Fuzzy Hash: 802d39847d3bb0009f8be18eacfcef83f8e1c9d1e2377e415514c2d09289a6b3
                        • Instruction Fuzzy Hash: E431A735708309AFEB115B68EC05BD67BE8FF15356F044075FA8CCB352E272AA509790
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008AA8AB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: +$Got unexpected pop3-server response
                        • API String ID: 601868998-3277052657
                        • Opcode ID: 82ab3cd5a22fe9a837cdfc70a74322f9a4b22a2182383d327ce21cc462e705c4
                        • Instruction ID: 5953618eb757fe9a7c604ad7f6707c3932ba33ac8fd3ccda89c7f3f59758e605
                        • Opcode Fuzzy Hash: 82ab3cd5a22fe9a837cdfc70a74322f9a4b22a2182383d327ce21cc462e705c4
                        • Instruction Fuzzy Hash: 23213531600145ABFB291B28EC49BBDBB58FF42358F144035F40CCA912E3769956C7A2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr___swprintf_l
                        • String ID: x-%s-content-sha256
                        • API String ID: 1035537661-3276819350
                        • Opcode ID: ef23e7ba80994e7a7defda9464afef9dfed59cdb65b89084a227dfc482a7491c
                        • Instruction ID: 25ca7f9c79b16e96dd2910c87012b18301d27143c63d0f20a6f15914516bbd9a
                        • Opcode Fuzzy Hash: ef23e7ba80994e7a7defda9464afef9dfed59cdb65b89084a227dfc482a7491c
                        • Instruction Fuzzy Hash: C021F3216001095BDF189FAC9911FBAB7B9FB46311F0881ADE889DB242FA32DD158395
                        APIs
                        • ___from_strstr_to_strchr.LIBCMT ref: 008C30CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___from_strstr_to_strchr
                        • String ID: .$0123456789
                        • API String ID: 601868998-4187921772
                        • Opcode ID: 0ee26d3e280999e3e8cf1e5ea16ed02192d903f061f20b2556f42ae40ea7ba03
                        • Instruction ID: 64a10e9baa0f887fc71543b116d97e516f3bed476f28e4f97bd35f0ef36a3f33
                        • Opcode Fuzzy Hash: 0ee26d3e280999e3e8cf1e5ea16ed02192d903f061f20b2556f42ae40ea7ba03
                        • Instruction Fuzzy Hash: 1521C3369005089EDB258A29C890BB9BBB4FB56715F1980BFFC99D7241E632CB478291
                        APIs
                        • ___swprintf_l.LIBCMT ref: 008ADFD5
                          • Part of subcall function 008AE3D0: ___swprintf_l.LIBCMT ref: 008AE400
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: CWD %s
                        • API String ID: 48624451-3220812625
                        • Opcode ID: 91776853cd1f755acdd171f6284376325c3dc4b5f2d58a70ce2b6943ffbd0a6f
                        • Instruction ID: 6a0d148362d6418e52a0ebc7f30625da5dab6bd92cb4b4bdcb9fef149755124a
                        • Opcode Fuzzy Hash: 91776853cd1f755acdd171f6284376325c3dc4b5f2d58a70ce2b6943ffbd0a6f
                        • Instruction Fuzzy Hash: B621A431A002046FF7149A08D805BE637A6FB42318F1884B8F80DDFA42EBF799568791
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00898165
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                        • String ID: ipv4$ipv6
                        • API String ID: 885266447-982188191
                        • Opcode ID: 57b13c08c06c08e9138287ace5a1044c973d23ef7bc9d228b9b6b1cc92f8f4ad
                        • Instruction ID: 6f27b0c917bf9733682f54be7ead180e7cee7a034467fb4d7291818be9c1c3e9
                        • Opcode Fuzzy Hash: 57b13c08c06c08e9138287ace5a1044c973d23ef7bc9d228b9b6b1cc92f8f4ad
                        • Instruction Fuzzy Hash: D62138B1600709DFCB20DF59D941A8ABBF1FF49364F14852AFA89D7B40E230E8518F90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strstr
                        • String ID: ;type=
                        • API String ID: 2882301372-3507045495
                        • Opcode ID: c8376460fd4cd38f60238848062c7a5e31150ca14e4f4b37ca47d4030b836611
                        • Instruction ID: e554a23a81726bb89804bd7fc56292bd7aece6eee3efb9cb14bc136f1f6d18b1
                        • Opcode Fuzzy Hash: c8376460fd4cd38f60238848062c7a5e31150ca14e4f4b37ca47d4030b836611
                        • Instruction Fuzzy Hash: 5A1134B11043459EEB308F2CD808B92BBE5FB02364F040229E8A8DA682D7B1E40487F2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: %c%03d$%s %s
                        • API String ID: 48624451-883683383
                        • Opcode ID: f1342232145295a4b5f99276aef2c791b65b3e777239f76c3d09294eac01c8e7
                        • Instruction ID: 3d84dcf338fb33d2ae942541c72f5572f2fbca68a805dbd27ba8b35e9f46f1b3
                        • Opcode Fuzzy Hash: f1342232145295a4b5f99276aef2c791b65b3e777239f76c3d09294eac01c8e7
                        • Instruction Fuzzy Hash: AF01B1B2601515BBDB01AA699C46EABB75CFF49314F044021FA18D6243EB34FA2187F6
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: Failure sending QUIT command: %s$QUIT
                        • API String ID: 48624451-1162443993
                        • Opcode ID: e88e5002de8aad8be11922adde8ec11afb73e4215d35b3538cb6449f44db32ca
                        • Instruction ID: 8fc97d6f82692d785008c2bdfde611b12f728b80e617dc6e78c83c6524aef94f
                        • Opcode Fuzzy Hash: e88e5002de8aad8be11922adde8ec11afb73e4215d35b3538cb6449f44db32ca
                        • Instruction Fuzzy Hash: 9CF0F4223803143AF61036AD5C82FBF67ACFBA7769F040439F629E6543E59A681503B6
                        APIs
                        • getsockopt.WS2_32(00004020,0000FFFF,00001001,00000000,00000004), ref: 008BD2FC
                        • setsockopt.WS2_32(00004020,0000FFFF,00001001,00004020,00000004), ref: 008BD321
                          • Part of subcall function 008C29B0: GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo), ref: 008C29D6
                          • Part of subcall function 008C29B0: GetProcAddress.KERNEL32(00000000), ref: 008C29DD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProcgetsockoptsetsockopt
                        • String ID: @
                        • API String ID: 1224256098-2726393805
                        • Opcode ID: 32489c0c754a8f06d7348275578464376777eab0fc66c10fb841f22fff9fc1ac
                        • Instruction ID: cf01908107af779d69dd66fdff24f6960fcf245a8d797f41750d219db6a70400
                        • Opcode Fuzzy Hash: 32489c0c754a8f06d7348275578464376777eab0fc66c10fb841f22fff9fc1ac
                        • Instruction Fuzzy Hash: D0012DB5A44308BBEB209B80DD46BED77B8FB04704F5040A5EA04EA3D1F7B19A489B51
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: CWD %s$Failed to MKD dir: %03d
                        • API String ID: 48624451-2878729461
                        • Opcode ID: bb878e6df116cb5d9b891c4b35260363af1528e553524ce9ce0ab73d66b1d70d
                        • Instruction ID: 82bddda5e4eb8c07fab6de6d49d2989282caf824ed1097031f703ac495ac09af
                        • Opcode Fuzzy Hash: bb878e6df116cb5d9b891c4b35260363af1528e553524ce9ce0ab73d66b1d70d
                        • Instruction Fuzzy Hash: ECF0F43274151A2BD608A96CAC86EE9F315FB84319F00036AFD18DA351EB62A92087C1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: _strstr
                        • String ID: ;mode=
                        • API String ID: 2882301372-3534008939
                        • Opcode ID: 889c998d46450946dde22cd0c60efe50eb6f2c5fcd5583dadcdfd5644e3bc9be
                        • Instruction ID: c1dd7acece757322a6c3db079f218e0a4923081474a90a26cebc50fafd367efa
                        • Opcode Fuzzy Hash: 889c998d46450946dde22cd0c60efe50eb6f2c5fcd5583dadcdfd5644e3bc9be
                        • Instruction Fuzzy Hash: D6F04C725442A569DF2096FCAC05BD3BBC8FF12394F08406BE54CD6212F575F52182B2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ___swprintf_l
                        • String ID: Access denied. %c$PASS %s
                        • API String ID: 48624451-68324150
                        • Opcode ID: d444d3cde7dff166f3560957186f721d9860047cfd17aa34843108e99129532b
                        • Instruction ID: cbc1b0f3c7f0faf40943f88065897a24c382dc534eff0c40284a2130b0357925
                        • Opcode Fuzzy Hash: d444d3cde7dff166f3560957186f721d9860047cfd17aa34843108e99129532b
                        • Instruction Fuzzy Hash: 04F0B4257006142BE70865589C01EEB738DFF95355F488131FA1CE7A01F665EE5443E6
                        APIs
                          • Part of subcall function 00884248: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,?,?,?,?,?), ref: 0088424E
                          • Part of subcall function 00884248: GetLastError.KERNEL32(?,00000000,00000000,?,?,?,?,?), ref: 00884258
                        • IsDebuggerPresent.KERNEL32(?,?,?,00881061), ref: 008CBAA6
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00881061), ref: 008CBAB5
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 008CBAB0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 3511171328-631824599
                        • Opcode ID: 248f4163e96cc1c9b1c703bf2c16cb8bd08216c414e4145d9de08a56f29bb413
                        • Instruction ID: 4019529d8e8c3d36e139436825bb6cb5b2291fd4f48159ff7d626a1545cf0a63
                        • Opcode Fuzzy Hash: 248f4163e96cc1c9b1c703bf2c16cb8bd08216c414e4145d9de08a56f29bb413
                        • Instruction Fuzzy Hash: 87E06D70204B518FC320AF78D849B12BBE4FF00704F008D2DE892C7240E7B6E4488B51
                        APIs
                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 008CA530
                          • Part of subcall function 008CA4A7: std::exception::exception.LIBCONCRT ref: 008CA4B4
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 008CA53E
                          • Part of subcall function 008CD27F: RaiseException.KERNEL32(?,?,?,008CB52E,?,?,?,?,?,?,?,?,008CB52E,?,008FE86C), ref: 008CD2DF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2796544622.0000000000881000.00000020.00000001.01000000.00000003.sdmp, Offset: 00880000, based on PE: true
                        • Associated: 00000000.00000002.2796510394.0000000000880000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796587195.00000000008ED000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796621604.0000000000901000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2796638128.0000000000903000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_880000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                        • String ID: Unknown exception
                        • API String ID: 1586462112-410509341
                        • Opcode ID: 569663daaf8cb9b477623e0be1f806031386b2928b5c46e16897d79d53cf336b
                        • Instruction ID: 513b00efa0fee83d5b7bab3641acb58dd113f4262ff9ce0a2684cff2cf3174a8
                        • Opcode Fuzzy Hash: 569663daaf8cb9b477623e0be1f806031386b2928b5c46e16897d79d53cf336b
                        • Instruction Fuzzy Hash: 48D05E34A0020C6BCB28BAF8C805E59777DFA10304B808468B614C6141EAB1EA198686

                        Execution Graph

                        Execution Coverage:23.4%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:2.3%
                        Total number of Nodes:1505
                        Total number of Limit Nodes:30
                        execution_graph 4928 407640 SetFilePointer 4929 407677 4928->4929 4930 407667 GetLastError 4928->4930 4930->4929 4931 407670 4930->4931 4933 407460 GetLastError 4931->4933 4936 4073c0 4933->4936 4945 407258 FormatMessageA 4936->4945 4939 407408 4952 405854 4939->4952 4942 407417 4956 40316c 4942->4956 4946 40727e 4945->4946 4960 40324c 4946->4960 4949 405158 4987 40516c 4949->4987 4953 40585b 4952->4953 4954 4031bc 4 API calls 4953->4954 4955 405873 4954->4955 4955->4942 4957 403172 4956->4957 4958 40318b 4956->4958 4957->4958 5115 402580 4957->5115 4958->4929 4965 403228 4960->4965 4962 40325c 4963 40316c 4 API calls 4962->4963 4964 403274 4963->4964 4964->4939 4964->4949 4966 403248 4965->4966 4967 40322c 4965->4967 4966->4962 4970 402568 4967->4970 4969 403235 4969->4962 4971 40256c 4970->4971 4972 402576 4970->4972 4971->4972 4974 403128 4971->4974 4972->4969 4972->4972 4975 403160 TlsGetValue 4974->4975 4976 403138 4974->4976 4977 403143 4975->4977 4978 40316a 4975->4978 4976->4972 4982 4030e0 4977->4982 4978->4972 4980 403148 TlsGetValue 4981 403158 4980->4981 4981->4972 4983 4030f4 LocalAlloc 4982->4983 4984 4030ea 4982->4984 4985 403112 TlsSetValue 4983->4985 4986 403106 4983->4986 4984->4983 4985->4986 4986->4980 4988 405189 4987->4988 4995 404e1c 4988->4995 4991 4051b5 4993 40324c 4 API calls 4991->4993 4994 405167 4993->4994 4994->4939 4998 404e37 4995->4998 4996 404e49 4996->4991 5000 404ba8 4996->5000 4998->4996 5003 404f3e 4998->5003 5010 404e10 4998->5010 5107 405904 5000->5107 5002 404bb9 5002->4991 5004 404f4f 5003->5004 5006 404f9d 5003->5006 5004->5006 5007 405023 5004->5007 5009 404fbb 5006->5009 5013 404db8 5006->5013 5007->5009 5017 404dfc 5007->5017 5009->4998 5011 40316c 4 API calls 5010->5011 5012 404e1a 5011->5012 5012->4998 5014 404dc6 5013->5014 5020 404bc0 5014->5020 5016 404df4 5016->5006 5046 403978 5017->5046 5023 405974 5020->5023 5022 404bd9 5022->5016 5024 405982 5023->5024 5033 404ca0 LoadStringA 5024->5033 5027 405158 19 API calls 5028 4059ba 5027->5028 5036 4031bc 5028->5036 5034 40324c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5033->5034 5035 404ccd 5034->5035 5035->5027 5037 4031c0 5036->5037 5039 4031d0 5036->5039 5037->5039 5040 403228 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5037->5040 5038 4031fc 5042 40318c 5038->5042 5039->5038 5041 402580 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5039->5041 5040->5039 5041->5038 5043 403192 5042->5043 5044 4031b7 5043->5044 5045 402580 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5043->5045 5044->5022 5045->5043 5047 40397f 5046->5047 5052 403888 5047->5052 5049 40399f 5050 40316c 4 API calls 5049->5050 5051 4039a6 5050->5051 5051->5009 5053 4038a9 5052->5053 5054 40389c 5052->5054 5056 403908 5053->5056 5057 4038af 5053->5057 5080 403754 5054->5080 5058 403967 5056->5058 5059 40390f 5056->5059 5061 4038c2 5057->5061 5062 4038b5 5057->5062 5063 4037c8 3 API calls 5058->5063 5064 403915 5059->5064 5065 40391f 5059->5065 5060 4038a4 5060->5049 5067 403868 6 API calls 5061->5067 5087 403868 5062->5087 5063->5060 5102 403838 5064->5102 5069 4037c8 3 API calls 5065->5069 5070 4038d0 5067->5070 5071 403931 5069->5071 5092 4037c8 5070->5092 5073 403838 9 API calls 5071->5073 5075 40394a 5073->5075 5074 4038eb 5098 403720 5074->5098 5078 403720 VariantClear 5075->5078 5077 403900 5077->5049 5079 40395f 5078->5079 5079->5049 5081 4037c4 5080->5081 5084 403718 5080->5084 5081->5060 5082 40377f 5082->5060 5083 403767 VariantClear 5083->5084 5084->5080 5084->5082 5084->5083 5085 40316c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5084->5085 5086 4037b0 VariantCopyInd 5084->5086 5085->5084 5086->5081 5086->5084 5088 40368c MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5087->5088 5089 403874 5088->5089 5090 403720 VariantClear 5089->5090 5091 40387d 5090->5091 5091->5060 5093 403819 VariantChangeTypeEx 5092->5093 5094 4037de VariantChangeTypeEx 5092->5094 5096 403806 5093->5096 5095 4037fa 5094->5095 5097 403720 VariantClear 5095->5097 5096->5074 5097->5096 5099 40373a 5098->5099 5100 40372d 5098->5100 5099->5077 5100->5099 5101 40374d VariantClear 5100->5101 5101->5077 5103 403670 8 API calls 5102->5103 5104 40384f 5103->5104 5105 403720 VariantClear 5104->5105 5106 403856 5105->5106 5106->5060 5108 405910 5107->5108 5109 404ca0 5 API calls 5108->5109 5110 405936 5109->5110 5111 4031bc 4 API calls 5110->5111 5112 405941 5111->5112 5113 40316c 4 API calls 5112->5113 5114 405956 5113->5114 5114->5002 5116 402584 5115->5116 5117 40258e 5115->5117 5116->5117 5118 403128 4 API calls 5116->5118 5117->4958 5117->5117 5118->5117 6265 406650 IsDBCSLeadByte 6266 406668 6265->6266 6607 403f51 6608 403f76 6607->6608 6611 403f58 6607->6611 6610 403e62 4 API calls 6608->6610 6608->6611 6609 403f60 6610->6611 6611->6609 6612 402648 4 API calls 6611->6612 6613 403f9e 6612->6613 6267 403a54 CloseHandle 6268 403a64 6267->6268 6269 403a65 GetLastError 6267->6269 6270 40a256 6271 40a1c8 6270->6271 6272 4094ac 9 API calls 6271->6272 6274 40a1f4 6271->6274 6272->6274 6273 40a20d 6275 40a221 6273->6275 6276 40a216 73A25CF0 6273->6276 6274->6273 6277 40a207 RemoveDirectoryA 6274->6277 6278 40a249 6275->6278 6279 403550 4 API calls 6275->6279 6276->6275 6277->6273 6280 40a23f 6279->6280 6281 402580 4 API calls 6280->6281 6281->6278 6282 404257 6283 404297 6282->6283 6284 403128 4 API calls 6283->6284 6285 4042f7 6284->6285 6614 404159 6615 4041d3 6614->6615 6616 4041a0 6615->6616 6617 403128 4 API calls 6615->6617 6618 4042f7 6617->6618 6286 403e5b 6287 403e20 6286->6287 6288 403e36 6287->6288 6289 403e4f 6287->6289 6292 403e3b 6287->6292 6290 403c9c 4 API calls 6288->6290 6291 402648 4 API calls 6289->6291 6290->6292 6293 403e4c 6291->6293 6292->6293 6294 402648 4 API calls 6292->6294 6294->6293 6295 40a25d 6296 40a264 6295->6296 6297 40a28f 6295->6297 6305 40941c 6296->6305 6300 40316c 4 API calls 6297->6300 6299 40a269 6299->6297 6302 40a287 MessageBoxA 6299->6302 6301 40a2c7 6300->6301 6303 40316c 4 API calls 6301->6303 6302->6297 6304 40a2cf 6303->6304 6306 409483 ExitWindowsEx 6305->6306 6307 409428 GetCurrentProcess OpenProcessToken 6305->6307 6308 40943a 6306->6308 6307->6308 6309 40943e LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6307->6309 6308->6299 6309->6306 6309->6308 6314 407e64 6315 407e8c VirtualFree 6314->6315 6316 407e71 6315->6316 6631 405b66 6633 405b68 6631->6633 6632 405ba4 6636 405904 5 API calls 6632->6636 6633->6632 6634 405bbb 6633->6634 6635 405b9e 6633->6635 6640 404ca0 5 API calls 6634->6640 6635->6632 6638 405c10 6635->6638 6637 405bb7 6636->6637 6642 40316c 4 API calls 6637->6642 6639 405974 19 API calls 6638->6639 6639->6637 6641 405be4 6640->6641 6644 405974 19 API calls 6641->6644 6643 405c4a 6642->6643 6644->6637 6328 403a6b 6329 403a80 6328->6329 6330 403b90 GetStdHandle 6329->6330 6331 403ae2 CreateFileA 6329->6331 6341 403a86 6329->6341 6333 403beb GetLastError 6330->6333 6335 403b8e 6330->6335 6332 403b00 6331->6332 6331->6333 6332->6335 6336 403b0f GetFileSize 6332->6336 6333->6341 6338 403bbb GetFileType 6335->6338 6335->6341 6336->6333 6337 403b22 SetFilePointer 6336->6337 6337->6333 6342 403b3e ReadFile 6337->6342 6340 403bd6 CloseHandle 6338->6340 6338->6341 6340->6341 6342->6333 6343 403b60 6342->6343 6343->6335 6344 403b73 SetFilePointer 6343->6344 6344->6333 6345 403b84 SetEndOfFile 6344->6345 6345->6333 6345->6335 5119 407600 ReadFile 5120 407620 5119->5120 5121 407637 5119->5121 5122 407630 5120->5122 5123 407626 GetLastError 5120->5123 5124 407460 21 API calls 5122->5124 5123->5121 5123->5122 5124->5121 6349 40a000 6350 409a74 4 API calls 6349->6350 6351 40a005 6350->6351 6352 402ef8 5 API calls 6351->6352 6353 40a00a 6352->6353 6354 4078ec InterlockedExchange 6353->6354 6355 40a034 6354->6355 6356 40a044 6355->6356 6357 409a74 4 API calls 6355->6357 6362 407680 SetEndOfFile 6356->6362 6357->6356 6359 40a060 6360 402580 4 API calls 6359->6360 6361 40a097 6360->6361 6363 407690 6362->6363 6364 407697 6362->6364 6365 407460 21 API calls 6363->6365 6364->6359 6365->6364 6667 407102 6668 4070ec 6667->6668 6669 40316c 4 API calls 6668->6669 6670 4070f4 6669->6670 6671 40316c 4 API calls 6670->6671 6672 4070fc 6671->6672 6673 408f04 6676 408dd0 6673->6676 6677 408dd9 6676->6677 6678 40316c 4 API calls 6677->6678 6679 408de7 6677->6679 6678->6677 6680 403906 6681 4038f8 6680->6681 6682 403720 VariantClear 6681->6682 6683 403900 6682->6683 5346 409c14 5387 4030b0 5346->5387 5348 409c2a 5390 4042bc 5348->5390 5350 409c2f 5393 404550 GetModuleHandleA GetProcAddress 5350->5393 5356 409c3e 5410 409078 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5356->5410 5365 4031bc 4 API calls 5366 409c8a 5365->5366 5446 4074b4 5366->5446 5373 409d17 5466 407474 5373->5466 5374 409cd9 5374->5373 5499 409a74 5374->5499 5376 409d3d 5377 409d58 5376->5377 5378 409a74 4 API calls 5376->5378 5470 4079fc 5377->5470 5378->5377 5380 409d7d 5480 408adc 5380->5480 5384 409dc3 5385 408adc 21 API calls 5384->5385 5386 409dfc 5384->5386 5385->5384 5509 403068 5387->5509 5389 4030b5 GetModuleHandleA GetCommandLineA 5389->5348 5391 403128 4 API calls 5390->5391 5392 4042f7 5390->5392 5391->5392 5392->5350 5394 404573 GetProcAddress 5393->5394 5395 40456c 5393->5395 5396 404582 5394->5396 5397 404589 GetProcAddress 5394->5397 5395->5394 5396->5397 5398 404598 SetProcessDEPPolicy 5397->5398 5399 40459c 5397->5399 5398->5399 5400 40658c 5399->5400 5510 405c6c 5400->5510 5409 4065d8 6F571CD0 5409->5356 5411 4090cb 5410->5411 5600 406f74 SetErrorMode 5411->5600 5414 407258 5 API calls 5415 4090fb 5414->5415 5416 40316c 4 API calls 5415->5416 5417 409110 5416->5417 5418 409b04 GetSystemInfo VirtualQuery 5417->5418 5419 409bb8 5418->5419 5422 409b2e 5418->5422 5424 40973c 5419->5424 5420 409b99 VirtualQuery 5420->5419 5420->5422 5421 409b58 VirtualProtect 5421->5422 5422->5419 5422->5420 5422->5421 5423 409b87 VirtualProtect 5422->5423 5423->5420 5606 406ba4 GetCommandLineA 5424->5606 5426 4097f9 5428 40318c 4 API calls 5426->5428 5427 406c00 6 API calls 5430 409759 5427->5430 5429 409813 5428->5429 5432 406c00 5429->5432 5430->5426 5430->5427 5431 403428 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5430->5431 5431->5430 5433 406c27 GetModuleFileNameA 5432->5433 5434 406c4b GetCommandLineA 5432->5434 5435 40324c 4 API calls 5433->5435 5442 406c50 5434->5442 5436 406c49 5435->5436 5440 406c78 5436->5440 5437 406c55 5438 40316c 4 API calls 5437->5438 5441 406c5d 5438->5441 5439 406ac4 4 API calls 5439->5442 5443 40316c 4 API calls 5440->5443 5444 403200 4 API calls 5441->5444 5442->5437 5442->5439 5442->5441 5445 406c8d 5443->5445 5444->5440 5445->5365 5447 4074be 5446->5447 5627 40754a 5447->5627 5630 40754c 5447->5630 5448 4074ea 5449 4074fe 5448->5449 5450 407460 21 API calls 5448->5450 5453 409bc0 FindResourceA 5449->5453 5450->5449 5454 409bd5 5453->5454 5455 409bda SizeofResource 5453->5455 5456 409a74 4 API calls 5454->5456 5457 409be7 5455->5457 5458 409bec LoadResource 5455->5458 5456->5455 5459 409a74 4 API calls 5457->5459 5460 409bfa 5458->5460 5461 409bff LockResource 5458->5461 5459->5458 5462 409a74 4 API calls 5460->5462 5463 409c10 5461->5463 5464 409c0b 5461->5464 5462->5461 5463->5374 5496 4078ec 5463->5496 5465 409a74 4 API calls 5464->5465 5465->5463 5467 407488 5466->5467 5468 407498 5467->5468 5469 4073c0 20 API calls 5467->5469 5468->5376 5469->5468 5471 407a09 5470->5471 5472 405854 4 API calls 5471->5472 5473 407a5d 5471->5473 5472->5473 5474 4078ec InterlockedExchange 5473->5474 5475 407a6f 5474->5475 5476 405854 4 API calls 5475->5476 5477 407a85 5475->5477 5476->5477 5478 407ac8 5477->5478 5479 405854 4 API calls 5477->5479 5478->5380 5479->5478 5492 408b0d 5480->5492 5493 408b56 5480->5493 5481 408ba1 5642 407c8c 5481->5642 5484 4034c4 4 API calls 5484->5493 5485 408bb8 5486 40318c 4 API calls 5485->5486 5489 408bd2 5486->5489 5487 4033f4 4 API calls 5487->5492 5488 4031bc 4 API calls 5488->5492 5506 404be4 5489->5506 5490 4033f4 4 API calls 5490->5493 5491 4031bc 4 API calls 5491->5493 5492->5487 5492->5488 5492->5493 5494 407c8c 21 API calls 5492->5494 5633 4034c4 5492->5633 5493->5481 5493->5484 5493->5490 5493->5491 5495 407c8c 21 API calls 5493->5495 5494->5492 5495->5493 5668 407898 5496->5668 5500 409a95 5499->5500 5501 409a7d 5499->5501 5503 405854 4 API calls 5500->5503 5502 405854 4 API calls 5501->5502 5504 409a8f 5502->5504 5505 409aa6 5503->5505 5504->5373 5505->5373 5507 402568 4 API calls 5506->5507 5508 404bef 5507->5508 5508->5384 5509->5389 5511 405904 5 API calls 5510->5511 5512 405c7d 5511->5512 5513 405244 GetSystemDefaultLCID 5512->5513 5515 40527a 5513->5515 5514 404ca0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5514->5515 5515->5514 5516 4051d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5515->5516 5517 4031bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5515->5517 5520 4052dc 5515->5520 5516->5515 5517->5515 5518 404ca0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5518->5520 5519 4051d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5519->5520 5520->5518 5520->5519 5521 4031bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5520->5521 5522 40535f 5520->5522 5521->5520 5523 40318c 4 API calls 5522->5523 5524 405379 5523->5524 5525 405388 GetSystemDefaultLCID 5524->5525 5582 4051d0 GetLocaleInfoA 5525->5582 5528 4031bc 4 API calls 5529 4053c8 5528->5529 5530 4051d0 5 API calls 5529->5530 5531 4053dd 5530->5531 5532 4051d0 5 API calls 5531->5532 5533 405401 5532->5533 5588 40521c GetLocaleInfoA 5533->5588 5536 40521c GetLocaleInfoA 5537 405431 5536->5537 5538 4051d0 5 API calls 5537->5538 5539 40544b 5538->5539 5540 40521c GetLocaleInfoA 5539->5540 5541 405468 5540->5541 5542 4051d0 5 API calls 5541->5542 5543 405482 5542->5543 5544 4031bc 4 API calls 5543->5544 5545 40548f 5544->5545 5546 4051d0 5 API calls 5545->5546 5547 4054a4 5546->5547 5548 4031bc 4 API calls 5547->5548 5549 4054b1 5548->5549 5550 40521c GetLocaleInfoA 5549->5550 5551 4054bf 5550->5551 5552 4051d0 5 API calls 5551->5552 5553 4054d9 5552->5553 5554 4031bc 4 API calls 5553->5554 5555 4054e6 5554->5555 5556 4051d0 5 API calls 5555->5556 5557 4054fb 5556->5557 5558 4031bc 4 API calls 5557->5558 5559 405508 5558->5559 5560 4051d0 5 API calls 5559->5560 5561 40551d 5560->5561 5562 40553a 5561->5562 5563 40552b 5561->5563 5565 403200 4 API calls 5562->5565 5596 403200 5563->5596 5566 405538 5565->5566 5567 4051d0 5 API calls 5566->5567 5568 40555c 5567->5568 5569 405579 5568->5569 5570 40556a 5568->5570 5572 40316c 4 API calls 5569->5572 5571 403200 4 API calls 5570->5571 5573 405577 5571->5573 5572->5573 5590 403388 5573->5590 5575 40559b 5576 403388 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5575->5576 5577 4055b5 5576->5577 5578 40318c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5577->5578 5579 4055cf 5578->5579 5580 405cb8 GetVersionExA 5579->5580 5581 405ccf 5580->5581 5581->5409 5583 4051f7 5582->5583 5584 405209 5582->5584 5585 40324c 4 API calls 5583->5585 5586 403200 4 API calls 5584->5586 5587 405207 5585->5587 5586->5587 5587->5528 5589 405238 5588->5589 5589->5536 5591 403390 5590->5591 5592 403228 4 API calls 5591->5592 5593 4033a3 5592->5593 5594 4031bc 4 API calls 5593->5594 5595 4033cb 5594->5595 5597 403204 5596->5597 5598 403226 5597->5598 5599 402580 4 API calls 5597->5599 5598->5566 5599->5598 5604 4033e8 5600->5604 5603 406fc2 5603->5414 5605 4033ec LoadLibraryA 5604->5605 5605->5603 5613 406ac4 5606->5613 5608 406bc7 5609 406bd9 5608->5609 5610 406ac4 4 API calls 5608->5610 5611 40316c 4 API calls 5609->5611 5610->5608 5612 406bee 5611->5612 5612->5430 5614 406af0 5613->5614 5615 40324c 4 API calls 5614->5615 5616 406afd 5615->5616 5623 4033f4 5616->5623 5618 406b05 5619 4031bc 4 API calls 5618->5619 5620 406b1d 5619->5620 5621 40316c 4 API calls 5620->5621 5622 406b3f 5621->5622 5622->5608 5624 4033fa 5623->5624 5626 40340b 5623->5626 5625 403228 4 API calls 5624->5625 5624->5626 5625->5626 5626->5618 5628 40754c 5627->5628 5629 40758b CreateFileA 5628->5629 5629->5448 5631 4033e8 5630->5631 5632 40758b CreateFileA 5631->5632 5632->5448 5634 4034d1 5633->5634 5641 403501 5633->5641 5636 4034fa 5634->5636 5637 4034dd 5634->5637 5635 40316c 4 API calls 5639 4034eb 5635->5639 5638 403228 4 API calls 5636->5638 5648 402598 5637->5648 5638->5641 5639->5492 5641->5635 5643 407ca7 5642->5643 5646 407c9c 5642->5646 5652 407c30 5643->5652 5646->5485 5647 405854 4 API calls 5647->5646 5649 40259e 5648->5649 5649->5639 5650 403128 4 API calls 5649->5650 5651 4025b0 5649->5651 5650->5651 5651->5639 5653 407c83 5652->5653 5654 407c44 5652->5654 5653->5646 5653->5647 5654->5653 5656 407b80 5654->5656 5657 407b9c 5656->5657 5658 407b8b 5656->5658 5660 407474 20 API calls 5657->5660 5659 405854 4 API calls 5658->5659 5659->5657 5661 407bb0 5660->5661 5662 407474 20 API calls 5661->5662 5663 407bd1 5662->5663 5664 4078ec InterlockedExchange 5663->5664 5666 407be6 5664->5666 5665 407bfc 5665->5654 5666->5665 5667 405854 4 API calls 5666->5667 5667->5665 5669 4078bb 5668->5669 5670 4078aa 5668->5670 5669->5374 5671 4078af InterlockedExchange 5670->5671 5671->5669 6375 409e1b 6376 409e40 6375->6376 6377 4098c8 15 API calls 6376->6377 6378 409e45 6377->6378 6379 409e98 6378->6379 6383 408dac 4 API calls 6378->6383 6409 402698 GetSystemTime 6379->6409 6381 409e9d 6382 409304 32 API calls 6381->6382 6384 409ea5 6382->6384 6385 409e74 6383->6385 6386 4031bc 4 API calls 6384->6386 6389 409e7c MessageBoxA 6385->6389 6387 409eb2 6386->6387 6388 4068fc 5 API calls 6387->6388 6390 409ebf 6388->6390 6389->6379 6391 409e89 6389->6391 6392 406694 5 API calls 6390->6392 6393 405828 5 API calls 6391->6393 6394 409ecf 6392->6394 6393->6379 6395 40660c 5 API calls 6394->6395 6396 409ee0 6395->6396 6397 403314 4 API calls 6396->6397 6398 409eee 6397->6398 6399 4031bc 4 API calls 6398->6399 6400 409efe 6399->6400 6401 4074b4 23 API calls 6400->6401 6402 409f3d 6401->6402 6403 402568 4 API calls 6402->6403 6404 409f5d 6403->6404 6405 4079fc 5 API calls 6404->6405 6406 409f9f 6405->6406 6407 407c8c 21 API calls 6406->6407 6408 409fc6 6407->6408 6409->6381 6250 40751c 6251 407528 CloseHandle 6250->6251 6252 407531 6250->6252 6251->6252 6692 402b1c RaiseException 6693 40291e 6694 402926 6693->6694 6695 403528 4 API calls 6694->6695 6696 40293b 6694->6696 6695->6694 6697 403f1e 6698 403f30 6697->6698 6699 403f27 6697->6699 6700 403edb 4 API calls 6699->6700 6700->6698 6709 405124 6710 405137 6709->6710 6711 404e1c 19 API calls 6710->6711 6712 40514b 6711->6712 6410 403a26 6411 403a48 6410->6411 6412 403a2e WriteFile 6410->6412 6412->6411 6413 403a4c GetLastError 6412->6413 6413->6411 6414 402628 6415 403128 4 API calls 6414->6415 6416 4025e8 6415->6416 6417 402606 6416->6417 6418 403128 4 API calls 6416->6418 6417->6417 6418->6417 6713 407d2c 6714 407d73 6713->6714 6715 407d33 6713->6715 6716 407d51 6715->6716 6717 407da4 6715->6717 6725 407db0 6715->6725 6720 407d72 6716->6720 6721 405888 19 API calls 6716->6721 6722 407e15 6717->6722 6717->6725 6718 405888 19 API calls 6719 407dda 6718->6719 6721->6720 6723 405158 19 API calls 6722->6723 6724 407e2b 6723->6724 6730 407db8 6724->6730 6725->6718 6727 407e33 6728 40316c 4 API calls 6727->6728 6729 407e48 6728->6729 6731 407dc1 6730->6731 6732 405888 19 API calls 6731->6732 6733 407dda 6732->6733 6733->6727 5672 409e36 5673 409a74 4 API calls 5672->5673 5674 409e3b 5673->5674 5675 409e40 5674->5675 5775 402ef8 5674->5775 5709 4098c8 5675->5709 5678 409e98 5714 402698 GetSystemTime 5678->5714 5680 409e45 5680->5678 5780 408dac 5680->5780 5681 409e9d 5715 409304 5681->5715 5685 409e74 5689 409e7c MessageBoxA 5685->5689 5686 4031bc 4 API calls 5687 409eb2 5686->5687 5733 4068fc 5687->5733 5689->5678 5691 409e89 5689->5691 5783 405828 5691->5783 5696 409ee0 5760 403314 5696->5760 5698 409eee 5699 4031bc 4 API calls 5698->5699 5700 409efe 5699->5700 5701 4074b4 23 API calls 5700->5701 5702 409f3d 5701->5702 5703 402568 4 API calls 5702->5703 5704 409f5d 5703->5704 5705 4079fc 5 API calls 5704->5705 5706 409f9f 5705->5706 5707 407c8c 21 API calls 5706->5707 5708 409fc6 5707->5708 5787 409510 5709->5787 5714->5681 5724 409324 5715->5724 5718 409349 CreateDirectoryA 5719 4093c1 5718->5719 5720 409353 GetLastError 5718->5720 5721 403200 4 API calls 5719->5721 5720->5724 5723 4093cb 5721->5723 5722 408dac 4 API calls 5722->5724 5725 40318c 4 API calls 5723->5725 5724->5718 5724->5722 5729 407258 5 API calls 5724->5729 5732 405854 4 API calls 5724->5732 5879 406cc8 5724->5879 5902 4091f8 5724->5902 5921 404c58 5724->5921 5924 408d7c 5724->5924 5727 4093e5 5725->5727 5728 40318c 4 API calls 5727->5728 5730 4093f2 5728->5730 5729->5724 5730->5686 5732->5724 6034 4067f4 5733->6034 5736 403428 4 API calls 5737 40691e 5736->5737 5738 406694 5737->5738 6039 4068b8 5738->6039 5741 4066d2 5743 403428 4 API calls 5741->5743 5742 4066c4 5744 403314 4 API calls 5742->5744 5745 4066e5 5743->5745 5746 4066d0 5744->5746 5747 403314 4 API calls 5745->5747 5748 40316c 4 API calls 5746->5748 5747->5746 5749 406707 5748->5749 5750 40660c 5749->5750 5751 406616 5750->5751 5752 406639 5750->5752 6045 406924 5751->6045 5754 403200 4 API calls 5752->5754 5755 406642 5754->5755 5755->5696 5756 40661d 5756->5752 5757 406628 5756->5757 5758 403314 4 API calls 5757->5758 5759 406636 5758->5759 5759->5696 5761 403318 5760->5761 5762 403379 5760->5762 5763 403320 5761->5763 5764 4031bc 5761->5764 5763->5762 5767 4031bc 4 API calls 5763->5767 5770 40332f 5763->5770 5765 4031d0 5764->5765 5769 403228 4 API calls 5764->5769 5766 4031fc 5765->5766 5771 402580 4 API calls 5765->5771 5766->5698 5767->5770 5768 403228 4 API calls 5772 403349 5768->5772 5769->5765 5770->5768 5771->5766 5773 4031bc 4 API calls 5772->5773 5774 403375 5773->5774 5774->5698 5776 403128 4 API calls 5775->5776 5777 402efd 5776->5777 6051 402ba0 5777->6051 5779 402f25 5779->5779 5781 408d7c 4 API calls 5780->5781 5782 408dc8 5781->5782 5782->5685 5784 40582d 5783->5784 5785 405904 5 API calls 5784->5785 5786 40583f 5785->5786 5786->5786 5794 40952f 5787->5794 5788 409564 5791 409571 GetUserDefaultLangID 5788->5791 5795 409566 5788->5795 5789 409568 5805 406ff8 GetModuleHandleA GetProcAddress 5789->5805 5791->5795 5793 409543 5799 409858 5793->5799 5794->5788 5794->5789 5794->5793 5795->5793 5796 40959f GetACP 5795->5796 5797 4095c3 5795->5797 5796->5793 5796->5795 5797->5793 5798 4095e9 GetACP 5797->5798 5798->5793 5798->5797 5800 40989a 5799->5800 5801 409860 5799->5801 5800->5680 5801->5800 5802 4033f4 4 API calls 5801->5802 5803 409894 5802->5803 5863 408e54 5803->5863 5806 407032 5805->5806 5807 40703b 5805->5807 5818 40316c 4 API calls 5806->5818 5808 407044 5807->5808 5809 40707c 5807->5809 5826 406f3c 5808->5826 5810 406f3c RegOpenKeyExA 5809->5810 5812 407095 5810->5812 5814 4070b2 5812->5814 5815 406f30 6 API calls 5812->5815 5813 40705d 5813->5814 5829 406f30 5813->5829 5816 403200 4 API calls 5814->5816 5819 4070a9 RegCloseKey 5815->5819 5820 4070bf 5816->5820 5822 4070f4 5818->5822 5819->5814 5832 4032d0 5820->5832 5823 40316c 4 API calls 5822->5823 5825 4070fc 5823->5825 5825->5795 5827 406f47 5826->5827 5828 406f4d RegOpenKeyExA 5826->5828 5827->5828 5828->5813 5846 406de4 5829->5846 5833 403313 5832->5833 5834 4032d4 5832->5834 5833->5806 5835 4032de 5834->5835 5838 4031bc 5834->5838 5836 4032f1 5835->5836 5837 403308 5835->5837 5840 4034c4 4 API calls 5836->5840 5841 4034c4 4 API calls 5837->5841 5842 403228 4 API calls 5838->5842 5843 4031d0 5838->5843 5839 4031fc 5839->5806 5845 4032f6 5840->5845 5841->5845 5842->5843 5843->5839 5844 402580 4 API calls 5843->5844 5844->5839 5845->5806 5847 406e0a RegQueryValueExA 5846->5847 5848 406e4f 5847->5848 5853 406e2d 5847->5853 5849 40316c 4 API calls 5848->5849 5852 406f1b RegCloseKey 5849->5852 5850 406e47 5851 40316c 4 API calls 5850->5851 5851->5848 5852->5814 5853->5848 5853->5850 5854 40324c 4 API calls 5853->5854 5855 4033f4 4 API calls 5853->5855 5854->5853 5856 406e84 RegQueryValueExA 5855->5856 5856->5847 5857 406ea0 5856->5857 5857->5848 5858 4034c4 4 API calls 5857->5858 5859 406ee2 5858->5859 5860 406ef4 5859->5860 5862 4033f4 4 API calls 5859->5862 5861 4031bc 4 API calls 5860->5861 5861->5848 5862->5860 5864 408e62 5863->5864 5866 408e7a 5864->5866 5876 408dec 5864->5876 5867 408dec 4 API calls 5866->5867 5868 408e9e 5866->5868 5867->5868 5869 4078ec InterlockedExchange 5868->5869 5870 408eb9 5869->5870 5871 408dec 4 API calls 5870->5871 5873 408ecc 5870->5873 5871->5873 5872 408dec 4 API calls 5872->5873 5873->5872 5874 40324c 4 API calls 5873->5874 5875 408efb 5873->5875 5874->5873 5875->5800 5877 405854 4 API calls 5876->5877 5878 408dfd 5877->5878 5878->5866 5928 406a2c 5879->5928 5882 406cfa 5884 406a2c 5 API calls 5882->5884 5886 406d46 5882->5886 5885 406d0a 5884->5885 5887 406d16 5885->5887 5889 406a08 7 API calls 5885->5889 5936 40685c 5886->5936 5887->5886 5890 406a2c 5 API calls 5887->5890 5898 406d3b 5887->5898 5889->5887 5894 406d2f 5890->5894 5893 40660c 5 API calls 5895 406d5b 5893->5895 5896 406a08 7 API calls 5894->5896 5894->5898 5897 403200 4 API calls 5895->5897 5896->5898 5899 406d65 5897->5899 5898->5886 5948 406c9c GetWindowsDirectoryA 5898->5948 5900 40318c 4 API calls 5899->5900 5901 406d7f 5900->5901 5901->5724 5903 409218 5902->5903 5904 40660c 5 API calls 5903->5904 5905 409231 5904->5905 5906 403200 4 API calls 5905->5906 5909 40923c 5906->5909 5908 40694c 6 API calls 5908->5909 5909->5908 5910 408dac 4 API calls 5909->5910 5911 403388 4 API calls 5909->5911 5912 405854 4 API calls 5909->5912 5914 4092b8 5909->5914 5988 409184 5909->5988 5996 409008 5909->5996 5910->5909 5911->5909 5912->5909 5915 403200 4 API calls 5914->5915 5916 4092c3 5915->5916 5917 40318c 4 API calls 5916->5917 5918 4092dd 5917->5918 5919 40316c 4 API calls 5918->5919 5920 4092e5 5919->5920 5920->5724 5922 40516c 19 API calls 5921->5922 5923 404c76 5922->5923 5923->5724 5925 408d9c 5924->5925 6024 408c54 5925->6024 5929 4034c4 4 API calls 5928->5929 5930 406a3f 5929->5930 5931 406a56 GetEnvironmentVariableA 5930->5931 5935 406a69 5930->5935 5950 406dc0 5930->5950 5931->5930 5932 406a62 5931->5932 5933 40316c 4 API calls 5932->5933 5933->5935 5935->5882 5945 406a08 5935->5945 5937 4033e8 5936->5937 5938 40687f GetFullPathNameA 5937->5938 5939 4068a2 5938->5939 5940 40688b 5938->5940 5941 403200 4 API calls 5939->5941 5940->5939 5942 406893 5940->5942 5943 4068a0 5941->5943 5944 40324c 4 API calls 5942->5944 5943->5893 5944->5943 5954 4069b0 5945->5954 5949 406cbd 5948->5949 5949->5886 5951 406dce 5950->5951 5952 4034c4 4 API calls 5951->5952 5953 406ddc 5952->5953 5953->5930 5961 40694c 5954->5961 5956 4069d2 5957 4069da GetFileAttributesA 5956->5957 5958 4069ef 5957->5958 5959 40316c 4 API calls 5958->5959 5960 4069f7 5959->5960 5960->5882 5971 406718 5961->5971 5963 406984 5966 40699a 5963->5966 5967 40698f 5963->5967 5965 40695d 5965->5963 5978 406944 CharPrevA 5965->5978 5979 403428 5966->5979 5968 403200 4 API calls 5967->5968 5970 406998 5968->5970 5970->5956 5974 406729 5971->5974 5972 40678d 5973 406654 IsDBCSLeadByte 5972->5973 5975 406788 5972->5975 5973->5975 5974->5972 5976 406747 5974->5976 5975->5965 5976->5975 5986 406654 IsDBCSLeadByte 5976->5986 5978->5965 5980 40345a 5979->5980 5981 40342d 5979->5981 5982 40316c 4 API calls 5980->5982 5981->5980 5983 403441 5981->5983 5985 403450 5982->5985 5984 40324c 4 API calls 5983->5984 5984->5985 5985->5970 5987 406668 5986->5987 5987->5976 5989 40316c 4 API calls 5988->5989 5991 4091a5 5989->5991 5993 4091d2 5991->5993 6005 40327c 5991->6005 6008 403468 5991->6008 5994 40316c 4 API calls 5993->5994 5995 4091e7 5994->5995 5995->5909 6012 408f44 5996->6012 5998 40901e 5999 409022 5998->5999 6018 406a1c 5998->6018 5999->5909 6002 409055 6021 408f80 6002->6021 6006 40324c 4 API calls 6005->6006 6007 403289 6006->6007 6007->5991 6009 40346c 6008->6009 6011 403497 6008->6011 6010 4034c4 4 API calls 6009->6010 6010->6011 6011->5991 6013 408f52 6012->6013 6014 408f4e 6012->6014 6015 408f74 SetLastError 6013->6015 6016 408f5b Wow64DisableWow64FsRedirection 6013->6016 6014->5998 6017 408f6f 6015->6017 6016->6017 6017->5998 6019 4069b0 7 API calls 6018->6019 6020 406a26 GetLastError 6019->6020 6020->6002 6022 408f85 Wow64RevertWow64FsRedirection 6021->6022 6023 408f8f 6021->6023 6022->6023 6023->5909 6025 40316c 4 API calls 6024->6025 6033 408c85 6025->6033 6026 408cb0 6027 40318c 4 API calls 6026->6027 6028 408d3d 6027->6028 6028->5724 6029 408c9c 6031 4032d0 4 API calls 6029->6031 6030 40324c 4 API calls 6030->6033 6031->6026 6032 4032d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6032->6033 6033->6026 6033->6029 6033->6030 6033->6032 6035 406718 IsDBCSLeadByte 6034->6035 6037 406809 6035->6037 6036 406853 6036->5736 6037->6036 6038 406654 IsDBCSLeadByte 6037->6038 6038->6037 6040 4068c7 6039->6040 6041 4067f4 IsDBCSLeadByte 6040->6041 6044 4068d2 6041->6044 6042 4066be 6042->5741 6042->5742 6043 406654 IsDBCSLeadByte 6043->6044 6044->6042 6044->6043 6046 40692b 6045->6046 6047 40692f 6045->6047 6046->5756 6050 406944 CharPrevA 6047->6050 6049 406940 6049->5756 6050->6049 6052 402ba9 RaiseException 6051->6052 6053 402bba 6051->6053 6052->6053 6053->5779 6419 402e38 6420 402e3d 6419->6420 6421 402e32 6420->6421 6422 402e4e RtlUnwind 6420->6422 6423 402e71 6422->6423 6434 402ac6 6435 402ad2 6434->6435 6438 402ea4 6435->6438 6439 403128 4 API calls 6438->6439 6441 402eb4 6439->6441 6440 402ad7 6441->6440 6443 402ae0 6441->6443 6444 402af9 6443->6444 6445 402ae9 RaiseException 6443->6445 6444->6440 6445->6444 6738 402dce 6739 402dfa 6738->6739 6740 402de1 6738->6740 6742 402b78 6740->6742 6743 402b81 6742->6743 6744 402b9d 6742->6744 6745 402b89 RaiseException 6743->6745 6744->6739 6745->6744 6746 4075ce GetFileSize 6747 4075fa 6746->6747 6748 4075ea GetLastError 6746->6748 6748->6747 6749 4075f3 6748->6749 6750 407460 21 API calls 6749->6750 6750->6747 6751 406fcf 6752 406fdc SetErrorMode 6751->6752 6054 403cd6 6059 403ce6 6054->6059 6055 403db3 ExitProcess 6056 403d8c 6070 403c9c 6056->6070 6058 403dbe 6059->6055 6059->6056 6059->6058 6064 403d63 MessageBoxA 6059->6064 6065 403d78 6059->6065 6061 403c9c 4 API calls 6062 403da0 6061->6062 6074 4019b0 6062->6074 6064->6056 6086 403fb8 6065->6086 6066 403da5 6066->6055 6066->6058 6071 403caa 6070->6071 6072 403cbf 6071->6072 6090 402648 6071->6090 6072->6061 6075 4019c1 6074->6075 6076 401a8f 6074->6076 6077 4019e2 LocalFree 6075->6077 6078 4019d8 RtlEnterCriticalSection 6075->6078 6076->6066 6079 401a15 6077->6079 6078->6077 6080 401a03 VirtualFree 6079->6080 6081 401a1d 6079->6081 6080->6079 6082 401a44 LocalFree 6081->6082 6083 401a5b 6081->6083 6082->6082 6082->6083 6084 401a73 RtlLeaveCriticalSection 6083->6084 6085 401a7d RtlDeleteCriticalSection 6083->6085 6084->6085 6085->6066 6087 403fbc 6086->6087 6093 403edb 6087->6093 6089 403fda 6091 403128 4 API calls 6090->6091 6092 40264e 6091->6092 6092->6072 6104 403edd 6093->6104 6094 403e70 6096 403f10 6094->6096 6098 403ec6 6094->6098 6105 403e7d 6094->6105 6107 403e62 6094->6107 6096->6089 6097 403ea3 6097->6089 6101 402648 4 API calls 6098->6101 6099 403128 4 API calls 6099->6104 6101->6097 6103 403f11 6103->6089 6104->6094 6104->6099 6104->6103 6116 403e70 6104->6116 6105->6097 6106 402648 4 API calls 6105->6106 6106->6097 6108 403e20 6107->6108 6109 403e36 6108->6109 6110 403e4f 6108->6110 6113 403e3b 6108->6113 6111 403c9c 4 API calls 6109->6111 6112 402648 4 API calls 6110->6112 6111->6113 6114 403e4c 6112->6114 6113->6114 6115 402648 4 API calls 6113->6115 6114->6098 6114->6105 6115->6114 6117 403e7d 6116->6117 6118 403eab 6116->6118 6120 403ea3 6117->6120 6124 402648 4 API calls 6117->6124 6119 403ec6 6118->6119 6121 403e62 4 API calls 6118->6121 6122 402648 4 API calls 6119->6122 6120->6104 6123 403eba 6121->6123 6122->6120 6123->6117 6123->6119 6124->6120 6761 4041da 6762 4041a0 6761->6762 6765 4041de 6761->6765 6763 404256 6764 403128 4 API calls 6766 4042f7 6764->6766 6765->6763 6765->6764 6767 402bdc 6770 402c56 6767->6770 6771 402bed 6767->6771 6768 402c2a RtlUnwind 6769 403128 4 API calls 6768->6769 6769->6770 6771->6768 6771->6770 6772 402afc RaiseException 6771->6772 6773 402c21 6772->6773 6773->6768 6774 408be4 6775 408beb 6774->6775 6776 40316c 4 API calls 6775->6776 6783 408c85 6775->6783 6776->6783 6777 408cb0 6778 40318c 4 API calls 6777->6778 6779 408d3d 6778->6779 6780 408c9c 6782 4032d0 4 API calls 6780->6782 6781 40324c 4 API calls 6781->6783 6782->6777 6783->6777 6783->6780 6783->6781 6784 4032d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6783->6784 6784->6783 6789 409fe5 6790 40a00a 6789->6790 6791 4078ec InterlockedExchange 6790->6791 6792 40a034 6791->6792 6793 40a044 6792->6793 6794 409a74 4 API calls 6792->6794 6795 407680 22 API calls 6793->6795 6794->6793 6796 40a060 6795->6796 6797 402580 4 API calls 6796->6797 6798 40a097 6797->6798 6460 4098ea 6461 4098ec 6460->6461 6462 40992a CallWindowProcA 6461->6462 6463 40990e 6461->6463 6462->6463 5344 406feb 5345 406fdc SetErrorMode 5344->5345 6470 4098ec 6471 40990e 6470->6471 6473 4098fb 6470->6473 6472 40992a CallWindowProcA 6472->6471 6473->6471 6473->6472 6799 402fec 6800 403044 6799->6800 6801 402ff9 6799->6801 6802 402ffe RtlUnwind 6801->6802 6805 403022 6802->6805 6803 402f4c 6805->6803 6806 402bbc 6805->6806 6807 402bc5 RaiseException 6806->6807 6808 402bd8 6806->6808 6807->6808 6808->6800 6813 408ff2 6814 408fe4 6813->6814 6815 408f80 Wow64RevertWow64FsRedirection 6814->6815 6816 408fec 6815->6816 6821 408ff4 SetLastError 6822 408ffd 6821->6822 6829 4039fc ReadFile 6830 403a1a 6829->6830 6831 403a1d GetLastError 6829->6831 5125 407680 SetEndOfFile 5126 407690 5125->5126 5127 407697 5125->5127 5128 407460 21 API calls 5126->5128 5128->5127 6474 402880 6475 402568 4 API calls 6474->6475 6476 40288a 6475->6476 6477 401a8d 6478 401a6a 6477->6478 6479 401a73 RtlLeaveCriticalSection 6478->6479 6480 401a7d RtlDeleteCriticalSection 6478->6480 6479->6480 6125 407598 SetFilePointer 6126 4075cb 6125->6126 6127 4075bb GetLastError 6125->6127 6127->6126 6128 4075c4 6127->6128 6129 407460 21 API calls 6128->6129 6129->6126 6485 405a98 6486 405aa0 6485->6486 6487 405aa8 6485->6487 6488 405aa6 6486->6488 6489 405aaf 6486->6489 6492 405a10 6488->6492 6490 405904 5 API calls 6489->6490 6490->6487 6493 405a18 6492->6493 6494 405a32 6493->6494 6495 403128 4 API calls 6493->6495 6496 405a37 6494->6496 6497 405a4e 6494->6497 6495->6493 6499 405904 5 API calls 6496->6499 6498 403128 4 API calls 6497->6498 6500 405a53 6498->6500 6501 405a4a 6499->6501 6502 405974 19 API calls 6500->6502 6503 403128 4 API calls 6501->6503 6502->6501 6504 405a7c 6503->6504 6505 403128 4 API calls 6504->6505 6506 405a8a 6505->6506 6506->6487 6130 40769c WriteFile 6131 4076c3 6130->6131 6132 4076bc 6130->6132 6134 4076d4 6131->6134 6135 4073c0 20 API calls 6131->6135 6133 407460 21 API calls 6132->6133 6133->6131 6135->6134 6507 40a29e 6516 4096d0 6507->6516 6510 402ef8 5 API calls 6511 40a2a8 6510->6511 6512 40316c 4 API calls 6511->6512 6513 40a2c7 6512->6513 6514 40316c 4 API calls 6513->6514 6515 40a2cf 6514->6515 6525 405670 6516->6525 6518 409719 6522 40316c 4 API calls 6518->6522 6519 4096eb 6519->6518 6531 4071e0 6519->6531 6521 409709 6524 409711 MessageBoxA 6521->6524 6523 40972e 6522->6523 6523->6510 6523->6511 6524->6518 6526 403128 4 API calls 6525->6526 6527 405675 6526->6527 6528 40568d 6527->6528 6529 403128 4 API calls 6527->6529 6528->6519 6530 405683 6529->6530 6530->6519 6532 405670 4 API calls 6531->6532 6533 4071ef 6532->6533 6534 407203 6533->6534 6535 4071f5 6533->6535 6537 407213 6534->6537 6538 40721f 6534->6538 6536 403200 4 API calls 6535->6536 6540 407201 6536->6540 6542 4071a4 6537->6542 6549 40328c 6538->6549 6540->6521 6543 403200 4 API calls 6542->6543 6545 4071b3 6543->6545 6544 4071d0 6544->6540 6545->6544 6546 406924 CharPrevA 6545->6546 6547 4071bf 6546->6547 6547->6544 6548 4032d0 4 API calls 6547->6548 6548->6544 6550 40324c 4 API calls 6549->6550 6551 403296 6550->6551 6551->6540 6552 402ca0 6555 402cb1 6552->6555 6556 402cd2 6552->6556 6553 402d5c RtlUnwind 6554 403128 4 API calls 6553->6554 6554->6556 6555->6553 6555->6556 6559 402afc 6555->6559 6560 402b05 RaiseException 6559->6560 6561 402b1b 6559->6561 6560->6561 6561->6553 6844 403fa1 6845 403edb 4 API calls 6844->6845 6846 403faa 6845->6846 6847 403e70 4 API calls 6846->6847 6848 403fb6 6847->6848 5129 4024a4 5130 4024b8 5129->5130 5131 4024cb 5129->5131 5168 4018ec RtlInitializeCriticalSection 5130->5168 5133 4024e2 RtlEnterCriticalSection 5131->5133 5134 4024ec 5131->5134 5133->5134 5145 4022d4 5134->5145 5138 4024c1 5139 4024f9 5141 402555 5139->5141 5142 40254b RtlLeaveCriticalSection 5139->5142 5142->5141 5143 402505 5143->5139 5175 402130 5143->5175 5146 4022e8 5145->5146 5148 40238c 5146->5148 5150 402309 5146->5150 5147 402318 5147->5139 5155 401fa8 5147->5155 5148->5147 5153 402429 5148->5153 5192 401d54 5148->5192 5200 401e58 5148->5200 5150->5147 5189 401b48 5150->5189 5153->5147 5196 401cd4 5153->5196 5156 401fbc 5155->5156 5157 401fcf 5155->5157 5159 4018ec 4 API calls 5156->5159 5158 401fe6 RtlEnterCriticalSection 5157->5158 5162 401ff0 5157->5162 5158->5162 5160 401fc1 5159->5160 5160->5157 5161 401fc5 5160->5161 5164 402026 5161->5164 5162->5164 5282 401eb4 5162->5282 5164->5143 5166 402111 RtlLeaveCriticalSection 5167 40211b 5166->5167 5167->5143 5169 401910 RtlEnterCriticalSection 5168->5169 5170 40191a 5168->5170 5169->5170 5171 401938 LocalAlloc 5170->5171 5172 401952 5171->5172 5173 4019a1 5172->5173 5174 401997 RtlLeaveCriticalSection 5172->5174 5173->5131 5173->5138 5174->5173 5176 402149 5175->5176 5179 40214e 5175->5179 5177 4018ec 4 API calls 5176->5177 5177->5179 5178 40217f RtlEnterCriticalSection 5182 402189 5178->5182 5179->5178 5179->5182 5183 402152 5179->5183 5180 402195 5184 4022c1 5180->5184 5185 4022b7 RtlLeaveCriticalSection 5180->5185 5181 402218 5181->5183 5186 401d54 7 API calls 5181->5186 5182->5180 5182->5181 5187 402244 5182->5187 5183->5139 5184->5139 5185->5184 5186->5183 5187->5180 5188 401cd4 7 API calls 5187->5188 5188->5180 5190 402130 9 API calls 5189->5190 5191 401b69 5190->5191 5191->5147 5193 401d66 5192->5193 5194 401d5d 5192->5194 5193->5148 5194->5193 5195 401b48 9 API calls 5194->5195 5195->5193 5197 401d22 5196->5197 5198 401cf2 5196->5198 5197->5198 5205 401c3c 5197->5205 5198->5147 5260 40173c 5200->5260 5202 401e6d 5204 401e7a 5202->5204 5271 401da0 5202->5271 5204->5148 5206 401c4e 5205->5206 5207 401c71 5206->5207 5208 401c83 5206->5208 5218 401860 5207->5218 5210 401860 3 API calls 5208->5210 5211 401c81 5210->5211 5212 401c99 5211->5212 5228 401b18 5211->5228 5212->5198 5214 401ca8 5215 401cc2 5214->5215 5233 401b6c 5214->5233 5238 401384 5215->5238 5219 401886 5218->5219 5227 4018df 5218->5227 5242 40162c 5219->5242 5224 4018ba 5226 401384 LocalAlloc 5224->5226 5224->5227 5226->5227 5227->5211 5229 401b35 5228->5229 5230 401b26 5228->5230 5229->5214 5231 401cd4 9 API calls 5230->5231 5232 401b33 5231->5232 5232->5214 5234 401b71 5233->5234 5235 401b7f 5233->5235 5236 401b48 9 API calls 5234->5236 5235->5215 5237 401b7e 5236->5237 5237->5215 5239 40138f 5238->5239 5240 4013aa 5239->5240 5241 4012e4 LocalAlloc 5239->5241 5240->5212 5241->5240 5244 401663 5242->5244 5243 4016a3 5246 401320 5243->5246 5244->5243 5245 40167d VirtualFree 5244->5245 5245->5244 5247 401333 5246->5247 5254 4012e4 5247->5254 5250 4014f0 5253 40151b 5250->5253 5251 40156e 5251->5224 5252 401542 VirtualFree 5252->5253 5253->5251 5253->5252 5257 40128c 5254->5257 5256 4012ef 5256->5224 5256->5250 5258 401298 LocalAlloc 5257->5258 5259 4012aa 5257->5259 5258->5259 5259->5256 5264 40175b 5260->5264 5261 40180f 5269 4017bb 5261->5269 5278 401598 5261->5278 5262 401478 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5262->5264 5263 401320 LocalAlloc 5263->5264 5264->5261 5264->5262 5264->5263 5266 4017f5 5264->5266 5268 4017aa 5264->5268 5267 4014f0 VirtualFree 5266->5267 5267->5269 5270 4014f0 VirtualFree 5268->5270 5269->5202 5270->5269 5272 401d54 9 API calls 5271->5272 5273 401db4 5272->5273 5274 401320 LocalAlloc 5273->5274 5275 401dc4 5274->5275 5276 401b18 9 API calls 5275->5276 5277 401dcc 5275->5277 5276->5277 5277->5204 5279 4015de 5278->5279 5280 4015fa VirtualAlloc 5279->5280 5281 40160e 5279->5281 5280->5279 5280->5281 5281->5269 5285 401ec4 5282->5285 5283 401ef0 5284 401cd4 9 API calls 5283->5284 5287 401f14 5283->5287 5284->5287 5285->5283 5285->5287 5288 401e2c 5285->5288 5287->5166 5287->5167 5293 4016ac 5288->5293 5291 401da0 9 API calls 5292 401e49 5291->5292 5292->5285 5294 4016c8 5293->5294 5295 4016d2 5294->5295 5298 40172f 5294->5298 5299 401320 LocalAlloc 5294->5299 5300 401723 5294->5300 5303 401414 5294->5303 5297 401598 VirtualAlloc 5295->5297 5301 4016de 5297->5301 5298->5291 5298->5292 5299->5294 5302 4014f0 VirtualFree 5300->5302 5301->5298 5302->5298 5304 401423 VirtualAlloc 5303->5304 5306 401450 5304->5306 5307 401473 5304->5307 5308 4012e4 LocalAlloc 5306->5308 5307->5294 5309 40145c 5308->5309 5309->5307 5310 401460 VirtualFree 5309->5310 5310->5307 6562 4028a6 6565 4028ae 6562->6565 6563 403528 4 API calls 6563->6565 6564 4028c3 6566 402580 4 API calls 6564->6566 6565->6563 6565->6564 6567 4028c8 6566->6567 6849 4019a7 6850 40198e 6849->6850 6851 4019a1 6850->6851 6852 401997 RtlLeaveCriticalSection 6850->6852 6852->6851 5311 407fa8 5312 407fba 5311->5312 5314 407fc1 5311->5314 5319 407ee4 5312->5319 5315 407fe9 5314->5315 5330 407d50 5314->5330 5316 408022 5315->5316 5318 407d50 19 API calls 5315->5318 5318->5316 5320 407ef9 5319->5320 5321 407d50 19 API calls 5320->5321 5322 407f08 5320->5322 5321->5322 5323 407f42 5322->5323 5324 407d50 19 API calls 5322->5324 5325 407f56 5323->5325 5326 407d50 19 API calls 5323->5326 5324->5323 5328 407f82 5325->5328 5333 407e8c 5325->5333 5326->5325 5328->5314 5336 405888 5330->5336 5332 407d72 5332->5315 5334 407e9b VirtualFree 5333->5334 5335 407ead VirtualAlloc 5333->5335 5334->5335 5335->5328 5337 405894 5336->5337 5338 405158 19 API calls 5337->5338 5339 4058c1 5338->5339 5340 4031bc 4 API calls 5339->5340 5341 4058cc 5340->5341 5342 40316c 4 API calls 5341->5342 5343 4058e1 5342->5343 5343->5332 6572 40a0a9 6573 40a0d9 6572->6573 6574 40a0e3 CreateWindowExA SetWindowLongA 6573->6574 6575 405158 19 API calls 6574->6575 6576 40a166 6575->6576 6577 4032d0 4 API calls 6576->6577 6578 40a174 6577->6578 6579 4032d0 4 API calls 6578->6579 6580 40a181 6579->6580 6581 406b50 5 API calls 6580->6581 6582 40a18d 6581->6582 6583 4032d0 4 API calls 6582->6583 6584 40a196 6583->6584 6585 409978 29 API calls 6584->6585 6586 40a1a8 6585->6586 6587 40a1bb 6586->6587 6588 409858 5 API calls 6586->6588 6589 40a1f4 6587->6589 6590 4094ac 9 API calls 6587->6590 6588->6587 6591 40a20d 6589->6591 6594 40a207 RemoveDirectoryA 6589->6594 6590->6589 6592 40a221 6591->6592 6593 40a216 73A25CF0 6591->6593 6595 40a249 6592->6595 6596 403550 4 API calls 6592->6596 6593->6592 6594->6591 6597 40a23f 6596->6597 6598 402580 4 API calls 6597->6598 6598->6595 6853 4011aa 6854 4011ac GetStdHandle 6853->6854 6136 40a0bc SetLastError 6166 40961c GetLastError 6136->6166 6139 40a0d9 6141 40a0e3 CreateWindowExA SetWindowLongA 6139->6141 6140 402ef8 5 API calls 6140->6139 6142 405158 19 API calls 6141->6142 6143 40a166 6142->6143 6144 4032d0 4 API calls 6143->6144 6145 40a174 6144->6145 6146 4032d0 4 API calls 6145->6146 6147 40a181 6146->6147 6179 406b50 GetCommandLineA 6147->6179 6150 4032d0 4 API calls 6151 40a196 6150->6151 6184 409978 6151->6184 6154 409858 5 API calls 6155 40a1bb 6154->6155 6156 40a1f4 6155->6156 6200 4094ac 6155->6200 6158 40a20d 6156->6158 6161 40a207 RemoveDirectoryA 6156->6161 6159 40a221 6158->6159 6160 40a216 73A25CF0 6158->6160 6162 40a249 6159->6162 6208 403550 6159->6208 6160->6159 6161->6158 6164 40a23f 6165 402580 4 API calls 6164->6165 6165->6162 6167 404c58 19 API calls 6166->6167 6168 409663 6167->6168 6169 407258 5 API calls 6168->6169 6170 409673 6169->6170 6171 408d7c 4 API calls 6170->6171 6172 409688 6171->6172 6173 405854 4 API calls 6172->6173 6174 409697 6173->6174 6175 40318c 4 API calls 6174->6175 6176 4096b6 6175->6176 6177 40316c 4 API calls 6176->6177 6178 4096be 6177->6178 6178->6139 6178->6140 6180 406ac4 4 API calls 6179->6180 6181 406b75 6180->6181 6182 40316c 4 API calls 6181->6182 6183 406b93 6182->6183 6183->6150 6185 403388 4 API calls 6184->6185 6186 4099b3 6185->6186 6187 4099e5 CreateProcessA 6186->6187 6188 4099f1 6187->6188 6189 4099f8 CloseHandle 6187->6189 6190 40961c 21 API calls 6188->6190 6191 409a01 6189->6191 6190->6189 6221 40994c 6191->6221 6194 409a1d 6195 40994c 3 API calls 6194->6195 6196 409a22 GetExitCodeProcess CloseHandle 6195->6196 6197 409a42 6196->6197 6198 40316c 4 API calls 6197->6198 6199 409a4a 6198->6199 6199->6154 6199->6155 6201 409506 6200->6201 6203 4094bf 6200->6203 6201->6156 6202 4094c7 Sleep 6202->6203 6203->6201 6203->6202 6204 4094d7 Sleep 6203->6204 6206 4094ee GetLastError 6203->6206 6225 408f90 6203->6225 6204->6203 6206->6201 6207 4094f8 GetLastError 6206->6207 6207->6201 6207->6203 6209 403565 6208->6209 6210 403574 6208->6210 6213 40358a 6209->6213 6216 4035a4 6209->6216 6217 40356f 6209->6217 6211 403585 6210->6211 6212 40358c 6210->6212 6214 40316c 4 API calls 6211->6214 6215 40318c 4 API calls 6212->6215 6213->6164 6214->6213 6215->6213 6216->6213 6219 403550 4 API calls 6216->6219 6217->6210 6218 4035c0 6217->6218 6218->6213 6233 403528 6218->6233 6219->6216 6222 409960 PeekMessageA 6221->6222 6223 409972 MsgWaitForMultipleObjects 6222->6223 6224 409954 TranslateMessage DispatchMessageA 6222->6224 6223->6191 6223->6194 6224->6222 6226 408f44 2 API calls 6225->6226 6227 408fa6 6226->6227 6228 408faa 6227->6228 6229 408fc6 DeleteFileA GetLastError 6227->6229 6228->6203 6230 408fe4 6229->6230 6231 408f80 Wow64RevertWow64FsRedirection 6230->6231 6232 408fec 6231->6232 6232->6203 6234 40353a 6233->6234 6236 40354c 6234->6236 6237 4035d8 6234->6237 6236->6218 6238 403550 6237->6238 6243 40356f 6238->6243 6244 40358a 6238->6244 6245 4035a4 6238->6245 6247 403574 6238->6247 6239 403585 6241 40316c 4 API calls 6239->6241 6240 40358c 6242 40318c 4 API calls 6240->6242 6241->6244 6242->6244 6246 4035c0 6243->6246 6243->6247 6244->6234 6245->6244 6248 403550 4 API calls 6245->6248 6246->6244 6249 403528 4 API calls 6246->6249 6247->6239 6247->6240 6248->6245 6249->6246 6858 402bbd RaiseException 6859 402bd8 6858->6859

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 134 409b04-409b28 GetSystemInfo VirtualQuery 135 409bb8-409bbf 134->135 136 409b2e 134->136 137 409bad-409bb2 136->137 137->135 138 409b30-409b37 137->138 139 409b99-409bab VirtualQuery 138->139 140 409b39-409b3d 138->140 139->135 139->137 140->139 141 409b3f-409b47 140->141 142 409b58-409b69 VirtualProtect 141->142 143 409b49-409b4c 141->143 145 409b6b 142->145 146 409b6d-409b6f 142->146 143->142 144 409b4e-409b51 143->144 144->142 148 409b53-409b56 144->148 145->146 147 409b7e-409b81 146->147 149 409b71-409b7a call 409afc 147->149 150 409b83-409b85 147->150 148->142 148->146 149->147 150->139 152 409b87-409b94 VirtualProtect 150->152 152->139
                        APIs
                        • GetSystemInfo.KERNEL32(?), ref: 00409B16
                        • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B21
                        • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B62
                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B94
                        • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BA4
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: Virtual$ProtectQuery$InfoSystem
                        • String ID:
                        • API String ID: 2441996862-0
                        • Opcode ID: e9377b5afe5b72dea238361b2bb5871f3a0709df6bf3f14a5dd1c9312b56f1de
                        • Instruction ID: 38bd387ce74bffc5090bd19e53d26db17da2baf97ae222e0508136422f5a0162
                        • Opcode Fuzzy Hash: e9377b5afe5b72dea238361b2bb5871f3a0709df6bf3f14a5dd1c9312b56f1de
                        • Instruction Fuzzy Hash: 1021A1B12003046BD630AA699C85F67B3E8AF85364F04493EF695E33C3D278FD448769
                        APIs
                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,0040529B,?,00000000,0040537A), ref: 004051EE
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                        • Instruction ID: 68d95fc310d0e2e6b92fb304f65b686029fe98484e0df8b5d62e12a65ece92cc
                        • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                        • Instruction Fuzzy Hash: 32E0D87170061857D310A99A5C86EF7B25CDB58311F1041BFBE05E73C2EDB49E844AED

                        Control-flow Graph

                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C34), ref: 00404556
                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00404563
                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00404579
                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040458F
                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C34), ref: 0040459A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModulePolicyProcess
                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                        • API String ID: 3256987805-3653653586
                        • Opcode ID: 16b1789e35b522b2d8bb10f6bbb07b51bba34ef056c7ec1fced0acd6d82488ab
                        • Instruction ID: d78e99609f180f09d0be49a5ff8f680cbea76e59fb445226a4dd35b93bf5228d
                        • Opcode Fuzzy Hash: 16b1789e35b522b2d8bb10f6bbb07b51bba34ef056c7ec1fced0acd6d82488ab
                        • Instruction Fuzzy Hash: 37E009D02903413AE61032F22D82F2B64884AC0F5ABA5153B7B15B41C6EEBD9A10847D

                        Control-flow Graph

                        APIs
                        • SetLastError.KERNEL32 ref: 0040A0C8
                          • Part of subcall function 0040961C: GetLastError.KERNEL32(00000000,004096BF,?,0040B240,?,01F80750), ref: 00409640
                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A105
                        • SetWindowLongA.USER32(000B029A,000000FC,004098EC), ref: 0040A11C
                          • Part of subcall function 00406B50: GetCommandLineA.KERNEL32(00000000,00406B94,?,?,?,?,00000000,?,0040A18D,?), ref: 00406B68
                          • Part of subcall function 00409978: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64,00000000,00409A4B), ref: 004099E8
                          • Part of subcall function 00409978: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64,00000000), ref: 004099FC
                          • Part of subcall function 00409978: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A15
                          • Part of subcall function 00409978: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A27
                          • Part of subcall function 00409978: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64), ref: 00409A30
                        • RemoveDirectoryA.KERNEL32(00000000,0040A25B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A208
                        • 73A25CF0.USER32(000B029A,0040A25B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A21C
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CloseCreateErrorHandleLastProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                        • API String ID: 3438005906-3001827809
                        • Opcode ID: 595b6057cef090e5f47441f72c64e546b7e9941f5ddb6d8e393304eaf004f3ad
                        • Instruction ID: ea0e0e13c26d8e86aefd78b07c9d99e29df4852e5b0778cd670351edb31d44fa
                        • Opcode Fuzzy Hash: 595b6057cef090e5f47441f72c64e546b7e9941f5ddb6d8e393304eaf004f3ad
                        • Instruction Fuzzy Hash: 29411C71600205DBD710FBA9EE85B9E37A4EB44304F20427BF514B73E1DBB8A8118B9D

                        Control-flow Graph

                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00409111,?,?,?,?,00000000,?,00409C48), ref: 00409098
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040909E
                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00409111,?,?,?,?,00000000,?,00409C48), ref: 004090B2
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090B8
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                        • API String ID: 1646373207-2130885113
                        • Opcode ID: 13390df3195196fd4c7a4b0fd4c829fc58c9a0ee826af99747b3c63f3ac9c006
                        • Instruction ID: b1e7bde34bb8037ffd9cace7221cb4ef14e92db929ad51b22cacf7135bf20728
                        • Opcode Fuzzy Hash: 13390df3195196fd4c7a4b0fd4c829fc58c9a0ee826af99747b3c63f3ac9c006
                        • Instruction Fuzzy Hash: E101D470348201AEF300AB66DC47B5676A8E789B04FA1453BF5047A2C3CA7C5C00D62D

                        Control-flow Graph

                        APIs
                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A105
                        • SetWindowLongA.USER32(000B029A,000000FC,004098EC), ref: 0040A11C
                          • Part of subcall function 00406B50: GetCommandLineA.KERNEL32(00000000,00406B94,?,?,?,?,00000000,?,0040A18D,?), ref: 00406B68
                          • Part of subcall function 00409978: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64,00000000,00409A4B), ref: 004099E8
                          • Part of subcall function 00409978: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64,00000000), ref: 004099FC
                          • Part of subcall function 00409978: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A15
                          • Part of subcall function 00409978: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A27
                          • Part of subcall function 00409978: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64), ref: 00409A30
                        • RemoveDirectoryA.KERNEL32(00000000,0040A25B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A208
                        • 73A25CF0.USER32(000B029A,0040A25B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A21C
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                        • API String ID: 978128352-3001827809
                        • Opcode ID: 742fa6f13246360ea421fed5741d9ee364c4b1fbc8b4df7434b9c7ce207b15c2
                        • Instruction ID: bb5d46c1f13ce808ec8939c8f52c28fb4167d05bc0ccdd2543a35232d5682a13
                        • Opcode Fuzzy Hash: 742fa6f13246360ea421fed5741d9ee364c4b1fbc8b4df7434b9c7ce207b15c2
                        • Instruction Fuzzy Hash: 54413A71604305DFD710EBA9EE85B5A37A4EB48304F20427BF514B73E1DBB8A8118B9D

                        Control-flow Graph

                        APIs
                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64,00000000,00409A4B), ref: 004099E8
                        • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64,00000000), ref: 004099FC
                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A15
                        • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A27
                        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A70,01F80750,00409A64), ref: 00409A30
                          • Part of subcall function 0040961C: GetLastError.KERNEL32(00000000,004096BF,?,0040B240,?,01F80750), ref: 00409640
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                        • String ID: D
                        • API String ID: 3356880605-2746444292
                        • Opcode ID: 391b8b3cc56de14ccc9e3bb62db485d02dfb8b3147fc6486b45a45dd8a10e713
                        • Instruction ID: 2cb7f3a708c5e4aa0c5238dbe6dc1c8217d87adb5a0d279101b142ca7fb735f5
                        • Opcode Fuzzy Hash: 391b8b3cc56de14ccc9e3bb62db485d02dfb8b3147fc6486b45a45dd8a10e713
                        • Instruction Fuzzy Hash: D21175B16402487EDB00EBE68C42FDFB7ACDF49714F50043ABA14F76C2DA789D008668

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 115 4019b0-4019bb 116 4019c1-4019d6 115->116 117 401a8f-401a91 115->117 118 4019e2-401a01 LocalFree 116->118 119 4019d8-4019dd RtlEnterCriticalSection 116->119 120 401a15-401a1b 118->120 119->118 121 401a03-401a13 VirtualFree 120->121 122 401a1d-401a42 call 4012dc * 3 120->122 121->120 129 401a44-401a59 LocalFree 122->129 130 401a5b-401a71 122->130 129->129 129->130 132 401a73-401a78 RtlLeaveCriticalSection 130->132 133 401a7d-401a87 RtlDeleteCriticalSection 130->133 132->133
                        APIs
                        • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401A88), ref: 004019DD
                        • LocalFree.KERNEL32(00000000,00000000,00401A88), ref: 004019EF
                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401A88), ref: 00401A0E
                        • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401A88), ref: 00401A4D
                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401A8F), ref: 00401A78
                        • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401A8F), ref: 00401A82
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                        • String ID:
                        • API String ID: 3782394904-0
                        • Opcode ID: bf981cf2fba7177aedbe9984e2c00b42b41ad258e1af5aee9e6bfe4aa0a7c235
                        • Instruction ID: e0da3218868b2eff3b283f08a977793ac46513ca518615f56d0a063205e332b4
                        • Opcode Fuzzy Hash: bf981cf2fba7177aedbe9984e2c00b42b41ad258e1af5aee9e6bfe4aa0a7c235
                        • Instruction Fuzzy Hash: CC118230742280DEDB11ABA59EE6F723658B785748F44427EF444B62F2C67C9840CB5D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 154 403cd6-403ce4 155 403ce6-403ced 154->155 156 403cfd-403d04 154->156 157 403db3-403db9 ExitProcess 155->157 158 403cf3 155->158 159 403d12-403d19 156->159 160 403d06-403d10 156->160 158->156 163 403cf5-403cf7 158->163 161 403d1b-403d25 159->161 162 403d8c-403da0 call 403c9c * 2 call 4019b0 159->162 160->156 165 403d2a-403d36 161->165 179 403da5-403dac 162->179 163->156 167 403dbe-403ded call 403088 163->167 165->165 168 403d38-403d42 165->168 171 403d47-403d58 168->171 171->171 175 403d5a-403d61 171->175 177 403d63-403d76 MessageBoxA 175->177 178 403d78-403d87 call 403fb8 call 403f3b 175->178 177->162 178->162 179->167 181 403dae call 403088 179->181 181->157
                        APIs
                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D71
                        • ExitProcess.KERNEL32 ref: 00403DB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ExitMessageProcess
                        • String ID: Error$Runtime error at 00000000
                        • API String ID: 1220098344-2970929446
                        • Opcode ID: e767076104ebe9a575a886a27bab96704bbed17555f1ff7c5604243d492b1398
                        • Instruction ID: 7623b26ae76aa42d6c1bfe6fa2c7727f948c1106033a569f5b18ef7ee1c36407
                        • Opcode Fuzzy Hash: e767076104ebe9a575a886a27bab96704bbed17555f1ff7c5604243d492b1398
                        • Instruction Fuzzy Hash: 9E21D330A04241CBE714AFB49AD97153E99AB4934AF04837BE541BB3E2C73C8A45C76E

                        Control-flow Graph

                        APIs
                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,004093F3,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040934A
                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,004093F3,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409353
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLast
                        • String ID: .tmp
                        • API String ID: 1375471231-2986845003
                        • Opcode ID: d11a567bb3b9f3925bba7f582b75683444d96de8cdef89de79b05b428cac1782
                        • Instruction ID: 575a88ac7b424e974c84527b2b9dbdd2516338253e063632d80d8489fa2c7ad6
                        • Opcode Fuzzy Hash: d11a567bb3b9f3925bba7f582b75683444d96de8cdef89de79b05b428cac1782
                        • Instruction Fuzzy Hash: 52213A75A002099BDB00EFA1C8969DEB7B8EB49304F50457FE901B73C2DA7C9E059B65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 215 4094ac-4094bd 216 409506-40950b 215->216 217 4094bf-4094c0 215->217 218 4094c2-4094c5 217->218 219 4094d2-4094d5 218->219 220 4094c7-4094d0 Sleep 218->220 221 4094e0-4094e5 call 408f90 219->221 222 4094d7-4094db Sleep 219->222 220->221 224 4094ea-4094ec 221->224 222->221 224->216 225 4094ee-4094f6 GetLastError 224->225 225->216 226 4094f8-409500 GetLastError 225->226 226->216 227 409502-409504 226->227 227->216 227->218
                        APIs
                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A1F4,000000FA,00000032,0040A25B), ref: 004094CB
                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A1F4,000000FA,00000032,0040A25B), ref: 004094DB
                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A1F4,000000FA,00000032,0040A25B), ref: 004094EE
                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A1F4,000000FA,00000032,0040A25B), ref: 004094F8
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorLastSleep
                        • String ID:
                        • API String ID: 1458359878-0
                        • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                        • Instruction ID: 29364c30fca442de7015088f72ff9262779920abee8f6ae47ea1c47af344b186
                        • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                        • Instruction Fuzzy Hash: F2F09673A0911476C621A9AB9D4195F6248DAC036C711433BE614F3283D478CD0182B9

                        Control-flow Graph

                        APIs
                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409E7F
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: .tmp
                        • API String ID: 2030045667-2986845003
                        • Opcode ID: d9a913587c7e1859cb3645527c7dbdd4f73443339cf33b5ca5b22e1ccd3b83f2
                        • Instruction ID: 8e4afeef181199523fe66605bbea0f276455dc9949a780c343e12d70ced0deae
                        • Opcode Fuzzy Hash: d9a913587c7e1859cb3645527c7dbdd4f73443339cf33b5ca5b22e1ccd3b83f2
                        • Instruction Fuzzy Hash: FA418E71604200DFD710EF25EED2A5A77A5E749304B10467AF804B73E1CBB9AC00CAED

                        Control-flow Graph

                        APIs
                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409E7F
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: .tmp
                        • API String ID: 2030045667-2986845003
                        • Opcode ID: 0be2e153a5eb354ebd768ef0601929076dc0c9d805b4233106e1eb051fb8d3b8
                        • Instruction ID: 4576c33ac34f862a7007cd4f64e70da85719223067a6170c18c9f0ce21174c46
                        • Opcode Fuzzy Hash: 0be2e153a5eb354ebd768ef0601929076dc0c9d805b4233106e1eb051fb8d3b8
                        • Instruction Fuzzy Hash: 8A417971600200DFD710EF25DED6A5A77A5EB49304B10467AF804B73E2CAB9AC00CAED

                        Control-flow Graph

                        APIs
                        • DeleteFileA.KERNEL32(00000000,00000000,00408FED,?,0000000D,00000000), ref: 00408FC7
                        • GetLastError.KERNEL32(00000000,00000000,00408FED,?,0000000D,00000000), ref: 00408FCF
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: DeleteErrorFileLast
                        • String ID:
                        • API String ID: 2018770650-0
                        • Opcode ID: 58ba8340111fc25fa664d495f60bae48bbaca2af8f4dd052401ae9e88c230a3f
                        • Instruction ID: 7473b665f0b50466bd9b18cc4559e96b17889a6c6940f240bf40a94945affa37
                        • Opcode Fuzzy Hash: 58ba8340111fc25fa664d495f60bae48bbaca2af8f4dd052401ae9e88c230a3f
                        • Instruction Fuzzy Hash: CDF02230A04308ABCB00EFB99D4189EB3ECDB8931079145BBE814F3382EE384E00929C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 338 40a256 call 4028f8 342 40a1f4-40a1fb 338->342 343 40a1db-40a1ef call 4094ac 338->343 345 40a20d-40a214 342->345 346 40a1fd-40a202 call 4033e8 342->346 343->342 348 40a221-40a228 345->348 349 40a216-40a21c 73A25CF0 345->349 350 40a207-40a208 RemoveDirectoryA 346->350 351 40a250 348->351 352 40a22a-40a24b call 403550 call 402580 348->352 349->348 350->345 352->351
                        APIs
                        • RemoveDirectoryA.KERNEL32(00000000,0040A25B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A208
                        • 73A25CF0.USER32(000B029A,0040A25B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A21C
                          • Part of subcall function 004094AC: Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A1F4,000000FA,00000032,0040A25B), ref: 004094CB
                          • Part of subcall function 004094AC: GetLastError.KERNEL32(?,?,?,0000000D,?,0040A1F4,000000FA,00000032,0040A25B), ref: 004094EE
                          • Part of subcall function 004094AC: GetLastError.KERNEL32(?,?,?,0000000D,?,0040A1F4,000000FA,00000032,0040A25B), ref: 004094F8
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorLast$DirectoryRemoveSleep
                        • String ID:
                        • API String ID: 936953547-0
                        • Opcode ID: 5ab131430e716034f97316521e3eeed8e3105cc99611465340129e8f339f46d7
                        • Instruction ID: 6fe3fcacb114e36297dde0258d5cb7bd5ac7de6590ac4d947cbeb0002f0b1124
                        • Opcode Fuzzy Hash: 5ab131430e716034f97316521e3eeed8e3105cc99611465340129e8f339f46d7
                        • Instruction Fuzzy Hash: DAF0C970240201DBD724FB69EEC9B1632A5A744309F10467BF514BA2E1CBBD9861DB8D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 334 406f74-406fc7 SetErrorMode call 4033e8 LoadLibraryA
                        APIs
                        • SetErrorMode.KERNEL32(00008000), ref: 00406F7E
                        • LoadLibraryA.KERNEL32(00000000,00000000,00406FC8,?,00000000,00406FE6,?,00008000), ref: 00406FAD
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorLibraryLoadMode
                        • String ID:
                        • API String ID: 2987862817-0
                        • Opcode ID: 07d60ca40f6a5de6a6d7bfc1aa7c3326d330f7ddd1a2c15294447816f4d458ce
                        • Instruction ID: b905ec5d70bb3528bc3c65f9bfd2df394304b0bf704959565eeff358016bb4df
                        • Opcode Fuzzy Hash: 07d60ca40f6a5de6a6d7bfc1aa7c3326d330f7ddd1a2c15294447816f4d458ce
                        • Instruction Fuzzy Hash: 70F082B0A14704BFDB115F769C6282BBAACEB49B1475348B6F910A26D1E63D48208564
                        APIs
                        • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040765F
                        • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407667
                          • Part of subcall function 00407460: GetLastError.KERNEL32(00407360,004074FE,?,?,01F803AC,?,00409CA2,00000001,00000000,00000002,00000000,0040A299,?,00000000,0040A2D0), ref: 00407463
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                        • Instruction ID: 92615ac504018fc2ef9004b1e2e8dab7ed172c2be265719791e44df5ba996551
                        • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                        • Instruction Fuzzy Hash: D1E092767081005BD700E66DC881F9B27DCDFC53B4F00453AF654EB2D0D676A8008776
                        APIs
                        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407617
                        • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407626
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorFileLastRead
                        • String ID:
                        • API String ID: 1948546556-0
                        • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                        • Instruction ID: e2fe2ee7492b083776eec8d034d862b37405252d33b3cd9430fbffd6dcaebef4
                        • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                        • Instruction Fuzzy Hash: FDE06DB1A081106ADB20A65E98C4F6B66DCCBC5324F04487BF544DA291C679DC05C6B6
                        APIs
                        • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075AF
                        • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075BB
                          • Part of subcall function 00407460: GetLastError.KERNEL32(00407360,004074FE,?,?,01F803AC,?,00409CA2,00000001,00000000,00000002,00000000,0040A299,?,00000000,0040A2D0), ref: 00407463
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                        • Instruction ID: 970c63f380b1e5f91357c7a72f5419c98ca516c7a9a0e602396cd137b378bc78
                        • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                        • Instruction Fuzzy Hash: 66E04FB16106109FDB10EEB588C1B9276D8DF45364F058576E614DF2D5D274DC008766
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,0040170D), ref: 00401443
                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,0040170D), ref: 0040146A
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: Virtual$AllocFree
                        • String ID:
                        • API String ID: 2087232378-0
                        • Opcode ID: 5dc5a68c3ac6e3b3f410d0a711f0322d952b794d3f98eb9a37972b140a0ee840
                        • Instruction ID: b10f2db527449a3d71de704a0217f88cc0837b989be249acc572bb0198679e0c
                        • Opcode Fuzzy Hash: 5dc5a68c3ac6e3b3f410d0a711f0322d952b794d3f98eb9a37972b140a0ee840
                        • Instruction Fuzzy Hash: 1BF0A772B0072056DB206A6A5CC1F535AC4AF85B90F1541BBF94CFF3F9D6B54C0142AD
                        APIs
                        • GetSystemDefaultLCID.KERNEL32(00000000,0040537A), ref: 00405263
                          • Part of subcall function 00404CA0: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CBD
                          • Part of subcall function 004051D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,0040529B,?,00000000,0040537A), ref: 004051EE
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: DefaultInfoLoadLocaleStringSystem
                        • String ID:
                        • API String ID: 1658689577-0
                        • Opcode ID: 3b94d9bc539be46ac2a0b89a72949fedcf473ae0dcf4bae5ae8035bdeabe1863
                        • Instruction ID: bfc648ab67c083b8e7d168beb4c61d6b33bd076ac68ced185244c8800fe71721
                        • Opcode Fuzzy Hash: 3b94d9bc539be46ac2a0b89a72949fedcf473ae0dcf4bae5ae8035bdeabe1863
                        • Instruction Fuzzy Hash: B1317071E001099BCB00DF95C8C09EEB379FF88314F5585B7E814BB285E738AE058B98
                        APIs
                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0040758C
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                        • Instruction ID: 7cdd5952380283e9219704550233ce4c64857b950caffd6c898a31991eaf45cd
                        • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                        • Instruction Fuzzy Hash: 85E06D713802083FE340AAEC6C51FA227DCD309754F008022B988DB381D9719D108AE8
                        APIs
                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0040758C
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                        • Instruction ID: 4e7a1eca56337192675c8e4566b502709ea6c0c4474c7e4af6db27c366a53947
                        • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                        • Instruction Fuzzy Hash: 81E06D713802082ED240AAEC6C51F92279C9309754F008022B988DB381D97199108AE8
                        APIs
                        • GetFileAttributesA.KERNEL32(00000000,00000000,004069F8,?,?,?,?,00000000,?,00406A0D,00406D3B,00000000,00406D80,?,?,?), ref: 004069DB
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: bbad55d5319b742f1c2ab3d279556d73e39d997f29fc48488aed692ee29c1378
                        • Instruction ID: 9e5701fa608e2b89b97de475988b8182b71220860db3492a4b6ebfab9464c731
                        • Opcode Fuzzy Hash: bbad55d5319b742f1c2ab3d279556d73e39d997f29fc48488aed692ee29c1378
                        • Instruction Fuzzy Hash: EAE09B71304304BFD701EF76DC52E5AB7ACD749714B53047AF501E79C1D5795E109458
                        APIs
                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076B3
                          • Part of subcall function 00407460: GetLastError.KERNEL32(00407360,004074FE,?,?,01F803AC,?,00409CA2,00000001,00000000,00000002,00000000,0040A299,?,00000000,0040A2D0), ref: 00407463
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID:
                        • API String ID: 442123175-0
                        • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                        • Instruction ID: 3b06fab1205f746d7f9f0ae3a7cf8452783139e810e5cbef3e1aec79d3ce6e7b
                        • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                        • Instruction Fuzzy Hash: 6DE06D72A181106BDB10E65E9880E676BDCCF85324F00447BB904DB251C574AC008776
                        APIs
                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004090FB,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 00407277
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: FormatMessage
                        • String ID:
                        • API String ID: 1306739567-0
                        • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                        • Instruction ID: 38ff10bd62a952a33468172c9413ba8ec6b0f62deb5c109e2fb2676b08d0ece5
                        • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                        • Instruction Fuzzy Hash: 7BE0D860F9C30126F62416944C43F76130E43C0B00F6441BE7B40BD3D6D6BDA949825F
                        APIs
                        • SetEndOfFile.KERNEL32(?,02200004,0040A060,00000000), ref: 00407687
                          • Part of subcall function 00407460: GetLastError.KERNEL32(00407360,004074FE,?,?,01F803AC,?,00409CA2,00000001,00000000,00000002,00000000,0040A299,?,00000000,0040A2D0), ref: 00407463
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorFileLast
                        • String ID:
                        • API String ID: 734332943-0
                        • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                        • Instruction ID: 8e14a83db3591f5eec3afc7a11a02327097fbaf17b336aebb6f37fcc1b49c18b
                        • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                        • Instruction Fuzzy Hash: 8DC04CA171410047CB00E6BEC5C1E0667DC5A493197004476B504DB256D679EC00562A
                        APIs
                        • SetErrorMode.KERNEL32(?,00406FED), ref: 00406FE0
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 61295b00f387c109ae41fb0936a60fb9de1b0acf9a1617db194694957169698a
                        • Instruction ID: f5b1d575f1f0fd957b27bad218b2698a9f5500ad08efab6a88bd98a6bc9d5760
                        • Opcode Fuzzy Hash: 61295b00f387c109ae41fb0936a60fb9de1b0acf9a1617db194694957169698a
                        • Instruction Fuzzy Hash: F0B09B7660C2005EE7059F95741191C67D4D7C47343E14477F110D25C0D53CD4108518
                        APIs
                        • SetErrorMode.KERNEL32(?,00406FED), ref: 00406FE0
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                        • Instruction ID: 582e62a1cc13b496afa0879b64d7a19082e32bc4e66f4f4950fe471fe18be73a
                        • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                        • Instruction Fuzzy Hash: 94A022B8C00000BBCF00ABE0A00080C332C2A8832C3C008A2B202B20C0C23EE0208208
                        APIs
                        • CharPrevA.USER32(?,?,00406940,?,0040661D,?,?,00406D5B,00000000,00406D80,?,?,?,?,00000000,00000000), ref: 00406946
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CharPrev
                        • String ID:
                        • API String ID: 122130370-0
                        • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                        • Instruction ID: f34a9fa5452be08fc290d1d775bfa78c4845c02a56b6b520d512f812200f2cd5
                        • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                        • Instruction Fuzzy Hash:
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407F74
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                        • Instruction ID: 70546900a2545a49531ab8d181eb88eaf86c5a6e52f57a7fec90b09eda53ae43
                        • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                        • Instruction Fuzzy Hash: 9E118171A042059BDB00FF59C881B5B3794EF84358F05847BFD58AB3C6DA38EC048BAA
                        APIs
                        • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000), ref: 0040154A
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: a13c2f8949639cccd14867062399a280011936f523c62a55ec63b8a2fa9f4d9b
                        • Instruction ID: aebbb75b63584ee67e6dc427414e6f4b7ee8bb4c034e846cc85eaae13fb67b44
                        • Opcode Fuzzy Hash: a13c2f8949639cccd14867062399a280011936f523c62a55ec63b8a2fa9f4d9b
                        • Instruction Fuzzy Hash: 32110A71208314ABC710EF19CDC0A5AB7E1EBC5764F54C56AE899AB3A1D374EC408B99
                        APIs
                        • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,00401893), ref: 00401686
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: da0a117f10eeafc050f1bcb718e664caf85a61256ccec6430ca4ed0f335c8cd9
                        • Instruction ID: adc309513e37e3591c2b10e3c4e9a80e06d8536add9933bc251d7f4690d6afea
                        • Opcode Fuzzy Hash: da0a117f10eeafc050f1bcb718e664caf85a61256ccec6430ca4ed0f335c8cd9
                        • Instruction Fuzzy Hash: 1501A7766487148BC3109F29DDC0E3A77E8EB84364F194A3ED984B73A1D23B6C4587E8
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                        • Instruction ID: f869eb2e7fc60bc2d6a3cb3b21c1780780f3db67bffb62d58e07d1de33cd6c44
                        • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                        • Instruction Fuzzy Hash: 55D0A742B00E7017D325B2BE4D4879B92C84F89748B48847BF945E7BD2DABCDC414389
                        APIs
                        • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E71), ref: 00407EA3
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                        • Instruction ID: 3c3f4653f9e422c4f428f4920a666df4a6e993513ad7d939249a3f6bb9a0d58b
                        • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                        • Instruction Fuzzy Hash: 0BD002B17553046FDB90EE799DC1B0337D87B48705F1048B66D04EB2C6E774E8108714
                        APIs
                        • GetCurrentProcess.KERNEL32(00000028), ref: 0040942B
                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00409431
                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 0040944A
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 00409471
                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 00409476
                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00409487
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                        • String ID: SeShutdownPrivilege
                        • API String ID: 107509674-3733053543
                        • Opcode ID: ca5a1a76723fb2e41f67c8bf2953e28d5da17075d4184350822a9654441e85e7
                        • Instruction ID: f60f187249215dc6da2edc62b3499dadf3a2934d325a5ec435716638b904d5a9
                        • Opcode Fuzzy Hash: ca5a1a76723fb2e41f67c8bf2953e28d5da17075d4184350822a9654441e85e7
                        • Instruction Fuzzy Hash: 70F0627078830276E620EA718C07F6B21885BC0B48F50893EFA55F91D3D7BCC90546BE
                        APIs
                        • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BCA
                        • SizeofResource.KERNEL32(00000000,00000000,?,00409CBA,00000000,0040A251,?,00000001,00000000,00000002,00000000,0040A299,?,00000000,0040A2D0), ref: 00409BDD
                        • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CBA,00000000,0040A251,?,00000001,00000000,00000002,00000000,0040A299,?,00000000), ref: 00409BEF
                        • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CBA,00000000,0040A251,?,00000001,00000000,00000002,00000000,0040A299), ref: 00409C00
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLockSizeof
                        • String ID:
                        • API String ID: 3473537107-0
                        • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                        • Instruction ID: 51a9d0e690ca15366b70ecda14b04c676cf454bae3074e0d3b3eae35a506df60
                        • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                        • Instruction Fuzzy Hash: 7FE07E8034538225EA5076F62CD7F2A609D5B6975DF00063BB702792E3EEBCCC44066E
                        APIs
                        • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040541E,?,?,?,00000000,004055D0), ref: 0040522F
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                        • Instruction ID: 63cd782c2070f3460c808b708ade2a6757c6928fdd739bfef76e2cb06f83fdb9
                        • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                        • Instruction Fuzzy Hash: ECD05EB630D6502AE310519A2E85DBB8ADCCEC57A5F50407EB648D6241E2248C079B76
                        APIs
                        • GetVersionExA.KERNEL32(?,004065B4,00000000,004065C2,?,?,?,?,?,00409C39), ref: 00405CC6
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: Version
                        • String ID:
                        • API String ID: 1889659487-0
                        • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                        • Instruction ID: fc6e362a93d68439b7046ef9660e26a03d0faa426c3c8fbd8e4ead76e6ab9676
                        • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                        • Instruction Fuzzy Hash: 14C012A08047018AE720AB319C02B2A72D4AB44310F840539A9B8E23C2EB3C80128BAA
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,004070FD,?,00000000,004098A4), ref: 00407021
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407027
                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004070FD,?,00000000,004098A4), ref: 00407075
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: AddressCloseHandleModuleProc
                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                        • API String ID: 4190037839-2401316094
                        • Opcode ID: 2f47c45b2a21b62b8e8262c7a94b0a3fcc2284934ea755bfc1278ac94d7e772a
                        • Instruction ID: 5759182dc4ae1423534bf2bb696cbeb027c262031553cb0d52081af84312380b
                        • Opcode Fuzzy Hash: 2f47c45b2a21b62b8e8262c7a94b0a3fcc2284934ea755bfc1278ac94d7e772a
                        • Instruction Fuzzy Hash: 4D214430E14209ABDB10EAB5CC41B9F77A8AB45704F51857BA501F72C1EB78BE05879A
                        APIs
                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403AF2
                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B16
                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B32
                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B53
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403B7C
                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403B86
                        • GetStdHandle.KERNEL32(000000F5), ref: 00403BA6
                        • GetFileType.KERNEL32(?,000000F5), ref: 00403BBD
                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403BD8
                        • GetLastError.KERNEL32(000000F5), ref: 00403BF2
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                        • String ID:
                        • API String ID: 1694776339-0
                        • Opcode ID: 821ab0b6a50121274b91d235b0a955b1e8abc9b39814a1c212f5f0f9a7f88cfc
                        • Instruction ID: 5e22eeadfbd1a2720c5c933d86468cf9c65db8e1b1d512800abaca574fed0329
                        • Opcode Fuzzy Hash: 821ab0b6a50121274b91d235b0a955b1e8abc9b39814a1c212f5f0f9a7f88cfc
                        • Instruction Fuzzy Hash: 0941AA702086009EE7309E298805B237DF8EB44719F24893FE1D6BD6E2D77DBA458B5D
                        APIs
                        • GetSystemDefaultLCID.KERNEL32(00000000,004055D0,?,?,?,?,00000000,00000000,00000000,?,004065AF,00000000,004065C2), ref: 004053A2
                          • Part of subcall function 004051D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,0040529B,?,00000000,0040537A), ref: 004051EE
                          • Part of subcall function 0040521C: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040541E,?,?,?,00000000,004055D0), ref: 0040522F
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: InfoLocale$DefaultSystem
                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                        • API String ID: 1044490935-665933166
                        • Opcode ID: f2521cc0bc819227d026c60e4c917d4611ce7b9cd8fffb19bc6b25f0418b3afe
                        • Instruction ID: 4758358dc4cfa5180dafb5223ad87eec1477a97535929aba7d89f103124d9f6a
                        • Opcode Fuzzy Hash: f2521cc0bc819227d026c60e4c917d4611ce7b9cd8fffb19bc6b25f0418b3afe
                        • Instruction Fuzzy Hash: FA515E34B00548ABD704EBA58C9179F776ADB98304FA0947FB500BB3C6DA3CCA058B6C
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036C6
                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036D1
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 004036E4
                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 004036EE
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004036FD
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocString
                        • String ID:
                        • API String ID: 262959230-0
                        • Opcode ID: 0d5f26fb079389d57e566eb582d4654feee47d3805a1398cd36e1489bb7f92a0
                        • Instruction ID: c12db871d9c6fd65086d198798fe5a97d9d27a1f19a34f4da0399418a75c5b5f
                        • Opcode Fuzzy Hash: 0d5f26fb079389d57e566eb582d4654feee47d3805a1398cd36e1489bb7f92a0
                        • Instruction Fuzzy Hash: C7F044A13543443AE56075A65C87FAB198CCB41BAAF10457FF704FA2C2D8799D04427D
                        APIs
                        • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019A2,?,?,0040214E,?,?,?,?,?,00401B69,00401D8F,00401DB4), ref: 00401902
                        • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019A2,?,?,0040214E,?,?,?,?,?,00401B69,00401D8F,00401DB4), ref: 00401915
                        • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019A2,?,?,0040214E,?,?,?,?,?,00401B69,00401D8F,00401DB4), ref: 0040193F
                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019A9,00000000,004019A2,?,?,0040214E,?,?,?,?,?,00401B69,00401D8F,00401DB4), ref: 0040199C
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                        • String ID:
                        • API String ID: 730355536-0
                        • Opcode ID: 892ecd86df803e1cb974552bda2a686fe554f5612c4b4aefdd9dc72fb40b1fe0
                        • Instruction ID: 5746b3b2d889d8a1011873919fe502cc9b982e698476508195c1ae4d0b4fb488
                        • Opcode Fuzzy Hash: 892ecd86df803e1cb974552bda2a686fe554f5612c4b4aefdd9dc72fb40b1fe0
                        • Instruction Fuzzy Hash: 9B016170584240DED715AB6999F6B353A94F785704F50827FF484F62F2C67C4450CB9E
                        APIs
                        • RtlUnwind.KERNEL32(?,00402D7C,?,00000000,0000000F,?,?,?,?), ref: 00402D77
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: Unwind
                        • String ID: T[@$h[@
                        • API String ID: 3419175465-843830617
                        • Opcode ID: d998609595d78ecca541b7c9038660594aa377744acb4499aeb2a44f90572769
                        • Instruction ID: d18a7742d14352309ff33adcb0f86f0e00ab0209cd237607142518dbf5ac4f6f
                        • Opcode Fuzzy Hash: d998609595d78ecca541b7c9038660594aa377744acb4499aeb2a44f90572769
                        • Instruction Fuzzy Hash: A3315A342042019FC310DF04CA88E2BB7A5FF88314B6585AAE948AB3E1C779EC42DB65
                        APIs
                        • RtlUnwind.KERNEL32(?,00403010,00000000,00000000), ref: 0040300B
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: Unwind
                        • String ID: \\@$h[@
                        • API String ID: 3419175465-480357254
                        • Opcode ID: 04559272bbcb20ad98b30e00d3c6ef8c2904a809e35807e42ef26a56f9d9d18d
                        • Instruction ID: 95fcb3952551e153b5c8d5d8a502b5d5b87d4caf643996d105ff3c72866b6dc8
                        • Opcode Fuzzy Hash: 04559272bbcb20ad98b30e00d3c6ef8c2904a809e35807e42ef26a56f9d9d18d
                        • Instruction Fuzzy Hash: CD1158352042039BD714DF59CA89B2777B5AB84344F24C57BA404AB3D9C7BCDC41A76D
                        APIs
                        • RtlUnwind.KERNEL32(?,00402C4D,Function_00002BDC,00000000,?,?,Function_00002BDC,?), ref: 00402C48
                          • Part of subcall function 00402AFC: RaiseException.KERNEL32(0EEDFAD4,00000000,00000002), ref: 00402B12
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: ExceptionRaiseUnwind
                        • String ID: h[@$y,@
                        • API String ID: 478881706-538065929
                        • Opcode ID: 197fac647d52be2cc9a721db62970f6363bbe9340481d3d2a4d13feaef6199d9
                        • Instruction ID: 9729de3e42ff11a0f1526335048358e57d5146657d12345feb7bd09424399a1d
                        • Opcode Fuzzy Hash: 197fac647d52be2cc9a721db62970f6363bbe9340481d3d2a4d13feaef6199d9
                        • Instruction Fuzzy Hash: FB010C74204200AFE314DF55CA89F1BB7A9FB88714F15C56DB508672A1C779EC11CA65
                        APIs
                        • GetModuleHandleA.KERNEL32(00000000,00409C2A), ref: 004030B7
                        • GetCommandLineA.KERNEL32(00000000,00409C2A), ref: 004030C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3354564376.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3354534460.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354590247.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000005.00000002.3354616542.0000000000411000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_evony_install.jbxd
                        Similarity
                        • API ID: CommandHandleLineModule
                        • String ID: U1h8.@
                        • API String ID: 2123368496-3367623671
                        • Opcode ID: 4dadbc42209142439aad2af0ab94c32bfcf3adda6045e33ce680bfa058b26073
                        • Instruction ID: 924c7b9890db684fc682acc431aa6d470a398ff13c163616bddd672675baf13b
                        • Opcode Fuzzy Hash: 4dadbc42209142439aad2af0ab94c32bfcf3adda6045e33ce680bfa058b26073
                        • Instruction Fuzzy Hash: 40C01274580300CAD720AFFA9E863047990A385349F40823EA604BA2F1CA7C4205EBDD

                        Execution Graph

                        Execution Coverage:1.3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:232
                        Total number of Limit Nodes:8
                        execution_graph 36512 7ff674bd14f0 36514 7ff674bd151c 36512->36514 36513 7ff674bd18be 36515 7ff674bd1889 36514->36515 36560 7ff674bceed0 36514->36560 36515->36513 36555 7ff674be9b80 36515->36555 36520 7ff674bd15b3 36520->36515 36523 7ff674bceed0 33 API calls 36520->36523 36525 7ff674bd160a 36523->36525 36567 7ff674bd0510 33 API calls 3 library calls 36525->36567 36533 7ff674bd1627 _Wcsxfrm 36534 7ff674bd169c 36533->36534 36537 7ff674bd1667 _Wcsxfrm 36533->36537 36568 7ff674bb6720 33 API calls 3 library calls 36534->36568 36569 7ff674bbd2a0 42 API calls __scrt_get_show_window_mode 36537->36569 36539 7ff674bd16c8 36541 7ff674bd16ee _Wcsxfrm 36539->36541 36570 7ff674bb6720 33 API calls 3 library calls 36539->36570 36542 7ff674bd1908 36541->36542 36543 7ff674bd176d 36541->36543 36544 7ff674be9b80 _invalid_parameter_noinfo_noreturn 31 API calls 36542->36544 36547 7ff674bd17af _Wcsxfrm 36543->36547 36571 7ff674bb6720 33 API calls 3 library calls 36543->36571 36545 7ff674bd190d 36544->36545 36548 7ff674be9b80 _invalid_parameter_noinfo_noreturn 31 API calls 36545->36548 36572 7ff674bd79f0 55 API calls _invalid_parameter_noinfo_noreturn 36547->36572 36549 7ff674bd1913 36548->36549 36549->36515 36551 7ff674bd1823 36551->36545 36552 7ff674bd1865 36551->36552 36573 7ff674bd0aa0 31 API calls _invalid_parameter_noinfo_noreturn 36552->36573 36554 7ff674bd1887 36554->36515 36574 7ff674be9ab0 31 API calls 2 library calls 36555->36574 36557 7ff674be9b99 36575 7ff674be9bb0 17 API calls _invalid_parameter_noinfo_noreturn 36557->36575 36561 7ff674bcef0c 36560->36561 36566 7ff674bcef6b _Wcsxfrm std::_Facet_Register __scrt_get_show_window_mode 36560->36566 36563 7ff674bcef1f std::_Facet_Register 36561->36563 36576 7ff674ba86a0 33 API calls 36561->36576 36564 7ff674be9b80 _invalid_parameter_noinfo_noreturn 31 API calls 36563->36564 36563->36566 36565 7ff674bcf01d 36564->36565 36566->36520 36567->36533 36568->36537 36569->36539 36570->36541 36571->36547 36572->36551 36573->36554 36574->36557 36577 7ff674bdf55c 36600 7ff674bdee38 36577->36600 36580 7ff674bdf6ac 36647 7ff674bdf8c0 7 API calls 2 library calls 36580->36647 36581 7ff674bdf578 __scrt_acquire_startup_lock 36583 7ff674bdf6b6 36581->36583 36590 7ff674bdf596 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 36581->36590 36648 7ff674bdf8c0 7 API calls 2 library calls 36583->36648 36585 7ff674bdf5bb 36586 7ff674bdf6c1 __uncaught_exceptions 36587 7ff674bdf645 36608 7ff674bdfa0c 36587->36608 36589 7ff674bdf64a 36611 7ff674bee7a4 36589->36611 36590->36585 36590->36587 36644 7ff674bea824 34 API calls __uncaught_exceptions 36590->36644 36595 7ff674bdf666 36645 7ff674bdfa48 GetModuleHandleW 36595->36645 36598 7ff674bdf66d 36598->36586 36646 7ff674bdf024 8 API calls 2 library calls 36598->36646 36599 7ff674bdf684 36599->36585 36601 7ff674bdee5a __scrt_initialize_crt 36600->36601 36649 7ff674be3750 36601->36649 36604 7ff674bdee63 36604->36580 36604->36581 36698 7ff674be2df0 36608->36698 36700 7ff674bf90b4 36611->36700 36613 7ff674bee7b3 36614 7ff674bdf652 36613->36614 36706 7ff674bf0810 34 API calls _Tolower 36613->36706 36616 7ff674bdaef0 CoInitializeEx 36614->36616 36617 7ff674bdaf02 36616->36617 36618 7ff674bdaf1a SetErrorMode 36616->36618 36783 7ff674ba1f50 68 API calls 36617->36783 36621 7ff674bdaf36 36618->36621 36620 7ff674bdaf10 36620->36595 36709 7ff674bed744 36621->36709 36626 7ff674bdaf8f 36628 7ff674bbf710 35 API calls 36626->36628 36629 7ff674bdafa3 36628->36629 36630 7ff674bdafac 36629->36630 36631 7ff674bdafa7 36629->36631 36632 7ff674bbf710 35 API calls 36630->36632 36785 7ff674bc0dc0 72 API calls 36631->36785 36634 7ff674bdafc0 36632->36634 36635 7ff674bdafcb 36634->36635 36636 7ff674bdaff8 36634->36636 36733 7ff674bbad70 36635->36733 36787 7ff674bd5730 187 API calls _invalid_parameter_noinfo_noreturn 36636->36787 36640 7ff674bdaffd 36640->36595 36641 7ff674bdafdb 36786 7ff674bd5e10 117 API calls 2 library calls 36641->36786 36642 7ff674bdafe7 36642->36595 36644->36587 36645->36598 36646->36599 36647->36583 36648->36586 36650 7ff674be3759 __vcrt_initialize_pure_virtual_call_handler __vcrt_initialize 36649->36650 36662 7ff674be5490 36650->36662 36654 7ff674be3770 36656 7ff674bdee5f 36654->36656 36669 7ff674be54d8 DeleteCriticalSection 36654->36669 36656->36604 36657 7ff674bee6c8 36656->36657 36658 7ff674bf96d0 36657->36658 36659 7ff674bdee6c 36658->36659 36686 7ff674bf3f90 36658->36686 36659->36604 36661 7ff674be3784 8 API calls 3 library calls 36659->36661 36661->36604 36663 7ff674be5498 36662->36663 36665 7ff674be54c9 36663->36665 36666 7ff674be3763 36663->36666 36670 7ff674be3ae0 36663->36670 36675 7ff674be54d8 DeleteCriticalSection 36665->36675 36666->36656 36668 7ff674be3e98 8 API calls 3 library calls 36666->36668 36668->36654 36669->36656 36676 7ff674be37a4 36670->36676 36673 7ff674be3b37 InitializeCriticalSectionAndSpinCount 36674 7ff674be3b23 36673->36674 36674->36663 36675->36666 36677 7ff674be3805 36676->36677 36684 7ff674be3800 try_get_function 36676->36684 36677->36673 36677->36674 36678 7ff674be38e8 36678->36677 36681 7ff674be38f6 GetProcAddress 36678->36681 36679 7ff674be3834 LoadLibraryExW 36680 7ff674be3855 GetLastError 36679->36680 36679->36684 36680->36684 36682 7ff674be3907 36681->36682 36682->36677 36683 7ff674be38cd FreeLibrary 36683->36684 36684->36677 36684->36678 36684->36679 36684->36683 36685 7ff674be388f LoadLibraryExW 36684->36685 36685->36684 36697 7ff674beff28 EnterCriticalSection 36686->36697 36688 7ff674bf3fa0 36689 7ff674bec898 32 API calls 36688->36689 36690 7ff674bf3fa9 36689->36690 36691 7ff674bf3fb7 36690->36691 36692 7ff674bf3da8 34 API calls 36690->36692 36693 7ff674beff7c Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 36691->36693 36694 7ff674bf3fb2 36692->36694 36695 7ff674bf3fc3 36693->36695 36696 7ff674bf3e94 GetStdHandle GetFileType 36694->36696 36695->36658 36696->36691 36699 7ff674bdfa23 GetStartupInfoW 36698->36699 36699->36589 36701 7ff674bf90c1 36700->36701 36702 7ff674bf9106 36700->36702 36707 7ff674bf56b8 34 API calls 4 library calls 36701->36707 36702->36613 36704 7ff674bf90f0 36708 7ff674bf8e38 44 API calls 4 library calls 36704->36708 36706->36613 36707->36704 36708->36702 36710 7ff674bed76c 36709->36710 36726 7ff674bed81f 36709->36726 36712 7ff674bed783 36710->36712 36713 7ff674bed82f 36710->36713 36788 7ff674beff28 EnterCriticalSection 36712->36788 36713->36726 36789 7ff674bf5760 14 API calls 3 library calls 36713->36789 36717 7ff674bed84b 36720 7ff674bed869 36717->36720 36717->36726 36790 7ff674bf08dc 15 API calls 2 library calls 36720->36790 36724 7ff674bed875 _Wcsxfrm 36724->36726 36728 7ff674bdaf53 GetCommandLineW CommandLineToArgvW 36726->36728 36791 7ff674bea034 14 API calls _Wcscoll 36726->36791 36729 7ff674bbf710 36728->36729 36731 7ff674bbf740 36729->36731 36732 7ff674bbf772 36729->36732 36731->36732 36792 7ff674befd48 35 API calls 4 library calls 36731->36792 36732->36626 36784 7ff674bbe9d0 73 API calls 36732->36784 36737 7ff674bbadf2 36733->36737 36734 7ff674bbb1ac 36825 7ff674ba1f50 68 API calls 36734->36825 36739 7ff674bbae42 36737->36739 36815 7ff674befd48 35 API calls 4 library calls 36737->36815 36738 7ff674bbb1a8 36738->36641 36738->36642 36739->36734 36740 7ff674bbaf26 OpenProcess 36739->36740 36741 7ff674bbaf44 36740->36741 36742 7ff674bbaf5c 36740->36742 36816 7ff674ba1f50 68 API calls 36741->36816 36793 7ff674bb1a70 36742->36793 36745 7ff674bbaf52 36745->36738 36748 7ff674bbb19f CloseHandle 36745->36748 36748->36738 36749 7ff674bbafae 36805 7ff674bd0760 36749->36805 36750 7ff674bbb146 36824 7ff674ba1f50 68 API calls 36750->36824 36753 7ff674bbb152 36758 7ff674bbb168 CloseHandle 36753->36758 36759 7ff674bbb177 36753->36759 36754 7ff674bbafb7 36811 7ff674bd08b0 36754->36811 36758->36759 36759->36745 36761 7ff674bbb186 CloseHandle 36759->36761 36760 7ff674bbafd5 WaitForMultipleObjectsEx 36763 7ff674bbb020 36760->36763 36764 7ff674bbb0df GetExitCodeProcess 36760->36764 36761->36745 36768 7ff674bbb07f GetLastError 36763->36768 36769 7ff674bbb0bc 36763->36769 36765 7ff674bbb113 36764->36765 36766 7ff674bbb0fb 36764->36766 36822 7ff674ba1f50 68 API calls 36765->36822 36821 7ff674ba1f50 68 API calls 36766->36821 36772 7ff674bbb0a7 36768->36772 36773 7ff674bbb08b 36768->36773 36819 7ff674bd6c40 15 API calls 36769->36819 36818 7ff674ba1f50 68 API calls 36772->36818 36817 7ff674ba1f50 68 API calls 36773->36817 36774 7ff674bbb0c6 36777 7ff674bbb09d 36774->36777 36820 7ff674ba1f50 68 API calls 36774->36820 36823 7ff674bd0b50 18 API calls 36777->36823 36783->36620 36784->36626 36785->36630 36786->36642 36787->36640 36789->36717 36790->36724 36791->36728 36792->36731 36794 7ff674bb1a99 __scrt_get_show_window_mode 36793->36794 36826 7ff674bb4770 36794->36826 36797 7ff674bb1ae1 36799 7ff674bb1b49 GetStdHandle 36797->36799 36800 7ff674bb4770 39 API calls 36797->36800 36798 7ff674bb1ad4 CloseHandle 36798->36797 36799->36749 36799->36750 36801 7ff674bb1b09 CreateEventW 36800->36801 36802 7ff674bb1b2c CloseHandle 36801->36802 36803 7ff674bb1b3a 36801->36803 36802->36803 36803->36799 36804 7ff674bb1b5a CloseHandle 36803->36804 36804->36799 36806 7ff674bd0780 36805->36806 36845 7ff674bb4380 36806->36845 36808 7ff674bd07d2 36809 7ff674bb4380 33 API calls 36808->36809 36810 7ff674bd0811 36809->36810 36810->36754 36855 7ff674bb0b30 36811->36855 36814 7ff674bd0700 InitializeCriticalSection CreateThread 36814->36760 36815->36737 36816->36745 36817->36777 36818->36777 36819->36774 36820->36777 36821->36777 36822->36777 36824->36753 36825->36738 36827 7ff674bb4795 __scrt_initialize_default_local_stdio_options 36826->36827 36830 7ff674be9654 36827->36830 36831 7ff674be96a4 36830->36831 36832 7ff674be9668 36830->36832 36843 7ff674bea034 14 API calls _Wcscoll 36831->36843 36832->36831 36835 7ff674be9672 36832->36835 36834 7ff674be969c 36844 7ff674be9b60 31 API calls _invalid_parameter_noinfo_noreturn 36834->36844 36841 7ff674be5e88 39 API calls 6 library calls 36835->36841 36838 7ff674be968b 36839 7ff674bb1ab2 CreateEventW 36838->36839 36842 7ff674bea034 14 API calls _Wcscoll 36838->36842 36839->36797 36839->36798 36841->36838 36842->36834 36843->36834 36844->36839 36846 7ff674bb43c5 36845->36846 36853 7ff674bb43a4 _Wcsxfrm 36845->36853 36848 7ff674bb43d8 std::_Facet_Register 36846->36848 36854 7ff674bb0490 33 API calls 36846->36854 36849 7ff674be9b80 _invalid_parameter_noinfo_noreturn 31 API calls 36848->36849 36850 7ff674bb4434 _Wcsxfrm std::_Facet_Register 36848->36850 36849->36850 36851 7ff674be9b80 _invalid_parameter_noinfo_noreturn 31 API calls 36850->36851 36850->36853 36852 7ff674bb44d4 36851->36852 36853->36808 36858 7ff674bb0b80 InitializeCriticalSectionAndSpinCount 36855->36858 36857 7ff674bb0b3e 36857->36814 36858->36857

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 7ff674bbad70-7ff674bbadff 2 7ff674bbae01-7ff674bbae08 0->2 3 7ff674bbae42-7ff674bbae4d 0->3 4 7ff674bbae10-7ff674bbae22 call 7ff674befd48 2->4 5 7ff674bbae53-7ff674bbae5e 3->5 6 7ff674bbb1ac-7ff674bbb1b8 call 7ff674ba1f50 3->6 14 7ff674bbae24 4->14 15 7ff674bbae27-7ff674bbae2a 4->15 5->6 8 7ff674bbae64-7ff674bbae6f 5->8 18 7ff674bbb1bd-7ff674bbb1dd 6->18 11 7ff674bbae71-7ff674bbae78 8->11 12 7ff674bbaeb6-7ff674bbaeb9 8->12 11->6 16 7ff674bbae7e-7ff674bbae84 11->16 12->6 17 7ff674bbaebf-7ff674bbaec9 12->17 14->15 21 7ff674bbae2c-7ff674bbae36 15->21 22 7ff674bbae3a-7ff674bbae40 15->22 16->6 23 7ff674bbae8a-7ff674bbae9e 16->23 19 7ff674bbaf26-7ff674bbaf42 OpenProcess 17->19 20 7ff674bbaecb-7ff674bbaed5 17->20 25 7ff674bbaf44-7ff674bbaf57 call 7ff674ba1f50 19->25 26 7ff674bbaf5c-7ff674bbafa8 call 7ff674bb1a70 GetStdHandle 19->26 24 7ff674bbaee0-7ff674bbaee7 20->24 21->22 22->3 22->4 23->6 27 7ff674bbaea4-7ff674bbaeb4 23->27 24->6 28 7ff674bbaeed-7ff674bbaef0 24->28 35 7ff674bbb195-7ff674bbb19d 25->35 39 7ff674bbafae-7ff674bbafd0 call 7ff674bd0760 call 7ff674bd08b0 call 7ff674bd0700 26->39 40 7ff674bbb146-7ff674bbb157 call 7ff674ba1f50 26->40 27->11 27->12 28->6 31 7ff674bbaef6-7ff674bbaf0e 28->31 31->6 34 7ff674bbaf14-7ff674bbaf24 31->34 34->19 34->24 37 7ff674bbb19f-7ff674bbb1a2 CloseHandle 35->37 38 7ff674bbb1a8-7ff674bbb1aa 35->38 37->38 38->18 52 7ff674bbafd5-7ff674bbb01a WaitForMultipleObjectsEx 39->52 48 7ff674bbb159-7ff674bbb166 40->48 50 7ff674bbb168-7ff674bbb16e CloseHandle 48->50 51 7ff674bbb177-7ff674bbb184 48->51 50->51 51->35 53 7ff674bbb186-7ff674bbb18c CloseHandle 51->53 55 7ff674bbb020-7ff674bbb023 52->55 56 7ff674bbb0df-7ff674bbb0f9 GetExitCodeProcess 52->56 53->35 57 7ff674bbb025-7ff674bbb045 call 7ff674bbd370 55->57 58 7ff674bbb079-7ff674bbb07d 55->58 59 7ff674bbb113-7ff674bbb11f call 7ff674ba1f50 56->59 60 7ff674bbb0fb-7ff674bbb111 call 7ff674ba1f50 56->60 57->58 63 7ff674bbb07f-7ff674bbb089 GetLastError 58->63 64 7ff674bbb0bc-7ff674bbb0c8 call 7ff674bd6c40 58->64 72 7ff674bbb125 59->72 60->72 68 7ff674bbb0a7-7ff674bbb0ba call 7ff674ba1f50 63->68 69 7ff674bbb08b-7ff674bbb0a2 call 7ff674ba1f50 63->69 75 7ff674bbb128-7ff674bbb144 call 7ff674bd0b50 call 7ff674bb0b50 call 7ff674bb9980 64->75 76 7ff674bbb0ca-7ff674bbb0dd call 7ff674ba1f50 64->76 68->75 69->75 72->75 75->48 76->75
                        Strings
                        • Process PID %d exited with code %d, xrefs: 00007FF674BBB102
                        • Inter-process communication between Unity and the crash handler prematurely exited with code %d, xrefs: 00007FF674BBB0CC
                        • Waiting on crash event failed with code %d, xrefs: 00007FF674BBB0A9
                        • Usage: %S <process ID> <shared region address>, xrefs: 00007FF674BBB1AC
                        • Warning: Wait on crash event threw unexpected error: %d. GetLastError is %d., xrefs: 00007FF674BBB08E
                        • Process PID %d was terminated but exit code is not available., xrefs: 00007FF674BBB113
                        • Invalid pipe specified for STDIN., xrefs: 00007FF674BBB146
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID:
                        • String ID: Inter-process communication between Unity and the crash handler prematurely exited with code %d$Invalid pipe specified for STDIN.$Process PID %d exited with code %d$Process PID %d was terminated but exit code is not available.$Usage: %S <process ID> <shared region address>$Waiting on crash event failed with code %d$Warning: Wait on crash event threw unexpected error: %d. GetLastError is %d.
                        • API String ID: 0-3785057018
                        • Opcode ID: 152767a312c36e84a56b600d845c726e6fdbe3bd1ad1c2e5db8c693346304a4d
                        • Instruction ID: e1b8dea51109c16f4969880a70201ea17ef2991c2a06d276b503c831ced26e91
                        • Opcode Fuzzy Hash: 152767a312c36e84a56b600d845c726e6fdbe3bd1ad1c2e5db8c693346304a4d
                        • Instruction Fuzzy Hash: 05816323A38A92C1E610DB25D8C81B97264FF86BB4F540332EA6D876E9DF39DD45C740

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 87 7ff674bd14f0-7ff674bd158a call 7ff674ba81c0 call 7ff674bdca60 92 7ff674bd1590-7ff674bd15b8 call 7ff674bdc944 call 7ff674bceed0 87->92 93 7ff674bd1889 87->93 110 7ff674bd15c0-7ff674bd15e3 call 7ff674bdc044 92->110 94 7ff674bd188b-7ff674bd1893 93->94 96 7ff674bd1895-7ff674bd18a7 94->96 97 7ff674bd18d1-7ff674bd18d8 94->97 99 7ff674bd18be-7ff674bd18cb call 7ff674bdedf4 96->99 100 7ff674bd18a9-7ff674bd18bc 96->100 102 7ff674bd18da-7ff674bd18de 97->102 103 7ff674bd18e8-7ff674bd1907 97->103 99->97 100->99 104 7ff674bd1914-7ff674bd195b call 7ff674be9b80 100->104 102->103 107 7ff674bd18e0-7ff674bd18e3 call 7ff674ba2000 102->107 114 7ff674bd1961-7ff674bd1967 104->114 115 7ff674bd1a99 104->115 107->103 110->93 119 7ff674bd15e9-7ff674bd15ed 110->119 118 7ff674bd1970-7ff674bd198d call 7ff674bceed0 114->118 117 7ff674bd1a9c-7ff674bd1abc 115->117 120 7ff674bd1abe-7ff674bd1acf 117->120 121 7ff674bd1aeb-7ff674bd1af3 117->121 131 7ff674bd1990-7ff674bd19bd ReadFile 118->131 119->110 123 7ff674bd15ef-7ff674bd1665 call 7ff674bdc980 call 7ff674bceed0 call 7ff674bd0510 call 7ff674be22d0 call 7ff674bd31b0 119->123 125 7ff674bd1ad1-7ff674bd1ae4 120->125 126 7ff674bd1ae6 call 7ff674bdedf4 120->126 164 7ff674bd169c-7ff674bd16ba call 7ff674bb6720 123->164 165 7ff674bd1667-7ff674bd169a call 7ff674be22d0 123->165 125->126 129 7ff674bd1af4-7ff674bd1af9 call 7ff674be9b80 125->129 126->121 133 7ff674bd1a35 131->133 134 7ff674bd19bf-7ff674bd19cc 131->134 137 7ff674bd1a37-7ff674bd1a3f 133->137 134->131 138 7ff674bd19ce-7ff674bd19d9 134->138 141 7ff674bd1a41-7ff674bd1a69 EnterCriticalSection LeaveCriticalSection 137->141 142 7ff674bd1a6b-7ff674bd1a6d 137->142 138->133 143 7ff674bd19db-7ff674bd19ef call 7ff674bceed0 138->143 145 7ff674bd1a6f-7ff674bd1a76 141->145 144 7ff674bd1a7e-7ff674bd1a89 GetLastError 142->144 142->145 153 7ff674bd19f1-7ff674bd1a04 call 7ff674bcfa40 143->153 154 7ff674bd1a06-7ff674bd1a0d call 7ff674bd51e0 143->154 144->115 150 7ff674bd1a8b-7ff674bd1a90 144->150 145->118 149 7ff674bd1a7c 145->149 149->115 150->115 155 7ff674bd1a92-7ff674bd1a97 150->155 153->137 161 7ff674bd1a12-7ff674bd1a14 154->161 155->115 155->117 161->133 163 7ff674bd1a16-7ff674bd1a1e 161->163 166 7ff674bd1a20-7ff674bd1a2c call 7ff674bcfa40 163->166 167 7ff674bd1a31-7ff674bd1a33 163->167 172 7ff674bd16bf-7ff674bd16d0 call 7ff674bbd2a0 164->172 165->172 166->167 167->137 175 7ff674bd16d2 172->175 176 7ff674bd16d5-7ff674bd16ec 172->176 175->176 177 7ff674bd16ee-7ff674bd171b call 7ff674be22d0 176->177 178 7ff674bd171d-7ff674bd172d call 7ff674bb6720 176->178 182 7ff674bd1732-7ff674bd173a 177->182 178->182 183 7ff674bd1772-7ff674bd178b 182->183 184 7ff674bd173c-7ff674bd1752 182->184 187 7ff674bd1790-7ff674bd1798 183->187 185 7ff674bd1754-7ff674bd1767 184->185 186 7ff674bd176d call 7ff674bdedf4 184->186 185->186 189 7ff674bd1908-7ff674bd190d call 7ff674be9b80 185->189 186->183 187->187 188 7ff674bd179a-7ff674bd17ad 187->188 191 7ff674bd17de-7ff674bd17f1 call 7ff674bb6720 188->191 192 7ff674bd17af-7ff674bd17dc call 7ff674be22d0 188->192 197 7ff674bd190e-7ff674bd1913 call 7ff674be9b80 189->197 199 7ff674bd17f6-7ff674bd1800 191->199 192->199 197->104 201 7ff674bd1802 199->201 202 7ff674bd1809-7ff674bd1831 call 7ff674bd79f0 199->202 201->202 206 7ff674bd1833-7ff674bd184a 202->206 207 7ff674bd186a-7ff674bd1887 call 7ff674bd0aa0 202->207 209 7ff674bd1865 call 7ff674bdedf4 206->209 210 7ff674bd184c-7ff674bd185f 206->210 207->94 209->207 210->197 210->209
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$CriticalSection$EnterErrorFileLastLeaveRead
                        • String ID: 1.2.3$X$\CrashReport
                        • API String ID: 3552829212-2709770053
                        • Opcode ID: c9ad7b509111042e7b0f24a87ec7b9178f46bd899d6895e1f1b47e0c13835981
                        • Instruction ID: e7600ea71b7db4772459de786e5870d02df5f7f8b41486978592793bd79ecf06
                        • Opcode Fuzzy Hash: c9ad7b509111042e7b0f24a87ec7b9178f46bd899d6895e1f1b47e0c13835981
                        • Instruction Fuzzy Hash: 2002B373B28B82C5EB00CF65D4881AD67B1FB86B94F604236EA5C83A99DF3CD945C740

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: __scrt_fastfail__scrt_is_nonwritable_in_current_image$__scrt_acquire_startup_lock__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock__scrt_uninitialize_crt__vcrt_initialize
                        • String ID:
                        • API String ID: 1664584033-0
                        • Opcode ID: 91ec2d03f7c72563df1a6b3a15f56ce7d89af5a32bc4c0540572b7b4003cd16d
                        • Instruction ID: 0b2d4305ace2c4c77dc0a859899349c76f8a2c861f4addcdfbfd95633446ba75
                        • Opcode Fuzzy Hash: 91ec2d03f7c72563df1a6b3a15f56ce7d89af5a32bc4c0540572b7b4003cd16d
                        • Instruction Fuzzy Hash: 64316D13E2D543C1FA64AB6098E93B923519F87B44F6450B5D90ECB6EBCE2CFC45CA01

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CommandLine$ArgvErrorInitializeMode
                        • String ID: --attach$CoInitializeEx failed with code 0x%0x
                        • API String ID: 3745094843-3050051734
                        • Opcode ID: 1cdfaa6d99931c18cca8a1ccff345aaa19a4f8afea843ff7ae3c8ee6e43aefa8
                        • Instruction ID: 5e45423a8287dfbe2a2f504680e37977de88c2c1efe38b3dd969a132b4591f96
                        • Opcode Fuzzy Hash: 1cdfaa6d99931c18cca8a1ccff345aaa19a4f8afea843ff7ae3c8ee6e43aefa8
                        • Instruction Fuzzy Hash: 02219863B38643C2EA14AB15E8C91BA6362FF86B84F544071E94DC73A6DE7CED05CB00

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: FileHandleType
                        • String ID: @
                        • API String ID: 3000768030-2766056989
                        • Opcode ID: f25c0320270db49df42788150c949e3002195f8fb88fb771cf093ef45b5c8b3c
                        • Instruction ID: da13aa2d63224d6b14c11e035e759e620a9e56279e35dd29fa72423ef437dd1a
                        • Opcode Fuzzy Hash: f25c0320270db49df42788150c949e3002195f8fb88fb771cf093ef45b5c8b3c
                        • Instruction Fuzzy Hash: A221B467A29783C2EB608B2894D81393660EB46F74F282336D66E867D4CE39DC85C701

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CreateCriticalInitializeSectionThread
                        • String ID:
                        • API String ID: 2823773144-0
                        • Opcode ID: ce8b461f1463f4c3f864f37e8f354fe7c8550794a67776fbb06a929b25695bb9
                        • Instruction ID: fcedab1081db6d44e96f61e88d6ff50d2888fb9e07d53eb8e605885bbbdb05b9
                        • Opcode Fuzzy Hash: ce8b461f1463f4c3f864f37e8f354fe7c8550794a67776fbb06a929b25695bb9
                        • Instruction Fuzzy Hash: 33F06DB6924B40C2E7148F68E84835973A4F758B48F688435CE8C86364CF3DC55AC750

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 327 7ff674bd51e0-7ff674bd520a 328 7ff674bd525e 327->328 329 7ff674bd520c-7ff674bd5216 327->329 331 7ff674bd5260-7ff674bd5278 328->331 330 7ff674bd5220-7ff674bd524d ReadFile 329->330 332 7ff674bd524f-7ff674bd525c 330->332 333 7ff674bd5279-7ff674bd527b 330->333 332->328 332->330 333->331
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: 52c8002c20f4a5866b9ca2d69eb4f14b45e4cc094b6b909063bfbd7e292b68e6
                        • Instruction ID: e0e30efd4828c165bee8a3fa1f7747b1663398f57be1f3fb33bc7b34edb24014
                        • Opcode Fuzzy Hash: 52c8002c20f4a5866b9ca2d69eb4f14b45e4cc094b6b909063bfbd7e292b68e6
                        • Instruction Fuzzy Hash: 4B01D8327187C0C5DA108F52B98416AEB94FB86FE0F584571EE8C57B69CF3CD4858B00

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressProc$EncodeHandleModulePointer
                        • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                        • API String ID: 73157160-295688737
                        • Opcode ID: 6681fdf1e5ba823ac0d85a57227c06d65ddf91c206e6a2ee508133a236ae922a
                        • Instruction ID: faa5f31a68f48c25d78cff31a2712da4db85966917ee4c8747b1536fdf3163cd
                        • Opcode Fuzzy Hash: 6681fdf1e5ba823ac0d85a57227c06d65ddf91c206e6a2ee508133a236ae922a
                        • Instruction Fuzzy Hash: 95E15DAAA39B47C1EA04DB55FCDC06133B0BF4AB54B8564B3C90D86334EEBCA599C350

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 384 7ff674bb2e90-7ff674bb2ead call 7ff674bdf0d0 388 7ff674bb2eaf-7ff674bb2ec1 384->388 389 7ff674bb2ec2-7ff674bb2ed7 GetModuleFileNameA 384->389 390 7ff674bb3017-7ff674bb301e 389->390 391 7ff674bb2edd-7ff674bb2f01 call 7ff674bea968 GetFileAttributesA 389->391 393 7ff674bb3020-7ff674bb3034 LoadLibraryA 390->393 394 7ff674bb303a-7ff674bb3152 GetProcAddress * 13 390->394 391->390 399 7ff674bb2f07-7ff674bb2f0c 391->399 393->388 393->394 395 7ff674bb3158-7ff674bb315d 394->395 396 7ff674bb32ed-7ff674bb3311 FreeLibrary 394->396 395->396 398 7ff674bb3163-7ff674bb3168 395->398 398->396 400 7ff674bb316e-7ff674bb3173 398->400 399->390 401 7ff674bb2f12-7ff674bb2f2c GetEnvironmentVariableA 399->401 400->396 402 7ff674bb3179-7ff674bb317e 400->402 403 7ff674bb2f2e-7ff674bb2f52 call 7ff674bea968 GetFileAttributesA 401->403 404 7ff674bb2f63-7ff674bb2f68 401->404 402->396 406 7ff674bb3184-7ff674bb3189 402->406 403->404 412 7ff674bb2f54-7ff674bb2f5f LoadLibraryA 403->412 404->390 405 7ff674bb2f6e-7ff674bb2f88 GetEnvironmentVariableA 404->405 409 7ff674bb2fbf-7ff674bb2fc4 405->409 410 7ff674bb2f8a-7ff674bb2fae call 7ff674bea968 GetFileAttributesA 405->410 406->396 411 7ff674bb318f-7ff674bb3196 406->411 409->390 415 7ff674bb2fc6-7ff674bb2fe0 GetEnvironmentVariableA 409->415 410->409 419 7ff674bb2fb0-7ff674bb2fbb LoadLibraryA 410->419 411->396 414 7ff674bb319c-7ff674bb31a1 411->414 412->404 414->396 417 7ff674bb31a7-7ff674bb31ac 414->417 415->390 418 7ff674bb2fe2-7ff674bb3006 call 7ff674bea968 GetFileAttributesA 415->418 417->396 420 7ff674bb31b2-7ff674bb31b7 417->420 418->390 425 7ff674bb3008-7ff674bb3013 LoadLibraryA 418->425 419->409 420->396 422 7ff674bb31bd-7ff674bb31c2 420->422 422->396 424 7ff674bb31c8-7ff674bb31d3 422->424 426 7ff674bb31e5-7ff674bb31f4 424->426 427 7ff674bb31d5-7ff674bb31e1 call 7ff674beaad0 424->427 425->390 431 7ff674bb3215-7ff674bb3243 call 7ff674be2df0 426->431 432 7ff674bb31f6-7ff674bb320f GetLastError 426->432 427->426 437 7ff674bb3245-7ff674bb325c 431->437 438 7ff674bb327d-7ff674bb32ec call 7ff674be2df0 GetUserNameA 431->438 432->431 437->438 442 7ff674bb325e-7ff674bb3277 GetLastError 437->442 442->438
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressFileProc$AttributesLibraryLoad$EnvironmentVariable$ModuleName
                        • String ID: .local$ProgramFiles$StackWalk64$SymCleanup$SymFunctionTableAccess64$SymGetLineFromAddr64$SymGetModuleBase64$SymGetModuleInfo64$SymGetOptions$SymGetSearchPath$SymGetSymFromAddr64$SymInitialize$SymLoadModule64$SymSetOptions$UnDecorateSymbolName$\Debugging Tools for Windows (x64)\dbghelp.dll$\Debugging Tools for Windows 64-Bit\dbghelp.dll$\Debugging Tools for Windows\dbghelp.dll$dbghelp.dll
                        • API String ID: 3759960736-2104867102
                        • Opcode ID: b91c5a648fbf5b85b5f042a15e0cde8a68a4501fac5cc6a052321ce3fe40038b
                        • Instruction ID: a79f794bcfceb5f2a5cf54d7e17d2ab0d8403421b663b478e2073673de23d6b2
                        • Opcode Fuzzy Hash: b91c5a648fbf5b85b5f042a15e0cde8a68a4501fac5cc6a052321ce3fe40038b
                        • Instruction Fuzzy Hash: 9FD11F77A24A42D2EB14DB55E9CC3A963B0FB49B44F405136DB4D87AA4DF3CE9A9C300

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1654 7ff674bd7230-7ff674bd724c 1655 7ff674bd724e-7ff674bd725c 1654->1655 1656 7ff674bd725d-7ff674bd7260 1654->1656 1657 7ff674bd7963-7ff674bd7971 1656->1657 1658 7ff674bd7266-7ff674bd7269 1656->1658 1658->1657 1659 7ff674bd726f-7ff674bd7274 1658->1659 1660 7ff674bd7285-7ff674bd72a6 1659->1660 1661 7ff674bd7276-7ff674bd7284 1659->1661 1662 7ff674bd72ab-7ff674bd732a call 7ff674bb0010 call 7ff674bd60a0 1660->1662 1663 7ff674bd72a8 1660->1663 1668 7ff674bd7335-7ff674bd73f6 call 7ff674be2df0 InternetCrackUrlA 1662->1668 1669 7ff674bd732c-7ff674bd7330 1662->1669 1663->1662 1679 7ff674bd748e-7ff674bd74ae InternetOpenA 1668->1679 1680 7ff674bd73fc-7ff674bd748a call 7ff674bb4380 * 6 1668->1680 1670 7ff674bd78c1-7ff674bd78c4 1669->1670 1673 7ff674bd7906-7ff674bd7910 1670->1673 1674 7ff674bd78c6-7ff674bd78d8 1670->1674 1677 7ff674bd7912-7ff674bd7919 1673->1677 1678 7ff674bd7926-7ff674bd7962 1673->1678 1675 7ff674bd78f3-7ff674bd7900 call 7ff674bdedf4 1674->1675 1676 7ff674bd78da-7ff674bd78ed 1674->1676 1675->1673 1676->1675 1681 7ff674bd7978-7ff674bd7991 call 7ff674be9b80 1676->1681 1677->1678 1685 7ff674bd791b-7ff674bd7921 call 7ff674ba2000 1677->1685 1683 7ff674bd74b0-7ff674bd74c8 GetLastError call 7ff674ba1f50 1679->1683 1684 7ff674bd74cd-7ff674bd74d1 1679->1684 1680->1679 1698 7ff674bd7993-7ff674bd799a 1681->1698 1699 7ff674bd799b-7ff674bd79e5 call 7ff674bb0b60 SendMessageW call 7ff674bb0b70 WaitForSingleObject 1681->1699 1700 7ff674bd78aa-7ff674bd78bc InternetCloseHandle call 7ff674bd0cb0 1683->1700 1690 7ff674bd74d3-7ff674bd74d6 1684->1690 1691 7ff674bd74d8-7ff674bd74e1 1684->1691 1685->1678 1695 7ff674bd74e6-7ff674bd74ea 1690->1695 1691->1695 1702 7ff674bd74f1-7ff674bd74fa 1695->1702 1703 7ff674bd74ec-7ff674bd74ef 1695->1703 1700->1670 1707 7ff674bd74ff-7ff674bd7538 InternetConnectA 1702->1707 1703->1707 1711 7ff674bd753a-7ff674bd7552 GetLastError call 7ff674ba1f50 1707->1711 1712 7ff674bd7557-7ff674bd7570 1707->1712 1724 7ff674bd789b 1711->1724 1714 7ff674bd7883-7ff674bd7896 call 7ff674ba1f50 1712->1714 1715 7ff674bd7576-7ff674bd757e 1712->1715 1714->1724 1715->1714 1719 7ff674bd7584-7ff674bd758e 1715->1719 1719->1714 1725 7ff674bd7594-7ff674bd75d6 HttpOpenRequestA 1719->1725 1729 7ff674bd78a1-7ff674bd78a4 InternetCloseHandle 1724->1729 1727 7ff674bd7602-7ff674bd767f call 7ff674bd02c0 call 7ff674bcceb0 * 4 call 7ff674bd0ed0 call 7ff674bcceb0 1725->1727 1728 7ff674bd75d8-7ff674bd75fd GetLastError call 7ff674ba1f50 InternetCloseHandle 1725->1728 1748 7ff674bd76d2-7ff674bd76d5 1727->1748 1749 7ff674bd7681-7ff674bd768e 1727->1749 1728->1729 1729->1700 1751 7ff674bd7702-7ff674bd770f 1748->1751 1752 7ff674bd76d7-7ff674bd76e4 1748->1752 1749->1748 1750 7ff674bd7690-7ff674bd76a8 1749->1750 1754 7ff674bd76ab-7ff674bd76d0 call 7ff674bb4380 1750->1754 1753 7ff674bd7714-7ff674bd7749 HttpSendRequestA 1751->1753 1752->1751 1755 7ff674bd76e6-7ff674bd7700 1752->1755 1756 7ff674bd774b-7ff674bd7761 GetLastError 1753->1756 1757 7ff674bd7766-7ff674bd77a8 HttpQueryInfoA 1753->1757 1754->1753 1755->1754 1759 7ff674bd780e-7ff674bd7816 call 7ff674ba1f50 1756->1759 1760 7ff674bd77c2-7ff674bd77ca 1757->1760 1761 7ff674bd77aa-7ff674bd77c0 GetLastError 1757->1761 1771 7ff674bd781c-7ff674bd7825 1759->1771 1763 7ff674bd77ec-7ff674bd77fd 1760->1763 1764 7ff674bd77cc-7ff674bd77d1 1760->1764 1761->1759 1767 7ff674bd7804-7ff674bd7807 1763->1767 1768 7ff674bd77ff-7ff674bd7802 1763->1768 1764->1763 1766 7ff674bd77d3-7ff674bd77e7 call 7ff674ba1f50 1764->1766 1766->1763 1767->1759 1768->1771 1772 7ff674bd7827-7ff674bd7839 1771->1772 1773 7ff674bd7859-7ff674bd7881 call 7ff674bd1160 InternetCloseHandle 1771->1773 1774 7ff674bd7854 call 7ff674bdedf4 1772->1774 1775 7ff674bd783b-7ff674bd784e 1772->1775 1773->1729 1774->1773 1775->1774 1777 7ff674bd7972-7ff674bd7977 call 7ff674be9b80 1775->1777 1777->1681
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID:
                        • String ID: %s/api/v2/projects/%s/reports$Content-Length: $Content-Type: multipart/form-data; boundary=$Failed to open HTTP request to server '%s' (code %d)$Failed to open internet session to server '%s' (code %d)$Failed to open the Internet with code %d$Failed to upload %u bytes to server '%s' (code %d)$HTTP/1.1$Invalid URL scheme '%s' (expected 'https').$POST$UnityCrashHandler$Upload of %u bytes to server '%s' completed, but received no response (Win32 code %d)$Upload of %u bytes to server '%s' completed, the server responded with code %u$Warning: Upload of %u bytes to server '%s' completed, but received multiple status codes! (first code: %u)
                        • API String ID: 0-337262095
                        • Opcode ID: 38aa65bcc0acc95a24bee0c4b2a0e5bd9e02338a2bcac9f8a5add61628e99eee
                        • Instruction ID: cb5df6673691ce86ee9a924b34348094189325024c092f6b2048666fed0614e1
                        • Opcode Fuzzy Hash: 38aa65bcc0acc95a24bee0c4b2a0e5bd9e02338a2bcac9f8a5add61628e99eee
                        • Instruction Fuzzy Hash: BA227F77A287C2CAEB219F25D8883ED6361FB45B88F504136DA4D87A99DF3CD944CB40
                        APIs
                        • CreateFileW.KERNEL32 ref: 00007FF674BBBBC1
                          • Part of subcall function 00007FF674BDA530: lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000001,00007FF674BBB7B1), ref: 00007FF674BDA574
                          • Part of subcall function 00007FF674BDA530: WriteFile.KERNEL32 ref: 00007FF674BDA591
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: File$CreateWritelstrlen
                        • String ID: $Additional report files:$Crash Report metadata:$Stacks for Running Threads:$ * %s"%s" (%s)$ * App Name: %s$ * App Version: %s$ * Bug Reporter App Path: %s$ * Crash Report Path: %s$ * Is Editor: %s$ * Mono DLL: %s$%s %s in module %s at %04x:%08x.$%s by %s [version: %s]$*** WARNING ***Managed call stack frames will be incorrect or missing because the Mono DLL at '%S' could not be loaded (unknown error).$<Unable to access crash thread information>$Crash Report configuration:$Disk space data for '%s' is unavailable.$MISSING: $No call stack available.$false$true
                        • API String ID: 1485387767-3773538728
                        • Opcode ID: 2434aedec69c7b04132ef32d3c17b27c5cc1a85c750c0c604dd47e9e05e181ca
                        • Instruction ID: d30b86c5b8ecc601bc02f5e4829660832647da2d635c5ababeafbecaa2748ea1
                        • Opcode Fuzzy Hash: 2434aedec69c7b04132ef32d3c17b27c5cc1a85c750c0c604dd47e9e05e181ca
                        • Instruction Fuzzy Hash: 85F18073628B81C6EB10CB55E8882AEB7B1FB85B84F504136EA8D97B58DF7CD945C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: FileTime$InfoMemoryName$DateGlobalLocalModulePerformanceProcessStatusSystemUserWritelstrlen
                        • String ID: %d MB physical memory [%d MB free].$%d MB process peak paging file [%d MB used].$%d MB process peak working set [%d MB used].$%d%% physical memory in use.$%s, run by %s.$E$E$Error occurred at %s.$System Commit Total/Limit/Peak: %dMB/%dMB/%dMB$System Handle Count: %d$System Physical Total/Available: %dMB/%dMB$System Process Count: %d$System Thread Count: %d$Unknown
                        • API String ID: 3684283064-3803933451
                        • Opcode ID: 6d86fa5d97c8bc3a9d712654edb3bdae9fc66d30be3742e0a34e694bcfe0fc3b
                        • Instruction ID: a986e1e1b5c977e07a62d1e5aa9a0b62ea408e9a0b219564587854bb4c3b679f
                        • Opcode Fuzzy Hash: 6d86fa5d97c8bc3a9d712654edb3bdae9fc66d30be3742e0a34e694bcfe0fc3b
                        • Instruction Fuzzy Hash: CDC18D63A24A82CAEB249F65D8843ED33A0FF85B48F504136EA0D97B99DF38D945C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: MemoryProcessRead$FileModuleName
                        • String ID: Company: %s$ FileDesc: %s$ FileVer: %d.%d.%d.%d$ ProdVer: %d.%d.%d.%d$ Product: %s$%s$File Size: %-10d File Time: %s$Image Base: 0x%08x Image Size: 0x%08x$Module %d$PE$Version:
                        • API String ID: 1307979695-3916291653
                        • Opcode ID: a7964ee960704449277de841231a4c507ec870fb0f4a6f85dcc9643bc488336c
                        • Instruction ID: 90361c2f006300c91fc31f58f64d004afcd49369e025ff2348819aa6ee77d3cf
                        • Opcode Fuzzy Hash: a7964ee960704449277de841231a4c507ec870fb0f4a6f85dcc9643bc488336c
                        • Instruction Fuzzy Hash: E79197736386C2C1EA34DB15E8986EA6761FB89B84F904132DA8D87B99DF3CD505CB40
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Exception$Throw$FileHeaderRaise_invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 2189741035-0
                        • Opcode ID: e9b3489329d420df4cfc935cad6458396515842352594b13747c991b50c1f593
                        • Instruction ID: 42807ee579791d280af2478d4ca73233ee7580848cf415d5a330ceac6fbaf6af
                        • Opcode Fuzzy Hash: e9b3489329d420df4cfc935cad6458396515842352594b13747c991b50c1f593
                        • Instruction Fuzzy Hash: 1A715763B24644C9E71CFE7298960BA1351AFC5BC0F04D83AFE4D8B75ADE38D8114380
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ErrorLastNameTranslatewcschr$CodePageValid
                        • String ID: utf8
                        • API String ID: 4034593509-905460609
                        • Opcode ID: f35cbd4715a8bb99b3fc737316d10dd04612f03b81eafb01d083df8991313e48
                        • Instruction ID: 6f3ea84dac4c3ab973d097e457ae20ab78802fdeacda1fec450186a20383c47c
                        • Opcode Fuzzy Hash: f35cbd4715a8bb99b3fc737316d10dd04612f03b81eafb01d083df8991313e48
                        • Instruction Fuzzy Hash: 6991923BA29742C5EB249F21D4996B922A4EF86F80F448131DE5D87B86DF3CE951CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Exception$Throw$_invalid_parameter_noinfo_noreturn$FileHeaderRaisenumpunct
                        • String ID:
                        • API String ID: 3072099479-0
                        • Opcode ID: 4fc5fc37c0fae1da19ab6e1a5c2447587416657cec2e8c1098cf424028b65220
                        • Instruction ID: de18c2edacff8aeb7624a5e621fd915e4203ebfe05b388554b0f5df741040f72
                        • Opcode Fuzzy Hash: 4fc5fc37c0fae1da19ab6e1a5c2447587416657cec2e8c1098cf424028b65220
                        • Instruction Fuzzy Hash: CD319366B24A44C9E71CEE32D8961FA1351EFC6BC4F14843AFE4D8BB5ADE39D8414740
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Find_invalid_parameter_noinfo_noreturn$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3168921036-0
                        • Opcode ID: 6cdd3c53aeeb6f0881dc5f539ed506a1846d728464acad09d9698cccd7aff902
                        • Instruction ID: 276152ceb2203f8840885d3465860171532e3f02f1f17e0d9bbb49ff1c582597
                        • Opcode Fuzzy Hash: 6cdd3c53aeeb6f0881dc5f539ed506a1846d728464acad09d9698cccd7aff902
                        • Instruction Fuzzy Hash: 06C19763B28B85C2EA00CB64D4883AD6361FB86BA4F505731EAAD47BDADF7CD544C740
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Crypt$Hash$Context$DestroyRelease$AcquireCreateDataParam
                        • String ID:
                        • API String ID: 1920540483-0
                        • Opcode ID: 648fb0ac9cf4f691533d0b0902547fe64f05b4d3ba1a9a3ec989cefb3ba6ee08
                        • Instruction ID: 5803bbbb9468d5ea99a5a12d7fa4c8139a2a7223cfe92a96b6a87176131b474e
                        • Opcode Fuzzy Hash: 648fb0ac9cf4f691533d0b0902547fe64f05b4d3ba1a9a3ec989cefb3ba6ee08
                        • Instruction Fuzzy Hash: 68313076A28741C2E7508B22E884A6A6765FBC5B84F409532EE8E87B28CF3DD545CB40
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                        • String ID:
                        • API String ID: 3939093798-0
                        • Opcode ID: e8c9d5e2a5ceb8b1f95362ac74c18bf4456879d5540b94a95606b71dfd5e307e
                        • Instruction ID: 3fdfa476a90f2245aa394af3f83e85235f2dec2f046e616f667feab1f93a98fd
                        • Opcode Fuzzy Hash: e8c9d5e2a5ceb8b1f95362ac74c18bf4456879d5540b94a95606b71dfd5e307e
                        • Instruction Fuzzy Hash: 74716D67F2A602C6FF219BA0D8986B823B0BF46B44F444436CE0D83695DF3CE995CB50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ErrorLast$_invalid_parameter_noinfo
                        • String ID: %02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%02hhX%x$SymGetModuleInfo64$SymGetSymFromAddr64
                        • API String ID: 2070757136-3416141836
                        • Opcode ID: f8569300621a515511e6f92a88202ead8c4f4f7487c9b752f1cc367b8f5cee12
                        • Instruction ID: c362f30c101f0541e905165380a676f260c43965cf79d8bd2118cffcf7acd7cc
                        • Opcode Fuzzy Hash: f8569300621a515511e6f92a88202ead8c4f4f7487c9b752f1cc367b8f5cee12
                        • Instruction Fuzzy Hash: A1F1AE33A18AD5C9E7218F25D8883ED3BA5F746B98F404125CA9D9BBC9CF38CA55C740
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                        • String ID:
                        • API String ID: 1239891234-0
                        • Opcode ID: 6eae5d8d90412f52848892a1ac808111895f9f1b9f343c5d79ddcbf7e0702183
                        • Instruction ID: 1852caa977866a8286a812c9ff76e2cac9ddfa8990169d78662f06ee69090be3
                        • Opcode Fuzzy Hash: 6eae5d8d90412f52848892a1ac808111895f9f1b9f343c5d79ddcbf7e0702183
                        • Instruction Fuzzy Hash: E4316277628B81C6E760CF65E8842AE73A0FB89754F540136EB8D83B59DF38D555CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Exception$Throw$FileHeaderRaise_invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 2189741035-0
                        • Opcode ID: de0619971ac5f13b23df4295ff1980f8c7ab9d494c8438cb34e3f6628c8a89a3
                        • Instruction ID: 7761d832a88c5206703e8013a15119fb48b1bbf73abefc20eab003a82707d55b
                        • Opcode Fuzzy Hash: de0619971ac5f13b23df4295ff1980f8c7ab9d494c8438cb34e3f6628c8a89a3
                        • Instruction Fuzzy Hash: 224164A7B24A44C9E71CEF36D8861B92361FF85B84F049436EE4D8BB5ADF78D8518340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: gfffffff
                        • API String ID: 3215553584-1523873471
                        • Opcode ID: 5f1c3d162c23beb3063def48a5ab6333f3c8a65e338ff35a2bf581168b797897
                        • Instruction ID: be2a0a27ddc65cea432521ad51f6e9c5fcd7a76d299ee409d1f19146a702f153
                        • Opcode Fuzzy Hash: 5f1c3d162c23beb3063def48a5ab6333f3c8a65e338ff35a2bf581168b797897
                        • Instruction Fuzzy Hash: B0917E67B2A7C5C6EB15CB2594C83BD6794EB52F80F068031CA5D87796ED3DEA02CB01
                        APIs
                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF674BF83E0
                          • Part of subcall function 00007FF674BE9BB0: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF674BE9B5D), ref: 00007FF674BE9BB9
                          • Part of subcall function 00007FF674BE9BB0: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF674BE9B5D), ref: 00007FF674BE9BDE
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                        • String ID: *?$.
                        • API String ID: 4036615347-3972193922
                        • Opcode ID: e343d81b3ce3eadcbb49aed6d16cb06046c9dc2621003b9d919f78e13c3bcede
                        • Instruction ID: 7487ff129c305570d8b549031db3b8f74878308142205dd7fd291dcd62375c7b
                        • Opcode Fuzzy Hash: e343d81b3ce3eadcbb49aed6d16cb06046c9dc2621003b9d919f78e13c3bcede
                        • Instruction Fuzzy Hash: 41510267B26B95C6EF10CFA698884AD27A0FB4AFD8B444535DE1D97B85DF3CE8018700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: InfoLocaletry_get_function
                        • String ID: GetLocaleInfoEx
                        • API String ID: 2200034068-2904428671
                        • Opcode ID: a6f69096ee4d04491265605dd20f6461fd4f4a42398d4423061803684f0eeb9a
                        • Instruction ID: 454aab86ada210de3b36f9e8d02d98e816591e025095dddbe5e05a750f7d9a5d
                        • Opcode Fuzzy Hash: a6f69096ee4d04491265605dd20f6461fd4f4a42398d4423061803684f0eeb9a
                        • Instruction Fuzzy Hash: 1501816AB28B81C2E7409B56B8844AAA670BF99FD0F584036DE4C97B69CE3CD9458740
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: FileFindFirst
                        • String ID:
                        • API String ID: 1974802433-0
                        • Opcode ID: 1dff032896a1aad533774f4b23f1814eb4bb81789b8ffd324186cea2847a20a8
                        • Instruction ID: d82ccec72b041c4b8571954775378ee27c54e5c8d1b826fd2b9057bece59bb0c
                        • Opcode Fuzzy Hash: 1dff032896a1aad533774f4b23f1814eb4bb81789b8ffd324186cea2847a20a8
                        • Instruction Fuzzy Hash: 92113A37B29685C2E7108B15E48836D77A0F789FA8F544225DB6C977A5CF7CD884CB40
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: b591bd749d6bfe140b1a1974f433969c5747222616435fbbab0be626e6390a61
                        • Instruction ID: 7871111e7eef6a6d4739538147dd4bea93a365d7cbea27bcf3d09accafe87ccc
                        • Opcode Fuzzy Hash: b591bd749d6bfe140b1a1974f433969c5747222616435fbbab0be626e6390a61
                        • Instruction Fuzzy Hash: 78B09221E27A02C2FA08AB656CCA21422B46F48B10F98403AC00C81330DE3C24E6AB10

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1550 7ff674bbb1e0-7ff674bbb2c9 call 7ff674bca200 GetSystemTime call 7ff674be2df0 call 7ff674bb4770 1557 7ff674bbb2d0-7ff674bbb2d8 1550->1557 1557->1557 1558 7ff674bbb2da-7ff674bbb314 call 7ff674bca200 1557->1558 1561 7ff674bbb349-7ff674bbb35c call 7ff674bb6720 1558->1561 1562 7ff674bbb316-7ff674bbb347 call 7ff674be22d0 1558->1562 1566 7ff674bbb361-7ff674bbb371 1561->1566 1562->1566 1567 7ff674bbb373-7ff674bbb389 1566->1567 1568 7ff674bbb3a9-7ff674bbb3c4 1566->1568 1571 7ff674bbb3a4 call 7ff674bdedf4 1567->1571 1572 7ff674bbb38b-7ff674bbb39e 1567->1572 1569 7ff674bbb556-7ff674bbb57c GetTempPathW 1568->1569 1570 7ff674bbb3ca-7ff674bbb3f2 call 7ff674bcc410 1568->1570 1575 7ff674bbb580-7ff674bbb588 1569->1575 1581 7ff674bbb3f4 1570->1581 1582 7ff674bbb3f7-7ff674bbb40b 1570->1582 1571->1568 1572->1571 1573 7ff674bbb76c-7ff674bbb771 call 7ff674be9b80 1572->1573 1587 7ff674bbb772-7ff674bbb777 call 7ff674be9b80 1573->1587 1575->1575 1577 7ff674bbb58a-7ff674bbb5c2 call 7ff674bca200 1575->1577 1588 7ff674bbb5c4-7ff674bbb5f9 call 7ff674be22d0 1577->1588 1589 7ff674bbb5fb-7ff674bbb60e call 7ff674bb6720 1577->1589 1581->1582 1585 7ff674bbb439-7ff674bbb44b call 7ff674bb6720 1582->1585 1586 7ff674bbb40d-7ff674bbb437 call 7ff674be22d0 1582->1586 1597 7ff674bbb450-7ff674bbb477 1585->1597 1586->1597 1600 7ff674bbb778-7ff674bbb77d call 7ff674be9b80 1587->1600 1599 7ff674bbb613-7ff674bbb639 1588->1599 1589->1599 1601 7ff674bbb4a9-7ff674bbb4bb call 7ff674bb6720 1597->1601 1602 7ff674bbb479-7ff674bbb4a7 call 7ff674be22d0 1597->1602 1604 7ff674bbb64c-7ff674bbb654 1599->1604 1605 7ff674bbb63b-7ff674bbb64a call 7ff674bb1350 1599->1605 1621 7ff674bbb77e-7ff674bbb783 call 7ff674be9b80 1600->1621 1611 7ff674bbb4c0-7ff674bbb4c7 1601->1611 1602->1611 1608 7ff674bbb656-7ff674bbb66c 1604->1608 1609 7ff674bbb68c-7ff674bbb694 1604->1609 1605->1609 1614 7ff674bbb66e-7ff674bbb681 1608->1614 1615 7ff674bbb687 call 7ff674bdedf4 1608->1615 1618 7ff674bbb696-7ff674bbb6ad 1609->1618 1619 7ff674bbb6cd-7ff674bbb6d2 1609->1619 1616 7ff674bbb4e2-7ff674bbb4ea 1611->1616 1617 7ff674bbb4c9-7ff674bbb4e0 call 7ff674bb1350 1611->1617 1614->1600 1614->1615 1615->1609 1627 7ff674bbb522-7ff674bbb52a 1616->1627 1628 7ff674bbb4ec-7ff674bbb502 1616->1628 1617->1627 1625 7ff674bbb6af-7ff674bbb6c2 1618->1625 1626 7ff674bbb6c8 call 7ff674bdedf4 1618->1626 1629 7ff674bbb6d4 1619->1629 1630 7ff674bbb6d7-7ff674bbb6e7 SHCreateDirectoryExW 1619->1630 1641 7ff674bbb784-7ff674bbb789 call 7ff674be9b80 1621->1641 1625->1621 1625->1626 1626->1619 1638 7ff674bbb52f-7ff674bbb53c SHCreateDirectoryExW 1627->1638 1639 7ff674bbb52c 1627->1639 1634 7ff674bbb504-7ff674bbb517 1628->1634 1635 7ff674bbb51d call 7ff674bdedf4 1628->1635 1629->1630 1636 7ff674bbb6f9 1630->1636 1637 7ff674bbb6e9-7ff674bbb6ee 1630->1637 1634->1587 1634->1635 1635->1627 1640 7ff674bbb6fb-7ff674bbb704 1636->1640 1637->1636 1643 7ff674bbb6f0-7ff674bbb6f3 1637->1643 1638->1636 1644 7ff674bbb542-7ff674bbb547 1638->1644 1639->1638 1646 7ff674bbb739-7ff674bbb76b 1640->1646 1647 7ff674bbb706-7ff674bbb71d 1640->1647 1643->1636 1649 7ff674bbb6f5-7ff674bbb6f7 1643->1649 1644->1636 1645 7ff674bbb54d-7ff674bbb550 1644->1645 1645->1569 1645->1636 1650 7ff674bbb71f-7ff674bbb732 1647->1650 1651 7ff674bbb734 call 7ff674bdedf4 1647->1651 1649->1640 1650->1641 1650->1651 1651->1646
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$CreateDirectory$PathSystemTempTime
                        • String ID: $Stack Trace of Crashed Thread %d:$== [end of %S] ==$Additional report files:$Crash Report metadata:$Stacks for Running Threads:$ * %s"%s" (%s)$ * '%s' = '%s'$ * App Name: %s$ * App Version: %s$ * Bug Reporter App Path: %s$ * Crash Report Path: %s$ * Is Editor: %s$ * Mono DLL: %s$%04d-%02d-%02d_%02d%02d%02d%03d$%s %s in module %s at %04x:%08x.$%s by %s [version: %s]$%s caused %s (0x%08x) in module %s at %04x:%08x.$%s location %08p caused an access violation.$Call Stack for Thread %d:$Disk space data for '%s' is unavailable.$Disk space data for '%s': %llu bytes free of %llu total.$Exception encountered during stack walk.$MISSING: $Read from$Write to$\Crash_$error.log$false$true
                        • API String ID: 2796418479-3009404257
                        • Opcode ID: 55a3c230471076c1123f839388838ac72df7a792750d648c74c177055a5dabd3
                        • Instruction ID: c006d73622bbeba2d671babec0afe64890cb794e9e73e845bb56671c3dc31d76
                        • Opcode Fuzzy Hash: 55a3c230471076c1123f839388838ac72df7a792750d648c74c177055a5dabd3
                        • Instruction Fuzzy Hash: 60F1C263B28B91C5EB108B69D4C82BD6371FB85B98F504632DE9D83AA9DF7CD944C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: *http://msdl.microsoft.com/download/symbols;$CreateToolhelp32Snapshot$Error while initializing dbghelp.dll$Module32First$Module32Next$SRV*$SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols;$SYSTEMDRIVE$SYSTEMROOT$\system32$\websymbols$_NT_ALTERNATE_SYMBOL_PATH$_NT_SYMBOL_PATH$kernel32.dll$tlhelp32.dll
                        • API String ID: 1452528299-182580123
                        • Opcode ID: afcb80269c5e635c447c9b58a1e019107f11ddc5bb5d275191d9c6436535e46e
                        • Instruction ID: 536834ac15397a3cf415ae560e4299ef75459d71843450c90f9841909968b2ab
                        • Opcode Fuzzy Hash: afcb80269c5e635c447c9b58a1e019107f11ddc5bb5d275191d9c6436535e46e
                        • Instruction Fuzzy Hash: 50E17367628782C6E7219B51ECD83EA2365FF8AF80F845032DA4E87B94DE3DD945C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Library$Free$LoadResource$AddressEnumFindMessageNamesProcSend
                        • String ID: %s - %s
                        • API String ID: 763271029-125065292
                        • Opcode ID: 45b8bc24ea8abf7947a60b8aa8ef0da6f9b1c9f5a01dc484ba12212f02db5cbd
                        • Instruction ID: 5aab0b293d61fabdc351675fe91d7e896225e8a060932e9eab4bdbde6b3e032c
                        • Opcode Fuzzy Hash: 45b8bc24ea8abf7947a60b8aa8ef0da6f9b1c9f5a01dc484ba12212f02db5cbd
                        • Instruction Fuzzy Hash: 85514166A28A46C1EA289F62A89C7797364FF86F45F544036DE4E87364EF3CEC448700
                        APIs
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3AE7
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3B06
                          • Part of subcall function 00007FF674BF3370: GetProcAddress.KERNEL32(?,00000000,0000000100000006,00007FF674BF3736,?,?,?,00007FF674BF57A3,?,?,?,00007FF674BEA03D), ref: 00007FF674BF34C8
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3B25
                          • Part of subcall function 00007FF674BF3370: LoadLibraryExW.KERNEL32(?,00000000,0000000100000006,00007FF674BF3736,?,?,?,00007FF674BF57A3,?,?,?,00007FF674BEA03D), ref: 00007FF674BF3413
                          • Part of subcall function 00007FF674BF3370: GetLastError.KERNEL32(?,00000000,0000000100000006,00007FF674BF3736,?,?,?,00007FF674BF57A3,?,?,?,00007FF674BEA03D), ref: 00007FF674BF3421
                          • Part of subcall function 00007FF674BF3370: LoadLibraryExW.KERNEL32(?,00000000,0000000100000006,00007FF674BF3736,?,?,?,00007FF674BF57A3,?,?,?,00007FF674BEA03D), ref: 00007FF674BF3463
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3B44
                          • Part of subcall function 00007FF674BF3370: FreeLibrary.KERNEL32(?,00000000,0000000100000006,00007FF674BF3736,?,?,?,00007FF674BF57A3,?,?,?,00007FF674BEA03D), ref: 00007FF674BF349C
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3B63
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3B82
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3BA1
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3BC0
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3BDF
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3BFE
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: try_get_function$Library$Load$AddressErrorFreeLastProc
                        • String ID: AreFileApisANSI$CompareStringEx$EnumSystemLocalesEx$GetDateFormatEx$GetLocaleInfoEx$GetTimeFormatEx$GetUserDefaultLocaleName$IsValidLocaleName$LCIDToLocaleName$LCMapStringEx$LocaleNameToLCID
                        • API String ID: 3255926029-3252031757
                        • Opcode ID: 9fec8168214f1b0824420edbfabf9752efc4b1cdafac9b821f145d4c5cf143ab
                        • Instruction ID: 3d1a13789e6bf735752602cb0f49920782c15bf6ad052805b6a20c964303284b
                        • Opcode Fuzzy Hash: 9fec8168214f1b0824420edbfabf9752efc4b1cdafac9b821f145d4c5cf143ab
                        • Instruction Fuzzy Hash: 0131A6E6979A8BE1EA04EB54E8E95F42331AF45340FC05133D40DCB1A5AE3CA649C794
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: File$Library$AddressAttributesCloseCreateDeleteErrorFreeHandleLastLoadProcProcessThread
                        • String ID: C:\buildslave\unity\build\PlatformDependent/Win/UnityCrashHandler/CrashHandlerWindows.cpp$Exception encountered during stack walk of thread %d$Failed to cache crash report.$Failed to copy "%s" to crash report folder at "%S"$Failed to generate minidump at '%S' (%x)$Failed to launch bug reporter: "%s"$Launching custom bug reporter with command line: %S$Thread %d
                        • API String ID: 3644900697-3521647862
                        • Opcode ID: 11ba5778a750d0f6db0b85955d1ae1edce776f4be7f6a8e0e386b1587938906b
                        • Instruction ID: 703cc32867fcbae2232e349ce0705b3acd601714e2bf3414eaeae3c4cbb478dd
                        • Opcode Fuzzy Hash: 11ba5778a750d0f6db0b85955d1ae1edce776f4be7f6a8e0e386b1587938906b
                        • Instruction Fuzzy Hash: D022A233628B81C6EB20CF64D8C82ED3761FB45B98F904132EA5D87AA9DF78D945C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ObjectSingleWait$CloseHandleThread$CodeCriticalExitLibrarySection$AddressBuffersEnterErrorFileFlushFreeLastLeaveLoadProcTerminate
                        • String ID: CancelSynchronousIo$Kernel32.dll
                        • API String ID: 128390033-1913859945
                        • Opcode ID: df5fe578fda47d3757a12a19d1677be107bceaee43c97a1a23e0623757df2af1
                        • Instruction ID: c032851568e916e3fa97c62cd5e0e2f144307302f09f2eae39378a8a892fa1e9
                        • Opcode Fuzzy Hash: df5fe578fda47d3757a12a19d1677be107bceaee43c97a1a23e0623757df2af1
                        • Instruction Fuzzy Hash: F9410277A28A42D2EB548B55D9981286330FF85B75B548332D77E836E0DF3CE8A5C700
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: RectWindow$Item$Offset$IconInfoMessageObjectSend$AdjustInflateLongUnion
                        • String ID:
                        • API String ID: 1989563074-0
                        • Opcode ID: 668e0612f225a05eaa94e63df751affccd4d2ba9f2cc909011d32ed68ec52d42
                        • Instruction ID: 2a0cd7065007bf1614e8c49fe58d31c8621fa25adfb20475b6ac9367256db5fa
                        • Opcode Fuzzy Hash: 668e0612f225a05eaa94e63df751affccd4d2ba9f2cc909011d32ed68ec52d42
                        • Instruction Fuzzy Hash: 03713C72B24641CBE720CFA5E89469D77B1FB88B98F004535DE0AA7B68DF38D905CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Create$CloseDirectoryFileHandle
                        • String ID: .meta$UCRM
                        • API String ID: 2152796283-1712913608
                        • Opcode ID: b98a06d280fa9aed44bcad48ee088e9614d49ea21f7fa5751551f55860f0557c
                        • Instruction ID: 0921803577879572ff1c187ebbb998bbf20b7d221508ea3f6a72d7dc0ac30b70
                        • Opcode Fuzzy Hash: b98a06d280fa9aed44bcad48ee088e9614d49ea21f7fa5751551f55860f0557c
                        • Instruction Fuzzy Hash: 94B19063B28B82C5EB108B64D4883ED6371EB46BA8F604236DE6D476D9DF3CD945C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressHandleProc__scrt_fastfail$Module$CloseCreateCriticalDeleteEventSectiontry_get_function
                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                        • API String ID: 3696669160-1714406822
                        • Opcode ID: bf25ea55a01288073ceacc5e84419815321b1eb6fbce0fc48e77c01169355f9c
                        • Instruction ID: 1a2f1faaf8dc7741022f50d5ab30dd483f57558ea325bd95a6cd50267cb1aeba
                        • Opcode Fuzzy Hash: bf25ea55a01288073ceacc5e84419815321b1eb6fbce0fc48e77c01169355f9c
                        • Instruction Fuzzy Hash: 68411E6AF3DA02C2FE14DB65ACDD2742361AF45B84F585476DA0EC27A9DE2CFC458700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: File$Delete$FindFirst
                        • String ID: .. %S: $%s$--no-delete$.meta$Done.$Found %u potential reports:$Unknown error
                        • API String ID: 2157329964-2449892357
                        • Opcode ID: 6de8490490efd8f9af3ee945eb9191bc6fd454be4dbe19b26bcd191da3d05c99
                        • Instruction ID: fdade4f06ff0712865166dd6849fc7bddca4566651b1ae0c95808d20d4a0152a
                        • Opcode Fuzzy Hash: 6de8490490efd8f9af3ee945eb9191bc6fd454be4dbe19b26bcd191da3d05c99
                        • Instruction Fuzzy Hash: C1A1C463F24A42C5EF00DB65D8C83BC2361AF46BA8F514672DA6C976D9DE3CE885C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$CloseHandleThread$FileOpenWritelstrlen
                        • String ID: $Stack Trace of Crashed Thread %d:$== [end of %S] ==$Stacks for Running Threads:$Call Stack for Thread %d:$Exception encountered during stack walk.$Mono DLL loaded successfully at '%S'.$error.log
                        • API String ID: 986948292-1968516911
                        • Opcode ID: 79cc5c44f63735a87bed86f10e8cca9b324e4a7a8f96b098e6b3ffe12debf753
                        • Instruction ID: 8ff96bc98e0e5bbcc99d630b0dbcc0cde82ab979f539c031a94f0b1730298b51
                        • Opcode Fuzzy Hash: 79cc5c44f63735a87bed86f10e8cca9b324e4a7a8f96b098e6b3ffe12debf753
                        • Instruction Fuzzy Hash: C1711F63B28A42C1EE14DB55E8C82AD2321AF46FE8F505236DA6D877E5DF7CE845C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$CloseHandleThread$FileOpenWritelstrlen
                        • String ID: $Stack Trace of Crashed Thread %d:$== [end of %S] ==$Stacks for Running Threads:$Call Stack for Thread %d:$Exception encountered during stack walk.$No mono DLL path set. This app is either running IL2CPP, or the crash occurred before mono was initialized.$error.log
                        • API String ID: 986948292-1046320450
                        • Opcode ID: 46e6a4ce24f60874e8736beaee3ccfbfce8443340059cffd4da6c2c8d080c603
                        • Instruction ID: 335021d06ff78fe109e637179ca55c19b2613f05eaf1ac05258bc93725b3affb
                        • Opcode Fuzzy Hash: 46e6a4ce24f60874e8736beaee3ccfbfce8443340059cffd4da6c2c8d080c603
                        • Instruction Fuzzy Hash: A6711F63B28A42C1EE10DB55E8C82AD2321AF46FE8F505236DA6D877E5DF7CE445C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$CloseHandleThread$FileOpenWritelstrlen
                        • String ID: $Stack Trace of Crashed Thread %d:$== [end of %S] ==$Stacks for Running Threads:$*** WARNING ***Managed call stack frames will be incorrect or missing.The Mono DLL at '%S' does not provide out-of-process stack information support.Upgrade to a newer version of the Mono Scripting Runtime for more detailed debug information.$Call Stack for Thread %d:$Exception encountered during stack walk.$error.log
                        • API String ID: 986948292-752006956
                        • Opcode ID: 9ba06fe0c01b8e8d7d320a7f2988858b2e6a5a7d6b60da22cbe48289b08705fa
                        • Instruction ID: 83bb0f1a4459ee4ddda69a94a19a93cf252077cfe42d12c8e12681259bc26842
                        • Opcode Fuzzy Hash: 9ba06fe0c01b8e8d7d320a7f2988858b2e6a5a7d6b60da22cbe48289b08705fa
                        • Instruction Fuzzy Hash: 3C711F63B28A42C1EE14DB55E8C82AD2321AF46FE8F505236DA6D877E5DF7CE845C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$CloseHandleThread$FileOpenWritelstrlen
                        • String ID: $Stack Trace of Crashed Thread %d:$== [end of %S] ==$Stacks for Running Threads:$*** WARNING ***Mono DLL loaded successfully at '%S' but failed to read Mono Function Access Tables. Stack frames may be missing or corrupt.$Call Stack for Thread %d:$Exception encountered during stack walk.$error.log
                        • API String ID: 986948292-514524435
                        • Opcode ID: de2670782bafd3cf3e47e3a08968a3fe14e7c590f2db976343f2c33748240aac
                        • Instruction ID: ca876cce0273df6b3f3e1a0281225810890e9fb849956de4ec13e9df1a341519
                        • Opcode Fuzzy Hash: de2670782bafd3cf3e47e3a08968a3fe14e7c590f2db976343f2c33748240aac
                        • Instruction Fuzzy Hash: F3711F63B28A42C1EE14DB55E8C82AD2321AF46FE8F505236DA6D877E5DF7CE845C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$CloseHandleThread$FileOpenWritelstrlen
                        • String ID: $Stack Trace of Crashed Thread %d:$== [end of %S] ==$Stacks for Running Threads:$*** WARNING ***Managed call stack frames will be incorrect or missing because the Mono DLL at '%S' could not be found.$Call Stack for Thread %d:$Exception encountered during stack walk.$error.log
                        • API String ID: 986948292-3983709894
                        • Opcode ID: ea8755e1ed472cba79905538f7fc232a6a80d096019df268bb4eef5f942456f9
                        • Instruction ID: 739345f0f8ea480fb3bc0216f169516b1108b07082969217d751b994d4375daf
                        • Opcode Fuzzy Hash: ea8755e1ed472cba79905538f7fc232a6a80d096019df268bb4eef5f942456f9
                        • Instruction Fuzzy Hash: 0F711F63B28A42C1EE14DB55E8C82AD2321AF46FE8F505236DA6D877E5DF7CE845C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$CloseHandleThread$FileOpenWritelstrlen
                        • String ID: $Stack Trace of Crashed Thread %d:$== [end of %S] ==$Stacks for Running Threads:$*** WARNING ***Mono DLL loaded successfully at '%S' but failed to read Mono stack frame memory. Stack frames may be missing or corrupt.$Call Stack for Thread %d:$Exception encountered during stack walk.$error.log
                        • API String ID: 986948292-1825997390
                        • Opcode ID: c9bcc1342d4e65b9dc259d504e7bab2340e4280a281ccd059f9d10d21f3031af
                        • Instruction ID: 47bfe71e08216d13fa3b0228b8c5e999695d46a74ecfb3fce88bad4b3ba4ffda
                        • Opcode Fuzzy Hash: c9bcc1342d4e65b9dc259d504e7bab2340e4280a281ccd059f9d10d21f3031af
                        • Instruction Fuzzy Hash: F2711E63B28A42C1EE14DB55E8C82AD2321AF46FE8F505236DA6D877E5DF7CE845C304
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: EnumProcessModules$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$LoadModule$psapi.dll
                        • API String ID: 2238633743-3874924332
                        • Opcode ID: b114bf7f60066f6fe7fc5c0f9f1c2ed9103db084501950f03bd6e0600bb29bce
                        • Instruction ID: 6bd91ea78e39a6a3cce363a2da81c9d0f04d3aacdfb14fe0acb71ef556635e1e
                        • Opcode Fuzzy Hash: b114bf7f60066f6fe7fc5c0f9f1c2ed9103db084501950f03bd6e0600bb29bce
                        • Instruction Fuzzy Hash: 6D51B567A29B82C2EA149B16A88C77A67A4FF8AFC4F444131DE4D87764DF3CD844C704
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ItemMessageSend$HandleImageLoadModule$DialogEventTextWindow
                        • String ID:
                        • API String ID: 123748578-0
                        • Opcode ID: c6bd56d523fc3c07a327624f8c00d311f112be2cc3b93d4ff85f516c36ea9ec0
                        • Instruction ID: 49fa834e0011d911e5702e209dd99675752f3de5d66bbe9b27c5371f0ce68f76
                        • Opcode Fuzzy Hash: c6bd56d523fc3c07a327624f8c00d311f112be2cc3b93d4ff85f516c36ea9ec0
                        • Instruction Fuzzy Hash: 2C51B872A38745C7E7159B22F8985A97361FF89B84F048231DA4D83FA5CF3CE9958B04
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$ByteCharMultiWide
                        • String ID: <appName>$<crashReportPath>$<vendor>$<version>
                        • API String ID: 469901203-2133340668
                        • Opcode ID: c1aa861fa68c66049ff8dcf1a1d7ebe9def7dae2a0431c189f1ddbc6f242d20b
                        • Instruction ID: 3a6d794002cba5703a0472cdcc9ed2abb47efda931de4cafde139d6ff29622b0
                        • Opcode Fuzzy Hash: c1aa861fa68c66049ff8dcf1a1d7ebe9def7dae2a0431c189f1ddbc6f242d20b
                        • Instruction Fuzzy Hash: 39817063B24A56C4FF04DB69D8D83AC2331BB46B98F904235DA6C96ADADF2CD585C340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressFreeLibraryProc$Init_thread_footerLoadPathTaskTemp
                        • String ID: SHGetFolderPathW$SHGetKnownFolderPath$Shell32.dll
                        • API String ID: 2960521507-337183102
                        • Opcode ID: 10340792aa236ccefce6233e9b6487504341c65f47c02d460fb09a61e9aee6d0
                        • Instruction ID: 8cbcb30bd96c5695f700c67b7278feed379077128021937765bf8eb5957288a0
                        • Opcode Fuzzy Hash: 10340792aa236ccefce6233e9b6487504341c65f47c02d460fb09a61e9aee6d0
                        • Instruction Fuzzy Hash: 61517067A2CA82C1EA60DF14E8C82B96370FF85B50F445236DA4D836A5DF7CE985D740
                        APIs
                          • Part of subcall function 00007FF674BBF7A0: CreateFileW.KERNEL32(?,?,?,?,?,?,?,00000000,00007FF674BD7BE4), ref: 00007FF674BBF7D2
                          • Part of subcall function 00007FF674BBF7A0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000000,00007FF674BD7BE4), ref: 00007FF674BBF88A
                          • Part of subcall function 00007FF674BB17C0: CryptAcquireContextA.ADVAPI32 ref: 00007FF674BB1826
                          • Part of subcall function 00007FF674BB17C0: CryptCreateHash.ADVAPI32 ref: 00007FF674BB184F
                          • Part of subcall function 00007FF674BB17C0: CryptHashData.ADVAPI32 ref: 00007FF674BB1867
                          • Part of subcall function 00007FF674BB17C0: CryptGetHashParam.ADVAPI32 ref: 00007FF674BB1897
                          • Part of subcall function 00007FF674BB17C0: CryptDestroyHash.ADVAPI32 ref: 00007FF674BB18A6
                          • Part of subcall function 00007FF674BB17C0: CryptReleaseContext.ADVAPI32 ref: 00007FF674BB18B3
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD51A9
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD51AF
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD51B5
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD51BB
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD51C1
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD51C7
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD51CD
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$Crypt$Hash$ContextCreate$AcquireCloseDataDestroyFileHandleParamRelease
                        • String ID: .meta$UCRM
                        • API String ID: 3834263306-1712913608
                        • Opcode ID: 33500c2ad8d3127221bd27d97312e8fe6904f773155ea4c874a19060aedc4e26
                        • Instruction ID: f62483d52c25f9da9dbb97b0199e60ed75e52adf7b34a13d9cd7814177f1f716
                        • Opcode Fuzzy Hash: 33500c2ad8d3127221bd27d97312e8fe6904f773155ea4c874a19060aedc4e26
                        • Instruction Fuzzy Hash: C1C1A363F28B42C6FB04CF74D4C83AC2361AB46BA8F114671DA6D56AD9DE38E995C340
                        APIs
                          • Part of subcall function 00007FF674BB4380: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BB44C9
                          • Part of subcall function 00007FF674BB4380: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BB44CF
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD6390
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD6396
                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF674BD63A2
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn
                        • String ID: --%s--$--%sContent-Disposition: form-data; name="%s"%s$--%sContent-Disposition: form-data; name="file"; filename="data.crashreportevent.gz"Content-Type: application/octet-stream$1.0$lan$ver
                        • API String ID: 3668304517-3328288363
                        • Opcode ID: 921d458d9082183e9415c28ff8730c392c3fc8883c3a234b004c38a19a239e3f
                        • Instruction ID: 0d98e4d9c46d68c0b1fe69fb4cc7c3ec8423de8599d7ff85a74e9ded1c31be3f
                        • Opcode Fuzzy Hash: 921d458d9082183e9415c28ff8730c392c3fc8883c3a234b004c38a19a239e3f
                        • Instruction Fuzzy Hash: 1F81A373B25A82D5EB00DF79C4C82AC2361EB4ABA8F504632EA5C47AD9DF38D555C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                        • API String ID: 3215553584-2617248754
                        • Opcode ID: 8a668d4b4726c9fa7fadc2095bbf885e88916b9bfddfa1fa4f85e34511f3bab3
                        • Instruction ID: 9a31beb8cdc13305384f009539b0a7dcd832870655dacbbcd1ee6d956cb79922
                        • Opcode Fuzzy Hash: 8a668d4b4726c9fa7fadc2095bbf885e88916b9bfddfa1fa4f85e34511f3bab3
                        • Instruction Fuzzy Hash: 8D41AC76A29B41D9EB00CF65E8943A933A4EB59784F404136EE4C87B99EE38D525C344
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcProcess
                        • String ID: DBGHELP.DLL$ERROR: DumpMiniDump: MiniDumpWriteDump function in dbghelp.dll not found$ERROR: DumpMiniDump: dbghelp.dll not found$MiniDumpWriteDump$writing minidump
                        • API String ID: 2567765581-2447102719
                        • Opcode ID: 8747b28ce1e8475d8377a1d45b1c4d362e15d9341d721b5d59517c1b319e4dd9
                        • Instruction ID: 4ff4102c841758715cc59bd28ff88ac200b25116b277e4d843e0841132f1cf2c
                        • Opcode Fuzzy Hash: 8747b28ce1e8475d8377a1d45b1c4d362e15d9341d721b5d59517c1b319e4dd9
                        • Instruction Fuzzy Hash: 5E219573A29781C1EA14CF51E88507A73A4BF85B90F584236EB5D83BA4DF3CE9158B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: MemoryProcessRead$FileWritelstrlen
                        • String ID: $%08x $0x%08x: $Stack Memory [0x%p-0x%p]:
                        • API String ID: 2370251862-1710592808
                        • Opcode ID: d639a387d0bc25807232437f7daa4cda3e4b80040bd11fd9967a086b4262753b
                        • Instruction ID: 16ec83f66a173b09a0937c8d2b3f9f92650d72fa6f6bf83aa505fa4357f758fb
                        • Opcode Fuzzy Hash: d639a387d0bc25807232437f7daa4cda3e4b80040bd11fd9967a086b4262753b
                        • Instruction Fuzzy Hash: 53519563A38B81C6E7549B15E88476A77A4FB89BC4F501035EE8A83B54DF7CD905CF00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID: %$C:\buildslave\unity\build\PlatformDependent/Win/FileInformation.cpp$CompanyName$FileDescription$ProductName$\VarFileInfo\Translation
                        • API String ID: 3660427363-3676721554
                        • Opcode ID: 735e694d8817948259c8fccb2274c6f9029893ac13ddbc3d8a7d2b50918e51fc
                        • Instruction ID: 1d454cba90c16d40b3e6fd08152bb56babd5c7e4b1c62b4e39caa715faecf9ad
                        • Opcode Fuzzy Hash: 735e694d8817948259c8fccb2274c6f9029893ac13ddbc3d8a7d2b50918e51fc
                        • Instruction Fuzzy Hash: B7519D676286C2D5EB28DF61E5846AA7360FB85F84F108036EE4C83B65DF3CE496C704
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: %s.%s()$<unknown class>$<unknown method>$Mono JIT Code$gfffffff$mono_unity_oop_get_stack_frame_details
                        • API String ID: 190572456-1718206740
                        • Opcode ID: e2f1a42fea6eaeb353ab4f0e8a5aaec911d6404b59da946f6bba33d77395855d
                        • Instruction ID: b6ad4c6be4acf4e6764f81e363ea69818ad481c0fff262758617353287b5f543
                        • Opcode Fuzzy Hash: e2f1a42fea6eaeb353ab4f0e8a5aaec911d6404b59da946f6bba33d77395855d
                        • Instruction Fuzzy Hash: B241B563A28B86D1EB60DB11E4883EA6364FB89B84F544176DB8CC3798DF3CD945CB41
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Callback64EntryFunctionLoadModuleRegister
                        • String ID: Failed to load virtual Mono module at 0x%llx-0x%llx[%d].$Failed to register the managed symbol callback.$Loaded virtual Mono module at 0x%llx-0x%llx[%d].$Mono JIT Code$gfffffff
                        • API String ID: 361628767-1706860466
                        • Opcode ID: fbc5f81c1952ffbbe23b2df25443e6d98cc2804ef11bf77ad5b8e28d06a31f3d
                        • Instruction ID: 7ba63f75b0f7e6d4cee70db1f5ed4ff44b503b3df9e50ddfe896a87ae4850a2f
                        • Opcode Fuzzy Hash: fbc5f81c1952ffbbe23b2df25443e6d98cc2804ef11bf77ad5b8e28d06a31f3d
                        • Instruction Fuzzy Hash: 1A4186B6628A86C2DB10CF22E8882697364F788B88F554036DF4C87B18DF38E445CB04
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CloseHandle$CreateEvent
                        • String ID: UnityCrashHandlerResp_%u$UnityCrashHandler_%u
                        • API String ID: 1371578007-1038460846
                        • Opcode ID: 74d58728cd6aa7c7001de05716dc8ea364e9cde6ba76bb681466bc7bd896c386
                        • Instruction ID: d1d4399abd86f9272b823c852f916d09df6f9e1e4bf3f148a3ceba7541e9952f
                        • Opcode Fuzzy Hash: 74d58728cd6aa7c7001de05716dc8ea364e9cde6ba76bb681466bc7bd896c386
                        • Instruction Fuzzy Hash: 94316377628A41D1E7208B65E8882697366FB85FB4F548332DA7D836E8DF3CD905C340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CloseHandleOpenProcess_invalid_parameter_noinfo
                        • String ID: --terminate$--wait-for-user$Couldn't attach to process PID %d$Usage: %S <process ID> <shared region address>
                        • API String ID: 2858867034-2257041809
                        • Opcode ID: 801d8f1245ae5fd13e8571f6bb69e1db22c098d7835370bc15f306bd153226f4
                        • Instruction ID: d73c472124dbdd98b981b1c03c0c6b4b0c3688d4573071b20dfabe1875d1892c
                        • Opcode Fuzzy Hash: 801d8f1245ae5fd13e8571f6bb69e1db22c098d7835370bc15f306bd153226f4
                        • Instruction Fuzzy Hash: C951A327A38657C1EA018B09D8D81B83760FF46F95F545232CA2E977A4DF78EC56C304
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$CriticalEnterFacet_GetcollRegisterSection_invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 237769769-0
                        • Opcode ID: 03aa59030590b70dc1a9b587bc8de336405bcb217181e22deec5ad724c6a29a5
                        • Instruction ID: 58ff6f7894f5b02889fc8c27529c6b6fc1e421e71c96323690bc379611de7b9c
                        • Opcode Fuzzy Hash: 03aa59030590b70dc1a9b587bc8de336405bcb217181e22deec5ad724c6a29a5
                        • Instruction Fuzzy Hash: DA515223A29A92C1EA25DB15E4C93BD6360FF96F90F484136EA5D87796DF7CE841C300
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$CriticalEnterFacet_GetcollRegisterSection_invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 237769769-0
                        • Opcode ID: 09bb33afaa0270cefd38ac91c38422941ed996d6c7b4946fe73720351ad25608
                        • Instruction ID: a0462355f168ace141347a16ec2a06f3af4775eb92442346aa05889f7627d8f2
                        • Opcode Fuzzy Hash: 09bb33afaa0270cefd38ac91c38422941ed996d6c7b4946fe73720351ad25608
                        • Instruction Fuzzy Hash: 43518423E29A42C1EE65DB15E4C93BD6360EF96F90F444236DA5D87796DE7CE881C300
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CurrentThread$ProcessThread32$FirstNextOpenSuspend
                        • String ID:
                        • API String ID: 3333453814-0
                        • Opcode ID: 19fd01300f90b48a5436e3b1f9113beed70fb3b15849fa8f98ac85e84a55fe10
                        • Instruction ID: c9252898e9fad5315bb2ed1842fe8865dd49d29c0cadf1b474701bac6a79975d
                        • Opcode Fuzzy Hash: 19fd01300f90b48a5436e3b1f9113beed70fb3b15849fa8f98ac85e84a55fe10
                        • Instruction Fuzzy Hash: F4519E73628B42C6EB648F25E58422977A1FB85F98F144231DA9D837A9DF38DC52CB00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressProc$ExceptionMemoryProcessReadThrow
                        • String ID: mono_unity_oop_get_dynamic_function_access_table64$mono_unity_oop_iterate_dynamic_function_access_tables64
                        • API String ID: 335310736-809575544
                        • Opcode ID: d138e9287d3c99f904c9395dc5dfed220a777b0259821cef0209412bfd62ccc8
                        • Instruction ID: cebbb94bff0d853c79168e0ce4719f03da017ed0c49f75f7e1be103ebbfe0b5f
                        • Opcode Fuzzy Hash: d138e9287d3c99f904c9395dc5dfed220a777b0259821cef0209412bfd62ccc8
                        • Instruction Fuzzy Hash: 59415927A24B52C6EB11CF65E8842E823B0FB48B98F545532DE0D83B99DF38D989C310
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ExceptionThrow
                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                        • API String ID: 432778473-1866435925
                        • Opcode ID: 50800d030e08b325d252e6ad05e330eebee7c6b53bb9d70c6c7cad164211c6ff
                        • Instruction ID: 42643a9c97199ef1f366db5a2408f6acd9af10e2c717f19554d62cfd40bbb199
                        • Opcode Fuzzy Hash: 50800d030e08b325d252e6ad05e330eebee7c6b53bb9d70c6c7cad164211c6ff
                        • Instruction Fuzzy Hash: D1115163A38607D6FA14EB14D4C91FE2361EF92B44F805532E64EC65A6EE3DED05C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                        • String ID: CONOUT$
                        • API String ID: 3230265001-3130406586
                        • Opcode ID: 173a65949728a06392e91cd9e17172a7bb866e1c3b26aa5d6398ee8689f650a0
                        • Instruction ID: a3c37e7da327fa6fa1fa97bda486b8b24263a730dfe8d9ebd811b8a587789270
                        • Opcode Fuzzy Hash: 173a65949728a06392e91cd9e17172a7bb866e1c3b26aa5d6398ee8689f650a0
                        • Instruction Fuzzy Hash: C6117F72728A41C2E7508B52A89832966B4BB88FE4F044236EA5DC77A4CF7CE9048744
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 3668304517-0
                        • Opcode ID: bc28632cf2c169d4cad24e0a8458e32906829c08789abf353f0c9701b9e305a4
                        • Instruction ID: f6425491bd455196a0ef9990aa2d2922a970fc41c372e1597cb708e82ae96ab2
                        • Opcode Fuzzy Hash: bc28632cf2c169d4cad24e0a8458e32906829c08789abf353f0c9701b9e305a4
                        • Instruction Fuzzy Hash: B5E1C273B28B85C5EB108B64D4C83AD2361FB49BA8F514321DAAD57BD9DF38E845C340
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d67292402bdb555108f95a639ffa5e2e12dcb3d5ffba849cc272f15b09933880
                        • Instruction ID: 7ea8a7f447f6a69c826e1d0f5f0388aa2b1bf6b748ec570a9124e8a6271c5c6c
                        • Opcode Fuzzy Hash: d67292402bdb555108f95a639ffa5e2e12dcb3d5ffba849cc272f15b09933880
                        • Instruction Fuzzy Hash: 1E919263A28792D5EB318E1194C87B967D1AFC6F94F6442B1DA5D87BC5DE3CEC448300
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$CriticalEnterFacet_GetctypeRegisterSection
                        • String ID:
                        • API String ID: 3540285380-0
                        • Opcode ID: b68d9fbbdce3cbae31183f12b4367757fa0d9e574f40d171a60829b7ba4f1bf4
                        • Instruction ID: 1a58658f6e98d48b1b3ea74d973a4a058c1d400179c76a72ed2ccebd6320ed21
                        • Opcode Fuzzy Hash: b68d9fbbdce3cbae31183f12b4367757fa0d9e574f40d171a60829b7ba4f1bf4
                        • Instruction Fuzzy Hash: 9B517D23A28A92C1EA51DF26D4C82B963A0FB9AF84F445136DE4D87356DF7CE981C300
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$CriticalEnterFacet_GetctypeRegisterSection
                        • String ID:
                        • API String ID: 3540285380-0
                        • Opcode ID: 1890d25b6612c0ab6b3cb18efa17c30cceac013ed6d66f508729fbde50d99d5a
                        • Instruction ID: 6e000b38fb4f6d9f38b1f400ac361c78b0433b596e8c6cbe3cc5e6062e96e52b
                        • Opcode Fuzzy Hash: 1890d25b6612c0ab6b3cb18efa17c30cceac013ed6d66f508729fbde50d99d5a
                        • Instruction Fuzzy Hash: 25417F23A29B52C1EA65DF15E4C83B963A0FB96F80F488176DA4D87396DF3CE941C340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AdjustPointer$CreateFrameInfo__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3825191021-1018135373
                        • Opcode ID: 59e0fb79a3cfbd317c4b1a21d2d16f642387fcd492d7f69792a4e6d746e94849
                        • Instruction ID: 27f839795b92381ae745b94e95f8b4df1fd44b6052e883622064373a5592b8ef
                        • Opcode Fuzzy Hash: 59e0fb79a3cfbd317c4b1a21d2d16f642387fcd492d7f69792a4e6d746e94849
                        • Instruction Fuzzy Hash: A5A1CF33A29A62C2EA65DF2294C827973A4EFC6F90F0546B5DE5D87795DF3CE8418300
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn$AttributesFile
                        • String ID: %s%03d%s
                        • API String ID: 2444315788-1942720828
                        • Opcode ID: 80b4f0cb40e5086c38a77a6551ba9bf93d3157f2524acdf1dfaf8ff2edff6a9c
                        • Instruction ID: ea69e45561e42aa3d644ecad8ef0a479355b5b0f18c1084348f4904ffb51500f
                        • Opcode Fuzzy Hash: 80b4f0cb40e5086c38a77a6551ba9bf93d3157f2524acdf1dfaf8ff2edff6a9c
                        • Instruction Fuzzy Hash: 1381C163B24A86C5FB108F64D9C83EC6321EB4ABD8F444631DE5D56AE9DF38E990C344
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: EmptyFindFrameHandlerStateUnwind__except_validate_context_record__vcrt_getptd_noexit
                        • String ID: csm$csm
                        • API String ID: 1119510232-3733052814
                        • Opcode ID: 640b9120b08c2a4bafbdc50c541ddd8e5c27851525bb5551dd398a9c25877275
                        • Instruction ID: 9a54084e87318c7c7a1afb905efd25881ffa82d0cb01ffab968fe80856a98945
                        • Opcode Fuzzy Hash: 640b9120b08c2a4bafbdc50c541ddd8e5c27851525bb5551dd398a9c25877275
                        • Instruction Fuzzy Hash: 2561C533A28692C6DA748E61A4C827977A0BB96F84F1541B5DF9D87B82CF3CEC50C701
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CatchCheckEncodePointerRangeTrys__vcrt_getptd_noexit
                        • String ID: MOC$RCC
                        • API String ID: 3524719674-2084237596
                        • Opcode ID: 23d45343d0e8ad5dd0490dbfac4a813e323db560eb8ab0f0eb58da4f6445c1fc
                        • Instruction ID: 25c02648e044d1a3c2427240ebb9bd643e7f39e552c3066c5c9bfc9f6ecd2920
                        • Opcode Fuzzy Hash: 23d45343d0e8ad5dd0490dbfac4a813e323db560eb8ab0f0eb58da4f6445c1fc
                        • Instruction Fuzzy Hash: EE618B33A18AD1C5EA249F10D4D43AA77A0FBC2F88F05453ADB5E83695CF78D955C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: FileInfoVersion$ErrorLastQuerySizeValue
                        • String ID: -unknown-
                        • API String ID: 867375363-1659202687
                        • Opcode ID: 3568e78086a6283b52571fd93e73ef63888f2c2b40b459ca45c8384f1e820073
                        • Instruction ID: 7e33c9bb807689d82fa1b98b611921d983435e95570f023f6c818b1dbf07cdb5
                        • Opcode Fuzzy Hash: 3568e78086a6283b52571fd93e73ef63888f2c2b40b459ca45c8384f1e820073
                        • Instruction Fuzzy Hash: C7516027A1CB85C2DA609B55A5C82A9B7A4FB8AFC4F445035DE8D83B45DF3CE805CB40
                        APIs
                        • WaitForMultipleObjectsEx.KERNEL32 ref: 00007FF674BBB00F
                          • Part of subcall function 00007FF674BD6C40: FlushFileBuffers.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6C61
                          • Part of subcall function 00007FF674BD6C40: CloseHandle.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6C6E
                          • Part of subcall function 00007FF674BD6C40: LoadLibraryA.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6C82
                          • Part of subcall function 00007FF674BD6C40: GetProcAddress.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6C95
                          • Part of subcall function 00007FF674BD6C40: GetLastError.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6CAD
                          • Part of subcall function 00007FF674BD6C40: WaitForSingleObject.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6CBD
                          • Part of subcall function 00007FF674BD6C40: WaitForSingleObject.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6CD3
                          • Part of subcall function 00007FF674BD6C40: WaitForSingleObject.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6CE4
                          • Part of subcall function 00007FF674BD6C40: GetExitCodeThread.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6CF9
                          • Part of subcall function 00007FF674BD6C40: FreeLibrary.KERNEL32(?,?,00000000,00007FF674BBB0C6), ref: 00007FF674BD6D58
                        • CloseHandle.KERNEL32 ref: 00007FF674BBB168
                        • CloseHandle.KERNEL32 ref: 00007FF674BBB186
                        • CloseHandle.KERNEL32 ref: 00007FF674BBB1A2
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CloseHandleWait$ObjectSingle$Library$AddressBuffersCodeErrorExitFileFlushFreeLastLoadMultipleObjectsProcThread
                        • String ID: Warning: IPC thread exited with code %d.
                        • API String ID: 1839048050-3426404464
                        • Opcode ID: adcc21b68b1ca121b0538a66c824c2628d271e2b56346d6ead9868c03e77b590
                        • Instruction ID: 362d7dc1816d13645ab4ad197035483d759e4b8098e3593d412911ae1ae7dba5
                        • Opcode Fuzzy Hash: adcc21b68b1ca121b0538a66c824c2628d271e2b56346d6ead9868c03e77b590
                        • Instruction Fuzzy Hash: 8631E02362CA82C1DA109B25E8D857D6364FB46BB4B540332EA7D83BE9DF39D945C704
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: std::_$ExceptionLocinfo::_Locinfo_ctorLockitLockit::_ThrowYarn__std_exception_copy
                        • String ID: bad locale name
                        • API String ID: 1898945047-1405518554
                        • Opcode ID: d0dc9bdfadd741ee6db536828eea00136518dfc6cf34ce01ed8ae7f085587f50
                        • Instruction ID: 271833ce7e616bc58c3f2b376e8c03a93bb31f39ec5dd9f0b28e40fde08487f5
                        • Opcode Fuzzy Hash: d0dc9bdfadd741ee6db536828eea00136518dfc6cf34ce01ed8ae7f085587f50
                        • Instruction Fuzzy Hash: F6217F63A29B81C5D741CF74E9C416873B5FB59B88B549135DA8C8771AEF38C9A4C340
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: GetDpiForWindow$User32.dll
                        • API String ID: 145871493-527045600
                        • Opcode ID: b21bd8795b9dd43543defbcc46be48d8d770f387683e75d39a2398e9e1922a1f
                        • Instruction ID: 5daf5bfbf490c128379fa6caea8b30c25f9c71bc98d022a92bbc93aff8bf7a39
                        • Opcode Fuzzy Hash: b21bd8795b9dd43543defbcc46be48d8d770f387683e75d39a2398e9e1922a1f
                        • Instruction Fuzzy Hash: 44F0A456A39E86C2EA018B25BD894766370BF8DB80F4D8631DA4D43770EF3DE9868610
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: edf103544de3fb6d880688ebb94ba975c7a7d1f4c33a5d37d642880f42a4ad61
                        • Instruction ID: 73b2532260afcad5060f116e220919f95cd8eb4d6617ec2e41eaa034d1098463
                        • Opcode Fuzzy Hash: edf103544de3fb6d880688ebb94ba975c7a7d1f4c33a5d37d642880f42a4ad61
                        • Instruction Fuzzy Hash: C4F0DAA6A39A46C1EB548B51E8C83752374AF8CB45F44143AD50F86664CE3CEC889710
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: DebuggerPresent$Sleep
                        • String ID: [CRASH HANDLER] Waiting for debugger...
                        • API String ID: 3726042274-2732769275
                        • Opcode ID: e044eb91350ffe7b20af5c092a1130067658518487f4732151cb90fd6db16fcf
                        • Instruction ID: 3ecd4e867e7732a757739c7f4c14de47ec6ab547a1391419110a67a2176636ec
                        • Opcode Fuzzy Hash: e044eb91350ffe7b20af5c092a1130067658518487f4732151cb90fd6db16fcf
                        • Instruction Fuzzy Hash: A8E0B666FB8403C2F6546BA5ACCC67922A16F61F51F440636C50DC00B0EE2CBC88A211
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: c0f92cd66aec1193bdbf9c51867cb6eadac89cbbc32a041722eb0e7487ca13da
                        • Instruction ID: 243248a6332071c7beed94f40515578b846ca4b1ebe877e73298e42f3cd34e3a
                        • Opcode Fuzzy Hash: c0f92cd66aec1193bdbf9c51867cb6eadac89cbbc32a041722eb0e7487ca13da
                        • Instruction Fuzzy Hash: C481B02BA7A612D5F7109B6198C8ABD76A4BB56F54F400136CE0E93792DF3CAC41DB10
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CloseHandle$CommandCreateLineProcess_invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 1990460968-0
                        • Opcode ID: 7148d7f0a8a4a19563fc89951591b091d4ddcfd30f8d2e8afdad13971dc25a24
                        • Instruction ID: b9ea86dd29a9d712c209d05b2cd0509238f12f3d08f76ec4fef7afa70a78ed6f
                        • Opcode Fuzzy Hash: 7148d7f0a8a4a19563fc89951591b091d4ddcfd30f8d2e8afdad13971dc25a24
                        • Instruction Fuzzy Hash: 35718063A28B82C5EB00CB65E8C42AD73A1FB85B84F505136DE4D97B69DF3CE941C740
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$CriticalEnterFacet_RegisterSection
                        • String ID:
                        • API String ID: 206065917-0
                        • Opcode ID: 0b6029dd43b323223393d5a2066b0d90069c23fd8cb75a54b51996db10e42454
                        • Instruction ID: 005690231ae2de2b9614a59861d02879564e802b52b9996893a876b720a3c9e0
                        • Opcode Fuzzy Hash: 0b6029dd43b323223393d5a2066b0d90069c23fd8cb75a54b51996db10e42454
                        • Instruction Fuzzy Hash: E1714F23618A81C2EB65DB25E4C43AAB7A0FB86F84F148176DB8D877A5DF3CD845C700
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: 0707efd8d0746db3d120108eb2e4adddcef0fc21f7cb5b8ec11b6d7ab6bb0fd0
                        • Instruction ID: 4bdc6d53f0e72503038c8193f6bf1d79fc61fbee157a376c287e3ba8a44bc91f
                        • Opcode Fuzzy Hash: 0707efd8d0746db3d120108eb2e4adddcef0fc21f7cb5b8ec11b6d7ab6bb0fd0
                        • Instruction Fuzzy Hash: F851291BE39D86C5F7629B3994D83766260BF42B54F108275FA5DA65D0DF3CAC41CE00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$CriticalEnterFacet_RegisterSection
                        • String ID:
                        • API String ID: 206065917-0
                        • Opcode ID: cfa2d68b6519999da36b75339ba0c94149825a5983faddd5b4ad6459bf6281a2
                        • Instruction ID: a7ad919ec1f6514ad3209d0ed71164d247eebeeb83c5b84f0470a0aaae1f8815
                        • Opcode Fuzzy Hash: cfa2d68b6519999da36b75339ba0c94149825a5983faddd5b4ad6459bf6281a2
                        • Instruction Fuzzy Hash: 8F414D23A29A52C0EE64DF15E4C83BA6361EF96F84F584076DA4D873A5DF3CE845C740
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID:
                        • API String ID: 3215553584-0
                        • Opcode ID: 934fb44a07ae33c16b4036ba493456c2b328e5d7cc23383259d4cabf6b0fdda6
                        • Instruction ID: 07307df0b9ca08b053c1584e639df9f56b0504a6145d88237dc67869c917e474
                        • Opcode Fuzzy Hash: 934fb44a07ae33c16b4036ba493456c2b328e5d7cc23383259d4cabf6b0fdda6
                        • Instruction Fuzzy Hash: 86216667929742C6EB109B61A4892B96360AF89FA4F444232DE5D86795DF3CEC45CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _set_statfp
                        • String ID:
                        • API String ID: 1156100317-0
                        • Opcode ID: 0c453a26a65cc264f34480e959e92e92ba93ba76e5a719f7620f73cb9509edd8
                        • Instruction ID: 69bc32738b1c00a6f11844e71980a45e3dce144a2ec47af8cf5477bdb296bbe2
                        • Opcode Fuzzy Hash: 0c453a26a65cc264f34480e959e92e92ba93ba76e5a719f7620f73cb9509edd8
                        • Instruction Fuzzy Hash: C211826BE3DE0381F75D1179E8DE37920406F56B64E490634EA6E962D68E3DAC404914
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                        • API String ID: 3215553584-1196891531
                        • Opcode ID: e7f9ddd6750e1190c8457508b73dfbc2a216c5d03a0f56ff7c829742ca268bb9
                        • Instruction ID: 890317fd8cf8a5ca5e77dd35ecd840348e3a4dc1c8c7ae03956b0b9e0ef88a56
                        • Opcode Fuzzy Hash: e7f9ddd6750e1190c8457508b73dfbc2a216c5d03a0f56ff7c829742ca268bb9
                        • Instruction Fuzzy Hash: 59818D73D6C262C5F7754A29C2DC2782BB09F97F48F1490B1DA4EC629ACF7DAC029601
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: $*
                        • API String ID: 3215553584-3982473090
                        • Opcode ID: dc2f86d936af3a210aa6ccfa24c4f182c6109bb490c63d5b1dac75b13a7168a7
                        • Instruction ID: 93fac6ba352d28aabc7dca4789e0e20ca049a13dba0fc1dbfe374797af4aaa9b
                        • Opcode Fuzzy Hash: dc2f86d936af3a210aa6ccfa24c4f182c6109bb490c63d5b1dac75b13a7168a7
                        • Instruction Fuzzy Hash: 1C512D73928362CAF7658E3880CC37837A1EB97F19F1411B5CA4A85295DF3EEC95D602
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: FormatFreeLocalMessage
                        • String ID: E$Unknown error [%i]
                        • API String ID: 1427518018-1961624668
                        • Opcode ID: 39932f3c715af74e78e4204e1a0029940ad0dfe86efcdaf91aa95447908630f2
                        • Instruction ID: 244d3c94993833497c6ef9e22c53888efe240b548774c0168e6a3890e14a090a
                        • Opcode Fuzzy Hash: 39932f3c715af74e78e4204e1a0029940ad0dfe86efcdaf91aa95447908630f2
                        • Instruction Fuzzy Hash: A6412973B18B40CAE710CFA5E4842AD33B5F788B98B104225DE5DA7B98DF38D955C790
                        APIs
                          • Part of subcall function 00007FF674BDA530: lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000001,00007FF674BBB7B1), ref: 00007FF674BDA574
                          • Part of subcall function 00007FF674BDA530: WriteFile.KERNEL32 ref: 00007FF674BDA591
                        • ReadProcessMemory.KERNEL32 ref: 00007FF674BD2046
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: FileMemoryProcessReadWritelstrlen
                        • String ID: Bytes at CS:EIP:$%02x $??
                        • API String ID: 1709475322-1830562983
                        • Opcode ID: e18409cf370088f462ff40b8fbe8a13f32536af2fe5171e6421fb6eba06fd340
                        • Instruction ID: 45d2b39a3703571b58043771865bc240f9799d4564c9754744c1e4195d5b7b44
                        • Opcode Fuzzy Hash: e18409cf370088f462ff40b8fbe8a13f32536af2fe5171e6421fb6eba06fd340
                        • Instruction Fuzzy Hash: 65018467A38B82C5EA10AB12F9842B96721FF89FD4F584171DE4C97765DE7CD8428B00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 3668304517-0
                        • Opcode ID: 648df93aaf1a27d41752ebac68eddaf676a17a5c61303f9b6a3cd310f0da3bea
                        • Instruction ID: a3e217b736d022fee283716ba4eca82611b58393bfd270db47052ab27e6ca703
                        • Opcode Fuzzy Hash: 648df93aaf1a27d41752ebac68eddaf676a17a5c61303f9b6a3cd310f0da3bea
                        • Instruction Fuzzy Hash: 19A1C173B28B85C5EB10CB65D4843AD2361FB8ABD8F504225EF9D67B99DE38E485C700
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 3668304517-0
                        • Opcode ID: 3acb2c6ce6658fb7da8c1d500a213315c8f184320617d801e1c715188b0047f2
                        • Instruction ID: 8191a8611d2699ef38aeb24ee31843271bf8a9fa2f90a346d419237c646b1c19
                        • Opcode Fuzzy Hash: 3acb2c6ce6658fb7da8c1d500a213315c8f184320617d801e1c715188b0047f2
                        • Instruction Fuzzy Hash: 0291B063B18B81C9FB108F75C5883AC2772EB8AB98F504325DE5D67B99DE38E485C740
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: FileWrite$ConsoleErrorLast
                        • String ID:
                        • API String ID: 765721374-0
                        • Opcode ID: a159577b1b3de883cedea6a065aeb26159bff510c9209bfa05206bd7de04ecac
                        • Instruction ID: 693d3d874125fa604e0405b14a94415adad33f4aadcebd9e8ffb2d7256d0f94a
                        • Opcode Fuzzy Hash: a159577b1b3de883cedea6a065aeb26159bff510c9209bfa05206bd7de04ecac
                        • Instruction Fuzzy Hash: 7051BF27B25652D9E710CF65E4887AD3B70FB15B88F044132CE4E976A9DF38D552CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: __std_exception_copy_invalid_parameter_noinfo_noreturn
                        • String ID:
                        • API String ID: 1109970293-0
                        • Opcode ID: 8723bb5c2728b8d27e4dc4a5be961ff3adfa68a6d017edc6daf7d2842333f116
                        • Instruction ID: d7caf39ad76b992863ebd669e3fbef0d1a791f5302d6e3608f80db038d1087b6
                        • Opcode Fuzzy Hash: 8723bb5c2728b8d27e4dc4a5be961ff3adfa68a6d017edc6daf7d2842333f116
                        • Instruction Fuzzy Hash: 0C417663A28B85C1EB158B68E4C53B97360EB86BA4F405331E6AD867E5DE2CD594C300
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Create$EventForegroundObjectSingleThreadWaitWindow
                        • String ID:
                        • API String ID: 3414155022-0
                        • Opcode ID: fa3a911ef68a15cedd06e024dddb27d482da2ba094b7074bfe1846213905964b
                        • Instruction ID: f205d2d936a60fb9b37450fb93feba01aedd388bb6fb6f7a9d584d90e9452f52
                        • Opcode Fuzzy Hash: fa3a911ef68a15cedd06e024dddb27d482da2ba094b7074bfe1846213905964b
                        • Instruction Fuzzy Hash: 4331F267A18A81C1EB10EF61E4887AA77B1FB86BA4F054231DE5987795DF38D881C700
                        APIs
                        • CreateFileW.KERNEL32(?,?,?,?,?,?,?,00000000,00007FF674BD7BE4), ref: 00007FF674BBF7D2
                        • GetFileSize.KERNEL32(?,?,?,?,?,?,?,00000000,00007FF674BD7BE4), ref: 00007FF674BBF800
                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000000,00007FF674BD7BE4), ref: 00007FF674BBF88A
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: File$CloseCreateHandleSize
                        • String ID:
                        • API String ID: 1378416451-0
                        • Opcode ID: 9db0e058b0c620bdd7e2744035a46b06eb01982a2b88bdb24384564714ab0664
                        • Instruction ID: bd45920ef8606e2616bbf019bcd746212a0772b42fab8c7888f76efed6adf4a4
                        • Opcode Fuzzy Hash: 9db0e058b0c620bdd7e2744035a46b06eb01982a2b88bdb24384564714ab0664
                        • Instruction Fuzzy Hash: 28216573B28742C7EA108F25A98422A7764FB85BE4F544235DB9D97BA8CF3CE411CB00
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: LockitYarnstd::_$EncodeLocimpLocimp::_Lockit::_Lockit::~_New_Pointerstd::locale::_
                        • String ID:
                        • API String ID: 4002550820-0
                        • Opcode ID: 5ec3677caa46dbd7572f34b6b0454da3a1b647d2279580d430ede9c81d51a50d
                        • Instruction ID: e701d5073bb4daec783ed980954dc1e625f05df8ba6bae2777f7b64a105832c3
                        • Opcode Fuzzy Hash: 5ec3677caa46dbd7572f34b6b0454da3a1b647d2279580d430ede9c81d51a50d
                        • Instruction Fuzzy Hash: DF219522B28A52C0EA00DB11E9C81B823B1EF86FE0F4441B2DA5D837E5CF7CE951C300
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ConditionMask$InfoVerifyVersion
                        • String ID:
                        • API String ID: 2793162063-0
                        • Opcode ID: 9456b7b3275d3bf55dd1223929cbfd5065e729fdc93afb0badb4f8038a6c425a
                        • Instruction ID: cf286217ad925cbb9ff0543d3ba283bdf3b39fb5cb7b980244f1509c51cb7f56
                        • Opcode Fuzzy Hash: 9456b7b3275d3bf55dd1223929cbfd5065e729fdc93afb0badb4f8038a6c425a
                        • Instruction Fuzzy Hash: 90114F37518785CAD720CF21E4846DA77A1FB88744F418229EB8D83B18DF3CDA45DB44
                        APIs
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 00479b422a42f70e1f41f65fe6de1172dabe8629108705f78718ed2209d6687b
                        • Instruction ID: 01ef0b51a16d98a0c95755b21a5bd9b46fb94c54b76db0b249f4777462246415
                        • Opcode Fuzzy Hash: 00479b422a42f70e1f41f65fe6de1172dabe8629108705f78718ed2209d6687b
                        • Instruction Fuzzy Hash: 88113026B14F41CAEB50CF64EC990A533B4FB4DB68B041A32EA5D83764DF3CE5A48350
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID: Couldn't create shared event for PID %d
                        • API String ID: 2962429428-2201211680
                        • Opcode ID: 0723f6ed2adcbf378180618d4e69052147be8188aa82d9ec5b90acfce2b18f0b
                        • Instruction ID: 58a35021d6bf489990e291add66cad0cf31da08f44e3e0e2a87a7c0d5d035214
                        • Opcode Fuzzy Hash: 0723f6ed2adcbf378180618d4e69052147be8188aa82d9ec5b90acfce2b18f0b
                        • Instruction Fuzzy Hash: 9D01E127628A42C1DA109B25E88816D6365EB45BB4B640332DA7D937E8DF39DC86C344
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Time$FileSystem
                        • String ID: C:\buildslave\unity\build\PlatformDependent/Win/UnityCrashHandler/CrashHandlerWindows.cpp$ReportJson
                        • API String ID: 2086374402-2582496768
                        • Opcode ID: c2354c6aaffb15a64f50128d7e19689910f143c8bb55bbbd16695f27a10640e8
                        • Instruction ID: 93f833f7bc896e40e565ca051a98507ea6e6471646ae0e6bcd49c4b038056c8e
                        • Opcode Fuzzy Hash: c2354c6aaffb15a64f50128d7e19689910f143c8bb55bbbd16695f27a10640e8
                        • Instruction Fuzzy Hash: 3DB19833B29A81DAEB60CB65D0887AD33A5FB05B88F444026CF9D87B95DF38E955C340
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID:
                        • String ID: gfffffff
                        • API String ID: 0-1523873471
                        • Opcode ID: 7e3acf3eb8e22d5a5bd9b17c612e73f9e045e36806c5c53c68df05afffaa88aa
                        • Instruction ID: cdb307272f00d61ee6e8df593dcd91bde17771ae5b63e1ae039bf6dfa64ec859
                        • Opcode Fuzzy Hash: 7e3acf3eb8e22d5a5bd9b17c612e73f9e045e36806c5c53c68df05afffaa88aa
                        • Instruction Fuzzy Hash: 47510163B25A8592EE14CB16F4942AD6350EB49FE8F144732DE6D877C4DF38E896C301
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _invalid_parameter_noinfo
                        • String ID: *
                        • API String ID: 3215553584-163128923
                        • Opcode ID: add212981c4add282e30f27004004863e6fc8ca435eb345f71844bb0f5c83eb9
                        • Instruction ID: ef2f27b1246dd5740d5b28fc7cd9c783a635e6d40b13e5ac57428c54b0b879b4
                        • Opcode Fuzzy Hash: add212981c4add282e30f27004004863e6fc8ca435eb345f71844bb0f5c83eb9
                        • Instruction Fuzzy Hash: 1D716473928662C6EBA99F29C0D803C37A0FB86F19F140175DF0A82295DF79DC82D750
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID: U
                        • API String ID: 442123175-4171548499
                        • Opcode ID: 848202c6187c40efbee0928459b99b385dee48571e29a33de8d15e86bb15f8d3
                        • Instruction ID: 2eadd8f2e185e343c7301d17ba1ca3f672e655443c7fec3cbd49f52a2c89a4a7
                        • Opcode Fuzzy Hash: 848202c6187c40efbee0928459b99b385dee48571e29a33de8d15e86bb15f8d3
                        • Instruction Fuzzy Hash: 3641B363B29641C6D720CF25E8887A967A0FB99B94F448131EE4DC7B58DF7CD801CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _handle_errorf
                        • String ID: "$powf
                        • API String ID: 2315412904-603753351
                        • Opcode ID: 1a3ab6078a69e1124d446049a7427b1005ed393588329ebf7ef479ac1467aa2f
                        • Instruction ID: 6f65d32de85c94314221170ddc8e7a3e221c6bfdfabc8954fc2dc9d83223b951
                        • Opcode Fuzzy Hash: 1a3ab6078a69e1124d446049a7427b1005ed393588329ebf7ef479ac1467aa2f
                        • Instruction Fuzzy Hash: C8415277D29680DBE370CF22E4847A9B6A0F79A748F102326F74942998DF7DC555AF00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: _handle_error
                        • String ID: "$pow
                        • API String ID: 1757819995-713443511
                        • Opcode ID: 50ca93047597f376ac85678cffab8cd06682119444654a60ccdb0236bc81f701
                        • Instruction ID: 89f39a2e53ab29fc88fcafb840ec9f1d611d2037974d9d04845cfff38b77d2ac
                        • Opcode Fuzzy Hash: 50ca93047597f376ac85678cffab8cd06682119444654a60ccdb0236bc81f701
                        • Instruction Fuzzy Hash: EE214D77D28A84C7E370CF60E48466ABAA0FFDA744F202326F68946954CFBDD4859F00
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID:
                        • String ID: false
                        • API String ID: 0-734881840
                        • Opcode ID: 6970387d9e74313b3204bd67ba5948e9733f9406a22aee1955614d19e59c96c5
                        • Instruction ID: 5a65a292a0dd6fd606150239a8e541437986c3063c0d10f33581cbddcdd71dc2
                        • Opcode Fuzzy Hash: 6970387d9e74313b3204bd67ba5948e9733f9406a22aee1955614d19e59c96c5
                        • Instruction Fuzzy Hash: 26219A22928B95C2E621DB25E8842AAB3B0FBC5B50F004735EA9C47796EF78E940C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Stringtry_get_function
                        • String ID: LCMapStringEx
                        • API String ID: 2588686239-3893581201
                        • Opcode ID: ec25a2a46c07bdb6505d694a34783aa3bdafa48b04d1b949821ddedff5d13d5b
                        • Instruction ID: 3b99da24d41425dfa9bd9e782f3c39d729c61fd2935b2b70076cfb3eff91c665
                        • Opcode Fuzzy Hash: ec25a2a46c07bdb6505d694a34783aa3bdafa48b04d1b949821ddedff5d13d5b
                        • Instruction Fuzzy Hash: 29113876A18B81C6DB60CB06F4842AAB7A4FBC9B90F144136EE8D83B59DF3CD4448B00
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Time$File$DateLocal
                        • String ID: %d-%02d-%02d_%02d%02d%02d
                        • API String ID: 2071732420-897368642
                        • Opcode ID: 61e7d4b7f34619cf6d03ff84a260dc2b7d394de02b59c4c05e88c49e54f0ac87
                        • Instruction ID: e6131fe440c014e815aaec62ec6bef726f368dd01559f21924ec3defce10177f
                        • Opcode Fuzzy Hash: 61e7d4b7f34619cf6d03ff84a260dc2b7d394de02b59c4c05e88c49e54f0ac87
                        • Instruction Fuzzy Hash: 8111A773A2C681C3DB108F19F88466AB762F780BC0F544126E78986E68DF3CD545CF40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: ByteCharMultiQueryValueWide
                        • String ID: \StringFileInfo\%04x%04x\%S
                        • API String ID: 649492702-3748715972
                        • Opcode ID: d616a4ad76ffdfe728b4da5a6d4d14dae892c0b4d9b1575c759f66f6a82a959d
                        • Instruction ID: 50c7406f5f1b40ab2cd35a82852edfe1030fbf46c0e2fff082b9a18ab5f72375
                        • Opcode Fuzzy Hash: d616a4ad76ffdfe728b4da5a6d4d14dae892c0b4d9b1575c759f66f6a82a959d
                        • Instruction Fuzzy Hash: 1F016972628AC1C2D730CB15F8847AAB7A1FB88794F404136EA8C87A5DDF7CC894CB40
                        APIs
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BE3B16
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,?,00007FF674BE54B4,?,?,00000001,00007FF674BE3763,?,?,?,?,00007FF674BDEE5F), ref: 00007FF674BE3B3C
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CountCriticalInitializeSectionSpintry_get_function
                        • String ID: InitializeCriticalSectionEx
                        • API String ID: 539475747-3084827643
                        • Opcode ID: 46a70f183ed03938605958c932fba6eaae294ccc232c085e4203bf4ed2aa0aca
                        • Instruction ID: 92d09f0899a042b471b62e40091e265de24892ae6d7197daea3b9be89ca94b0e
                        • Opcode Fuzzy Hash: 46a70f183ed03938605958c932fba6eaae294ccc232c085e4203bf4ed2aa0aca
                        • Instruction Fuzzy Hash: 19F08166B2CB92C2EA049B12A5C40697361FB89F80F545036EA4D47B19DE3CD845C700
                        APIs
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BE3AA6
                        • TlsSetValue.KERNEL32(?,?,?,00007FF674BE3EC5,?,?,?,?,00007FF674BE3770,?,?,?,?,00007FF674BDEE5F), ref: 00007FF674BE3AC9
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Valuetry_get_function
                        • String ID: FlsSetValue
                        • API String ID: 738293619-3750699315
                        • Opcode ID: 5b4d43a0d13e347f29cd10afd78d10b25679fc8a15ebf5076edc8287c56dacb2
                        • Instruction ID: 9360633c68d9fdfbe2fae9f85b4a8a05538c167aac53a221bf91fbcc52ae6ebc
                        • Opcode Fuzzy Hash: 5b4d43a0d13e347f29cd10afd78d10b25679fc8a15ebf5076edc8287c56dacb2
                        • Instruction Fuzzy Hash: 95F03656B28651C2FE059711A4D80796262AF88F80F5C5077D91D47759DE3CD946C700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: DefaultUsertry_get_function
                        • String ID: GetUserDefaultLocaleName
                        • API String ID: 3217810228-151340334
                        • Opcode ID: 641b75b0ad51971969f92ff23ea75a550f8771ab3f4b3eec5342dacd340543b4
                        • Instruction ID: 23fe9d2ec9089c0e6cd867c4370817e862baf61c5ac71f935da5032bd7d21aef
                        • Opcode Fuzzy Hash: 641b75b0ad51971969f92ff23ea75a550f8771ab3f4b3eec5342dacd340543b4
                        • Instruction Fuzzy Hash: D6F0E2A2B3C682C2EB145B69B9CC1B91271AF48BC0F846032DA0D86B55DE3CDC58C780
                        APIs
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3875
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00000030,00007FF674BEC7FB,?,?,00000000,00007FF674BECA99,?,?,?,?,?,00007FF674BECD1E), ref: 00007FF674BF388F
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: CountCriticalInitializeSectionSpintry_get_function
                        • String ID: InitializeCriticalSectionEx
                        • API String ID: 539475747-3084827643
                        • Opcode ID: 3939e4e46ca42991412e812f4471c088eca1047adf8c6d3a286a2810d95f0994
                        • Instruction ID: c1e474f6a336cc26e7c801ca7269f4dca5e7239e026d2f89d5f16b47030d23e0
                        • Opcode Fuzzy Hash: 3939e4e46ca42991412e812f4471c088eca1047adf8c6d3a286a2810d95f0994
                        • Instruction Fuzzy Hash: A6F05E67A39B92D2EB159B41F8880A92231BF48B80F845036EA2D87B64CF3CD849C740
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Valuetry_get_function
                        • String ID: FlsGetValue
                        • API String ID: 738293619-662576866
                        • Opcode ID: ed9774e846f7c560cab9fcae545d12457ed61fd1877f717fb28d869256d1bcac
                        • Instruction ID: 07f9975bca19ca12c3618eab3bfe7e234801d1f8f4c989e386be30a6dbbf2067
                        • Opcode Fuzzy Hash: ed9774e846f7c560cab9fcae545d12457ed61fd1877f717fb28d869256d1bcac
                        • Instruction Fuzzy Hash: 99E03753B3D646C2FA059B65A4C80782361AF85B80F547036D51E46756DD3CD98AC700
                        APIs
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BE39F6
                        • TlsFree.KERNEL32(?,?,?,00007FF674BE3ED9,?,?,?,?,00007FF674BE3770,?,?,?,?,00007FF674BDEE5F), ref: 00007FF674BE3A13
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Freetry_get_function
                        • String ID: FlsFree
                        • API String ID: 2043475122-3081468905
                        • Opcode ID: 9aa65d2e97a8f9daa6b4a9a89ea50464664c4aa7773cab6a003a332669ba21a7
                        • Instruction ID: ee1df45512635ad338f0bf42c1f457ebf084bf6d16d61de248202c01fb1efeb9
                        • Opcode Fuzzy Hash: 9aa65d2e97a8f9daa6b4a9a89ea50464664c4aa7773cab6a003a332669ba21a7
                        • Instruction Fuzzy Hash: EDE037A2B3C64AC2FE149751B8D80B813619F85B80F542036D50D47795DD7CDC89C740
                        APIs
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BE39A0
                        • TlsAlloc.KERNEL32(?,?,?,00007FF674BE3EA8,?,?,?,?,00007FF674BE3770,?,?,?,?,00007FF674BDEE5F), ref: 00007FF674BE39BC
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Alloctry_get_function
                        • String ID: FlsAlloc
                        • API String ID: 591514613-671089009
                        • Opcode ID: 9d79934ddcaf7207b86f52e2874a35245ede5eb97c79096cd49b59b50f2821b9
                        • Instruction ID: 9242602c331c075f828170bd6721f2d78ed74073e8515d3f1a9aaa30abdd2357
                        • Opcode Fuzzy Hash: 9d79934ddcaf7207b86f52e2874a35245ede5eb97c79096cd49b59b50f2821b9
                        • Instruction Fuzzy Hash: 80E06553A3C587C1FE059752B5C80B923B09F89F84F581037DA1E86B55DE3CE889C744
                        APIs
                        • try_get_function.LIBVCRUNTIME ref: 00007FF674BF3731
                        • TlsSetValue.KERNEL32(?,?,?,00007FF674BF57A3,?,?,?,00007FF674BEA03D,?,?,?,?,00007FF674BF100A,?,?,00000000), ref: 00007FF674BF3748
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: Valuetry_get_function
                        • String ID: FlsSetValue
                        • API String ID: 738293619-3750699315
                        • Opcode ID: ba1b4cae9cccf917f5622adf67c8f988d2351a50df3f32d20e5cfcd1b2f6bd5a
                        • Instruction ID: 6abae1247cc1ff50b788e7692f51c2dd661d81126d40c61bcf76552667200ada
                        • Opcode Fuzzy Hash: ba1b4cae9cccf917f5622adf67c8f988d2351a50df3f32d20e5cfcd1b2f6bd5a
                        • Instruction Fuzzy Hash: EDE065E7A38A42E2EB454B55F8C84B52232AF48B80F485033D51E863A4DE3CEC4CC700
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000A.00000002.4178598498.00007FF674BA1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF674BA0000, based on PE: true
                        • Associated: 0000000A.00000002.4177496309.00007FF674BA0000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178682740.00007FF674C02000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C26000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4178751687.00007FF674C29000.00000004.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C2B000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C44000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C56000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674C7D000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CB9000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBC000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CBF000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CC2000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674CFB000.00000002.00000001.01000000.00000010.sdmpDownload File
                        • Associated: 0000000A.00000002.4179658945.00007FF674D04000.00000002.00000001.01000000.00000010.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_7ff674ba0000_UnityCrashHandler64.jbxd
                        Similarity
                        • API ID: DownlevelLocaleName__crttry_get_function
                        • String ID: LocaleNameToLCID
                        • API String ID: 404522899-2050040251
                        • Opcode ID: 3e09e8f8f3dc6326ec65de0463ece96fd0be5ee1a01a4df02ddc49cca5cf1d12
                        • Instruction ID: ea6d0ef88edd77c225c99c0fe7d55cdbbe4591035b5bb08bf534173c663eac0a
                        • Opcode Fuzzy Hash: 3e09e8f8f3dc6326ec65de0463ece96fd0be5ee1a01a4df02ddc49cca5cf1d12
                        • Instruction Fuzzy Hash: 0EE09B67A2D542D2FF059B51F8C80F92231AF84740F585032D51D4F261DE3CDC4AC744