Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_419.exe

Overview

General Information

Sample name:LisectAVT_2403002A_419.exe
Analysis ID:1482269
MD5:42b90e270ab9cc4d1f6354045048b538
SHA1:080d0df0d03f707096cb974da2d683037e9cc63a
SHA256:e4883bfe1480181df3d2eb0e0a587be359260ee11a32176aab234eb707fe6f76
Tags:exe
Infos:

Detection

RisePro Stealer
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RisePro Stealer
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to check for running processes (XOR)
Contains functionality to inject threads in other processes
Drops PE files to the user root directory
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Injects a PE file into a foreign processes
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • LisectAVT_2403002A_419.exe (PID: 7272 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_419.exe" MD5: 42B90E270AB9CC4D1F6354045048B538)
    • Au3Check.exe (PID: 7416 cmdline: "C:\Program Files (x86)\autoit3\Au3Check.exe" MD5: 3BE697D1A92115D5CA76A633A527DFB7)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\jQRMFClswtrBVwy.pdfJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.2.LisectAVT_2403002A_419.exe.c000380000.1.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                0.3.LisectAVT_2403002A_419.exe.2bce88a0000.3.raw.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                  0.2.LisectAVT_2403002A_419.exe.c000600000.5.raw.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                    0.3.LisectAVT_2403002A_419.exe.2bce88a0000.3.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                      0.3.LisectAVT_2403002A_419.exe.2bce89f0000.0.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                        Click to see the 11 entries
                        No Sigma rule has matched
                        No Snort rule has matched
                        Timestamp:2024-07-25T20:24:30.069059+0200
                        SID:2049060
                        Source Port:49705
                        Destination Port:5000
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T20:25:13.610035+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:49708
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T20:24:33.064109+0200
                        SID:2046269
                        Source Port:49705
                        Destination Port:5000
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T20:24:36.289495+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:49706
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                        Source: LisectAVT_2403002A_419.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0051E150 FindFirstFileA,GetLastError,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,GetFileAttributesA,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,__Mtx_unlock,2_2_0051E150
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0054E2D0 SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CopyFileA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,CopyFileA,__Mtx_unlock,__Mtx_unlock,2_2_0054E2D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0051A750 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,__Mtx_unlock,2_2_0051A750
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005ED997 FindClose,FindFirstFileExW,GetLastError,2_2_005ED997
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005EDA1D GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,2_2_005EDA1D
                        Source: global trafficTCP traffic: 192.168.2.8:49705 -> 193.233.132.67:5000
                        Source: Joe Sandbox ViewIP Address: 193.233.132.67 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0052E0A0 recv,setsockopt,WSAStartup,getaddrinfo,closesocket,socket,connect,closesocket,freeaddrinfo,WSACleanup,freeaddrinfo,2_2_0052E0A0
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C000400000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, Au3Check.exe, 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, jQRMFClswtrBVwy.pdf.0.drString found in binary or memory: http://www.winimage.com/zLibDll
                        Source: Au3Check.exeString found in binary or memory: https://ipinfo.io/
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C000400000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, jQRMFClswtrBVwy.pdf.0.drString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
                        Source: Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                        Source: Au3Check.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0051AF30 GdiplusStartup,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,DeleteObject,GdipDisposeImage,DeleteObject,ReleaseDC,GdiplusShutdown,2_2_0051AF30
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeProcess Stats: CPU usage > 49%
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0051B3602_2_0051B360
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005670F02_2_005670F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005990E02_2_005990E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0051E1502_2_0051E150
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0059E1402_2_0059E140
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005531602_2_00553160
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005E51002_2_005E5100
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005411D02_2_005411D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005191A02_2_005191A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005AD1A02_2_005AD1A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005952402_2_00595240
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005B12702_2_005B1270
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005562302_2_00556230
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005512202_2_00551220
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0054E2D02_2_0054E2D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0055F2802_2_0055F280
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0059F3602_2_0059F360
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005333302_2_00533330
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A63D02_2_005A63D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005694402_2_00569440
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0053C4702_2_0053C470
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005F646A2_2_005F646A
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005124F02_2_005124F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005AC4F02_2_005AC4F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0059E4902_2_0059E490
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0054B4802_2_0054B480
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005F84A02_2_005F84A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005965502_2_00596550
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005955B02_2_005955B0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005986102_2_00598610
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A06102_2_005A0610
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A26102_2_005A2610
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0059F6002_2_0059F600
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0060F7712_2_0060F771
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005677702_2_00567770
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005477E02_2_005477E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_006098242_2_00609824
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0059F8102_2_0059F810
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005DF8002_2_005DF800
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A68C02_2_005A68C0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E02_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005998802_2_00599880
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005388A02_2_005388A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005458A02_2_005458A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005E29502_2_005E2950
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005E69702_2_005E6970
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0059E9102_2_0059E910
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0055A9002_2_0055A900
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005719E02_2_005719E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0053EA602_2_0053EA60
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00525A102_2_00525A10
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00548A002_2_00548A00
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00534AD02_2_00534AD0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0054CA802_2_0054CA80
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005DDA802_2_005DDA80
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0059EB702_2_0059EB70
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005FBB6D2_2_005FBB6D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005C7B302_2_005C7B30
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00595B202_2_00595B20
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005CDC702_2_005CDC70
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00596C002_2_00596C00
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A2CF02_2_005A2CF0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005F2CE02_2_005F2CE0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0059BD502_2_0059BD50
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00527DC02_2_00527DC0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005ECE102_2_005ECE10
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0053AE302_2_0053AE30
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00535E302_2_00535E30
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005FBEAF2_2_005FBEAF
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00529F502_2_00529F50
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005D1F902_2_005D1F90
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00593F802_2_00593F80
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: String function: 0057E530 appears 41 times
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: String function: 005A2450 appears 101 times
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: String function: 005EFED0 appears 50 times
                        Source: LisectAVT_2403002A_419.exeStatic PE information: Number of sections : 12 > 10
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1511786300.00007FF642639000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename" vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000003.1507566796.000002BCE8B87000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAu3Check.exeN vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAu3Check.exeN vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000003.1507782336.000002BCE89D8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C000400000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAu3Check.exeN vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAu3Check.exeN vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exeBinary or memory string: OriginalFilename" vs LisectAVT_2403002A_419.exe
                        Source: LisectAVT_2403002A_419.exeBinary or memory string: main.SLNxPDSjg
                        Source: classification engineClassification label: mal84.troj.evad.winEXE@3/2@0/1
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A47F0 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,2_2_005A47F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A4110 GetVersionExA,CreateFileW,CreateFileA,GetDiskFreeSpaceW,GetDiskFreeSpaceA,2_2_005A4110
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005191A0 CopyFileA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,2_2_005191A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00556230 CopyFileA,RegOpenKeyExA,RegSetValueExA,RegCloseKey,CopyFileA,GetUserNameA,CopyFileA,SHGetFolderPathA,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,ShellExecuteA,2_2_00556230
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\jQRMFClswtrBVwy.pdfJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeFile created: C:\Users\user\AppData\Local\Temp\adobezReUMOGlGfitJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile opened: C:\Windows\system32\0db7f57e1c2f78ea24726f4ea368749bdd86de5fb8e853dffdfb2de10d733165AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
                        Source: LisectAVT_2403002A_419.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C000400000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, Au3Check.exe, 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, jQRMFClswtrBVwy.pdf.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C000400000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, jQRMFClswtrBVwy.pdf.0.drBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                        Source: Au3Check.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
                        Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_419.exe "C:\Users\user\Desktop\LisectAVT_2403002A_419.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeProcess created: C:\Program Files (x86)\AutoIt3\Au3Check.exe "C:\Program Files (x86)\autoit3\Au3Check.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeProcess created: C:\Program Files (x86)\AutoIt3\Au3Check.exe "C:\Program Files (x86)\autoit3\Au3Check.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: devobj.dllJump to behavior
                        Source: LisectAVT_2403002A_419.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: LisectAVT_2403002A_419.exeStatic PE information: Image base 0x140000000 > 0x60000000
                        Source: LisectAVT_2403002A_419.exeStatic file information: File size 5050885 > 1048576
                        Source: LisectAVT_2403002A_419.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x142c00
                        Source: LisectAVT_2403002A_419.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x356000
                        Source: LisectAVT_2403002A_419.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: CopyFileA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,2_2_005191A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0054B480 SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrlenA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,2_2_0054B480
                        Source: ROxcmXIWiwnYKwA.pdf.0.drStatic PE information: real checksum: 0x465e9 should be: 0x4eff9
                        Source: jQRMFClswtrBVwy.pdf.0.drStatic PE information: real checksum: 0x0 should be: 0x1557f3
                        Source: LisectAVT_2403002A_419.exeStatic PE information: real checksum: 0x4d8c61 should be: 0x4d8c66
                        Source: LisectAVT_2403002A_419.exeStatic PE information: section name: .xdata
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005EFA97 push ecx; ret 2_2_005EFAAA
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\ROxcmXIWiwnYKwA.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\jQRMFClswtrBVwy.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\ROxcmXIWiwnYKwA.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\jQRMFClswtrBVwy.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\jQRMFClswtrBVwy.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\ROxcmXIWiwnYKwA.pdfJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\ROxcmXIWiwnYKwA.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeFile created: C:\Users\user\jQRMFClswtrBVwy.pdfJump to dropped file
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005955B0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_005955B0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_2-80323
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_2-80324
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,2_2_00573A40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeWindow / User API: threadDelayed 1654Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeWindow / User API: threadDelayed 6841Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeDropped PE file which has not been started: C:\Users\user\ROxcmXIWiwnYKwA.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeDropped PE file which has not been started: C:\Users\user\jQRMFClswtrBVwy.pdfJump to dropped file
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_2-80306
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeAPI coverage: 4.4 %
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 7420Thread sleep count: 1654 > 30Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 7420Thread sleep time: -167054s >= -30000sJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 7432Thread sleep count: 315 > 30Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 7420Thread sleep count: 6841 > 30Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 7420Thread sleep time: -690941s >= -30000sJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeLast function: Thread delayed
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeLast function: Thread delayed
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00579610 GetKeyboardLayoutList followed by cmp: cmp ecx, edx and CTI: je 0057962Ah2_2_00579610
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00577750 GetKeyboardLayoutList followed by cmp: cmp eax, 0eh and CTI: jc 00577760h country: Hungarian (hu)2_2_00577750
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00577780 GetKeyboardLayoutList followed by cmp: cmp eax, 21h and CTI: jc 00577790h country: Indonesian (id)2_2_00577780
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00577D40 GetKeyboardLayoutList followed by cmp: cmp eax, 2eh and CTI: jc 00577D50h country: Upper Sorbian (hsb)2_2_00577D40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A4670 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 005A46C1h2_2_005A4670
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0051E150 FindFirstFileA,GetLastError,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,GetFileAttributesA,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,__Mtx_unlock,2_2_0051E150
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0054E2D0 SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CopyFileA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,CopyFileA,__Mtx_unlock,__Mtx_unlock,2_2_0054E2D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0051A750 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,__Mtx_unlock,2_2_0051A750
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005ED997 FindClose,FindFirstFileExW,GetLastError,2_2_005ED997
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005EDA1D GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,2_2_005EDA1D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0051C430 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,2_2_0051C430
                        Source: LisectAVT_2403002A_419.exeBinary or memory string: oTGTaprHP6Aj.(*k79haqX)._vmCie
                        Source: Au3Check.exe, 00000002.00000002.3876523073.00000000007A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}:#\lH
                        Source: LisectAVT_2403002A_419.exe, 00000000.00000002.1510858966.000002BCA3418000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllhk
                        Source: Au3Check.exe, 00000002.00000003.1520539735.00000000007A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}:#\lJ
                        Source: LisectAVT_2403002A_419.exeBinary or memory string: _vmCie
                        Source: Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -t-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_B6FF812C
                        Source: Au3Check.exe, 00000002.00000002.3876523073.000000000079F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: Au3Check.exe, 00000002.00000002.3876343971.000000000019D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}x<us <u
                        Source: Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_B6FF812C
                        Source: Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000="]k
                        Source: Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ?tx<u#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}t
                        Source: Au3Check.exe, 00000002.00000002.3876523073.00000000007A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-9
                        Source: Au3Check.exe, 00000002.00000002.3876523073.0000000000792000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%%
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00524100 IsDebuggerPresent,2_2_00524100
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0054B480 SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrlenA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,2_2_0054B480
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00573A40 mov eax, dword ptr fs:[00000030h]2_2_00573A40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00573A40 mov eax, dword ptr fs:[00000030h]2_2_00573A40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0052C0A0 mov eax, dword ptr fs:[00000030h]2_2_0052C0A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00524100 mov eax, dword ptr fs:[00000030h]2_2_00524100
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005248E0 mov eax, dword ptr fs:[00000030h]2_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00525A10 mov ecx, dword ptr fs:[00000030h]2_2_00525A10
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_0054CA80 mov eax, dword ptr fs:[00000030h]2_2_0054CA80
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00595240 GetProcessHeap,InternetOpenA,InternetOpenUrlA,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,CharNextA,CharNextA,CharNextA,CharNextA,2_2_00595240
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005F006D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_005F006D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005F45A4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_005F45A4
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005EFCC4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_005EFCC4

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeMemory allocated: C:\Program Files (x86)\AutoIt3\Au3Check.exe base: 510000 protect: page execute and read and writeJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00529F50 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,2_2_00529F50
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeMemory written: C:\Program Files (x86)\AutoIt3\Au3Check.exe base: 510000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeMemory written: C:\Program Files (x86)\AutoIt3\Au3Check.exe base: 510000Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeMemory written: C:\Program Files (x86)\AutoIt3\Au3Check.exe base: 3B2008Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeProcess created: C:\Program Files (x86)\AutoIt3\Au3Check.exe "C:\Program Files (x86)\autoit3\Au3Check.exe"Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00524400 cpuid 2_2_00524400
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: EnumSystemLocalesW,2_2_0061004D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_006100D8
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,2_2_0061032B
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00610454
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,2_2_0051C430
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,2_2_006074CE
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,2_2_0061055A
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00610630
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoEx,FormatMessageA,2_2_005ED793
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,2_2_0060FCBB
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,2_2_0060FEC0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: EnumSystemLocalesW,2_2_0060FF67
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: EnumSystemLocalesW,2_2_00606F4A
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: EnumSystemLocalesW,2_2_0060FFB2
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeQueries volume information: C:\Program Files (x86)\AutoIt3\Au3Check.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_419.exeQueries volume information: C:\Program Files (x86)\AutoIt3\Au3Check.exe VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005EF26A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,2_2_005EF26A
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00556230 CopyFileA,RegOpenKeyExA,RegSetValueExA,RegCloseKey,CopyFileA,GetUserNameA,CopyFileA,SHGetFolderPathA,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,ShellExecuteA,2_2_00556230
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_00609160 GetTimeZoneInformation,2_2_00609160
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 2_2_005A4110 GetVersionExA,CreateFileW,CreateFileA,GetDiskFreeSpaceW,GetDiskFreeSpaceA,2_2_005A4110
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000380000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.LisectAVT_2403002A_419.exe.2bce88a0000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000600000.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.LisectAVT_2403002A_419.exe.2bce88a0000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.LisectAVT_2403002A_419.exe.2bce89f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c0009d4000.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.Au3Check.exe.510000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.Au3Check.exe.510000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000888000.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c0009d4000.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.LisectAVT_2403002A_419.exe.2bce89f0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000600000.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000572000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c0004f2000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000888000.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c00052c000.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Au3Check.exe PID: 7416, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\jQRMFClswtrBVwy.pdf, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000380000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.LisectAVT_2403002A_419.exe.2bce88a0000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000600000.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.LisectAVT_2403002A_419.exe.2bce88a0000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.LisectAVT_2403002A_419.exe.2bce89f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c0009d4000.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.Au3Check.exe.510000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.Au3Check.exe.510000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000888000.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c0009d4000.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.LisectAVT_2403002A_419.exe.2bce89f0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000600000.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000572000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c0004f2000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c000888000.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_419.exe.c00052c000.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Au3Check.exe PID: 7416, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\jQRMFClswtrBVwy.pdf, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                        Command and Scripting Interpreter
                        1
                        DLL Side-Loading
                        411
                        Process Injection
                        121
                        Masquerading
                        OS Credential Dumping12
                        System Time Discovery
                        Remote Services1
                        Screen Capture
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts12
                        Native API
                        Boot or Logon Initialization Scripts1
                        DLL Side-Loading
                        11
                        Virtualization/Sandbox Evasion
                        LSASS Memory131
                        Security Software Discovery
                        Remote Desktop Protocol1
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)411
                        Process Injection
                        Security Account Manager11
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Ingress Tool Transfer
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Deobfuscate/Decode Files or Information
                        NTDS11
                        Process Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                        Obfuscated Files or Information
                        LSA Secrets1
                        Application Window Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        DLL Side-Loading
                        Cached Domain Credentials1
                        Account Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                        System Owner/User Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                        File and Directory Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow46
                        System Information Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://www.winimage.com/zLibDll0%URL Reputationsafe
                        https://ipinfo.io/0%URL Reputationsafe
                        https://www.autoitscript.com/autoit3/0%Avira URL Cloudsafe
                        https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
                        https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
                        https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
                        No contacted domains info
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C000400000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, jQRMFClswtrBVwy.pdf.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.winimage.com/zLibDllLisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C000400000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, Au3Check.exe, 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, jQRMFClswtrBVwy.pdf.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://t.me/RiseProSUPPORTAu3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ipinfo.io/Au3Check.exefalse
                        • URL Reputation: safe
                        unknown
                        https://www.autoitscript.com/autoit3/LisectAVT_2403002A_419.exe, 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000003.1507541737.000002BCE8A40000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_419.exe, 00000000.00000002.1508940725.000000C0000F4000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000002.00000002.3876523073.000000000073E000.00000004.00000020.00020000.00000000.sdmp, ROxcmXIWiwnYKwA.pdf.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.maxmind.com/en/locate-my-ip-addressAu3Check.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        193.233.132.67
                        unknownRussian Federation
                        2895FREE-NET-ASFREEnetEUfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1482269
                        Start date and time:2024-07-25 20:23:23 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 4s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:9
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:LisectAVT_2403002A_419.exe
                        Detection:MAL
                        Classification:mal84.troj.evad.winEXE@3/2@0/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target LisectAVT_2403002A_419.exe, PID 7272 because there are no executed function
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • VT rate limit hit for: LisectAVT_2403002A_419.exe
                        TimeTypeDescription
                        14:25:02API Interceptor1129904x Sleep call for process: Au3Check.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        193.233.132.67file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                        • 193.233.132.67:8081/static/crypted_f961bb26.exe
                        SecuriteInfo.com.Win32.PWSX-gen.9534.16812.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                        • 193.233.132.67:8081/static/crypted_f961bb26.exe
                        file.exeGet hashmaliciousRisePro StealerBrowse
                        • 193.233.132.67:666/static/rise.exe
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        FREE-NET-ASFREEnetEULisectAVT_2403002A_464.exeGet hashmaliciousRisePro StealerBrowse
                        • 193.233.132.109
                        LisectAVT_2403002A_464.exeGet hashmaliciousRisePro StealerBrowse
                        • 193.233.132.109
                        LisectAVT_2403002A_79.exeGet hashmaliciousAmadeyBrowse
                        • 193.233.132.56
                        LisectAVT_2403002B_242.exeGet hashmaliciousRisePro StealerBrowse
                        • 193.233.132.74
                        LisectAVT_2403002B_433.exeGet hashmaliciousAmadeyBrowse
                        • 193.233.132.56
                        Lisect_AVT_24003_G1B_108.exeGet hashmaliciousRisePro StealerBrowse
                        • 193.233.132.62
                        Lisect_AVT_24003_G1A_89.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                        • 193.233.132.62
                        Lisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                        • 193.233.132.62
                        LisectAVT_2403002A_262.exeGet hashmaliciousRisePro StealerBrowse
                        • 193.233.132.190
                        LisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
                        • 193.233.132.74
                        No context
                        No context
                        Process:C:\Users\user\Desktop\LisectAVT_2403002A_419.exe
                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):284088
                        Entropy (8bit):6.5839751375706195
                        Encrypted:false
                        SSDEEP:3072:4wOvOIXbP5KVkD8QC2mCBFv9m7usyT8tKQ9clyPqlO91/iDVSsWUG0bCP0l/rUT+:nCb4VQjVsxyItKQNhigibiKwDU
                        MD5:DA03D5D29A3F3528D91A150E5679AC97
                        SHA1:D5F7922707254D7DC8035AD1DD858726A82070E5
                        SHA-256:5BDE05F7AC626D14F39C4745BD9B457454FE15ED23E78D4FDDA42D2C600834A3
                        SHA-512:0435FC939E2AFEF975C33694B4EC65E831C89816D337B8ABAE8919E0F2E8033C778F18572D7E4CF8262E81BF759978613E7B1BBC95F6DB1ECB36A1BACBB69F6D
                        Malicious:true
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.~.2.-.2.-.2.-n.G-.2.-n.E-J2.-n.D-.2.-.Z.,.2.-.Z.,.2.-.Z.,.2.-.J%-.2.-.2.-.2.-.[.,.2.-.[I-.2.-.2!-.2.-.[.,.2.-Rich.2.-........................PE..L...g.(c.....................6......&........0....@..................................e......................................,b..<....p...............l..h&...........L..8............................L..@............0..,............................text............................... ..`.rdata...8...0...:..."..............@..@.data........p.......\..............@....rsrc........p.......f..............@..@................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\LisectAVT_2403002A_419.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):1357136
                        Entropy (8bit):6.739855442755242
                        Encrypted:false
                        SSDEEP:24576:9jhWSkCh5jR4pkIhn1Fg7YqPCxYL+ID4ntel4LbKbmNTwEBzpKPSa72gn/:Ob6jCkIhn1PGyuFbmNTrzAPSaP
                        MD5:EBE3AA84AB79715A8A97D1D9211D30CF
                        SHA1:DB233BD7FFD956C164722DDEC309E84481EE17F6
                        SHA-256:22ABEAE29927CD4A1A70E774EA9050D64CB63FC18206AF294B99F839EB1BB3A4
                        SHA-512:6DC0B98E0432F095D79A5025FB03B68F79E86E7DE3905FA2D55407BEDFB0245B6716194F8A1E47ED1BB811A50577F7FFEF9E4DB206C8102A1B29479552F55D54
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: C:\Users\user\jQRMFClswtrBVwy.pdf, Author: Joe Security
                        Reputation:low
                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$......."...f.{Tf.{Tf.{T-.xUk.{T-.~U..{T-.|Ug.{T)..Tb.{T)..Ut.{T).xUq.{T).~U3.{T-..U..{T-.}Ug.{T-.zU}.{Tf.zT@.{T..rUz.{T..{Ug.{T...Tg.{Tf..Tg.{T..yUg.{TRichf.{T................PE..L.....e...............".....0....................@..........................0............@.............................L...\...........X+.......................z..8k..8...........................xj..@............................................text...X........................... ..`.rdata...<.......>..................@..@.data....H...0...4..................@....rsrc...X+.......,...J..............@..@.reloc...z.......|...v..............@..B................................................................................................................................................................................................................................................................
                        File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                        Entropy (8bit):7.02180932844593
                        TrID:
                        • Win64 Executable (generic) (12005/4) 74.95%
                        • Generic Win/DOS Executable (2004/3) 12.51%
                        • DOS Executable Generic (2002/1) 12.50%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                        File name:LisectAVT_2403002A_419.exe
                        File size:5'050'885 bytes
                        MD5:42b90e270ab9cc4d1f6354045048b538
                        SHA1:080d0df0d03f707096cb974da2d683037e9cc63a
                        SHA256:e4883bfe1480181df3d2eb0e0a587be359260ee11a32176aab234eb707fe6f76
                        SHA512:fac869f426d33a58edf8af7b39b3615d774c951174f87ad9e61aee8e06457a95b81c8264db5e2632e7a4f0071cb509392dde14f0fbf212a5bb636852d249ca04
                        SSDEEP:49152:vQsLHy/+BFCdShmG/RcxajYhJ5J8tEdTZaEjkulvWKw9pE6UumTS58M3g3hQjDVj:5O/+bzE3BjkV99C64u5o4JHpV
                        TLSH:58369C87BC9444F5C0EED336886656827B31BC480F3027D72A50BFA92E7ABD5AD75318
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$.,....M................@..............................S.....a.M...`... ............................
                        Icon Hash:4951468062846465
                        Entrypoint:0x1400014c0
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                        TLS Callbacks:0x401384a0, 0x1, 0x40138470, 0x1, 0x4013bf00, 0x1
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:1
                        File Version Major:6
                        File Version Minor:1
                        Subsystem Version Major:6
                        Subsystem Version Minor:1
                        Import Hash:5929190c8765f5bc37b052ab5c6c53e7
                        Instruction
                        dec eax
                        sub esp, 28h
                        dec eax
                        mov eax, dword ptr [004C0375h]
                        mov dword ptr [eax], 00000001h
                        call 00007F1628AD1FDFh
                        nop
                        nop
                        dec eax
                        add esp, 28h
                        ret
                        nop dword ptr [eax]
                        dec eax
                        sub esp, 28h
                        dec eax
                        mov eax, dword ptr [004C0355h]
                        mov dword ptr [eax], 00000000h
                        call 00007F1628AD1FBFh
                        nop
                        nop
                        dec eax
                        add esp, 28h
                        ret
                        nop dword ptr [eax]
                        dec eax
                        sub esp, 28h
                        call 00007F1628C1408Ch
                        dec eax
                        test eax, eax
                        sete al
                        movzx eax, al
                        neg eax
                        dec eax
                        add esp, 28h
                        ret
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        dec eax
                        lea ecx, dword ptr [00000009h]
                        jmp 00007F1628AD22F9h
                        nop dword ptr [eax+00h]
                        ret
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        push ebp
                        dec eax
                        mov ebp, esp
                        dec eax
                        sub esp, 10h
                        dec eax
                        mov ecx, dword ptr [00158619h]
                        dec eax
                        mov edx, dword ptr [0015860Ah]
                        dec eax
                        cmp eax, ecx
                        jnl 00007F1628AD233Ah
                        jnc 00007F1628AD2354h
                        dec eax
                        shl eax, 04h
                        dec eax
                        mov ecx, dword ptr [edx+eax]
                        dec eax
                        mov ebx, dword ptr [edx+eax+08h]
                        dec eax
                        mov eax, ecx
                        dec eax
                        add esp, 10h
                        pop ebp
                        ret
                        dec eax
                        test ecx, ecx
                        jbe 00007F1628AD232Fh
                        dec eax
                        mov eax, dword ptr [edx]
                        dec eax
                        mov ebx, dword ptr [edx+08h]
                        dec eax
                        add esp, 10h
                        pop ebp
                        ret
                        xor eax, eax
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x5240000x4e.edata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x5250000x13d0.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5290000x10d5.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4c20000x7398.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x52b0000x56c0.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x4c11a00x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x52547c0x440.idata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x142a300x142c00ec60e9450167f49a2e3734f1215e2d8fFalse0.4552717733346243data6.2608703171217615IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x1440000x27b300x27c0066b100cb0ab9e270ffb1292af60b6ddfFalse0.3416371855345912data4.14020611943253IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rdata0x16c0000x355fd00x35600050c5b5722bfdab825047d1d6cf4de2bcunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .pdata0x4c20000x73980x74000d4944f904275b17f0ba20c90b6309e0False0.42120150862068967data5.498119784883578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .xdata0x4ca0000xc380xe000418035c41906d786a61478e845b8e57False0.2544642857142857data3.9697108368799037IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .bss0x4cb0000x588600x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .edata0x5240000x4e0x200a35245cf06a3071989cfb9fc14559e26False0.1328125data0.8426867641107897IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .idata0x5250000x13d00x14006a88646a8e1dfcf2a0b9107b9612c66eFalse0.3169921875data4.483269562379886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .CRT0x5270000x700x200603a409fb97f7928c0617e2ab51b1a0bFalse0.080078125data0.4511542940585521IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .tls0x5280000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x5290000x10d50x12002bf279738e4285db6e16a2026c40ba52False0.5733506944444444data5.997066503649664IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0x52b0000x56c00x5800158b93ec0088398751adcb6e3b3ef0afFalse0.3039772727272727data5.387308434369343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x52913c0x79dPNG image data, 256 x 256, 8-bit/color RGB, non-interlaced0.7855310415597743
                        RT_GROUP_ICON0x5298dc0x14data1.05
                        RT_VERSION0x5298f00x378dataEnglishUnited States0.47072072072072074
                        RT_MANIFEST0x529c680x46dXML 1.0 document, ASCII textEnglishUnited States0.4510150044130627
                        DLLImport
                        KERNEL32.dllAddAtomA, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreA, CreateThread, CreateWaitableTimerExW, DeleteAtom, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, FindAtomA, FormatMessageA, FreeEnvironmentStringsW, GetAtomNameA, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetErrorMode, GetHandleInformation, GetLastError, GetProcAddress, GetProcessAffinityMask, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, RaiseFailFastException, ReleaseMutex, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetLastError, SetProcessAffinityMask, SetProcessPriorityBoost, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                        msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _beginthread, _beginthreadex, _cexit, _commode, _endthreadex, _errno, _fmode, _initterm, _lock, _memccpy, _onexit, _setjmp, _strdup, _ultoa, _unlock, abort, calloc, exit, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memcpy, memmove, memset, printf, realloc, signal, strerror, strlen, strncmp, vfprintf, wcslen
                        NameOrdinalAddress
                        _cgo_dummy_export10x140522a90
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                        2024-07-25T20:24:30.069059+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet497055000192.168.2.8193.233.132.67
                        2024-07-25T20:25:13.610035+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970820.12.23.50192.168.2.8
                        2024-07-25T20:24:33.064109+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)497055000192.168.2.8193.233.132.67
                        2024-07-25T20:24:36.289495+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970620.12.23.50192.168.2.8
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 25, 2024 20:24:30.045792103 CEST497055000192.168.2.8193.233.132.67
                        Jul 25, 2024 20:24:30.051371098 CEST500049705193.233.132.67192.168.2.8
                        Jul 25, 2024 20:24:30.051485062 CEST497055000192.168.2.8193.233.132.67
                        Jul 25, 2024 20:24:30.069058895 CEST497055000192.168.2.8193.233.132.67
                        Jul 25, 2024 20:24:30.076714993 CEST500049705193.233.132.67192.168.2.8
                        Jul 25, 2024 20:24:33.064109087 CEST497055000192.168.2.8193.233.132.67
                        Jul 25, 2024 20:24:33.069199085 CEST500049705193.233.132.67192.168.2.8
                        Jul 25, 2024 20:24:51.465765953 CEST500049705193.233.132.67192.168.2.8
                        Jul 25, 2024 20:24:51.465946913 CEST497055000192.168.2.8193.233.132.67

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:14:24:17
                        Start date:25/07/2024
                        Path:C:\Users\user\Desktop\LisectAVT_2403002A_419.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_419.exe"
                        Imagebase:0x7ff642110000
                        File size:5'050'885 bytes
                        MD5 hash:42B90E270AB9CC4D1F6354045048B538
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Go lang
                        Yara matches:
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.1507782336.000002BCE88A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.1457225393.000002BCE89F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.1509621033.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.1510031771.000000C000800000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:14:24:28
                        Start date:25/07/2024
                        Path:C:\Program Files (x86)\AutoIt3\Au3Check.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\autoit3\Au3Check.exe"
                        Imagebase:0x400000
                        File size:234'088 bytes
                        MD5 hash:3BE697D1A92115D5CA76A633A527DFB7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:moderate
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:6.6%
                          Total number of Nodes:653
                          Total number of Limit Nodes:20
                          execution_graph 80547 514050 43 API calls 80549 5ee04a 16 API calls 2 library calls 80550 569440 184 API calls 4 library calls 80322 573a40 GetCursorPos 80323 573a55 GetCursorPos 80322->80323 80324 573b28 GetPEB 80323->80324 80327 573a67 80323->80327 80324->80327 80325 573a73 GetPEB 80325->80327 80326 573b9d Sleep 80326->80323 80327->80324 80327->80325 80327->80326 80327->80327 80328 573ae8 Sleep GetCursorPos 80327->80328 80329 573bc7 80327->80329 80328->80324 80328->80327 80676 59fe70 InitializeCriticalSection 80677 5a4670 GetSystemTime GetCurrentProcessId GetTickCount QueryPerformanceCounter 80555 5f386f 54 API calls 3 library calls 80556 515460 60 API calls ___std_fs_directory_iterator_advance@8 80557 552860 48 API calls 4 library calls 80558 578860 69 API calls 80680 5fde68 40 API calls 3 library calls 80682 5efe63 51 API calls _unexpected 80683 5ff260 21 API calls CallUnexpected 79768 51a210 79790 5ef290 79768->79790 79770 51a248 79800 512ae0 79770->79800 79772 51a28b 79816 5f5362 79772->79816 79775 51a377 error_info_injector 79779 51a34e 79779->79775 79845 5f47b0 79779->79845 79782 5f9136 66 API calls 79784 51a2fc 79782->79784 79786 51a318 79784->79786 79831 57cf60 79784->79831 79836 5fdbdf 79786->79836 79792 5ef295 ___std_exception_copy 79790->79792 79791 5ef2af 79791->79770 79792->79791 79795 5121d0 Concurrency::cancel_current_task 79792->79795 79852 6017d8 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 79792->79852 79794 5ef2bb 79794->79794 79795->79794 79850 5f0efb RaiseException 79795->79850 79797 5121ec 79851 5f0651 39 API calls 2 library calls 79797->79851 79799 512213 79799->79770 79801 512ba5 79800->79801 79807 512af6 79800->79807 79853 512270 40 API calls 79801->79853 79803 512b02 __Strxfrm 79803->79772 79804 512baa 79854 5121d0 40 API calls 2 library calls 79804->79854 79805 512b2a 79808 5ef290 std::_Facet_Register 40 API calls 79805->79808 79807->79803 79807->79805 79810 512b65 79807->79810 79811 512b6e 79807->79811 79809 512b3d 79808->79809 79812 5f47b0 39 API calls 79809->79812 79815 512b46 __Strxfrm 79809->79815 79810->79804 79810->79805 79814 5ef290 std::_Facet_Register 40 API calls 79811->79814 79811->79815 79813 512bb4 79812->79813 79814->79815 79815->79772 79855 5f52a0 79816->79855 79819 5f9136 79820 5f9149 ___std_exception_copy 79819->79820 79910 5f8e8d 79820->79910 79825 5f4eeb 79826 5f4efe ___std_exception_copy 79825->79826 79989 5f4801 79826->79989 79829 5f44dc ___std_exception_copy 39 API calls 79830 51a2f0 79829->79830 79830->79782 79832 57cfa7 79831->79832 79833 57cf78 __fread_nolock 79831->79833 80040 580560 79832->80040 79833->79786 79835 57cfba 79835->79786 80057 5fdbfc 79836->80057 79839 5f8be8 79840 5f8bfb ___std_exception_copy 79839->79840 80198 5f8ac3 79840->80198 79842 5f8c07 79843 5f44dc ___std_exception_copy 39 API calls 79842->79843 79844 5f8c13 79843->79844 79844->79779 80265 5f46ec 39 API calls ___std_exception_copy 79845->80265 79847 5f47bf 80266 5f47cd 11 API calls CallUnexpected 79847->80266 79849 5f47cc 79850->79797 79851->79799 79852->79792 79854->79809 79858 5f52ac __FrameHandler3::FrameUnwindToState 79855->79858 79856 5f52b3 79880 5fd23f 14 API calls __Strcoll 79856->79880 79858->79856 79859 5f52d3 79858->79859 79861 5f52d8 79859->79861 79862 5f52e5 79859->79862 79860 5f52b8 79881 5f47a0 39 API calls ___std_exception_copy 79860->79881 79882 5fd23f 14 API calls __Strcoll 79861->79882 79872 606688 79862->79872 79867 5f52f5 79883 5fd23f 14 API calls __Strcoll 79867->79883 79868 5f5302 79884 5f5340 LeaveCriticalSection __fread_nolock 79868->79884 79871 51a2d7 79871->79779 79871->79819 79873 606694 __FrameHandler3::FrameUnwindToState 79872->79873 79885 5ffd09 EnterCriticalSection 79873->79885 79875 6066a2 79886 60672c 79875->79886 79880->79860 79881->79871 79882->79871 79883->79871 79884->79871 79885->79875 79893 60674f 79886->79893 79887 6066af 79900 6066e8 79887->79900 79888 6067a7 79905 6063f3 14 API calls 3 library calls 79888->79905 79890 6067b0 79906 606db3 14 API calls 2 library calls 79890->79906 79893->79887 79893->79888 79893->79893 79903 5fcd90 EnterCriticalSection 79893->79903 79904 5fcda4 LeaveCriticalSection 79893->79904 79894 6067b9 79894->79887 79907 60758e 6 API calls _unexpected 79894->79907 79896 6067d8 79908 5fcd90 EnterCriticalSection 79896->79908 79899 6067eb 79899->79887 79909 5ffd51 LeaveCriticalSection 79900->79909 79902 5f52ee 79902->79867 79902->79868 79903->79893 79904->79893 79905->79890 79906->79894 79907->79896 79908->79899 79909->79902 79912 5f8e99 __FrameHandler3::FrameUnwindToState 79910->79912 79911 5f8e9f 79937 5f4723 39 API calls 2 library calls 79911->79937 79912->79911 79915 5f8ee2 79912->79915 79914 5f8eba 79921 5f44dc 79914->79921 79927 5fcd90 EnterCriticalSection 79915->79927 79917 5f8eee 79928 5f9010 79917->79928 79919 5f8f04 79938 5f8f2d LeaveCriticalSection __fread_nolock 79919->79938 79922 5f44e8 79921->79922 79923 5f44ff 79922->79923 79987 5f4587 39 API calls 2 library calls 79922->79987 79926 51a2ea 79923->79926 79988 5f4587 39 API calls 2 library calls 79923->79988 79926->79825 79927->79917 79929 5f9036 79928->79929 79930 5f9023 79928->79930 79939 5f8f37 79929->79939 79930->79919 79932 5f90e7 79932->79919 79933 5f9059 79933->79932 79943 5f55d3 79933->79943 79937->79914 79938->79914 79940 5f8f48 79939->79940 79942 5f8fa0 79939->79942 79940->79942 79952 5fe13d 41 API calls 2 library calls 79940->79952 79942->79933 79944 5f5613 79943->79944 79945 5f55ec 79943->79945 79949 5fe17d 79944->79949 79945->79944 79953 605f82 79945->79953 79947 5f5608 79960 60538b 64 API calls 3 library calls 79947->79960 79963 5fe05c 79949->79963 79951 5fe196 79951->79932 79952->79942 79954 605fa3 79953->79954 79955 605f8e 79953->79955 79954->79947 79961 5fd23f 14 API calls __Strcoll 79955->79961 79957 605f93 79962 5f47a0 39 API calls ___std_exception_copy 79957->79962 79959 605f9e 79959->79947 79960->79944 79961->79957 79962->79959 79969 60a6de 79963->79969 79965 5fe06e 79966 5fe08a SetFilePointerEx 79965->79966 79968 5fe076 __fread_nolock 79965->79968 79967 5fe0a2 GetLastError 79966->79967 79966->79968 79967->79968 79968->79951 79970 60a700 79969->79970 79971 60a6eb 79969->79971 79976 60a725 79970->79976 79984 5fd22c 14 API calls __Strcoll 79970->79984 79982 5fd22c 14 API calls __Strcoll 79971->79982 79973 60a6f0 79983 5fd23f 14 API calls __Strcoll 79973->79983 79976->79965 79977 60a730 79985 5fd23f 14 API calls __Strcoll 79977->79985 79978 60a6f8 79978->79965 79980 60a738 79986 5f47a0 39 API calls ___std_exception_copy 79980->79986 79982->79973 79983->79978 79984->79977 79985->79980 79986->79978 79987->79923 79988->79926 79990 5f480d __FrameHandler3::FrameUnwindToState 79989->79990 79991 5f4835 79990->79991 79992 5f4814 79990->79992 80000 5fcd90 EnterCriticalSection 79991->80000 80004 5f4723 39 API calls 2 library calls 79992->80004 79995 5f482d 79995->79829 79996 5f4840 80001 5f4910 79996->80001 80000->79996 80006 5f4942 80001->80006 80003 5f484f 80005 5f4877 LeaveCriticalSection __fread_nolock 80003->80005 80004->79995 80005->79995 80007 5f4979 80006->80007 80008 5f4951 80006->80008 80010 605f82 __fread_nolock 39 API calls 80007->80010 80023 5f4723 39 API calls 2 library calls 80008->80023 80011 5f4982 80010->80011 80020 5fe11f 80011->80020 80014 5f4a2c 80024 5f4cae 44 API calls 4 library calls 80014->80024 80016 5f496c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 80016->80003 80017 5f4a43 80017->80016 80025 5f4ae3 43 API calls 2 library calls 80017->80025 80018 5f4a3b 80018->80016 80026 5fdf37 80020->80026 80023->80016 80024->80018 80025->80016 80027 5fdf43 __FrameHandler3::FrameUnwindToState 80026->80027 80028 5f49a0 80027->80028 80029 5fdf86 80027->80029 80031 5fdfcc 80027->80031 80028->80014 80028->80016 80028->80017 80038 5f4723 39 API calls 2 library calls 80029->80038 80037 60a462 EnterCriticalSection 80031->80037 80033 5fdfd2 80034 5fdff3 80033->80034 80035 5fe05c __fread_nolock 41 API calls 80033->80035 80039 5fe054 LeaveCriticalSection __wsopen_s 80034->80039 80035->80034 80037->80033 80038->80028 80039->80028 80041 5806a9 80040->80041 80042 580585 80040->80042 80055 512270 40 API calls 80041->80055 80043 58059a 80042->80043 80047 5805f0 80042->80047 80048 5805e3 80042->80048 80049 5ef290 std::_Facet_Register 40 API calls 80043->80049 80045 5806ae 80056 5121d0 40 API calls 2 library calls 80045->80056 80051 5ef290 std::_Facet_Register 40 API calls 80047->80051 80053 5805aa __fread_nolock __Strxfrm 80047->80053 80048->80043 80048->80045 80049->80053 80050 5f47b0 39 API calls 80052 5806b8 80050->80052 80051->80053 80053->80050 80054 580667 __fread_nolock error_info_injector __Strxfrm 80053->80054 80054->79835 80056->80053 80058 5fdc08 __FrameHandler3::FrameUnwindToState 80057->80058 80059 5fdc52 80058->80059 80061 5fdc1b __fread_nolock 80058->80061 80069 51a348 80058->80069 80070 5fcd90 EnterCriticalSection 80059->80070 80084 5fd23f 14 API calls __Strcoll 80061->80084 80063 5fdc5c 80071 5fda06 80063->80071 80064 5fdc35 80085 5f47a0 39 API calls ___std_exception_copy 80064->80085 80069->79839 80070->80063 80072 5fda35 80071->80072 80075 5fda18 __fread_nolock 80071->80075 80086 5fdc91 LeaveCriticalSection __fread_nolock 80072->80086 80073 5fda25 80152 5fd23f 14 API calls __Strcoll 80073->80152 80075->80072 80075->80073 80077 5fda76 __fread_nolock 80075->80077 80077->80072 80079 605f82 __fread_nolock 39 API calls 80077->80079 80081 5fdba1 __fread_nolock 80077->80081 80087 604623 80077->80087 80154 5f8a2b 39 API calls 4 library calls 80077->80154 80079->80077 80155 5fd23f 14 API calls __Strcoll 80081->80155 80082 5fda2a 80153 5f47a0 39 API calls ___std_exception_copy 80082->80153 80084->80064 80085->80069 80086->80069 80088 604635 80087->80088 80089 60464d 80087->80089 80172 5fd22c 14 API calls __Strcoll 80088->80172 80090 60498f 80089->80090 80094 604690 80089->80094 80190 5fd22c 14 API calls __Strcoll 80090->80190 80092 60463a 80173 5fd23f 14 API calls __Strcoll 80092->80173 80097 60469b 80094->80097 80098 604642 80094->80098 80105 6046cb 80094->80105 80096 604994 80191 5fd23f 14 API calls __Strcoll 80096->80191 80174 5fd22c 14 API calls __Strcoll 80097->80174 80098->80077 80100 6046a8 80192 5f47a0 39 API calls ___std_exception_copy 80100->80192 80102 6046a0 80175 5fd23f 14 API calls __Strcoll 80102->80175 80106 6046e4 80105->80106 80107 6046f1 80105->80107 80108 60471f 80105->80108 80106->80107 80141 60470d 80106->80141 80176 5fd22c 14 API calls __Strcoll 80107->80176 80156 606e2d 80108->80156 80110 6046f6 80177 5fd23f 14 API calls __Strcoll 80110->80177 80115 6046fd 80178 5f47a0 39 API calls ___std_exception_copy 80115->80178 80116 60486b 80119 6048df 80116->80119 80122 604884 GetConsoleMode 80116->80122 80121 6048e3 ReadFile 80119->80121 80120 604739 80180 606db3 14 API calls 2 library calls 80120->80180 80124 604957 GetLastError 80121->80124 80125 6048fb 80121->80125 80122->80119 80126 604895 80122->80126 80130 604964 80124->80130 80131 6048bb 80124->80131 80125->80124 80132 6048d4 80125->80132 80126->80121 80133 60489b ReadConsoleW 80126->80133 80127 604740 80128 604765 80127->80128 80129 60474a 80127->80129 80183 5fe13d 41 API calls 2 library calls 80128->80183 80181 5fd23f 14 API calls __Strcoll 80129->80181 80188 5fd23f 14 API calls __Strcoll 80130->80188 80150 604708 __fread_nolock 80131->80150 80184 5fd1e5 14 API calls 2 library calls 80131->80184 80145 604920 80132->80145 80146 604937 80132->80146 80132->80150 80133->80132 80137 6048b5 GetLastError 80133->80137 80137->80131 80139 60474f 80182 5fd22c 14 API calls __Strcoll 80139->80182 80140 604969 80189 5fd22c 14 API calls __Strcoll 80140->80189 80163 610d44 80141->80163 80186 604335 44 API calls 4 library calls 80145->80186 80148 604950 80146->80148 80146->80150 80187 60417b 42 API calls __fread_nolock 80148->80187 80185 606db3 14 API calls 2 library calls 80150->80185 80151 604955 80151->80150 80152->80082 80153->80072 80154->80077 80155->80082 80157 606e6b 80156->80157 80161 606e3b _strftime 80156->80161 80194 5fd23f 14 API calls __Strcoll 80157->80194 80159 606e56 RtlAllocateHeap 80160 604730 80159->80160 80159->80161 80179 606db3 14 API calls 2 library calls 80160->80179 80161->80157 80161->80159 80193 6017d8 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 80161->80193 80164 610d51 80163->80164 80165 610d5e 80163->80165 80195 5fd23f 14 API calls __Strcoll 80164->80195 80167 610d6a 80165->80167 80196 5fd23f 14 API calls __Strcoll 80165->80196 80167->80116 80169 610d56 80169->80116 80170 610d8b 80197 5f47a0 39 API calls ___std_exception_copy 80170->80197 80172->80092 80173->80098 80174->80102 80175->80100 80176->80110 80177->80115 80178->80150 80179->80120 80180->80127 80181->80139 80182->80150 80183->80141 80184->80150 80185->80098 80186->80150 80187->80151 80188->80140 80189->80150 80190->80096 80191->80100 80192->80098 80193->80161 80194->80160 80195->80169 80196->80170 80197->80169 80199 5f8acf __FrameHandler3::FrameUnwindToState 80198->80199 80200 5f8afc 80199->80200 80201 5f8ad9 80199->80201 80203 5f8af4 80200->80203 80209 5fcd90 EnterCriticalSection 80200->80209 80224 5f4723 39 API calls 2 library calls 80201->80224 80203->79842 80205 5f8b1a 80210 5f8b5a 80205->80210 80207 5f8b27 80225 5f8b52 LeaveCriticalSection __fread_nolock 80207->80225 80209->80205 80211 5f8b8a 80210->80211 80212 5f8b67 80210->80212 80214 5f55d3 ___scrt_uninitialize_crt 64 API calls 80211->80214 80221 5f8b82 80211->80221 80237 5f4723 39 API calls 2 library calls 80212->80237 80215 5f8ba2 80214->80215 80226 606ded 80215->80226 80218 605f82 __fread_nolock 39 API calls 80219 5f8bb6 80218->80219 80230 604a3f 80219->80230 80221->80207 80224->80203 80225->80203 80227 606e04 80226->80227 80228 5f8baa 80226->80228 80227->80228 80239 606db3 14 API calls 2 library calls 80227->80239 80228->80218 80231 5f8bbd 80230->80231 80233 604a68 80230->80233 80231->80221 80238 606db3 14 API calls 2 library calls 80231->80238 80232 604ab7 80248 5f4723 39 API calls 2 library calls 80232->80248 80233->80232 80235 604a8f 80233->80235 80240 6049ae 80235->80240 80237->80221 80238->80221 80239->80228 80241 6049ba __FrameHandler3::FrameUnwindToState 80240->80241 80249 60a462 EnterCriticalSection 80241->80249 80243 6049c8 80244 6049f9 80243->80244 80250 604b12 80243->80250 80263 604a33 LeaveCriticalSection __wsopen_s 80244->80263 80247 604a1c 80247->80231 80248->80231 80249->80243 80251 60a6de __fread_nolock 39 API calls 80250->80251 80253 604b22 80251->80253 80252 604b28 80264 60a64d 15 API calls 3 library calls 80252->80264 80253->80252 80254 604b5a 80253->80254 80256 60a6de __fread_nolock 39 API calls 80253->80256 80254->80252 80257 60a6de __fread_nolock 39 API calls 80254->80257 80258 604b51 80256->80258 80259 604b66 FindCloseChangeNotification 80257->80259 80260 60a6de __fread_nolock 39 API calls 80258->80260 80259->80252 80261 604b72 GetLastError 80259->80261 80260->80254 80261->80252 80262 604b80 __fread_nolock 80262->80244 80263->80247 80264->80262 80265->79847 80266->79849 80684 513610 43 API calls 80688 5f2e10 20 API calls 5 library calls 80564 524400 GetModuleHandleA 80689 52ea00 71 API calls error_info_injector 80690 57e200 48 API calls std::_Facet_Register 80566 580c00 45 API calls __Strcoll 80568 51c430 189 API calls 2 library calls 80692 512230 39 API calls ___std_exception_copy 80693 5ff23a 41 API calls 4 library calls 80694 556230 178 API calls __fread_nolock 80572 5ff82f 47 API calls 5 library calls 80697 515a20 49 API calls 80699 57ee20 75 API calls 80330 606a18 80335 6067ee 80330->80335 80333 606a57 80336 60680d 80335->80336 80337 606820 80336->80337 80345 606835 80336->80345 80355 5fd23f 14 API calls __Strcoll 80337->80355 80339 606825 80356 5f47a0 39 API calls ___std_exception_copy 80339->80356 80341 606830 80341->80333 80352 5fe7f3 80341->80352 80343 606a06 80361 5f47a0 39 API calls ___std_exception_copy 80343->80361 80345->80345 80350 606955 80345->80350 80357 5fcaee 39 API calls 2 library calls 80345->80357 80347 6069a5 80347->80350 80358 5fcaee 39 API calls 2 library calls 80347->80358 80349 6069c3 80349->80350 80359 5fcaee 39 API calls 2 library calls 80349->80359 80350->80341 80360 5fd23f 14 API calls __Strcoll 80350->80360 80362 5fe19b 80352->80362 80355->80339 80356->80341 80357->80347 80358->80349 80359->80350 80360->80343 80361->80341 80364 5fe1a7 __FrameHandler3::FrameUnwindToState 80362->80364 80363 5fe1ae 80382 5fd23f 14 API calls __Strcoll 80363->80382 80364->80363 80367 5fe1d9 80364->80367 80366 5fe1b3 80383 5f47a0 39 API calls ___std_exception_copy 80366->80383 80373 5fe785 80367->80373 80372 5fe1bd 80372->80333 80385 5f8ce7 80373->80385 80378 5fe7bb 80380 5fe1fd 80378->80380 80440 606db3 14 API calls 2 library calls 80378->80440 80384 5fe230 LeaveCriticalSection __wsopen_s 80380->80384 80382->80366 80383->80372 80384->80372 80441 5f50f0 80385->80441 80389 5f8d0b 80390 5f8cca 80389->80390 80453 5f8c18 80390->80453 80393 5fe813 80478 5fe561 80393->80478 80396 5fe85e 80496 60a53a 80396->80496 80397 5fe845 80510 5fd22c 14 API calls __Strcoll 80397->80510 80401 5fe84a 80511 5fd23f 14 API calls __Strcoll 80401->80511 80402 5fe86c 80512 5fd22c 14 API calls __Strcoll 80402->80512 80403 5fe883 80509 5fe4cc CreateFileW 80403->80509 80407 5fe871 80513 5fd23f 14 API calls __Strcoll 80407->80513 80408 5fe857 80408->80378 80410 5fe939 GetFileType 80411 5fe98b 80410->80411 80412 5fe944 GetLastError 80410->80412 80518 60a485 15 API calls 3 library calls 80411->80518 80516 5fd1e5 14 API calls 2 library calls 80412->80516 80413 5fe90e GetLastError 80515 5fd1e5 14 API calls 2 library calls 80413->80515 80416 5fe8bc 80416->80410 80416->80413 80514 5fe4cc CreateFileW 80416->80514 80417 5fe952 CloseHandle 80417->80401 80419 5fe97b 80417->80419 80517 5fd23f 14 API calls __Strcoll 80419->80517 80421 5fe901 80421->80410 80421->80413 80422 5fe9ac 80424 5fe9f8 80422->80424 80519 5fe6db 73 API calls 4 library calls 80422->80519 80429 5fe9ff 80424->80429 80521 5fe276 73 API calls 4 library calls 80424->80521 80425 5fe980 80425->80401 80428 5fea2d 80428->80429 80430 5fea3b 80428->80430 80520 604ae2 42 API calls 2 library calls 80429->80520 80430->80408 80432 5feab7 CloseHandle 80430->80432 80522 5fe4cc CreateFileW 80432->80522 80434 5feae2 80435 5feb18 80434->80435 80436 5feaec GetLastError 80434->80436 80435->80408 80523 5fd1e5 14 API calls 2 library calls 80436->80523 80438 5feaf8 80524 60a64d 15 API calls 3 library calls 80438->80524 80440->80380 80442 5f510e 80441->80442 80443 5f5107 80441->80443 80442->80443 80450 605bdb 39 API calls 3 library calls 80442->80450 80443->80389 80449 6072a8 5 API calls std::_Lockit::_Lockit 80443->80449 80445 5f512f 80451 605ec6 39 API calls __Getctype 80445->80451 80447 5f5145 80452 605f24 39 API calls _strftime 80447->80452 80449->80389 80450->80445 80451->80447 80452->80443 80454 5f8c26 80453->80454 80455 5f8c40 80453->80455 80471 5f8d26 14 API calls ___std_exception_destroy 80454->80471 80456 5f8c47 80455->80456 80457 5f8c66 80455->80457 80470 5f8c30 80456->80470 80472 5f8d40 15 API calls _strftime 80456->80472 80473 606f13 MultiByteToWideChar _strftime 80457->80473 80461 5f8c75 80462 5f8c7c GetLastError 80461->80462 80464 5f8ca2 80461->80464 80476 5f8d40 15 API calls _strftime 80461->80476 80474 5fd1e5 14 API calls 2 library calls 80462->80474 80464->80470 80477 606f13 MultiByteToWideChar _strftime 80464->80477 80466 5f8c88 80475 5fd23f 14 API calls __Strcoll 80466->80475 80468 5f8cb9 80468->80462 80468->80470 80470->80378 80470->80393 80471->80470 80472->80470 80473->80461 80474->80466 80475->80470 80476->80464 80477->80468 80479 5fe582 80478->80479 80484 5fe59c 80478->80484 80479->80484 80532 5fd23f 14 API calls __Strcoll 80479->80532 80482 5fe591 80533 5f47a0 39 API calls ___std_exception_copy 80482->80533 80525 5fe4f1 80484->80525 80485 5fe603 80494 5fe656 80485->80494 80536 602733 39 API calls 2 library calls 80485->80536 80486 5fe5d4 80486->80485 80534 5fd23f 14 API calls __Strcoll 80486->80534 80489 5fe651 80491 5fe6ce 80489->80491 80489->80494 80490 5fe5f8 80535 5f47a0 39 API calls ___std_exception_copy 80490->80535 80537 5f47cd 11 API calls CallUnexpected 80491->80537 80494->80396 80494->80397 80495 5fe6da 80497 60a546 __FrameHandler3::FrameUnwindToState 80496->80497 80540 5ffd09 EnterCriticalSection 80497->80540 80499 60a572 80544 60a314 15 API calls 3 library calls 80499->80544 80500 60a54d 80500->80499 80505 60a5e1 EnterCriticalSection 80500->80505 80508 60a594 80500->80508 80504 60a577 80504->80508 80545 60a462 EnterCriticalSection 80504->80545 80506 60a5ee LeaveCriticalSection 80505->80506 80505->80508 80506->80500 80541 60a644 80508->80541 80509->80416 80510->80401 80511->80408 80512->80407 80513->80401 80514->80421 80515->80401 80516->80417 80517->80425 80518->80422 80519->80424 80520->80408 80521->80428 80522->80434 80523->80438 80524->80435 80528 5fe509 80525->80528 80526 5fe524 80526->80486 80528->80526 80538 5fd23f 14 API calls __Strcoll 80528->80538 80529 5fe548 80539 5f47a0 39 API calls ___std_exception_copy 80529->80539 80531 5fe553 80531->80486 80532->80482 80533->80484 80534->80490 80535->80485 80536->80489 80537->80495 80538->80529 80539->80531 80540->80500 80546 5ffd51 LeaveCriticalSection 80541->80546 80543 5fe863 80543->80402 80543->80403 80544->80504 80545->80508 80546->80543 80700 55fad0 210 API calls 80705 5242c0 GetUserNameA GetComputerNameA GetCurrentProcess TerminateProcess __fread_nolock 80707 60fec0 41 API calls 4 library calls 80581 5670f0 221 API calls 80710 580af0 46 API calls __Strxfrm 80711 59fef0 DeleteCriticalSection 80712 5eeef7 InitializeCriticalSectionEx 80584 5248e0 20 API calls 80587 6100d8 44 API calls 4 library calls 80588 5f04e1 5 API calls CatchGuardHandler 80267 51a690 80277 5ee812 80267->80277 80270 51a6fe 80280 5ee4bb 71 API calls CallUnexpected 80270->80280 80272 51a6a9 80274 51a6d4 __Mtx_unlock 80272->80274 80275 51a6bd GetFileAttributesA 80272->80275 80275->80274 80276 51a6c9 GetLastError 80275->80276 80276->80274 80281 5ee5ec 80277->80281 80282 5ee64e 80281->80282 80283 5ee614 GetCurrentThreadId 80281->80283 80284 5ee678 80282->80284 80285 5ee652 GetCurrentThreadId 80282->80285 80286 5ee61f GetCurrentThreadId 80283->80286 80296 5ee63a 80283->80296 80287 5ee716 GetCurrentThreadId 80284->80287 80289 5ee699 80284->80289 80288 5ee661 80285->80288 80286->80296 80287->80288 80291 5ee75f GetCurrentThreadId 80288->80291 80288->80296 80306 5eec91 GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 80289->80306 80291->80296 80293 51a6a2 80293->80270 80293->80272 80295 5ee6d5 GetCurrentThreadId 80295->80288 80297 5ee6a4 __Xtime_diff_to_millis2 80295->80297 80299 5ef8b5 80296->80299 80297->80288 80297->80295 80297->80296 80307 5eec91 GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 80297->80307 80300 5ef8be IsProcessorFeaturePresent 80299->80300 80301 5ef8bd 80299->80301 80303 5f00aa 80300->80303 80301->80293 80308 5f006d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 80303->80308 80305 5f018d 80305->80293 80306->80297 80307->80297 80308->80305 80589 51a090 81 API calls 3 library calls 80592 524490 46 API calls error_info_injector 80715 552e90 CreateToolhelp32Snapshot Process32First Process32Next CloseHandle CloseHandle 80717 578e90 42 API calls 2 library calls 80719 512280 40 API calls __fread_nolock 80596 52f880 41 API calls 80720 54ca80 45 API calls 3 library calls 80722 5ee289 9 API calls 3 library calls 80598 5a3880 SetFilePointer GetLastError WriteFile GetLastError 80600 5788b0 66 API calls 80601 578cb0 53 API calls 2 library calls 80602 5110a0 43 API calls 80309 52e0a0 WSAStartup 80310 52e1b7 80309->80310 80311 52e0d8 80309->80311 80311->80310 80312 52e10e getaddrinfo 80311->80312 80313 52e1b1 WSACleanup 80312->80313 80314 52e167 80312->80314 80313->80310 80315 52e1c5 freeaddrinfo 80314->80315 80317 52e175 socket 80314->80317 80315->80313 80316 52e1d1 80315->80316 80317->80313 80318 52e18b connect 80317->80318 80319 52e1c1 80318->80319 80320 52e19d closesocket 80318->80320 80319->80315 80320->80317 80321 52e1a7 freeaddrinfo 80320->80321 80321->80313 80603 52c0a0 56 API calls std::_Facet_Register 80604 5ef8ab GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 80724 5f56aa 68 API calls ___scrt_uninitialize_crt 80725 576ea0 42 API calls std::_Facet_Register 80606 5ef4a7 75 API calls ___scrt_uninitialize_crt 80607 5a44a0 23 API calls ___std_exception_destroy 80727 529f50 85 API calls 4 library calls 80608 544550 176 API calls 2 library calls 80609 579150 41 API calls 80729 60f771 41 API calls 4 library calls 80730 516b40 70 API calls std::ios_base::_Ios_base_dtor 80613 586140 97 API calls 2 library calls 80731 607378 6 API calls _unexpected 80733 59ff40 LeaveCriticalSection 80615 5a3940 SetFilePointer GetLastError SetEndOfFile GetLastError 80734 5a4740 GetSystemTimeAsFileTime __alldvrm 80616 51b170 GetModuleHandleExA 80735 541770 115 API calls 2 library calls 80736 567770 96 API calls 80620 512160 14 API calls 2 library calls 80738 5ef36f 4 API calls 2 library calls 80625 5a3d60 10 API calls 80627 578910 67 API calls 80628 5fdd18 43 API calls 80742 59ff10 EnterCriticalSection GetCurrentThreadId 80743 61032b 42 API calls 4 library calls 80744 5a4710 Sleep 80632 524100 42 API calls 2 library calls 80745 607734 FreeLibrary 80746 559300 77 API calls error_info_injector 80634 5a3d00 LockFile UnlockFile 80748 524730 IsDebuggerPresent IsProcessorFeaturePresent GetVolumeInformationA 80749 57c730 44 API calls 2 library calls 80750 5ef336 11 API calls ___scrt_uninitialize_crt 80751 5eef28 DecodePointer 80643 5efddf GetStartupInfoW __fread_nolock 80753 513bd0 48 API calls 80645 5411d0 55 API calls 3 library calls 80648 5a39d0 GetFileSize GetLastError 80650 527dc0 112 API calls 4 library calls 80754 5243c0 GetTickCount64 Sleep GetTickCount64 80651 59b5c0 46 API calls 80756 59fbc0 52 API calls _strftime 80757 5a47f0 24 API calls ___std_exception_destroy 80758 5ee7f3 InitializeSRWLock 80654 52e1e0 42 API calls 2 library calls 80655 5719e0 252 API calls 3 library calls 80656 5789e0 68 API calls 80760 5a37e0 SetFilePointer GetLastError ReadFile GetLastError __fread_nolock 80658 6019a1 53 API calls 3 library calls 80764 605fa9 42 API calls 80765 5a3790 CloseHandle Sleep CloseHandle 80767 6073b7 6 API calls _unexpected 80769 5a3b80 15 API calls 80771 5c2b80 43 API calls __Strxfrm 80664 5955b0 10 API calls 80777 5a43b0 29 API calls ___std_exception_destroy 80778 51a3a0 71 API calls error_info_injector 80667 5a39a0 FlushFileBuffers GetLastError 80668 60619b 66 API calls __fread_nolock 80669 5bc9a0 42 API calls
                          APIs
                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0051B3D1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: DirectoryWindows
                          • String ID: :$_$_$_
                          • API String ID: 3619848164-4119709311
                          • Opcode ID: 0a767f0d9061222dbf496a06ad616178ba4397ed77843cf8ab9939fc8b8dacdd
                          • Instruction ID: 144fbe67849478809701c1046d592d1d5c763818b81d205a7229894bca57ba83
                          • Opcode Fuzzy Hash: 0a767f0d9061222dbf496a06ad616178ba4397ed77843cf8ab9939fc8b8dacdd
                          • Instruction Fuzzy Hash: 339290709002499FEB18CF68DC89BEDBFB5FF45304F1482A9E449A7282E7759A85CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 322 52e0a0-52e0d2 WSAStartup 323 52e1b7-52e1c0 322->323 324 52e0d8-52e102 call 516bd0 * 2 322->324 329 52e104-52e108 324->329 330 52e10e-52e165 getaddrinfo 324->330 329->323 329->330 331 52e1b1 WSACleanup 330->331 332 52e167-52e16d 330->332 331->323 333 52e1c5-52e1cf freeaddrinfo 332->333 334 52e16f 332->334 333->331 335 52e1d1-52e1d9 333->335 336 52e175-52e189 socket 334->336 336->331 337 52e18b-52e19b connect 336->337 338 52e1c1 337->338 339 52e19d-52e1a5 closesocket 337->339 338->333 339->336 340 52e1a7-52e1ab freeaddrinfo 339->340 340->331
                          APIs
                          • WSAStartup.WS2_32 ref: 0052E0CA
                          • getaddrinfo.WS2_32(?,?,?,00647320), ref: 0052E15D
                          • socket.WS2_32(?,?,?), ref: 0052E17E
                          • connect.WS2_32(00000000,?,00000000), ref: 0052E192
                          • closesocket.WS2_32(00000000), ref: 0052E19E
                          • freeaddrinfo.WS2_32(?,?,?,?,00647320,?,?,?,?,?,?), ref: 0052E1AB
                          • WSACleanup.WS2_32 ref: 0052E1B1
                          • freeaddrinfo.WS2_32(?,?,?,?,00647320,?,?,?,?,?,?), ref: 0052E1C6
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: freeaddrinfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                          • String ID:
                          • API String ID: 58224237-0
                          • Opcode ID: 1dbee7ac01d11c3f207edcc2f62f04c2f9b17a49c32e817fbbe5caba0fd6d19f
                          • Instruction ID: cac3c2b77853f7bcff5336494e2cb69a9d7d0fc41575315bd56aa2d47c9794b8
                          • Opcode Fuzzy Hash: 1dbee7ac01d11c3f207edcc2f62f04c2f9b17a49c32e817fbbe5caba0fd6d19f
                          • Instruction Fuzzy Hash: C5317E72604310AFD7209F25EC4976ABBE5FF85724F044B2DF9B8962E0D3359814CB92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 449 573a40-573a53 GetCursorPos 450 573a55-573a61 GetCursorPos 449->450 451 573a67-573a6d 450->451 452 573b28-573b31 GetPEB 450->452 451->452 454 573a73-573a7f GetPEB 451->454 453 573b34-573b48 452->453 455 573b4a-573b4f 453->455 456 573b99-573b9b 453->456 457 573a80-573a94 454->457 455->456 458 573b51-573b59 455->458 456->453 459 573a96-573a9b 457->459 460 573ae4-573ae6 457->460 461 573b60-573b73 458->461 459->460 462 573a9d-573aa3 459->462 460->457 463 573b75-573b88 461->463 464 573b92-573b97 461->464 465 573aa5-573ab8 462->465 463->463 466 573b8a-573b90 463->466 464->456 464->461 467 573add-573ae2 465->467 468 573aba 465->468 466->464 469 573b9d-573bc2 Sleep 466->469 467->460 467->465 470 573ac0-573ad3 468->470 469->450 470->470 471 573ad5-573adb 470->471 471->467 472 573ae8-573b1a Sleep GetCursorPos 471->472 472->452 473 573b1c-573b22 472->473 473->452 474 573bc7-573bd8 call 516bd0 473->474 477 573bde 474->477 478 573bda-573bdc 474->478 479 573be0-573bfd call 516bd0 477->479 478->479
                          APIs
                          • GetCursorPos.USER32(?), ref: 00573A53
                          • GetCursorPos.USER32(?), ref: 00573A59
                          • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00573DB6), ref: 00573B08
                          • GetCursorPos.USER32(?), ref: 00573B0E
                          • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00573DB6), ref: 00573BBA
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Cursor$Sleep
                          • String ID:
                          • API String ID: 1847515627-0
                          • Opcode ID: 5b94d7a6f0a2fee03543c2f0ead46ddc954a7b4c5d191674bbc66f5b5d2c93bd
                          • Instruction ID: 109e3ac0b1173c44c13e9c1300e26bde590a3ab1e53f643b58ef21546360212a
                          • Opcode Fuzzy Hash: 5b94d7a6f0a2fee03543c2f0ead46ddc954a7b4c5d191674bbc66f5b5d2c93bd
                          • Instruction Fuzzy Hash: 6451BA35A04219CFCB24CF58D8D5EA9BBB1FF48724B29859AD449AB311D731EE05EB80

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 253 5fe813-5fe843 call 5fe561 256 5fe85e-5fe86a call 60a53a 253->256 257 5fe845-5fe850 call 5fd22c 253->257 262 5fe86c-5fe881 call 5fd22c call 5fd23f 256->262 263 5fe883-5fe8cc call 5fe4cc 256->263 264 5fe852-5fe859 call 5fd23f 257->264 262->264 273 5fe8ce-5fe8d7 263->273 274 5fe939-5fe942 GetFileType 263->274 271 5feb38-5feb3c 264->271 278 5fe90e-5fe934 GetLastError call 5fd1e5 273->278 279 5fe8d9-5fe8dd 273->279 275 5fe98b-5fe98e 274->275 276 5fe944-5fe975 GetLastError call 5fd1e5 CloseHandle 274->276 282 5fe997-5fe99d 275->282 283 5fe990-5fe995 275->283 276->264 290 5fe97b-5fe986 call 5fd23f 276->290 278->264 279->278 284 5fe8df-5fe90c call 5fe4cc 279->284 287 5fe9a1-5fe9ef call 60a485 282->287 288 5fe99f 282->288 283->287 284->274 284->278 295 5fea0e-5fea36 call 5fe276 287->295 296 5fe9f1-5fe9fd call 5fe6db 287->296 288->287 290->264 303 5fea3b-5fea7c 295->303 304 5fea38-5fea39 295->304 296->295 302 5fe9ff 296->302 305 5fea01-5fea09 call 604ae2 302->305 306 5fea7e-5fea82 303->306 307 5fea9d-5feaab 303->307 304->305 305->271 306->307 311 5fea84-5fea98 306->311 308 5feb36 307->308 309 5feab1-5feab5 307->309 308->271 309->308 312 5feab7-5feaea CloseHandle call 5fe4cc 309->312 311->307 316 5feb1e-5feb32 312->316 317 5feaec-5feb18 GetLastError call 5fd1e5 call 60a64d 312->317 316->308 317->316
                          APIs
                            • Part of subcall function 005FE4CC: CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 005FE4E9
                          • GetLastError.KERNEL32 ref: 005FE927
                          • __dosmaperr.LIBCMT ref: 005FE92E
                          • GetFileType.KERNELBASE(00000000), ref: 005FE93A
                          • GetLastError.KERNEL32 ref: 005FE944
                          • __dosmaperr.LIBCMT ref: 005FE94D
                          • CloseHandle.KERNEL32(00000000), ref: 005FE96D
                          • CloseHandle.KERNEL32(?), ref: 005FEABA
                          • GetLastError.KERNEL32 ref: 005FEAEC
                          • __dosmaperr.LIBCMT ref: 005FEAF3
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                          • String ID: H
                          • API String ID: 4237864984-2852464175
                          • Opcode ID: 537428f3d2f85738b8f2939a80b42b263b1d887533b52fe75c43d5593ccacdd7
                          • Instruction ID: cd9ee92fd73fccb5f37b13421650b881d2e7d05a91940067c6664dce6f9cd352
                          • Opcode Fuzzy Hash: 537428f3d2f85738b8f2939a80b42b263b1d887533b52fe75c43d5593ccacdd7
                          • Instruction Fuzzy Hash: 7AA12432A001599FCF19AF68DC96BBD3FB2BB46314F14015DFA019B2A1DB399D06C752

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 341 604623-604633 342 604635-604648 call 5fd22c call 5fd23f 341->342 343 60464d-60464f 341->343 361 6049a7 342->361 344 604655-60465b 343->344 345 60498f-60499c call 5fd22c call 5fd23f 343->345 344->345 347 604661-60468a 344->347 362 6049a2 call 5f47a0 345->362 347->345 350 604690-604699 347->350 353 6046b3-6046b5 350->353 354 60469b-6046ae call 5fd22c call 5fd23f 350->354 359 60498b-60498d 353->359 360 6046bb-6046bf 353->360 354->362 363 6049aa-6049ad 359->363 360->359 365 6046c5-6046c9 360->365 361->363 362->361 365->354 368 6046cb-6046e2 365->368 370 6046e4-6046e7 368->370 371 604717-60471d 368->371 374 6046e9-6046ef 370->374 375 60470d-604715 370->375 372 6046f1-604708 call 5fd22c call 5fd23f call 5f47a0 371->372 373 60471f-604726 371->373 404 6048c2 372->404 377 604728 373->377 378 60472a-60472b call 606e2d 373->378 374->372 374->375 376 60478a-6047a9 375->376 381 604865-60486e call 610d44 376->381 382 6047af-6047bb 376->382 377->378 387 604730-604748 call 606db3 * 2 378->387 393 604870-604882 381->393 394 6048df 381->394 382->381 386 6047c1-6047c3 382->386 386->381 390 6047c9-6047ea 386->390 408 604765-604788 call 5fe13d 387->408 409 60474a-604760 call 5fd23f call 5fd22c 387->409 390->381 395 6047ec-604802 390->395 393->394 399 604884-604893 GetConsoleMode 393->399 397 6048e3-6048f9 ReadFile 394->397 395->381 400 604804-604806 395->400 402 604957-604962 GetLastError 397->402 403 6048fb-604901 397->403 399->394 405 604895-604899 399->405 400->381 406 604808-60482b 400->406 410 604964-604976 call 5fd23f call 5fd22c 402->410 411 60497b-60497e 402->411 403->402 412 604903 403->412 414 6048c5-6048cf call 606db3 404->414 405->397 413 60489b-6048b3 ReadConsoleW 405->413 406->381 415 60482d-604843 406->415 408->376 409->404 410->404 423 604984-604986 411->423 424 6048bb-6048c1 call 5fd1e5 411->424 420 604906-604918 412->420 421 6048d4-6048dd 413->421 422 6048b5 GetLastError 413->422 414->363 415->381 416 604845-604847 415->416 416->381 427 604849-604860 416->427 420->414 431 60491a-60491e 420->431 421->420 422->424 423->414 424->404 427->381 435 604920-604930 call 604335 431->435 436 604937-604944 431->436 447 604933-604935 435->447 441 604950-604955 call 60417b 436->441 442 604946 call 60448c 436->442 448 60494b-60494e 441->448 442->448 447->414 448->447
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 151553ef43e1e2bc9f9febcb4bf39ac9ae964ade4cb46c6b6e6c8b694a297cd3
                          • Instruction ID: 109cc01d0d77480a202ffb14ea5874ef3c6ceaa841186f58249773a979873ac9
                          • Opcode Fuzzy Hash: 151553ef43e1e2bc9f9febcb4bf39ac9ae964ade4cb46c6b6e6c8b694a297cd3
                          • Instruction Fuzzy Hash: 8BB1D3B4A44249AFDB29DFA8D881BAF7BB3BF46304F144158F644973D1CB709942CBA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 482 5ef290-5ef293 483 5ef2a2-5ef2a5 call 5fdf2c 482->483 485 5ef2aa-5ef2ad 483->485 486 5ef2af-5ef2b0 485->486 487 5ef295-5ef2a0 call 6017d8 485->487 487->483 490 5ef2b1-5ef2b5 487->490 491 5121d0-512220 call 5121b0 call 5f0efb call 5f0651 490->491 492 5ef2bb 490->492 492->492
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051220E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: bea4122cb0115a8b9d65407e7c28dc79c0f8986298e99f954259dd21c054b8b6
                          • Instruction ID: 1c5126556307acc7506a7b22bebd4661648819c9edd32a102af14d01b999c4a3
                          • Opcode Fuzzy Hash: bea4122cb0115a8b9d65407e7c28dc79c0f8986298e99f954259dd21c054b8b6
                          • Instruction Fuzzy Hash: 03012B3940030DABCB18EFA9DC058AA7FEDBA00320B444439FB58DB591EB30E990C791

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 499 51a690-51a6a7 call 5ee812 502 51a6a9-51a6ab 499->502 503 51a6fe-51a704 call 5ee4bb 499->503 505 51a6e7 502->505 506 51a6ad-51a6af 502->506 507 51a6e9-51a6fd call 5ee823 505->507 509 51a6b2-51a6b7 506->509 509->509 511 51a6b9-51a6bb 509->511 511->505 513 51a6bd-51a6c7 GetFileAttributesA 511->513 514 51a6e3-51a6e5 513->514 515 51a6c9-51a6d2 GetLastError 513->515 514->507 515->514 516 51a6d4-51a6d7 515->516 516->514 517 51a6d9-51a6dc 516->517 517->514 518 51a6de-51a6e1 517->518 518->505 518->514
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesErrorFileLastMtx_unlock
                          • String ID:
                          • API String ID: 441747541-0
                          • Opcode ID: ef09833f780a66896017453d8b4d86062b002d51d542c2492cbd5857399587a9
                          • Instruction ID: 0349615ae64a19efd38a0a50a047703d525dc799bf83c99c267b3f5a77ece004
                          • Opcode Fuzzy Hash: ef09833f780a66896017453d8b4d86062b002d51d542c2492cbd5857399587a9
                          • Instruction Fuzzy Hash: B4F08171D47151167E3A96B56C5A4F93F0AB95332C72C4622E845C6553F607CCC18593

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 519 5f4942-5f494f 520 5f4979-5f498d call 605f82 519->520 521 5f4951-5f4974 call 5f4723 519->521 527 5f498f 520->527 528 5f4992-5f499b call 5fe11f 520->528 526 5f4ae0-5f4ae2 521->526 527->528 530 5f49a0-5f49af 528->530 531 5f49bf-5f49c8 530->531 532 5f49b1 530->532 535 5f49dc-5f4a10 531->535 536 5f49ca-5f49d7 531->536 533 5f4a89-5f4a8e 532->533 534 5f49b7-5f49b9 532->534 540 5f4ade-5f4adf 533->540 534->531 534->533 538 5f4a6d-5f4a79 535->538 539 5f4a12-5f4a1c 535->539 537 5f4adc 536->537 537->540 543 5f4a7b-5f4a82 538->543 544 5f4a90-5f4a93 538->544 541 5f4a1e-5f4a2a 539->541 542 5f4a43-5f4a4f 539->542 540->526 541->542 545 5f4a2c-5f4a3e call 5f4cae 541->545 542->544 546 5f4a51-5f4a6b call 5f4e59 542->546 543->533 547 5f4a96-5f4a9e 544->547 545->540 546->547 550 5f4ada 547->550 551 5f4aa0-5f4aa6 547->551 550->537 552 5f4abe-5f4ac2 551->552 553 5f4aa8-5f4abc call 5f4ae3 551->553 557 5f4ad5-5f4ad7 552->557 558 5f4ac4-5f4ad2 call 614a10 552->558 553->540 557->550 558->557
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: O_
                          • API String ID: 0-2128823147
                          • Opcode ID: c5f0ec7b1c6fc88c5d3552c0a52f83b287307c3b3ab2d58feece3c7eb62e9dd7
                          • Instruction ID: 1626921da8c42e604611b2bb99c594bcf26711910522ccb0e1e1e219ed5d14a1
                          • Opcode Fuzzy Hash: c5f0ec7b1c6fc88c5d3552c0a52f83b287307c3b3ab2d58feece3c7eb62e9dd7
                          • Instruction Fuzzy Hash: 6E51A070A0010CAFDB14CF58C885ABBBFB6FF89364F248158E9899B252D2759E41CF94

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 562 604b12-604b26 call 60a6de 565 604b28-604b2a 562->565 566 604b2c-604b34 562->566 567 604b7a-604b9a call 60a64d 565->567 568 604b36-604b3d 566->568 569 604b3f-604b42 566->569 577 604bac 567->577 578 604b9c-604baa call 5fd208 567->578 568->569 570 604b4a-604b5e call 60a6de * 2 568->570 571 604b60-604b70 call 60a6de FindCloseChangeNotification 569->571 572 604b44-604b48 569->572 570->565 570->571 571->565 584 604b72-604b78 GetLastError 571->584 572->570 572->571 582 604bae-604bb1 577->582 578->582 584->567
                          APIs
                          • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,006049F9,00000000,CF830579,00641140,0000000C,00604AB5,005F8BBD,?), ref: 00604B68
                          • GetLastError.KERNEL32(?,006049F9,00000000,CF830579,00641140,0000000C,00604AB5,005F8BBD,?), ref: 00604B72
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ChangeCloseErrorFindLastNotification
                          • String ID:
                          • API String ID: 1687624791-0
                          • Opcode ID: 3d9ce4fbcdb03520ecb0a5912ac885b713a4830c7c0afca97f1f0e1ace3bba7c
                          • Instruction ID: c10d4ba88b41c38f99e868d3ce223be98d395987f124be8c56ebbeacbc602431
                          • Opcode Fuzzy Hash: 3d9ce4fbcdb03520ecb0a5912ac885b713a4830c7c0afca97f1f0e1ace3bba7c
                          • Instruction Fuzzy Hash: 9F112532AD42145AC73C2774A945BBF7B5B8B867B4F29021DFA088B2D2EF22DC418159

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 587 5fe05c-5fe074 call 60a6de 590 5fe08a-5fe0a0 SetFilePointerEx 587->590 591 5fe076-5fe07d 587->591 593 5fe0b5-5fe0bf 590->593 594 5fe0a2-5fe0b3 GetLastError call 5fd208 590->594 592 5fe084-5fe088 591->592 595 5fe0db-5fe0de 592->595 593->592 597 5fe0c1-5fe0d6 593->597 594->592 597->595
                          APIs
                          • SetFilePointerEx.KERNELBASE(00000000,00000000,00640DF8,0051A3EB,00000002,0051A3EB,00000000,?,?,?,005FE166,00000000,?,0051A3EB,00000002,00640DF8), ref: 005FE098
                          • GetLastError.KERNEL32(0051A3EB,?,?,?,005FE166,00000000,?,0051A3EB,00000002,00640DF8,00000000,0051A3EB,00000000,00640DF8,0000000C,005F915E), ref: 005FE0A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 93cdd5da7aea4e9ef497547a5c686bf92fa3bf4d0ebb8168052cd25fc50d6389
                          • Instruction ID: 2ff2419506d98a44966b5bbe1b925a6fa90e768581c1e160a5e87b6d4cacebb8
                          • Opcode Fuzzy Hash: 93cdd5da7aea4e9ef497547a5c686bf92fa3bf4d0ebb8168052cd25fc50d6389
                          • Instruction Fuzzy Hash: E2012B36610109AFCF058F65CC0ACAF3F2AFB85324B240248F9119B1E1EA71ED41CBD0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 599 51a210-51a2ab call 5ef290 call 512ae0 604 51a2b0-51a2bb 599->604 604->604 605 51a2bd-51a2c8 604->605 606 51a2ca 605->606 607 51a2cd-51a2de call 5f5362 605->607 606->607 610 51a351-51a357 607->610 611 51a2e0-51a305 call 5f9136 call 5f4eeb call 5f9136 607->611 612 51a381-51a393 610->612 613 51a359-51a365 610->613 627 51a307 611->627 628 51a30c-51a316 611->628 615 51a377-51a37e call 5ef511 613->615 616 51a367-51a375 613->616 615->612 616->615 619 51a394-51a399 call 5f47b0 616->619 627->628 629 51a328-51a32f call 57cf60 628->629 630 51a318-51a31c 628->630 634 51a334-51a33a 629->634 631 51a320-51a326 630->631 632 51a31e 630->632 631->634 632->631 635 51a33c 634->635 636 51a33e-51a349 call 5fdbdf call 5f8be8 634->636 635->636 640 51a34e 636->640 640->610
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __fread_nolock
                          • String ID:
                          • API String ID: 2638373210-0
                          • Opcode ID: b4786ccb5abc9ce717ff485e748ee77bf778934dad8dbca2040e27a9d6ecf089
                          • Instruction ID: f454b76df3c6e6b47d09ca7971dfbfa404390bf54b9db760909911edbbf78c03
                          • Opcode Fuzzy Hash: b4786ccb5abc9ce717ff485e748ee77bf778934dad8dbca2040e27a9d6ecf089
                          • Instruction Fuzzy Hash: D44126709012059FEB15DF68C849BAEBFF4FF41700F20896DF5159B282D7B99981CB92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 641 580560-58057f 642 5806a9 call 512270 641->642 643 580585-580598 641->643 648 5806ae call 5121d0 642->648 644 58059a 643->644 645 5805c0-5805c8 643->645 647 58059c-5805a1 644->647 649 5805ca-5805cf 645->649 650 5805d1-5805d5 645->650 651 5805a4-5805a5 call 5ef290 647->651 658 5806b3-5806b8 call 5f47b0 648->658 649->647 653 5805d9-5805e1 650->653 654 5805d7 650->654 662 5805aa-5805af 651->662 655 5805f0-5805f2 653->655 656 5805e3-5805e8 653->656 654->653 660 580601 655->660 661 5805f4-5805ff call 5ef290 655->661 656->648 659 5805ee 656->659 659->651 665 580603-580629 660->665 661->665 662->658 666 5805b5-5805be 662->666 669 58062b-580655 call 5f0f70 call 5f14f0 665->669 670 580680-5806a6 call 5f0f70 call 5f14f0 665->670 666->665 679 580669-58067d call 5ef511 669->679 680 580657-580665 669->680 680->658 682 580667 680->682 682->679
                          APIs
                          • Concurrency::cancel_current_task.LIBCPMT ref: 005806AE
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Concurrency::cancel_current_task
                          • String ID:
                          • API String ID: 118556049-0
                          • Opcode ID: 5b8477abd5dfbafd0efb1f6b93b48d469f4d73f05dc056d89ab6e976788f4514
                          • Instruction ID: f4df40b54ea0e01903499650bc81dd24ea63272c68eae7a981902edc8bdabf84
                          • Opcode Fuzzy Hash: 5b8477abd5dfbafd0efb1f6b93b48d469f4d73f05dc056d89ab6e976788f4514
                          • Instruction Fuzzy Hash: D041E372A001199BCB15EF69DC806AE7FA5BF88350F140569FC05EB382E730DD648BE1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 684 606a18-606a3e call 6067ee 687 606a40-606a52 call 5fe7f3 684->687 688 606a97-606a9a 684->688 690 606a57-606a5c 687->690 690->688 691 606a5e-606a96 690->691
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __wsopen_s
                          • String ID:
                          • API String ID: 3347428461-0
                          • Opcode ID: 8724513643eea024314cd992aba80936861fde2c76bcb2830cae26b6e57b53eb
                          • Instruction ID: e2ec2eeca04dbcec3af327adc70d07eb0f27b612226570652ba90cce4d3ed369
                          • Opcode Fuzzy Hash: 8724513643eea024314cd992aba80936861fde2c76bcb2830cae26b6e57b53eb
                          • Instruction Fuzzy Hash: C61145B1A0020AAFCB09DF58E9459DB7BF5EF48308F104069F808EB351D630EA21CBA4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 692 606e2d-606e39 693 606e6b-606e76 call 5fd23f 692->693 694 606e3b-606e3d 692->694 701 606e78-606e7a 693->701 696 606e56-606e67 RtlAllocateHeap 694->696 697 606e3f-606e40 694->697 699 606e42-606e49 call 603f93 696->699 700 606e69 696->700 697->696 699->693 704 606e4b-606e54 call 6017d8 699->704 700->701 704->693 704->696
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,0060D635,4D88C033,?,0060D635,00000220,?,006057EF,4D88C033), ref: 00606E5F
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: f277032d07f74d98d26ee67a4081d6e3cf48d9ad72ec3fcc61f729327466e9ae
                          • Instruction ID: 405eab3e05091c55a44e066254b1307802ad3694a5dfa42e2ccc3a23f6b6e793
                          • Opcode Fuzzy Hash: f277032d07f74d98d26ee67a4081d6e3cf48d9ad72ec3fcc61f729327466e9ae
                          • Instruction Fuzzy Hash: FFE0E5391C87255ADB382A65DC0479B7B5B9B817E1F040121FD05D62D1CB20CD2081E8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 707 5fe4cc-5fe4f0 CreateFileW
                          APIs
                          • CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 005FE4E9
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 7efdeef83c5fd10c923e3c940ec20b2c2a22c038daffbfa16762055254062c6f
                          • Instruction ID: d4ec3953310a42f1145e6c9d46ee810abcd2f47364c341068cdf969d7cebf13a
                          • Opcode Fuzzy Hash: 7efdeef83c5fd10c923e3c940ec20b2c2a22c038daffbfa16762055254062c6f
                          • Instruction Fuzzy Hash: 10D06C3200010DFBDF028F84DC06EDA3BAAFB88724F018010BE1856020C732E861EB90
                          APIs
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0056B6A4
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateDirectory
                          • String ID: $ $-$-$\$\$\$\$\$\$\$\$\$\$\$_$_$_$type must be boolean, but is
                          • API String ID: 4241100979-3297522916
                          • Opcode ID: 74a2649cc73b63e85cbb92f078080c665b0e644dc4d3d35cf837e04065200db4
                          • Instruction ID: d24c8ae9fb2ca65fd9d65074adc5e14bd2aacf0b955cc93019a63677e7ec256f
                          • Opcode Fuzzy Hash: 74a2649cc73b63e85cbb92f078080c665b0e644dc4d3d35cf837e04065200db4
                          • Instruction Fuzzy Hash: A0F3CA709042598FEB29CF28CC997EEBFB5BF45304F1481E9D049A7292EB709A85CF51
                          APIs
                          • FindFirstFileA.KERNEL32(?,?,?,BEBDB8CD,?,?,BEBDB8CD,BEBDB8CE), ref: 0051E29B
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileFindFirst
                          • String ID: .$\$y
                          • API String ID: 1974802433-705995259
                          • Opcode ID: d5cf5c937341de7555c206c065dd4ed148498b14d134b9fa0f6b233247d5766d
                          • Instruction ID: 0debe1d1cefbe2e016e1a1b6a5c0d7a2f3d86c31578789a040498b0f3841bbd5
                          • Opcode Fuzzy Hash: d5cf5c937341de7555c206c065dd4ed148498b14d134b9fa0f6b233247d5766d
                          • Instruction Fuzzy Hash: 96D21770D002499BEF18DFA8DC8A6EDBF76BF55300F14826CE855A7292E7309A85CB51
                          APIs
                          • RegOpenKeyExA.ADVAPI32(80000002,C0D5DDC2,00000000,00020019,00000000), ref: 0051C6DD
                          • RegQueryValueExA.ADVAPI32(00000000,FCF0F3DC,00000000,00020019,?,00000400), ref: 0051C753
                          • RegCloseKey.ADVAPI32(00000000), ref: 0051C788
                          • GetCurrentHwProfileA.ADVAPI32(?), ref: 0051C82F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCurrentOpenProfileQueryValue
                          • String ID: 1.8$?$@$styzix_build
                          • API String ID: 1240309278-2967258260
                          • Opcode ID: 74622d2d23146962ea74465dab412a5a05e0b8a596b50d840ed6e11caf542412
                          • Instruction ID: 965cbe2944e9e4dca211cb5164a7a934ebb86f62df10307db8c94f357ab5bea7
                          • Opcode Fuzzy Hash: 74622d2d23146962ea74465dab412a5a05e0b8a596b50d840ed6e11caf542412
                          • Instruction Fuzzy Hash: 90E226B180422D9EEF20DF60DC49BEEBBB9BF54304F4440D9E549A6242EB715B89CF61
                          APIs
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 005531F0
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0055324C
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00553B09
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00553C91
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00553D3B
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00553EE2
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00553F7A
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 005540B7
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0055414E
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 005542D0
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00554365
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0055327D
                            • Part of subcall function 0051A690: GetFileAttributesA.KERNELBASE ref: 0051A6BE
                            • Part of subcall function 0051A690: GetLastError.KERNEL32 ref: 0051A6C9
                            • Part of subcall function 0051A690: __Mtx_unlock.LIBCPMT ref: 0051A6EE
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 005533B8
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 005533E7
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 005534E6
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 005535BD
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0055361B
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00553756
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 005537E4
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0055395B
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateDirectory$File$Copy$FolderPath$AttributesErrorLastMtx_unlock
                          • String ID: l
                          • API String ID: 3772196144-2517025534
                          • Opcode ID: 59c3ee000f34ae73ca3c17306f4d4dded7e11705d2677ff8e17237c7c4e2ceae
                          • Instruction ID: 1851345905ba4f1335b944a6c8d7cfeadd7f6bccd6c7ec7696aa36ee3d783bca
                          • Opcode Fuzzy Hash: 59c3ee000f34ae73ca3c17306f4d4dded7e11705d2677ff8e17237c7c4e2ceae
                          • Instruction Fuzzy Hash: C243A0B4C042699AEF25EB64DC5ABDDBB74BF54304F0441D9D84967282EB701BC8CFA2
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?), ref: 0054E327
                          • GetFileAttributesA.KERNEL32(?,?,F8F6C6CE,?,?), ref: 0054E449
                          • GetLastError.KERNEL32(?,F8F6C6CE,?,?), ref: 0054E456
                          • __Mtx_unlock.LIBCPMT ref: 0054E475
                          • GetFileAttributesA.KERNEL32(?,F5F7E6CE,?,?,F8F6C6CE,?,?), ref: 0054E540
                          • GetLastError.KERNEL32(?,?,F8F6C6CE,?,?), ref: 0054E547
                          • __Mtx_unlock.LIBCPMT ref: 0054E566
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesErrorFileLastMtx_unlock$FolderPath
                          • String ID: .$\$\$\$\$s$s
                          • API String ID: 3673586248-1144724142
                          • Opcode ID: c5b35c3c0de7a5c6547ee5e1fc31e57aadc931bfb04b53c93f4a64a620e158f6
                          • Instruction ID: 10219ed061191ef3858e1867691b92154a9b46c4a14170a9559d69b539a6b69c
                          • Opcode Fuzzy Hash: c5b35c3c0de7a5c6547ee5e1fc31e57aadc931bfb04b53c93f4a64a620e158f6
                          • Instruction Fuzzy Hash: A8F2B0709002598FDB28CF68CC99BEDBFB5BF45304F1482E9E449A7282E7749A85CF51
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0054B596
                          • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 0054B6B5
                          • GetPrivateProfileStringA.KERNEL32(?,FCE7F3C1,00000000,?,00000104,?), ref: 0054B76A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfile$FolderNamesPathSectionString
                          • String ID: %IUL$)$/$1S@W$423-$LX+N$T.ft$\$\
                          • API String ID: 1539182551-1036846380
                          • Opcode ID: 7d2ff3bd2206225e7a5e1d4c8feda82bfec30de03a5eb7b210212ddde3d3b383
                          • Instruction ID: f4b59638a300917936386fcc22618fa09b142cd821bac7e38d03d6a549b507e1
                          • Opcode Fuzzy Hash: 7d2ff3bd2206225e7a5e1d4c8feda82bfec30de03a5eb7b210212ddde3d3b383
                          • Instruction Fuzzy Hash: C4D2BD709042599FDB28CF68CC99BEDBFB5BF45308F1441E9E449AB282D7709A84CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Concurrency::cancel_current_task
                          • String ID: P$styzix_build
                          • API String ID: 118556049-1643158637
                          • Opcode ID: b98a9700821180d8546c6a2616d5c088904ad59dd7e02ab2e14466a7b202e238
                          • Instruction ID: 911f59d124184d0b2fafd50eb57e465d0cdd164d5b6a234b0341ae034b03c148
                          • Opcode Fuzzy Hash: b98a9700821180d8546c6a2616d5c088904ad59dd7e02ab2e14466a7b202e238
                          • Instruction Fuzzy Hash: 29537D7081425D9ADF25EB64DC6ABEDBB78BF54304F4440D9E84963282EB701F89CF62
                          APIs
                          • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00647420,00000000), ref: 0055130F
                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 0055134A
                          • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 00551375
                          • RegQueryValueExA.ADVAPI32(?,FDF2FFD4,00000000,00000001,?,00000104), ref: 00551475
                          • RegQueryValueExA.ADVAPI32(?,C4D2DFD8,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 005515BF
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 00551610
                          • RegQueryValueExA.ADVAPI32(?,C4D2DFD8,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 005516BC
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 00551717
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 00551772
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 005517C9
                          • RegCloseKey.ADVAPI32(?), ref: 0055204D
                          • RegEnumKeyA.ADVAPI32(?,00000001,?,00000104), ref: 0055207C
                          • RegCloseKey.ADVAPI32(?), ref: 00552090
                          Strings
                          • cannot use operator[] with a string argument with , xrefs: 005520EB
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: QueryValue$CloseEnumOpen
                          • String ID: cannot use operator[] with a string argument with
                          • API String ID: 2041898428-2766135566
                          • Opcode ID: a3ebc4535adffc76adf3b3738b3dcd7947c2baccb1005750a0726a6149ebcf53
                          • Instruction ID: 32be46e609e94597c80adf459f73f746bb7487762cc4922aae0d6a0e24e7ac66
                          • Opcode Fuzzy Hash: a3ebc4535adffc76adf3b3738b3dcd7947c2baccb1005750a0726a6149ebcf53
                          • Instruction Fuzzy Hash: 94928A708002599EDB25DF64CC59BEEBFB8BF59304F1081DAD449A7282EB715B88CF61
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: \*.*
                          • API String ID: 0-1173974218
                          • Opcode ID: 93ef508fa6cf0f6dbca4859de52fd87fa03b99330e4d914690ae835272948ffe
                          • Instruction ID: cea07eb826e6328f1d7d80f018d8b7dbc1bcdc1ab26125d763f15a707ed1e0c9
                          • Opcode Fuzzy Hash: 93ef508fa6cf0f6dbca4859de52fd87fa03b99330e4d914690ae835272948ffe
                          • Instruction Fuzzy Hash: B3A1A170901249DFEB19DFA8C988BEEBFB6FF48310F144529E445E7282D7709985CB62
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: $+$+Inf$-Inf$-x0$0123456789ABCDEF0123456789abcdef$Inf$NaN$gfff
                          • API String ID: 0-3242634575
                          • Opcode ID: 6be73e1bee1737f9b0bf3526189eda0d078409bb85fa4aed6e23f403afaaf2ef
                          • Instruction ID: 9339eb918f032133901ee87b91e32ea65193c69ed80769c87147ffc464a990b4
                          • Opcode Fuzzy Hash: 6be73e1bee1737f9b0bf3526189eda0d078409bb85fa4aed6e23f403afaaf2ef
                          • Instruction Fuzzy Hash: F8821371A187828BD7268F28C49436FBFE0BBC7344F185D9DE4C597292E635C949CB82
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,00000000), ref: 0053C54A
                            • Part of subcall function 0057C860: std::locale::_Init.LIBCPMT ref: 0057C996
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FolderInitPathstd::locale::_
                          • String ID: A$\$\$\$\$\$\$\$cannot use operator[] with a string argument with
                          • API String ID: 2462228025-727479227
                          • Opcode ID: 2b9d0cd6590cfde177b2f0c86f81aa106fa5901ae1f0a707f6768f6b5ed6ef50
                          • Instruction ID: 68f6583f34444414230fd5932c8409c5f04c29849d20f0eaab03894cc716c804
                          • Opcode Fuzzy Hash: 2b9d0cd6590cfde177b2f0c86f81aa106fa5901ae1f0a707f6768f6b5ed6ef50
                          • Instruction Fuzzy Hash: 50339F719002598FDB28DF68CC897EEBFB5BF45304F1481D9E449A7282D770AA85CFA1
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 0054595D
                          • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,00000000), ref: 005459FE
                          • GetPrivateProfileStringA.KERNEL32(?,FCE7F3C1,00000000,?,00000104,?), ref: 00545AAC
                          • lstrlenA.KERNEL32(?), ref: 005475CA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfile$FolderNamesPathSectionStringlstrlen
                          • String ID: ;$\$cannot use operator[] with a string argument with
                          • API String ID: 1311570089-3867962221
                          • Opcode ID: c4412d9c6a5f852854636bf8b3f2b3c3a558c3c5dc3f673ef1c877b1682ad5de
                          • Instruction ID: d9a9554f5b266b18e0169d9e9fa19ba5db562fc379c648de69d74879d6ac7631
                          • Opcode Fuzzy Hash: c4412d9c6a5f852854636bf8b3f2b3c3a558c3c5dc3f673ef1c877b1682ad5de
                          • Instruction Fuzzy Hash: 6803BC709042598BDF29DB24CC99BEDBF75BF55308F0441D8E449A7282EB705B89CFA2
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 005478F6
                          • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 00547A33
                          • GetPrivateProfileStringA.KERNEL32(?,FCE7F3C1,00000000,?,00000104,?), ref: 00547AEA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfile$FolderNamesPathSectionString
                          • String ID: $/$\$\$cannot use operator[] with a string argument with
                          • API String ID: 1539182551-3367344905
                          • Opcode ID: 88fa7e9d4ac504f75e55cac4d6468e8ac9c8b8596f61dc67357326595495b02c
                          • Instruction ID: 37bed82444e33ef7d02f8d84fad5ab8fd8a86924aee7d0001635e11bfa369b31
                          • Opcode Fuzzy Hash: 88fa7e9d4ac504f75e55cac4d6468e8ac9c8b8596f61dc67357326595495b02c
                          • Instruction Fuzzy Hash: 4DC2C1709042599FDB28CF64CC49BEDBFB5BF45304F1481E9D449AB282EB749A88CF91
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00519283
                          • Process32First.KERNEL32(00000000,00000128), ref: 00519293
                          • Process32Next.KERNEL32(00000000,00000128), ref: 005192B0
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process32$CreateFirstNextSnapshotToolhelp32
                          • String ID: /$/\/$\$k:R
                          • API String ID: 1238713047-4104199226
                          • Opcode ID: a5532653b63562a5f2077e431d5726220666d687bdcd84f60ada98ca753d347d
                          • Instruction ID: 34c8f9642be17b32a3256bc95882219b530ac5a1136b3e202f5b2f5ba3852d2f
                          • Opcode Fuzzy Hash: a5532653b63562a5f2077e431d5726220666d687bdcd84f60ada98ca753d347d
                          • Instruction Fuzzy Hash: 7892F571D002499FEF19CFA8C8A46EEBFB5BF45314F14426DD445AB282E7305E86CBA1
                          APIs
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 005955FC
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 0059563E
                          • GetProcAddress.KERNEL32(00000000,E4E7E6D9), ref: 00595686
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 005956C7
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 00595708
                          • GetProcAddress.KERNEL32(00000000,E4E7E6D9), ref: 00595746
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 0059578E
                          • GetProcAddress.KERNEL32(00000000,E4E7E6D9), ref: 005957D6
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 00595817
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 0059585D
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc
                          • String ID:
                          • API String ID: 190572456-0
                          • Opcode ID: 4b754765c7de2766ed18039b3f4a1b09bc732e9621cc5057ea13f0b15216dd1e
                          • Instruction ID: d295fe6d2213ccf14067a8061b50dd42fd58c7a2cb02a829134d74316b2cf658
                          • Opcode Fuzzy Hash: 4b754765c7de2766ed18039b3f4a1b09bc732e9621cc5057ea13f0b15216dd1e
                          • Instruction Fuzzy Hash: 878192B481429C9EDF19CFA4D445AEEBFB9FF06304F5080AED441AB641E378430ACB66
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: +$,$-$.$.,+-$>$@$@$H$Q
                          • API String ID: 0-262771488
                          • Opcode ID: 2bb66d51075f4c401b0db156811db391b67e66e397475115847e4b2db615038b
                          • Instruction ID: 8752559fba0ace90c3a357913066fd11b23a9f1e9c103f160f80f9d3d9435b13
                          • Opcode Fuzzy Hash: 2bb66d51075f4c401b0db156811db391b67e66e397475115847e4b2db615038b
                          • Instruction Fuzzy Hash: 3C13A870A00685CFCB28DF59C480BAABBB1FF48348F15819DD985AB392E775E915CF90
                          APIs
                          • CoInitializeEx.OLE32(00000000,00000002), ref: 00524934
                          • CoCreateInstance.OLE32(0062B154,00000000,00000001,00632798,00000000), ref: 0052496E
                          • RegCreateKeyExA.ADVAPI32(?,C0D5DDC2,00000000,00000000,00000000,00020006,00000000,?,00000000), ref: 00524A3A
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Create$InitializeInstance
                          • String ID:
                          • API String ID: 3883656743-0
                          • Opcode ID: 0dcb75c88546d6ed7b7e024f476c0feed2ab7078d194b67b758b1a4e18620ede
                          • Instruction ID: 95e681c302dacdf8b56981db11a2f65a7d0e046736e0aea04dc8fe06325e9a65
                          • Opcode Fuzzy Hash: 0dcb75c88546d6ed7b7e024f476c0feed2ab7078d194b67b758b1a4e18620ede
                          • Instruction Fuzzy Hash: DFB28770A142698FDB28CF48D8A4BAEBBB1FF45704F14409DD4496F292E771AE45CF90
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,00000000), ref: 00538971
                            • Part of subcall function 0057C860: std::locale::_Init.LIBCPMT ref: 0057C996
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FolderInitPathstd::locale::_
                          • String ID: 1$1$P$cannot use operator[] with a string argument with
                          • API String ID: 2462228025-2196587224
                          • Opcode ID: cb5b5d42d7f3dcba1c794231bcc1c37cb5dafbc565328684466c3435d91feb68
                          • Instruction ID: 495303cb16f150fd199514d0a133b7937743d5fbf0ec0609980834351390b520
                          • Opcode Fuzzy Hash: cb5b5d42d7f3dcba1c794231bcc1c37cb5dafbc565328684466c3435d91feb68
                          • Instruction Fuzzy Hash: 2933AFB0D002598BDB25DF64CC99BEEBFB4BF55304F1441D8E449A7282EB705B89CB92
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: $-$-$;$\$\$\$authorization: $cannot use operator[] with a string argument with
                          • API String ID: 1646373207-2790917795
                          • Opcode ID: a0704703ff41f95840d6c1a40cf62073c665fc4bb64bed1915ae0f7227094da3
                          • Instruction ID: 1726c2c7295f21a312b46300aecbc9cf27d7f63e3f92ad48f9d3303e9e22e77a
                          • Opcode Fuzzy Hash: a0704703ff41f95840d6c1a40cf62073c665fc4bb64bed1915ae0f7227094da3
                          • Instruction Fuzzy Hash: 3402D170D002498FDB08DFA8D8897DEBFB5BF49304F14816DE41AEB682D7349984CB95
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00610738
                          • IsValidCodePage.KERNEL32(00000000), ref: 00610776
                          • IsValidLocale.KERNEL32(?,00000001), ref: 00610789
                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 006107D1
                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 006107EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                          • String ID: `Db
                          • API String ID: 415426439-2151651399
                          • Opcode ID: a774324960514bf7e47775b86eee49274d3166e292b8f3856b81aec5450ae46d
                          • Instruction ID: cea180f9ada95ffaab8fc2f0e31e664feea79005358fe1332d94b11a1dc7d497
                          • Opcode Fuzzy Hash: a774324960514bf7e47775b86eee49274d3166e292b8f3856b81aec5450ae46d
                          • Instruction Fuzzy Hash: 0E518471A04205AFEF50DFA4CC41AEF77BABF48700F184469E515E7291DBB1A9C4CB64
                          APIs
                          • GetLastError.KERNEL32 ref: 005A47FB
                          • GetVersionExA.KERNEL32(?), ref: 005A4820
                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 005A4853
                          • LocalFree.KERNEL32(?), ref: 005A486A
                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 005A48A3
                            • Part of subcall function 005A3710: AreFileApisANSI.KERNEL32 ref: 005A371C
                            • Part of subcall function 005A3710: MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,00000000,00000000), ref: 005A3731
                            • Part of subcall function 005A3710: MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,00000000,00000000), ref: 005A3757
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharFormatMessageMultiWide$ApisErrorFileFreeLastLocalVersion
                          • String ID: OsError 0x%x (%u)
                          • API String ID: 807219750-2664311388
                          • Opcode ID: a528d8c95632313fcb7761a486af0256c4a9dcf590806df0abb6d5e543c9f0a2
                          • Instruction ID: fbdb5d45437fded61e81d5658e96869aa03656ff335a7647fc71d8fb1669fcba
                          • Opcode Fuzzy Hash: a528d8c95632313fcb7761a486af0256c4a9dcf590806df0abb6d5e543c9f0a2
                          • Instruction Fuzzy Hash: E821CB35A00209FBEB209FA1EC0AF9E7FB9FB85751F144069F909A6191DB705A11CE64
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,FBE7E7F0), ref: 00533453
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FolderPath
                          • String ID: &$\$\$cannot use operator[] with a string argument with
                          • API String ID: 1514166925-52429261
                          • Opcode ID: 5f919d01a9d6b41b5ab30d5ceab17a2acfda4c3d86bdfcc93d922ec34dccf0a5
                          • Instruction ID: 033a29b7cb64f61e935033b811d2884b7fd150a0db67442f7ad7a0392ea486c1
                          • Opcode Fuzzy Hash: 5f919d01a9d6b41b5ab30d5ceab17a2acfda4c3d86bdfcc93d922ec34dccf0a5
                          • Instruction Fuzzy Hash: F6E2AF719002598FDF28CF68CC997EDBFB5BF45300F1481A9E449AB282D774AA85CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: :$type must be boolean, but is $z
                          • API String ID: 0-1047511338
                          • Opcode ID: d127fc94397f76d8c3743963eec90a2f3643f209d582133f42a85eacdbcffcaa
                          • Instruction ID: dabb6906a3cdd4a572abc8de882db35be6901aae1da934129939395ea9cf658c
                          • Opcode Fuzzy Hash: d127fc94397f76d8c3743963eec90a2f3643f209d582133f42a85eacdbcffcaa
                          • Instruction Fuzzy Hash: 49639AB18042699ADF25EF68C8297EEBF75BF45300F5442C9D84937282D7711B89CFA2
                          APIs
                          • GetLocaleInfoW.KERNEL32(?,2000000B,00610766,00000002,00000000,?,?,?,00610766,?,00000000), ref: 006104ED
                          • GetLocaleInfoW.KERNEL32(?,20001004,00610766,00000002,00000000,?,?,?,00610766,?,00000000), ref: 00610516
                          • GetACP.KERNEL32(?,?,00610766,?,00000000), ref: 0061052B
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale
                          • String ID: ACP$OCP
                          • API String ID: 2299586839-711371036
                          • Opcode ID: 8779f752ec26bc537e469adf8f0eb0d9de74fac0e04ab07ea39aed8d74cc262e
                          • Instruction ID: 6921c22a5b73752f2e79181c7c085aa43c13f970720e2cf6a69524655fe3ab9a
                          • Opcode Fuzzy Hash: 8779f752ec26bc537e469adf8f0eb0d9de74fac0e04ab07ea39aed8d74cc262e
                          • Instruction Fuzzy Hash: E221B622700105E6FF308F64DA41AEB76E7AF54B64B5E8474EA0ADB214EBB2DDC1C750
                          APIs
                          • InternetCloseHandle.WININET(?), ref: 00595403
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,7556F380), ref: 00595475
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,7556F380), ref: 0059548C
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,7556F380), ref: 005954A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CharNext$CloseHandleInternet
                          • String ID:
                          • API String ID: 581584189-0
                          • Opcode ID: 7d28dc5c691a0dd1b4395843922dd54029e115c9f1ffaa38c874db2298a0954c
                          • Instruction ID: 89a3e24a2ad303a942da38ddaa8079e7779fe52c009ba1fb59335f1ce82a20c5
                          • Opcode Fuzzy Hash: 7d28dc5c691a0dd1b4395843922dd54029e115c9f1ffaa38c874db2298a0954c
                          • Instruction Fuzzy Hash: 3E81DF71A0060AABDF15CFA9DC51BEEBFB9FF49340F144069E908A3251E7709E518BA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: @$@$@$at most %d tables in a join$cannot use index: %s
                          • API String ID: 0-2763088227
                          • Opcode ID: 1286752b9f09bfa8f2432ed54c98a53eafb320fb6d87578785542d0b8dd6d505
                          • Instruction ID: 6b1db7804b3f3852fbd61b87660f081a4532629b76e1a1745c7b56d50d8a857a
                          • Opcode Fuzzy Hash: 1286752b9f09bfa8f2432ed54c98a53eafb320fb6d87578785542d0b8dd6d505
                          • Instruction Fuzzy Hash: 756299706083828FD718CF19C484B2BBBE1BF99394F158A6DE8D59B391D770E845CB92
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: header crc mismatch$incorrect header check$invalid window size$unknown compression method$unknown header flags set
                          • API String ID: 0-3633268661
                          • Opcode ID: 14f713258f6c30de99bad4f5c99af0fc1fac02f81c569464100306b633e8a28b
                          • Instruction ID: 9d400d10de0f3470d0e31f2d085479bed0817f6b0bcfe29771d4ee7a4b48a2d9
                          • Opcode Fuzzy Hash: 14f713258f6c30de99bad4f5c99af0fc1fac02f81c569464100306b633e8a28b
                          • Instruction Fuzzy Hash: 4A625CB0E002159BDF14CF5DC5846ADBFB2BF88308F2885ADD808AB356D735D946CB91
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                          • Instruction ID: fa72119d763c41ce507c4b5e08828b50c96f072b29f168590d063ceb56f1789b
                          • Opcode Fuzzy Hash: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                          • Instruction Fuzzy Hash: CF023C71E012199BDF14CFA9C9806BEFBF1FF88314F248669D619E7381DB35A9418B90
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressConcurrency::cancel_current_taskHandleModuleProc
                          • String ID: C$Content-Type: application/x-www-form-urlencoded$https://ipinfo.io/$https://www.maxmind.com/en/locate-my-ip-address
                          • API String ID: 2385143733-2400714340
                          • Opcode ID: a4d9850abf7888587847929ef497dce24d0e2f451c3598609469d549ffb619b8
                          • Instruction ID: d8432a5da1ae175fc55bdda7341a7f5c057a8cbdde4add86962f88158ce2db84
                          • Opcode Fuzzy Hash: a4d9850abf7888587847929ef497dce24d0e2f451c3598609469d549ffb619b8
                          • Instruction Fuzzy Hash: 03C28B709042699ADF24EB64DC5ABEEBF75BF95304F0440D8E44977282EB701B89CF62
                          APIs
                          • CreateFileW.KERNEL32(00000000,?,00000003,00000000,?,?,00000000), ref: 005A4208
                          • CreateFileA.KERNEL32(00000000,?,00000003,00000000,?,?,00000000), ref: 005A4210
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 79ba54dee12a99d5e1f57adf10db26b1d13320eb8772cbdecd632756f3e3447e
                          • Instruction ID: 3676b17facff502085dcb45424836d17350e3ee2611662772394f07abfecafd0
                          • Opcode Fuzzy Hash: 79ba54dee12a99d5e1f57adf10db26b1d13320eb8772cbdecd632756f3e3447e
                          • Instruction Fuzzy Hash: A071EDB16043018BDB10CF68D845BAFBBE9FFC6314F04492EF99986251E775C985CB92
                          APIs
                          • GetSystemTime.KERNEL32(?), ref: 005A468A
                          • GetCurrentProcessId.KERNEL32 ref: 005A46B5
                          • GetTickCount.KERNEL32 ref: 005A46CA
                          • QueryPerformanceCounter.KERNEL32(?), ref: 005A46E1
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CountCounterCurrentPerformanceProcessQuerySystemTickTime
                          • String ID:
                          • API String ID: 4122616988-0
                          • Opcode ID: 97fe228d6c22aeb01a6a25a303f63774e305b3b128eecb279eae291899a5a0ae
                          • Instruction ID: 48371d23f9f3a07e7bd576459557e1182cf3547f86edcaf45f2c2e9010a357fc
                          • Opcode Fuzzy Hash: 97fe228d6c22aeb01a6a25a303f63774e305b3b128eecb279eae291899a5a0ae
                          • Instruction Fuzzy Hash: 10115B76A00628DBCB10CFA8D8885DDFBF5FB4A320B448476EC49D7315D631E941CB90
                          APIs
                          • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,?,00000002,?,?,?,0051363F,?,?,?,?,?,?,0061514D,000000FF), ref: 005ED7A8
                          • FormatMessageA.KERNEL32(00001300,00000000,?,?,00000000,00000000,00000000,?,?,?,0051363F,?,?), ref: 005ED7CA
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FormatInfoLocaleMessage
                          • String ID: !x-sys-default-locale
                          • API String ID: 4235545615-2729719199
                          • Opcode ID: 0b9833f857ee08166cb84dd1def236c6740cd911ef31909d675f0d8fd7dd1401
                          • Instruction ID: a73c66b1b6d155f5a0acc7396bda06b4e7d6c0f644a339e228b431a9513d6d4b
                          • Opcode Fuzzy Hash: 0b9833f857ee08166cb84dd1def236c6740cd911ef31909d675f0d8fd7dd1401
                          • Instruction Fuzzy Hash: 29E039B6550118FEFB04DBA0CC0BEEB7B6DEB04750B048125B905D2190E6B16E0096A0
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0061012C
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00610176
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0061023C
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale$ErrorLast
                          • String ID:
                          • API String ID: 661929714-0
                          • Opcode ID: a1228b19fd6b5f68162f453634e6f67cb38646d158cff2a757f64013bcd604b7
                          • Instruction ID: acff281ffb4f7c04b33e7ba8199395a31f602d0a8f58c8705136e7de43cac57e
                          • Opcode Fuzzy Hash: a1228b19fd6b5f68162f453634e6f67cb38646d158cff2a757f64013bcd604b7
                          • Instruction Fuzzy Hash: 7C61A07154420B9FEF68DF24CC86BEA77AAEF14300F18416AE915C6689F7B4DAC1CB50
                          APIs
                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 005F469C
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 005F46A6
                          • UnhandledExceptionFilter.KERNEL32(005F4484,?,?,?,?,?,00000000), ref: 005F46B3
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                          • String ID:
                          • API String ID: 3906539128-0
                          • Opcode ID: 3e5dd56b1fb5298e7fb7ab45f600f5bf7168b0abf22b21694986f8e3c7a7ff96
                          • Instruction ID: 905088620edd0f85bb75edbfb52fa4982d2a50057dc8b094d84a935e8a6aaa62
                          • Opcode Fuzzy Hash: 3e5dd56b1fb5298e7fb7ab45f600f5bf7168b0abf22b21694986f8e3c7a7ff96
                          • Instruction Fuzzy Hash: 8031C37590122DABCB21DF64D8897DDBBB8BF48310F5041EAE50CA7251EB749F858F44
                          Strings
                          • invalid distance code, xrefs: 005994C3
                          • invalid literal/length code, xrefs: 005994AA
                          • invalid distance too far back, xrefs: 005994D9
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
                          • API String ID: 0-3255898291
                          • Opcode ID: e79e1e614b61c4b8435e2ccd599855c6680f9d307dc00e9d6710b568c99d3ff3
                          • Instruction ID: 77a11e599059b916f01e501a1d8551dbe1548a6263d35bbc6de10ef0a69f7a06
                          • Opcode Fuzzy Hash: e79e1e614b61c4b8435e2ccd599855c6680f9d307dc00e9d6710b568c99d3ff3
                          • Instruction Fuzzy Hash: 9DF16C71E002599FCF04CFADC5906ACBFF2FF99304B2485AED495AB342D635AA46CB50
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: no such column: %s$rows updated
                          • API String ID: 0-885832449
                          • Opcode ID: da9f202eedd0dedde7acd6e6c8a1f1d0d30254eba9650297ca8db23cec1c0821
                          • Instruction ID: 07f28041a3f1cec0daeff34070ea4cc73827f06c15346c5bbacc7454193806d3
                          • Opcode Fuzzy Hash: da9f202eedd0dedde7acd6e6c8a1f1d0d30254eba9650297ca8db23cec1c0821
                          • Instruction Fuzzy Hash: 58C269706047828FD724DF19C094B2ABBF1FF88344F15896EE9868B392D775E855CB82
                          APIs
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005A28FB
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005A294D
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                          • String ID:
                          • API String ID: 885266447-0
                          • Opcode ID: e1169bf2a2d88f9097cbc5291f777eb9e6fb9c7e2e75234ed14d65dbaf6a6de8
                          • Instruction ID: 1a288245f105955c42638d63c3b92732988b2e147f454b26f39e54aec7b28d5f
                          • Opcode Fuzzy Hash: e1169bf2a2d88f9097cbc5291f777eb9e6fb9c7e2e75234ed14d65dbaf6a6de8
                          • Instruction Fuzzy Hash: 96F1E271E0021A8BCF14CF5DD8912BDFFF2FB89310F1982AAE595AB291DB7549418B90
                          APIs
                          • GetSystemTimePreciseAsFileTime.KERNEL32(?,?,005EEC78,?,?,?,?,005240EB,?,00573C2E), ref: 005EF283
                          • GetSystemTimeAsFileTime.KERNEL32(?,?,?,005EEC78,?,?,?,?,005240EB,?,00573C2E), ref: 005EF287
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Time$FileSystem$Precise
                          • String ID:
                          • API String ID: 743729956-0
                          • Opcode ID: 0169edcfba86221f0bdc54baff4c70f354a88b29cfc713275bb8e683c312cc1e
                          • Instruction ID: 2d59f8a3579d4c648ca915ac350bcc63844a2a3133431e75e29c03c861c3550a
                          • Opcode Fuzzy Hash: 0169edcfba86221f0bdc54baff4c70f354a88b29cfc713275bb8e683c312cc1e
                          • Instruction Fuzzy Hash: 03D0223A5005B8E78B092FD1FC048DC7F2AFA0AB503088077FA0983124CF211C008BC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: /
                          • API String ID: 0-2043925204
                          • Opcode ID: e6f9361b79cae30eccac2df57ad2210cb5673d937e8340a67173644a85d68272
                          • Instruction ID: 45115c9e1e7475f37bed64e6ac78eddbe925b7d0a6dc21700beca2db610bdd43
                          • Opcode Fuzzy Hash: e6f9361b79cae30eccac2df57ad2210cb5673d937e8340a67173644a85d68272
                          • Instruction Fuzzy Hash: 84E26D7080425E9ADF25EBA0DC5ABEDBF75BF54300F4044D8E44A67282EB741B89DF62
                          APIs
                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?), ref: 00609A51
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: 9978ff0b82d6eaaf016ba493cafe3c960920387c15122b413961ccd9cce6d203
                          • Instruction ID: 2ccc3695b41ff43b27dff3d8d37e07dbfe79a6c28315b93b79bc69df6e9d91e9
                          • Opcode Fuzzy Hash: 9978ff0b82d6eaaf016ba493cafe3c960920387c15122b413961ccd9cce6d203
                          • Instruction Fuzzy Hash: 5CB11A316506089FD719CF28C486BA67BA2FF45364F29865CE899CF3E2C335D992CB50
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: %s-mj%08X
                          • API String ID: 0-77246884
                          • Opcode ID: 448fc39f872702818dadb165210a53d9838cf7a70e9be67fe8432c37282cff97
                          • Instruction ID: 0dbe326acba404a3471f2d881f5791bbcd8aac032625ffafd9517a7fc1f43873
                          • Opcode Fuzzy Hash: 448fc39f872702818dadb165210a53d9838cf7a70e9be67fe8432c37282cff97
                          • Instruction Fuzzy Hash: DD126C70604B019FD764CF69C890BAABBE5FFC8314F54892DE99A87251DB31F841CB4A
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __allrem
                          • String ID:
                          • API String ID: 2933888876-0
                          • Opcode ID: 7a44c20f99546b8cb0b7f6f3bc7e91dfe326bceb999c1273d02f7bbc8312f864
                          • Instruction ID: d005bacb5d751484d03050d67539252212aae33d580862b95aea8dda7986990c
                          • Opcode Fuzzy Hash: 7a44c20f99546b8cb0b7f6f3bc7e91dfe326bceb999c1273d02f7bbc8312f864
                          • Instruction Fuzzy Hash: 23816071A001459FDF58CF9CCC80AAEBBB5AF89300F1880A9E955EB346D275EE05CB91
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __allrem
                          • String ID:
                          • API String ID: 2933888876-0
                          • Opcode ID: 1ae21db2f24bae033a874413a08895cf9ef0a6936569dd53fef1bb6e24226d22
                          • Instruction ID: 6a0d4a47c696437260d3519ce59a653953009ccc764e9f33138adf274d0c262f
                          • Opcode Fuzzy Hash: 1ae21db2f24bae033a874413a08895cf9ef0a6936569dd53fef1bb6e24226d22
                          • Instruction Fuzzy Hash: 10616A71610740DFCB28CF6DC88056AFBF5AF99300B088AAEDD86DB756D630E955CB90
                          APIs
                          • IsDebuggerPresent.KERNEL32(?,?,?,00000000,00000001,?,00000000), ref: 00524293
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: DebuggerPresent
                          • String ID:
                          • API String ID: 1347740429-0
                          • Opcode ID: af5fd15cff890a9ac27f1d996f7fc24282960a7df6c92adc14ff25c9d05ac904
                          • Instruction ID: 60514511a7dd16cb3c7d4ea48fa3f746946ab04a4950e744f2a964b4b1ac5b20
                          • Opcode Fuzzy Hash: af5fd15cff890a9ac27f1d996f7fc24282960a7df6c92adc14ff25c9d05ac904
                          • Instruction Fuzzy Hash: 87518F71E002299FCB18DF99E885AEEBFB5FF89310F144569E419A7381D7349944CFA0
                          APIs
                            • Part of subcall function 00606DB3: HeapFree.KERNEL32(00000000,00000000,?,0060ECA9,005F89C3,00000000,005F89C3,?,0060EF4A,005F89C3,00000007,005F89C3,?,0060F43E,005F89C3,005F89C3), ref: 00606DC9
                            • Part of subcall function 00606DB3: GetLastError.KERNEL32(005F89C3,?,0060ECA9,005F89C3,00000000,005F89C3,?,0060EF4A,005F89C3,00000007,005F89C3,?,0060F43E,005F89C3,005F89C3), ref: 00606DD4
                          • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00609313,00000000,00000000,00000000), ref: 006091D2
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFreeHeapInformationLastTimeZone
                          • String ID:
                          • API String ID: 3335090040-0
                          • Opcode ID: 047590866a50a0a3ed8b40d57cce0762a1a26530c912eb94fe7bf74fde8b5ecb
                          • Instruction ID: e162799986963195751de8b80979baba6591c4f421e9c48cbe9f5458a8cdcaf4
                          • Opcode Fuzzy Hash: 047590866a50a0a3ed8b40d57cce0762a1a26530c912eb94fe7bf74fde8b5ecb
                          • Instruction Fuzzy Hash: 9941E675940125AFCB18EF65EC0699B7F7BAF42760B10416AF454A72E2EB309E00CBA4
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0061037F
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$InfoLocale
                          • String ID:
                          • API String ID: 3736152602-0
                          • Opcode ID: 0ba3c15ef53b571376abd5d4431c1df9cad4954e471b662ac661dff2d933006d
                          • Instruction ID: 2fb6de2176c0ce4f7ee092243e70b1668ea74a5f3fc3c3dcd330d37dbe979520
                          • Opcode Fuzzy Hash: 0ba3c15ef53b571376abd5d4431c1df9cad4954e471b662ac661dff2d933006d
                          • Instruction Fuzzy Hash: 2521A132611207ABEF289B25DC81AFB37AAEB04310F14017AF915D6281EBB4EDC08B54
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: 2a2e03b90355dc0d59000aeef2c7e7f9d6bd4af588e3a47cd3e57602e03e1696
                          • Instruction ID: 5bc310b744196eac31cd953c03f2a46461962f343431ff8d175d28990ca305ab
                          • Opcode Fuzzy Hash: 2a2e03b90355dc0d59000aeef2c7e7f9d6bd4af588e3a47cd3e57602e03e1696
                          • Instruction Fuzzy Hash: 71B1A1356007059FEF20CAA4CC41ABEFBF5FF44310F144E1AE9AAD2690D371A946CB61
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: d
                          • API String ID: 0-2564639436
                          • Opcode ID: a46c03965f89406d21e4840a8879490cd355410da3bfc95495e00d4f6904263f
                          • Instruction ID: 75acc801fc2566a54498e5fa300652ea53ace401c0fd58e5b07d4af67fa206e7
                          • Opcode Fuzzy Hash: a46c03965f89406d21e4840a8879490cd355410da3bfc95495e00d4f6904263f
                          • Instruction Fuzzy Hash: A9C171716047428FC715CF29C48056ABFE2BFDA344F1885ADE8998B346DB35ED06CBA1
                          APIs
                          • GetModuleHandleA.KERNEL32(FAE1F7FA), ref: 0052446D
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: HandleModule
                          • String ID:
                          • API String ID: 4139908857-0
                          • Opcode ID: cc950a95dce5ff95e785122f5184d828b507a2eedb93c1b78dded785e97a1ba2
                          • Instruction ID: fc9eef203d3167730693a814ddc29224c8ca56efc21fde2109924a4f19aa2584
                          • Opcode Fuzzy Hash: cc950a95dce5ff95e785122f5184d828b507a2eedb93c1b78dded785e97a1ba2
                          • Instruction Fuzzy Hash: AC015BB1915218AFDB00DFA9D8856CEFBF8FF08310F5085AAE419E7241D375A205CBA0
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,006103D5,00000000,00000000,?), ref: 00610586
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$InfoLocale
                          • String ID:
                          • API String ID: 3736152602-0
                          • Opcode ID: 005763b52e6410c09ce1b8511ea4d81e0cd6910015807635b6cb8cacbb8b1f0a
                          • Instruction ID: afbc30c313302886a278c6a7cc5870b223ca7b81aa3bf5c4daa390f34718b25b
                          • Opcode Fuzzy Hash: 005763b52e6410c09ce1b8511ea4d81e0cd6910015807635b6cb8cacbb8b1f0a
                          • Instruction Fuzzy Hash: B401DB32600116ABEF289B248A45AFB776BDB40754F194429EC46A31C0EAB4FDC2CD90
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • EnumSystemLocalesW.KERNEL32(0061032B,00000001,FFFFFFFF,?,-00000050,?,006106D4,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00610097
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystem
                          • String ID:
                          • API String ID: 2417226690-0
                          • Opcode ID: 698648870ab998a35d3e21d8a0abd4c583c67cc4dd88312cd9ec148d8011cb59
                          • Instruction ID: 92fdf73d9813b16d46527402e4dcafd7e11d96ef09186ef227328806549dfeaf
                          • Opcode Fuzzy Hash: 698648870ab998a35d3e21d8a0abd4c583c67cc4dd88312cd9ec148d8011cb59
                          • Instruction Fuzzy Hash: 3BF0C2362007049FEB246F359881BEA7B92FB84369F19842DF9464B690D6B1ACC2CB50
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00603B89,?,20001004,00000000,00000002,?,?,0060317B), ref: 00607502
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: cf4ae74dd506eeff0fb7818d64b21c8a87832422d4a35f6e3d9fd1103e66f4e9
                          • Instruction ID: d7bf2133b4ce6a2b2b4f4f9f6111c25f4b3395656b1c5b3b48320380bd496042
                          • Opcode Fuzzy Hash: cf4ae74dd506eeff0fb7818d64b21c8a87832422d4a35f6e3d9fd1103e66f4e9
                          • Instruction Fuzzy Hash: 35E01A32984528BBCB162F61EC04EEF3F67AB44750F048425FC05652A1CB32AA21AAD4
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: ffad52e287b60b8b48c8f6c01dcfbe838c716be90c45fb450b26370899277487
                          • Instruction ID: 80a956d39aa894fe09583f73f8bfb0f9b4aae5ffc161a2b174383d22acec2d80
                          • Opcode Fuzzy Hash: ffad52e287b60b8b48c8f6c01dcfbe838c716be90c45fb450b26370899277487
                          • Instruction Fuzzy Hash: FA818F71951648AEEF219AB4C840BEDFFF0EF05201F1489E8E8D5E3B41D678D64AC7A1
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6094c59931180dee46fcb7a570bc31a5db8888ad96c1c80ab7b2378a9d329632
                          • Instruction ID: e5dd06fb9e742d12c9ff5ec71d543e2fc7c19b9c22be57ac397748bf796f4e1f
                          • Opcode Fuzzy Hash: 6094c59931180dee46fcb7a570bc31a5db8888ad96c1c80ab7b2378a9d329632
                          • Instruction Fuzzy Hash: 18929D74A083528FC714DF29D48062EBBF2BFCA304F15496DE8968B752D735E845CBA2
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 979fb8f93f60bc7e3a4f33676972e644137c874c556c6cda60a5e639773166af
                          • Instruction ID: 415b1f69013bfa3049c8e2b4ed8b5237d22e1e852f5f384cd5cb82c0dd775f7d
                          • Opcode Fuzzy Hash: 979fb8f93f60bc7e3a4f33676972e644137c874c556c6cda60a5e639773166af
                          • Instruction Fuzzy Hash: 1E526EB190424A8EDB48DF68C4156AEFFF4FF09304F1482AED845EB642E7719689CBD1
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e5a7e680b9f4d2905e7ccd588a0a5f6707801662529157b4eab3a2d851289479
                          • Instruction ID: cd44fef8237a88bfaa8c967efe295cc943f640b1cea9e4a39b0e218169d2efe3
                          • Opcode Fuzzy Hash: e5a7e680b9f4d2905e7ccd588a0a5f6707801662529157b4eab3a2d851289479
                          • Instruction Fuzzy Hash: 1B329A716083818FD728CF29C48572ABBE5BF88314F18896DE9C98B359D771ED45CB82
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c28d73c0b092ef984f92d42c05f47b3fe9854d4a3893dd605d8e8d710e45b8fc
                          • Instruction ID: 6368f64f042d4186b98edcf152e7f41783211b9fb6a6a35570034c0507328270
                          • Opcode Fuzzy Hash: c28d73c0b092ef984f92d42c05f47b3fe9854d4a3893dd605d8e8d710e45b8fc
                          • Instruction Fuzzy Hash: 0B025A35600B008FCB24CF29C484A6ABBF2FF89314F55495EE9968BB92DB75F851CB50
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Concurrency::cancel_current_taskFolderNamesPathPrivateProfileSection
                          • String ID:
                          • API String ID: 1185923200-0
                          • Opcode ID: 79e802052aba22b5e1dbcb441e2bdf86f60f083011ecf5141175cf5ab1925fd0
                          • Instruction ID: f36b6d8507c617a9eed6374c82864c0465579252861624bd1a23b8658af1d30a
                          • Opcode Fuzzy Hash: 79e802052aba22b5e1dbcb441e2bdf86f60f083011ecf5141175cf5ab1925fd0
                          • Instruction Fuzzy Hash: A2E1EF74D042898FCB15DB68CC49BEDBFB6BF99314F1880D9D449A7342EB705A48CBA1
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast
                          • String ID:
                          • API String ID: 1452528299-0
                          • Opcode ID: ec7cb30a5dc5b3a29324ca80e9e4014bfec278e9a5d19fdf040499880a3c4984
                          • Instruction ID: 2bd7dacbcdda5ce4e7f6423dc7f4233bc8f06dde5f41d64ac0e68878300dd99d
                          • Opcode Fuzzy Hash: ec7cb30a5dc5b3a29324ca80e9e4014bfec278e9a5d19fdf040499880a3c4984
                          • Instruction Fuzzy Hash: 64B1C6756407459BDB3C9B24CC92BF7B3AAEF44308F14493DE94786AC0EB75A986CB10
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 88923f8df2a61e7006f5ecf14fd7805f83e68085996bdc7208aa9031238299ab
                          • Instruction ID: 490e25d703bf2389942f55cccb75498ed556e8392beed292251798a5721673df
                          • Opcode Fuzzy Hash: 88923f8df2a61e7006f5ecf14fd7805f83e68085996bdc7208aa9031238299ab
                          • Instruction Fuzzy Hash: 36D19D706007418BEB24CF39C49479ABBE1FF58314F548A6DD4EE8B781EB74A489CB91
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa4a20ca9efea50b4dec5b5d095b2047d73e52b5fca4e20fe11e8416b54ef34e
                          • Instruction ID: 26ff1b4a958cb3d5f31096c9c1cadc86d488ae95b706d5d3e25c33f0f80737d9
                          • Opcode Fuzzy Hash: fa4a20ca9efea50b4dec5b5d095b2047d73e52b5fca4e20fe11e8416b54ef34e
                          • Instruction Fuzzy Hash: 85B1A1716047019FDB20DE64C880A6BBBE5FF89324F144A3DF9AAC3690D774E949CB52
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 970760fb301abcd751a2535e2fc00994ad1a2215bf31372becfa56a4f6f65e52
                          • Instruction ID: 09a458d104271dc0fdde13bedee7aebcdf8d8c07d5a10f8380e34d6c8dc67631
                          • Opcode Fuzzy Hash: 970760fb301abcd751a2535e2fc00994ad1a2215bf31372becfa56a4f6f65e52
                          • Instruction Fuzzy Hash: FA7104B4E011468FEB14CF68D8D17FEBFB6FB1A300F050169D85597782CB289996C7A0
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 41d31ba86242bfd7bd76f9ba221a1519e07e8bc4f3f0aa95c67da6b44e1bb030
                          • Instruction ID: d5569f474a28144352b1a2fb2cc242acae7b9b31f6f407bc9e283419549aa584
                          • Opcode Fuzzy Hash: 41d31ba86242bfd7bd76f9ba221a1519e07e8bc4f3f0aa95c67da6b44e1bb030
                          • Instruction Fuzzy Hash: ED61B431500709AFDF30CAA8C880BEEBFE5FF45310F208AB9E595D26A0D275E685C751
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 01fa3ee8db4cf0f3d1f92b962ccb34bcd4349841ee1e19269a56cd65cbf3ca22
                          • Instruction ID: 9c21d87bae517280a858c4eeda8aaec5cbd6f708df631f964d5dd397f332ed9e
                          • Opcode Fuzzy Hash: 01fa3ee8db4cf0f3d1f92b962ccb34bcd4349841ee1e19269a56cd65cbf3ca22
                          • Instruction Fuzzy Hash: 506144316109664FD728CF5EECC04663752E78A301386661AEAC1DB2A6C735F527DBE0
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 920c44e739ca4d08db5b5969fbc7a5a158caad0a814d8dad7807257cb044add9
                          • Instruction ID: 2988480aa988442f801a26c19e2885f991f9754534a8e66d8d31943de64ceac2
                          • Opcode Fuzzy Hash: 920c44e739ca4d08db5b5969fbc7a5a158caad0a814d8dad7807257cb044add9
                          • Instruction Fuzzy Hash: 70517F72D00219AFDF14CF98C981AFEBFB6FF88314F598459E915AB201D7389A50DB90
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 854d7f0168f0dc93b040c5b83782ce3004fb363419dbd7899f20dfa3d1eb45b6
                          • Instruction ID: 6b72043940b605ff67476cb5c97f11e7ebffca8ec816ebeedd5b4c5b805cdf47
                          • Opcode Fuzzy Hash: 854d7f0168f0dc93b040c5b83782ce3004fb363419dbd7899f20dfa3d1eb45b6
                          • Instruction Fuzzy Hash: 4C317E31600B158FC765CEB9C8817A3F7E5FB49310F150A6EE6EAC7281C6B4B984CB60
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ac8b70dc6646eac00bb8f7aeb5e9057f0b1fa3d1da44066a827c1914688b07cf
                          • Instruction ID: 4dd92dd7dde1a304bcc7d3d61ec1e2c3c28f2bde888e3ef3c77944fba0328c28
                          • Opcode Fuzzy Hash: ac8b70dc6646eac00bb8f7aeb5e9057f0b1fa3d1da44066a827c1914688b07cf
                          • Instruction Fuzzy Hash: 90D0A73102C299CDC32EC964F084B827F85DF06704F16CCCDC0A6CB156D5E0D884E398
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fb43d5ebd18ffb5bfa975f8970044cafa813baba2386a534dcfbb36c7b008315
                          • Instruction ID: 5283c8b63ae8548d8e40bf5470c4245be67efeb7fe5a67d9c850ab03f81b6920
                          • Opcode Fuzzy Hash: fb43d5ebd18ffb5bfa975f8970044cafa813baba2386a534dcfbb36c7b008315
                          • Instruction Fuzzy Hash: 22D05E3202969549D32EC528B048B837FA5AB4A214F168D8980868B052E5A094C9D658
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3469e2706c7b8808072a0d70d13407581380fe56500d1ba4e961cf50c2cc6b8c
                          • Instruction ID: dbc702a08d152575c0d9f4efb0c0dd8df9a70d10112f3a1208ba3dba4c9c81cc
                          • Opcode Fuzzy Hash: 3469e2706c7b8808072a0d70d13407581380fe56500d1ba4e961cf50c2cc6b8c
                          • Instruction Fuzzy Hash: 9FC0CAB06042108BCA28DB1CB480866B7E6AF98210328CA2EE08A83600E672ED009B90
                          APIs
                          • std::_Lockit::_Lockit.LIBCPMT ref: 0057F833
                          • std::_Lockit::_Lockit.LIBCPMT ref: 0057F855
                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0057F875
                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0057F89F
                          • std::_Lockit::_Lockit.LIBCPMT ref: 0057F90D
                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0057F959
                          • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0057F973
                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0057FA08
                          • std::_Facet_Register.LIBCPMT ref: 0057FA15
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                          • String ID: bad locale name$"c
                          • API String ID: 3375549084-968494664
                          • Opcode ID: c9dc5e39d474c26a5d588a029adc1cef0c6c531a087194b2b0bc96c07b065ae1
                          • Instruction ID: 42db759a30de6cc6157f111f38de0f8af23331a62208688d16e4fe1f7948a353
                          • Opcode Fuzzy Hash: c9dc5e39d474c26a5d588a029adc1cef0c6c531a087194b2b0bc96c07b065ae1
                          • Instruction Fuzzy Hash: 95619FB1D002499FEF10DFA4E849B9EBFB5BF45310F148468E849AB341E735E905CBA2
                          APIs
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,7556F380), ref: 00595475
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,7556F380), ref: 0059548C
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,7556F380), ref: 005954A5
                          Strings
                          • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36, xrefs: 0059557F
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CharNext
                          • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36
                          • API String ID: 3213498283-2732702261
                          • Opcode ID: 784c1c15fe1aa32dc9641f7e8f4a1616ef73e0240794f039d3c2f399316f2aa8
                          • Instruction ID: 82ab2f4c158aeb7807b1b6c9c6983b4b0e06d12b8b8d8b892858048b83120db6
                          • Opcode Fuzzy Hash: 784c1c15fe1aa32dc9641f7e8f4a1616ef73e0240794f039d3c2f399316f2aa8
                          • Instruction Fuzzy Hash: 9E416939940614ABCF52DF689C80AADBFB7FF4A311F094069ED88D7321E7314E568B50
                          APIs
                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00523938
                          • RmStartSession.RSTRTMGR(?,00000000,?), ref: 00523990
                          • RmRegisterResources.RSTRTMGR(?,00000001,?,00000000,00000000,00000000,00000000,?), ref: 005239CC
                          • RmGetList.RSTRTMGR(?,00000000,?,?,?), ref: 005239F4
                          • RmShutdown.RSTRTMGR(?,00000001,00000000), ref: 00523A15
                          • RmEndSession.RSTRTMGR(?), ref: 00523A28
                          • SetLastError.KERNEL32(00000000), ref: 00523A2F
                          • CopyFileA.KERNEL32(?,?,00000000), ref: 00523A4E
                          • GetLastError.KERNEL32(?,?,00000000), ref: 00523A59
                          • CopyFileA.KERNEL32(?,?,00000000), ref: 00523A71
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$CopyFileSession$ListRegisterResourcesShutdownStart
                          • String ID:
                          • API String ID: 304452573-0
                          • Opcode ID: 3d54961e041344b6abc5ae9431c808675942ca85bf7f518e53896aef589d52dc
                          • Instruction ID: e0ee568a8aacf3c20d06a4ea4c4bfbd7912edc8d8cfdd1e5732e146f24263e63
                          • Opcode Fuzzy Hash: 3d54961e041344b6abc5ae9431c808675942ca85bf7f518e53896aef589d52dc
                          • Instruction Fuzzy Hash: 6C41AC32D0021AABDF21DBA0EC45BFEBB79FF45710F14412AE905B6290DB755A40CBA0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwind
                          • String ID: csm$csm$csm$b
                          • API String ID: 944608866-1124614693
                          • Opcode ID: d8b54be5ecb7279b6850f66950320b191d0dfffbac8d575c94d8bfe3c3c2b9cd
                          • Instruction ID: 0f0791b8eb696a74d2c5a4c60a6e97a1b940f28bd6bde632a280b20980339126
                          • Opcode Fuzzy Hash: d8b54be5ecb7279b6850f66950320b191d0dfffbac8d575c94d8bfe3c3c2b9cd
                          • Instruction Fuzzy Hash: BEB1557180020EEBEF15DFA4C8899BEBFB5FF94310B14455AEA01AB202D739DA51CF91
                          APIs
                          • DecodePointer.KERNEL32(?,811C9DC5,?,?,?,?,?,?,?,0061448A), ref: 006133C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: DecodePointer
                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                          • API String ID: 3527080286-3064271455
                          • Opcode ID: 297b0b9c951f5bd73616194bbc5f425296444d194a741a00c02861a85b5f6bf7
                          • Instruction ID: eb24b1fd0acbca56f8e351c06700685752a34fbad8da3c68b7611e48c0ed5fd8
                          • Opcode Fuzzy Hash: 297b0b9c951f5bd73616194bbc5f425296444d194a741a00c02861a85b5f6bf7
                          • Instruction Fuzzy Hash: AD5147B4900A2ACBCF119F59E80C1EDBFB7FB49704F184056D492AA354CB798BA5CF54
                          APIs
                          • LocalAlloc.KERNEL32(00000040,0000001C), ref: 0051B1F0
                          • SetupDiEnumDeviceInfo.SETUPAPI(?,00000000,00000000), ref: 0051B1FF
                          • LocalAlloc.KERNEL32(00000040,0000001C,?,00000000,00000000), ref: 0051B239
                          • SetupDiEnumDeviceInterfaces.SETUPAPI(?,00000000,0061F540,00000000,00000000), ref: 0051B251
                          • SetupDiGetDeviceInterfaceDetailA.SETUPAPI(?,00000000,00000000,00000000,?,00000000), ref: 0051B26D
                          • SetupDiGetDeviceInterfaceDetailA.SETUPAPI(?,?,00000000,?,00000000,00000000), ref: 0051B28F
                          • LocalFree.KERNEL32(?,?,?,?,?,00000000,?,00000000,00000000), ref: 0051B2C0
                          • LocalFree.KERNEL32(?,?,?,00000000,?,00000000,00000000), ref: 0051B2C5
                          • LocalFree.KERNEL32(?,?,?,00000000,?,00000000,00000000), ref: 0051B2C8
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Local$DeviceSetup$Free$AllocDetailEnumInterface$InfoInterfaces
                          • String ID:
                          • API String ID: 45558158-0
                          • Opcode ID: 2fc3ded58bfc13478eb5c79bd7a3a87bc892eb8f736f92cd3746db8217bbe1cd
                          • Instruction ID: dcbd8c47dab12788d076ee99284abccb88a065d76e521a727a8699a6d87d0e63
                          • Opcode Fuzzy Hash: 2fc3ded58bfc13478eb5c79bd7a3a87bc892eb8f736f92cd3746db8217bbe1cd
                          • Instruction Fuzzy Hash: 59413CB5A40309AFDB60DFA9DC41B9EFBF9FB48700F14852AE519E7650E774A9008F60
                          APIs
                            • Part of subcall function 005A3E50: GetVersionExA.KERNEL32(?), ref: 005A3E76
                          • GetVersionExA.KERNEL32(?), ref: 005A43F3
                          • DeleteFileW.KERNEL32(00000000), ref: 005A4412
                          • GetFileAttributesW.KERNEL32(00000000), ref: 005A4419
                          • GetLastError.KERNEL32 ref: 005A4426
                          • Sleep.KERNEL32(00000064), ref: 005A443C
                          • DeleteFileA.KERNEL32(00000000), ref: 005A4445
                          • GetFileAttributesA.KERNEL32(00000000), ref: 005A444C
                          • GetLastError.KERNEL32 ref: 005A4459
                          • Sleep.KERNEL32(00000064), ref: 005A446F
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$AttributesDeleteErrorLastSleepVersion
                          • String ID:
                          • API String ID: 1421123951-0
                          • Opcode ID: f8063c74552b481fd06f19973c27757e23bbc73517f8b7ace63e1d926da70a25
                          • Instruction ID: f12187bb19c7de63b763daf322be59253268958384ebdcdee2e6486cc4a4a7a1
                          • Opcode Fuzzy Hash: f8063c74552b481fd06f19973c27757e23bbc73517f8b7ace63e1d926da70a25
                          • Instruction Fuzzy Hash: B721E5359002149BCF10ABB8AC886BE7BF5FB8F335F20C666E91EC2241EB7449419F51
                          APIs
                          • RegGetValueA.ADVAPI32(80000002,E0E0EBC2,F5FEFDD5,0001FFFF,00000001,?,00000104), ref: 0051C2B2
                          • GetComputerNameExA.KERNEL32(00000002,?,00000104), ref: 0051C31C
                          • LsaOpenPolicy.ADVAPI32(00000000,006456CC,00000001,00000000), ref: 0051C375
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ComputerNameOpenPolicyValue
                          • String ID: %wZ
                          • API String ID: 642710655-705104578
                          • Opcode ID: 964aefc5871dd21a5c9538ff98d78de7ddb1eada1a6ce6d5199e0dce2fdc983d
                          • Instruction ID: 53d75ef2b57e7537aa9568300706464194d523846beed17187213c53db81b639
                          • Opcode Fuzzy Hash: 964aefc5871dd21a5c9538ff98d78de7ddb1eada1a6ce6d5199e0dce2fdc983d
                          • Instruction Fuzzy Hash: E871AEB1940258DFEF20CFA4D849BEEBFB8BF05300F04456EE559AB241E7B65689CB50
                          APIs
                          • InternetSetOptionA.WININET(00000000,00000006,00000000,00000004), ref: 00595100
                          • HttpOpenRequestA.WININET(00000000,D0D2D7D9,?,00000000,00000000,00000000,80000000,00000000), ref: 00595175
                          • GetLastError.KERNEL32(00000000,00000000), ref: 005951A0
                          • InternetQueryOptionA.WININET(00000000,0000001F,80000000,?), ref: 005951CB
                          • InternetSetOptionA.WININET(00000000,0000001F,00000100,00000004), ref: 005951E1
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: InternetOption$ErrorHttpLastOpenQueryRequest
                          • String ID:
                          • API String ID: 482189329-0
                          • Opcode ID: 519fd74dd3c4f222391f2ca2af2559af22bd4b98511b1bc3005cd8a4b1fc17a0
                          • Instruction ID: 5b8c9bedebde1194860fb76edaae1b081af8cb9346664c6cb1fb08c8a3d67b62
                          • Opcode Fuzzy Hash: 519fd74dd3c4f222391f2ca2af2559af22bd4b98511b1bc3005cd8a4b1fc17a0
                          • Instruction Fuzzy Hash: 79419575A40209BBEB21CF94DC49FAF7BB9EB45704F104059FA05BB280E7B49B04DB55
                          APIs
                          • OpenProcess.KERNEL32(001FFFFF,00000000), ref: 005528EA
                          • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000208,00000000), ref: 005529BB
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$MemoryOpenRead
                          • String ID: A$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_.$O$steam
                          • API String ID: 435025951-934398379
                          • Opcode ID: 8202b87646b18687101022c30b0c38714c380670410aa6c11c60f2151b4ec0ba
                          • Instruction ID: 188c0b6e12f493e14cefe52798c1858f0533cb96498a378a6fcd288e6289bc2b
                          • Opcode Fuzzy Hash: 8202b87646b18687101022c30b0c38714c380670410aa6c11c60f2151b4ec0ba
                          • Instruction Fuzzy Hash: 5602D370D002498FDF18DF68DC597AEBFB5BF45300F1481ADE849AB282E7745A89CB91
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051799A
                          • ___std_exception_copy.LIBVCRUNTIME ref: 00517B75
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q$out_of_range$type_error
                          • API String ID: 2659868963-383665097
                          • Opcode ID: 129ec59cb174273058bd2153e000e7cc6d1672668ed282b34513743d3f0bc536
                          • Instruction ID: bbb9ae0747723e5334f8c954386250ac2239ef30c865df8441737301076b6a17
                          • Opcode Fuzzy Hash: 129ec59cb174273058bd2153e000e7cc6d1672668ed282b34513743d3f0bc536
                          • Instruction Fuzzy Hash: ACC159B19042098FDB08CFA8D88479DBFF6FF48310F14866AE459EB742E7749980CB90
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005132C6
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 00513350
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy___std_exception_destroy
                          • String ID: +4Q$@3Q$`!Q$`!Q
                          • API String ID: 2970364248-74169555
                          • Opcode ID: 4864e0c79e1366dd5093894e37f81f5854b3674c835b86367817a7941c249697
                          • Instruction ID: b5b0fe487274b767b858b553b5df9d72fcf648426577df82a92fcc68c27a451e
                          • Opcode Fuzzy Hash: 4864e0c79e1366dd5093894e37f81f5854b3674c835b86367817a7941c249697
                          • Instruction Fuzzy Hash: 0F51A0719002499FDB08DF98D899BDEBFF6FF48310F14812AE815A7382D7749A81CB90
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 005EE614
                          • GetCurrentThreadId.KERNEL32 ref: 005EE631
                          • GetCurrentThreadId.KERNEL32 ref: 005EE652
                          • GetCurrentThreadId.KERNEL32 ref: 005EE6D5
                          • __Xtime_diff_to_millis2.LIBCPMT ref: 005EE6ED
                          • GetCurrentThreadId.KERNEL32 ref: 005EE719
                          • GetCurrentThreadId.KERNEL32 ref: 005EE75F
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CurrentThread$Xtime_diff_to_millis2
                          • String ID:
                          • API String ID: 1280559528-0
                          • Opcode ID: 3f88ef1a2d2011dffc1c2fc882fd28097b322cc5f72d9f408a340324effe5f81
                          • Instruction ID: 88f078ad942b6932a47670ca62396092b47e1f7c3e5f555803c1c8cfb6601926
                          • Opcode Fuzzy Hash: 3f88ef1a2d2011dffc1c2fc882fd28097b322cc5f72d9f408a340324effe5f81
                          • Instruction Fuzzy Hash: 2B51D235910695CFCF28DF65D9878A9BBF2FF58310B25846AE8869B241DB30EC41CF50
                          APIs
                          • FreeLibrary.KERNEL32(00000000,?,00607227,005F89C3,005FD244,00000000,00000000,00000000,?,00607451,00000022,FlsSetValue,00623B28,p;b,00000000), ref: 006071D9
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLibrary
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3664257935-537541572
                          • Opcode ID: f8d4f676038b4a1c1e92fe3a192567e8e6eea8b5b4a7a5488bbce0034ba26d6c
                          • Instruction ID: ae0f51698ac3b6db2dc74ba7b7089233ecbde21ea45b0c469ad33d081da09915
                          • Opcode Fuzzy Hash: f8d4f676038b4a1c1e92fe3a192567e8e6eea8b5b4a7a5488bbce0034ba26d6c
                          • Instruction Fuzzy Hash: F3210576E88210ABC7259B64DC40A9B37ABAF42374F1901A0FD06A73D0E770FE01CAD1
                          APIs
                          • __allrem.LIBCMT ref: 005FD69B
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005FD6B7
                          • __allrem.LIBCMT ref: 005FD6CE
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005FD6EC
                          • __allrem.LIBCMT ref: 005FD703
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005FD721
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                          • String ID:
                          • API String ID: 1992179935-0
                          • Opcode ID: 072458b663d47d35d409f30cb4732191d78ed49eac36aae1a03e98589251f805
                          • Instruction ID: 0a15a64cbb04ee4f69b73da031bda36b8aec196cfb0eb73631cbb3b8a4e42b72
                          • Opcode Fuzzy Hash: 072458b663d47d35d409f30cb4732191d78ed49eac36aae1a03e98589251f805
                          • Instruction Fuzzy Hash: E981F8B260170A9BE724AE28DC41B7B7BF7FF40724F144629F611DB681E778D9008BA0
                          APIs
                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,006132ED,00000000,00000000,?,00000001,?,?,?,?,00000001,?), ref: 006130C3
                          • __freea.LIBCMT ref: 00613258
                          • __freea.LIBCMT ref: 0061325E
                          • __freea.LIBCMT ref: 00613294
                          • __freea.LIBCMT ref: 0061329A
                          • __freea.LIBCMT ref: 006132AA
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __freea$Info
                          • String ID:
                          • API String ID: 541289543-0
                          • Opcode ID: 052e44f189a188f99ca8ad6910fe5a6df68fa086b2ade1ac308c63d66be6a28b
                          • Instruction ID: 6b4b08a6c4141cddeef66d6f77359d8fee98aaeb2da538d478682b8eecdfc7ea
                          • Opcode Fuzzy Hash: 052e44f189a188f99ca8ad6910fe5a6df68fa086b2ade1ac308c63d66be6a28b
                          • Instruction Fuzzy Hash: 8471C672904266ABDF24AF54CC42BEF7BABAF49310F2C0059E946BB381D7359F858750
                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 0052449B
                          • IsProcessorFeaturePresent.KERNEL32(00000015), ref: 005244A7
                          • RegOpenKeyExA.ADVAPI32(80000002,C0C0CBC2,00000000,00020019,?), ref: 0052452C
                          • RegOpenKeyExA.ADVAPI32(80000002,C0C0CBC2,00000000,00020019,?), ref: 005245AA
                          • RegCloseKey.ADVAPI32(?), ref: 005245B5
                          • GetComputerNameA.KERNEL32(?,?), ref: 005245CA
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: OpenPresent$CloseComputerDebuggerFeatureNameProcessor
                          • String ID:
                          • API String ID: 2393775839-0
                          • Opcode ID: c91fda855e356346202d83207b76113f7fd768b696904c9fa85ad288ff5d02c5
                          • Instruction ID: a4d6608399f69672e76826d58c64b4d2bdeb0311dc4ac1c13f27252e962d2912
                          • Opcode Fuzzy Hash: c91fda855e356346202d83207b76113f7fd768b696904c9fa85ad288ff5d02c5
                          • Instruction Fuzzy Hash: E871AD7090026CAEDF14CFA4E884AEDBFB9FF0A304F14415DE845AB282E770A545CF64
                          APIs
                          • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 005155C4
                          • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 005155FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_fs_directory_iterator_advance@8
                          • String ID: .
                          • API String ID: 2610647541-248832578
                          • Opcode ID: 252926316b0406c02cc289696f9d4ec0676907b97eb3fad9dd05e55569c75e58
                          • Instruction ID: 7b1524c8d28a175596b4280d414dbaa6a727882fdf04ff40149e83bc3aa0e623
                          • Opcode Fuzzy Hash: 252926316b0406c02cc289696f9d4ec0676907b97eb3fad9dd05e55569c75e58
                          • Instruction Fuzzy Hash: 22C1EF75A00A26DFEB24CF18C4846E9BBB2FF84320F554669D8559B290F735ADC4CBD0
                          APIs
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 005175BE
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 005175CD
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_destroy
                          • String ID: at line $, column $`!Q
                          • API String ID: 4194217158-3570351978
                          • Opcode ID: d9c15410a5c118c90975e1361f7b6b8c659fa07921b49db98d2c8164c43f73fa
                          • Instruction ID: 51829fd37b9b8bb6353c0acd2004eea68b089b5f882f566cc4a003031960c869
                          • Opcode Fuzzy Hash: d9c15410a5c118c90975e1361f7b6b8c659fa07921b49db98d2c8164c43f73fa
                          • Instruction Fuzzy Hash: FC61F971A042499FEB08DF68DC84B9DBFB6FF88300F14462CE415A7782D774AA80CB90
                          APIs
                            • Part of subcall function 00513190: ___std_exception_copy.LIBVCRUNTIME ref: 005132C6
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051345F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: +4Q$@3Q$@3Q$`!Q
                          • API String ID: 2659868963-2244486879
                          • Opcode ID: c5b10aef47ef45ffe0d1ae1e360459a342529804b669f832fc9a30a48d1e5127
                          • Instruction ID: a667031697b3c26895c80163bd6b5ef16fee3c5dfab99ccee6be91f318a90bbf
                          • Opcode Fuzzy Hash: c5b10aef47ef45ffe0d1ae1e360459a342529804b669f832fc9a30a48d1e5127
                          • Instruction Fuzzy Hash: 173183B1900209AFCB18DFA8D845AEEFFF9FB48310F14852AF515E7641E774A690CB94
                          APIs
                            • Part of subcall function 005F0EFB: RaiseException.KERNEL32(E06D7363,00000001,00000003,00573D00,00573D00,?,?,005ED708,00573D00,006409C4,00000000,00573D00,00000000,00000001), ref: 005F0F5B
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051345F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionRaise___std_exception_copy
                          • String ID: +4Q$@3Q$@3Q$`!Q
                          • API String ID: 3109751735-2244486879
                          • Opcode ID: 02ac4cfb0c47430e8a23a32c09928d6e41d60212aa2f893110cab2f538bc7af1
                          • Instruction ID: 12060f76310e50b19a33cad5673592cf0d75d8ad7a4bf63da4a8e8ddf17dc5c9
                          • Opcode Fuzzy Hash: 02ac4cfb0c47430e8a23a32c09928d6e41d60212aa2f893110cab2f538bc7af1
                          • Instruction Fuzzy Hash: D2014FB650020AAF8704DFA8D405896FFFDBF44310704842AE62987611EBB0E554CB90
                          APIs
                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,1D15B573,005F47AC,?,00000000,0061D2B1,000000FF,?,005FF151,FF176ACC,?,005FF125,00000000), ref: 005FF1AA
                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005FF1BC
                          • FreeLibrary.KERNEL32(00000000,?,00000000,0061D2B1,000000FF,?,005FF151,FF176ACC,?,005FF125,00000000), ref: 005FF1DE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 6adf3e2a5eb246f5847bf128e56d0028e075a653c01457c80dbe34131a118d62
                          • Instruction ID: 30b4ab417910c1936268a30238db8041801f599f36a9fde87c0e473a2ca430f5
                          • Opcode Fuzzy Hash: 6adf3e2a5eb246f5847bf128e56d0028e075a653c01457c80dbe34131a118d62
                          • Instruction Fuzzy Hash: A4016775544A2AFFDB119B50DC05FEEBBB9FB04B21F048536EC11E2690DB789900CB90
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057D06F
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057D096
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q$uQ
                          • API String ID: 2659868963-1635935002
                          • Opcode ID: 5542d998bc9f276b9de09799c8a3c6af9b9b123f1bbfd2b1cd3a1a1f2b2d10bd
                          • Instruction ID: 1c9a36f9857229ba223778fa611c24b24e81897b96aed9abb7d89dd684721aa4
                          • Opcode Fuzzy Hash: 5542d998bc9f276b9de09799c8a3c6af9b9b123f1bbfd2b1cd3a1a1f2b2d10bd
                          • Instruction Fuzzy Hash: AF01A4B650060AAF8704DF59D409892FFFAFF58710704852BA529CBB11E7B0E568CFA0
                          APIs
                            • Part of subcall function 005A3E50: GetVersionExA.KERNEL32(?), ref: 005A3E76
                          • GetVersionExA.KERNEL32(?,?,?,?), ref: 005A4591
                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?), ref: 005A45B6
                          • GetFullPathNameW.KERNEL32(00000000,00000003,00000000,00000000,?), ref: 005A45D6
                          • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?), ref: 005A45EF
                          • GetFullPathNameA.KERNEL32(00000000,00000003,00000000,00000000,?), ref: 005A4621
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FullNamePath$Version
                          • String ID:
                          • API String ID: 495861893-0
                          • Opcode ID: 2be0e66c9867936495926d750cff8215042d4e4d483c097261c3efae2f7eb728
                          • Instruction ID: 1aed157da81442f69b2fa1603fa575926d78917411fff9065881f5dbe4b18c7e
                          • Opcode Fuzzy Hash: 2be0e66c9867936495926d750cff8215042d4e4d483c097261c3efae2f7eb728
                          • Instruction Fuzzy Hash: 32212DB2A0110967D7107B64EC4AFBF7B69FFC3314F044034F90A57252DB689905C7A6
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005177B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q$invalid_iterator
                          • API String ID: 2659868963-2457165433
                          • Opcode ID: d6f76faeaf49e0222cf05479c9f35fb5ba9f559c2f5d370a5a66870217d9c61c
                          • Instruction ID: f62e94db0ad494021ba79c1c6ab61c43f77cf161d7567bd430a832aac0064341
                          • Opcode Fuzzy Hash: d6f76faeaf49e0222cf05479c9f35fb5ba9f559c2f5d370a5a66870217d9c61c
                          • Instruction Fuzzy Hash: 32514EB09002499FDB18CF68D89479DFFF2FB48310F148669E419EB792E774A980CB90
                          APIs
                          • EncodePointer.KERNEL32(00000000,?), ref: 005F36D0
                          • CatchIt.LIBVCRUNTIME ref: 005F37B6
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CatchEncodePointer
                          • String ID: MOC$RCC
                          • API String ID: 1435073870-2084237596
                          • Opcode ID: 342482f0a0998134e8d19b061fcd218d82a8e6241885b77058ccd29af76a4e3b
                          • Instruction ID: 2ec690571fbdaf82dbaed5e57487c85bff868c690c3af66f8e82b3c2b84728fe
                          • Opcode Fuzzy Hash: 342482f0a0998134e8d19b061fcd218d82a8e6241885b77058ccd29af76a4e3b
                          • Instruction Fuzzy Hash: 9C416AB290120EAFEF15EF94CD85AEEBFB5FF48304F188059FA0566261D3399A50DB50
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057D0DF
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057D106
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 9940d1acb60a71fbee33f00c383a2ae0849cec9c513006fc10dc722c846f653f
                          • Instruction ID: f16c871ece39802eadb44443dbbaa31ab9a1d752b09aec970a6d89af778da10d
                          • Opcode Fuzzy Hash: 9940d1acb60a71fbee33f00c383a2ae0849cec9c513006fc10dc722c846f653f
                          • Instruction Fuzzy Hash: CBF0C4B650060AAF8708DF58D409892FFEAFA54710705853BA529CBB01E7B0E568CFA0
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0058B3DF
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0058B406
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 56f60a0efb31b411004c69370bca0858b066b4b0414069862f8a2c64f9a23001
                          • Instruction ID: 306760a5b0a0c58843ef841e6875e3707fc5825cc462c9d7c96577c4f011cd96
                          • Opcode Fuzzy Hash: 56f60a0efb31b411004c69370bca0858b066b4b0414069862f8a2c64f9a23001
                          • Instruction Fuzzy Hash: 38F0C4B650060AAF8708DF58D409896BFEAFA54710305852BE52ACBB01E7B0E568CFA0
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057A8AF
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057A8D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 2032b15beadde8aa39ddf178bab52cd3986704a9ea8b62f026669beb0a3b9420
                          • Instruction ID: f12c09cb9ccaa05ebbf20c88a474b13fd1f25ab7f79359212760566c69536e69
                          • Opcode Fuzzy Hash: 2032b15beadde8aa39ddf178bab52cd3986704a9ea8b62f026669beb0a3b9420
                          • Instruction Fuzzy Hash: 58F0C4B650060AAF8708DF58D409892FFEAFA54710305853BA529CBB01E7B0E568CFA0
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057A97F
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057A9A6
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 1f0047e6fbe73a5750f2ae1381ec866849626a293e4cc28c6085984445bff7dc
                          • Instruction ID: 20efa7f03bfa3ed1b98c0fb4837b8fe572025763d2435ac105b8e12f4cbbce25
                          • Opcode Fuzzy Hash: 1f0047e6fbe73a5750f2ae1381ec866849626a293e4cc28c6085984445bff7dc
                          • Instruction Fuzzy Hash: 65F0C4B650061AAF8708DF59D409892BFEAFA94710305852BE529CBB01E7B0E568CFA4
                          APIs
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,005F4078,00000000,?,00646988,?,?,?,005F421B,00000004,InitializeCriticalSectionEx,006215CC,InitializeCriticalSectionEx), ref: 005F40D4
                          • GetLastError.KERNEL32(?,005F4078,00000000,?,00646988,?,?,?,005F421B,00000004,InitializeCriticalSectionEx,006215CC,InitializeCriticalSectionEx,00000000,?,005F3E62), ref: 005F40DE
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 005F4106
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad$ErrorLast
                          • String ID: api-ms-
                          • API String ID: 3177248105-2084034818
                          • Opcode ID: 59487e1819e3e4d6b9e0c1747807fa37e43665c41ce29fecf557bf2bb1e1545e
                          • Instruction ID: a2e08ee297dbade59886715e4f378b6e993b11ecfa08f4690378606ea8d8bb1b
                          • Opcode Fuzzy Hash: 59487e1819e3e4d6b9e0c1747807fa37e43665c41ce29fecf557bf2bb1e1545e
                          • Instruction Fuzzy Hash: 5AE01A3068820CB6EF105BA1EC06F6A3E6BBB11B50F148031FA0DA84E1EB75E9909944
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AdjustPointer
                          • String ID:
                          • API String ID: 1740715915-0
                          • Opcode ID: 5731da0b598b6d78cba2267ac0d38802d5865d48c1e3f55e07ead866f44965bf
                          • Instruction ID: 5eec340306c823e1933e993c72371c1d434a78851c523fb4fa1ac709dc1a7f83
                          • Opcode Fuzzy Hash: 5731da0b598b6d78cba2267ac0d38802d5865d48c1e3f55e07ead866f44965bf
                          • Instruction Fuzzy Hash: C151A37560160A9FFB289F14D845FBA7FA5FF40310F244529EE0187291DB3AAA85CB90
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 599017c89d470981fefea27f155824e36b1cd886e50e5685f193db0a798847b3
                          • Instruction ID: d4829d4132f064b77d27710cf36a8de4e1c66b2f3ae118b727fdcacd4f6d6dda
                          • Opcode Fuzzy Hash: 599017c89d470981fefea27f155824e36b1cd886e50e5685f193db0a798847b3
                          • Instruction Fuzzy Hash: 17410BB2640709AFD724AF38D845B7ABFB5FF84710F10453AF201DBA91D77999408790
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f0729fb4909c83ad4ecad4a37ccf2d15157d5c48bf3d7ee6d86927987860ca1e
                          • Instruction ID: fb378e397ff78bbf523c6f26fed8c2958a372a6ed2e70450098e802c70bdbf05
                          • Opcode Fuzzy Hash: f0729fb4909c83ad4ecad4a37ccf2d15157d5c48bf3d7ee6d86927987860ca1e
                          • Instruction Fuzzy Hash: EB21927564020EAF9B10AF65DC8497A7F6ABF903647118935FB18D7981EB38ED0187A0
                          APIs
                          • SetFilePointer.KERNEL32(00000000,00000000,?,00000000), ref: 005A38A9
                          • GetLastError.KERNEL32 ref: 005A38B6
                          • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 005A38EE
                          • GetLastError.KERNEL32 ref: 005A391F
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFileLast$PointerWrite
                          • String ID:
                          • API String ID: 2977825765-0
                          • Opcode ID: f59be7c20ddad96e5fe1638ff2cb8542237ba605ffcade6b9d761ff1655a608b
                          • Instruction ID: a9dc41451a92f90786e6ef381ffd7ee91283107251ab4b70a0f3186cfbb4cb15
                          • Opcode Fuzzy Hash: f59be7c20ddad96e5fe1638ff2cb8542237ba605ffcade6b9d761ff1655a608b
                          • Instruction Fuzzy Hash: 4C21A132A01209AFDB20CFA9D841BDE7BE8FB45365F144266FE18D7240D771DE108B90
                          APIs
                          • GetUserNameA.ADVAPI32(?,00000100), ref: 005242F8
                          • GetComputerNameA.KERNEL32(?,00000100), ref: 0052431F
                          • GetCurrentProcess.KERNEL32(00000000), ref: 005243A8
                          • TerminateProcess.KERNEL32(00000000), ref: 005243AF
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: NameProcess$ComputerCurrentTerminateUser
                          • String ID:
                          • API String ID: 1086297622-0
                          • Opcode ID: efc96081783eca5f1435bdafcca3e43d9d15e3ae63d095d8cea5d459068e07b2
                          • Instruction ID: 2ec99e40e4e0dc7aa4aeba2e0c9d04edbe3f883add55e5bfc39333803fc6a03e
                          • Opcode Fuzzy Hash: efc96081783eca5f1435bdafcca3e43d9d15e3ae63d095d8cea5d459068e07b2
                          • Instruction Fuzzy Hash: 29218671C4425CABDF10DBE0EC49BDEBBBCAF18305F1041AAE945D7182E7759289CBA1
                          APIs
                          • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 005A37FF
                          • GetLastError.KERNEL32 ref: 005A380A
                          • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 005A3832
                          • GetLastError.KERNEL32 ref: 005A383C
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFileLast$PointerRead
                          • String ID:
                          • API String ID: 2170121939-0
                          • Opcode ID: de2215407c46ecff412d9e71a6e2461da2223d52033b78c1b7ff2d4a582e014a
                          • Instruction ID: e5dae0a11a7d4647a977fa7758eb77aef0b347a8b65d2cbddeb2f306fd0fbe52
                          • Opcode Fuzzy Hash: de2215407c46ecff412d9e71a6e2461da2223d52033b78c1b7ff2d4a582e014a
                          • Instruction Fuzzy Hash: 95116D32600109ABDB108FA9EC05BDABBA9FB45365F008266F92CC6250E775D9208BD0
                          APIs
                          • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 005A395F
                          • GetLastError.KERNEL32 ref: 005A396A
                          • SetEndOfFile.KERNEL32(?), ref: 005A3977
                          • GetLastError.KERNEL32 ref: 005A3981
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFileLast$Pointer
                          • String ID:
                          • API String ID: 1697706070-0
                          • Opcode ID: 9a4f1cff1090d128d6edcfcc6afc4509b4150bfb18c9430425845f060431a95b
                          • Instruction ID: 898c2b8b8cf55022386a8647aff52515d8cc4bb18e43b59ee37d81801205fa3a
                          • Opcode Fuzzy Hash: 9a4f1cff1090d128d6edcfcc6afc4509b4150bfb18c9430425845f060431a95b
                          • Instruction Fuzzy Hash: 66F03031514608EFDB109FA4ED066ABBBE9FB05325F04826AF92DC21A0EB719D109B80
                          APIs
                          • WriteConsoleW.KERNEL32(00000000,00000000,005F9087,00000000,00000000,?,00610F2F,00000000,00000001,?,?,?,00604FA4,?,00000000,00000000), ref: 006141C9
                          • GetLastError.KERNEL32(?,00610F2F,00000000,00000001,?,?,?,00604FA4,?,00000000,00000000,?,?,?,0060557E,00000000), ref: 006141D5
                            • Part of subcall function 0061419B: CloseHandle.KERNEL32(FFFFFFFE,006141E5,?,00610F2F,00000000,00000001,?,?,?,00604FA4,?,00000000,00000000,?,?), ref: 006141AB
                          • ___initconout.LIBCMT ref: 006141E5
                            • Part of subcall function 0061415D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0061418C,00610F1C,?,?,00604FA4,?,00000000,00000000,?), ref: 00614170
                          • WriteConsoleW.KERNEL32(00000000,00000000,005F9087,00000000,?,00610F2F,00000000,00000001,?,?,?,00604FA4,?,00000000,00000000,?), ref: 006141FA
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                          • String ID:
                          • API String ID: 2744216297-0
                          • Opcode ID: 2df3bda3c0e5d09e80aa0c8a33cf6a574ce7d1a610a517150f5924b888a4aa47
                          • Instruction ID: e0d9bf839152ae3d0ffba15970a65bfe3bdf4559e6a1c33c460443f4262b885b
                          • Opcode Fuzzy Hash: 2df3bda3c0e5d09e80aa0c8a33cf6a574ce7d1a610a517150f5924b888a4aa47
                          • Instruction Fuzzy Hash: 6AF0123A000125BBCF226FD1DC099D93F67FF0A3A1F098015FA1D96630CA3289A09B90
                          APIs
                          • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,?,?,?,?,?,?,00000000,006322E8,00000000), ref: 0052E557
                          • GetProcAddress.KERNEL32(00000000,C7D2C1C6), ref: 0052E562
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Ws2_32.dll
                          • API String ID: 1646373207-3093949381
                          • Opcode ID: aab0e015a796fbe62367bd9e587ee8f51ff09821fcadbac78285a68e97363212
                          • Instruction ID: 5d11e451eab1dadb33dbd2028f9dc5e161f010a06ed81c37cb2250edaa70f5ea
                          • Opcode Fuzzy Hash: aab0e015a796fbe62367bd9e587ee8f51ff09821fcadbac78285a68e97363212
                          • Instruction Fuzzy Hash: F7E1BF70600221DFEB25CF68D88166DBFE2FF56310F24495DE4A69B3D2DB70A941CB91
                          APIs
                          • SetEndOfFile.KERNEL32(00000000,?,00000000,?,?,?,?,?,a_,0060A7BA,?,?,a_,?,00000000,?), ref: 0060A918
                          • GetLastError.KERNEL32(?,?,?,?,a_,0060A7BA,?,?,a_,?,00000000,?), ref: 0060A922
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFileLast
                          • String ID: a_
                          • API String ID: 734332943-2295455027
                          • Opcode ID: c10fb9b0f26f56fcdd86b26488b2c4e7d2901f2e7c8ca4051a70a2659116c371
                          • Instruction ID: f2b1cf678a21c1f134422b2e0be2e5bc2513cd9e6658cc3f387332049bc15e47
                          • Opcode Fuzzy Hash: c10fb9b0f26f56fcdd86b26488b2c4e7d2901f2e7c8ca4051a70a2659116c371
                          • Instruction Fuzzy Hash: 4D513A31A80705AAEB1C8FE5CC85BDF7B76BF043A0F148219F511962C1E330D892CB92
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005134AF
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: @3Q$`!Q
                          • API String ID: 2659868963-2844704439
                          • Opcode ID: 26ccfd862ffb857bb4669486b6ba2dac6845ac4ee95a905b4cba5cf52c6d838b
                          • Instruction ID: 25ad08f5b60d01b37825a46c904af3658f3564112f679ec65ed8c1bd6faafb21
                          • Opcode Fuzzy Hash: 26ccfd862ffb857bb4669486b6ba2dac6845ac4ee95a905b4cba5cf52c6d838b
                          • Instruction Fuzzy Hash: 83F0A5B660470AAF8708CF59D401896FBE9FB99320305853BE529C7B00E7B0E5248BA4
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 00513078
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 0b78440d9291ec1e783ac7c08242bf6ad28a5221b5ecd803e107569c13f4949b
                          • Instruction ID: fd0ee94aa4340964ea0801a4b488dd923d23cd9493619fa2b0658b0e48f51f6f
                          • Opcode Fuzzy Hash: 0b78440d9291ec1e783ac7c08242bf6ad28a5221b5ecd803e107569c13f4949b
                          • Instruction Fuzzy Hash: 8FE012B29013099BC710DFA8D8059CAFFF9AB59711F0486BAE948D7301F6B0D5948BD1
                          APIs
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 005175F1
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 00517600
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_destroy
                          • String ID: `!Q
                          • API String ID: 4194217158-660956851
                          • Opcode ID: 73c2244f9fc807076d07fba8c252deb731c01c674e66a1b7b70aaacd15a80fed
                          • Instruction ID: 5a724f3f3b6cfa56aa7d7f67e3638b0da99a29a9cf31a3c22f9e69b4d3e12872
                          • Opcode Fuzzy Hash: 73c2244f9fc807076d07fba8c252deb731c01c674e66a1b7b70aaacd15a80fed
                          • Instruction Fuzzy Hash: B3E026F240074813C720AF549C0DBCABEEDAF60314F08083AFA5092342E7B4E65883E0
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005130AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: c2d4a24d0ab07bacfbe2ccd4410b2f665a8b3164d6c814142d23e2f662bdd90c
                          • Instruction ID: dfb2b47b467553cec50254d5e986dda1a7ca0008b7d94c0be3c8d9d1d4d169cd
                          • Opcode Fuzzy Hash: c2d4a24d0ab07bacfbe2ccd4410b2f665a8b3164d6c814142d23e2f662bdd90c
                          • Instruction Fuzzy Hash: 6BE012B25042199FC714DF48D805896BFDDEB15754709843EF649DB301E670D4508BA8
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051224E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.3876360133.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 401f76050f5728a0f12d10cc5740254eae01a823aea7712218f10f69a5bc145a
                          • Instruction ID: dd1332e80cdb1cd88eb2bdc2220f6f74893cb9ca54e2ef14f5cfe7b4d910754c
                          • Opcode Fuzzy Hash: 401f76050f5728a0f12d10cc5740254eae01a823aea7712218f10f69a5bc145a
                          • Instruction Fuzzy Hash: A2E012B25042159BC714DF48D805896BFDDEB15754749843EF649DB301E770D8508BA4