Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Rr6TGP9rEq.exe

Overview

General Information

Sample name:Rr6TGP9rEq.exe
renamed because original name is a hash value
Original sample name:297270c13474cdcd006acc261c98050a.exe
Analysis ID:1491466
MD5:297270c13474cdcd006acc261c98050a
SHA1:40fd185b12939822e4cc02da09ae3d38aea83306
SHA256:ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b
Tags:exe
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected RisePro Stealer
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to check for running processes (XOR)
Contains functionality to inject threads in other processes
Drops PE files to the user root directory
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • Rr6TGP9rEq.exe (PID: 7124 cmdline: "C:\Users\user\Desktop\Rr6TGP9rEq.exe" MD5: 297270C13474CDCD006ACC261C98050A)
    • Au3Check.exe (PID: 7164 cmdline: "C:\Program Files (x86)\autoit3\Au3Check.exe" MD5: 3BE697D1A92115D5CA76A633A527DFB7)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\bgEoRLupllWTRAp.pdfJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.2.Rr6TGP9rEq.exe.c000800000.8.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                0.3.Rr6TGP9rEq.exe.22dedf70000.3.raw.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                  0.2.Rr6TGP9rEq.exe.c000940000.7.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                    0.2.Rr6TGP9rEq.exe.c000380000.1.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                      1.2.Au3Check.exe.510000.0.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                        Click to see the 13 entries
                        No Sigma rule has matched
                        Timestamp:2024-08-12T11:29:18.496103+0200
                        SID:2046269
                        Severity:1
                        Source Port:49730
                        Destination Port:5000
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-12T11:29:15.502619+0200
                        SID:2049060
                        Severity:1
                        Source Port:49730
                        Destination Port:5000
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Rr6TGP9rEq.exeAvira: detected
                        Source: Rr6TGP9rEq.exeReversingLabs: Detection: 52%
                        Source: Rr6TGP9rEq.exeVirustotal: Detection: 63%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: Rr6TGP9rEq.exeJoe Sandbox ML: detected
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0053053B CryptUnprotectData,LocalFree,1_2_0053053B
                        Source: Rr6TGP9rEq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0051E150 FindFirstFileA,GetLastError,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,GetFileAttributesA,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,__Mtx_unlock,1_2_0051E150
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054E2D0 SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CopyFileA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,CopyFileA,__Mtx_unlock,__Mtx_unlock,1_2_0054E2D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0051A750 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,__Mtx_unlock,1_2_0051A750
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005ED997 FindClose,FindFirstFileExW,GetLastError,1_2_005ED997
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005EDA1D GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,1_2_005EDA1D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00530D83 FindFirstFileA,FindNextFileA,GetLastError,FindClose,1_2_00530D83
                        Source: global trafficTCP traffic: 192.168.2.4:49730 -> 193.233.132.67:5000
                        Source: Joe Sandbox ViewIP Address: 193.233.132.67 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.67
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0052E0A0 recv,setsockopt,WSAStartup,getaddrinfo,closesocket,socket,connect,closesocket,freeaddrinfo,WSACleanup,freeaddrinfo,1_2_0052E0A0
                        Source: Network trafficSuricata IDS: 2049060 - Severity 1 - ET MALWARE RisePro TCP Heartbeat Packet : 192.168.2.4:49730 -> 193.233.132.67:5000
                        Source: Network trafficSuricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.4:49730 -> 193.233.132.67:5000
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C000400000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, Au3Check.exe, 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, bgEoRLupllWTRAp.pdf.0.drString found in binary or memory: http://www.winimage.com/zLibDll
                        Source: Au3Check.exeString found in binary or memory: https://ipinfo.io/
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C000400000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, bgEoRLupllWTRAp.pdf.0.drString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
                        Source: Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                        Source: Au3Check.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0051AF30 GdiplusStartup,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,DeleteObject,GdipDisposeImage,DeleteObject,ReleaseDC,GdiplusShutdown,1_2_0051AF30
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeProcess Stats: CPU usage > 49%
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005745771_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00573E4B1_2_00573E4B
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0059A03B1_2_0059A03B
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005670F01_2_005670F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005990E01_2_005990E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0053B0E91_2_0053B0E9
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0051E1501_2_0051E150
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0059E1401_2_0059E140
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0053E1081_2_0053E108
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005E51001_2_005E5100
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005381291_2_00538129
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005411D01_2_005411D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005191A01_2_005191A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005AD1A01_2_005AD1A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005292591_2_00529259
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005952401_2_00595240
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005B12701_2_005B1270
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005562301_2_00556230
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005512201_2_00551220
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0053E2291_2_0053E229
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054E2D01_2_0054E2D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005512D81_2_005512D8
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0052A2901_2_0052A290
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005432861_2_00543286
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0055F2801_2_0055F280
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0059F3601_2_0059F360
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005333301_2_00533330
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A63D01_2_005A63D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0056A3E81_2_0056A3E8
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0060B3B91_2_0060B3B9
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005544571_2_00554457
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005694401_2_00569440
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0053C4701_2_0053C470
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005F646A1_2_005F646A
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005124F01_2_005124F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005AC4F01_2_005AC4F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0059E4901_2_0059E490
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054B4801_2_0054B480
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005F84A01_2_005F84A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005965501_2_00596550
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0055B5681_2_0055B568
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005955B01_2_005955B0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005986101_2_00598610
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A06101_2_005A0610
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A26101_2_005A2610
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0059F6001_2_0059F600
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0055C6201_2_0055C620
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054B6C91_2_0054B6C9
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005266891_2_00526689
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005677701_2_00567770
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054C7F01_2_0054C7F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005477E01_2_005477E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_006098241_2_00609824
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0059F8101_2_0059F810
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005DF8001_2_005DF800
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A68C01_2_005A68C0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E01_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005998801_2_00599880
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005388A01_2_005388A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005458A01_2_005458A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005E29501_2_005E2950
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005E69701_2_005E6970
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054D9101_2_0054D910
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0059E9101_2_0059E910
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0055A9001_2_0055A900
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0055B9391_2_0055B939
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005719E01_2_005719E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00547A471_2_00547A47
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0053EA601_2_0053EA60
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00525A101_2_00525A10
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00548A001_2_00548A00
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00534AD01_2_00534AD0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0056DA991_2_0056DA99
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054CA801_2_0054CA80
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005DDA801_2_005DDA80
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005FBB6D1_2_005FBB6D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005C7B301_2_005C7B30
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00595B201_2_00595B20
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00533B281_2_00533B28
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00569BD91_2_00569BD9
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00528C581_2_00528C58
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00542C591_2_00542C59
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0056FC771_2_0056FC77
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005CDC701_2_005CDC70
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00596C001_2_00596C00
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0056EC081_2_0056EC08
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0056ACC91_2_0056ACC9
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A2CF01_2_005A2CF0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005F2CE01_2_005F2CE0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00548C971_2_00548C97
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0059BD501_2_0059BD50
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00569D391_2_00569D39
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00527DC01_2_00527DC0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0053AE301_2_0053AE30
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00535E301_2_00535E30
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005FBEAF1_2_005FBEAF
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00552F401_2_00552F40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0056AF691_2_0056AF69
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00570F081_2_00570F08
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00593F801_2_00593F80
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: String function: 0057E530 appears 42 times
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: String function: 005A2450 appears 83 times
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: String function: 005EFED0 appears 53 times
                        Source: Rr6TGP9rEq.exeStatic PE information: Number of sections : 12 > 10
                        Source: Rr6TGP9rEq.exe, 00000000.00000003.1807163393.0000022DEE257000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAu3Check.exeN vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAu3Check.exeN vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000003.1807457246.0000022DEE0A8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAu3Check.exeN vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1811658210.00007FF682648000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename" vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C000400000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAu3Check.exeN vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exeBinary or memory string: OriginalFilename" vs Rr6TGP9rEq.exe
                        Source: Rr6TGP9rEq.exeBinary or memory string: main.SLnQ0g
                        Source: Rr6TGP9rEq.exeBinary or memory string: g9ew8IJGJBP.slN5jqtgKy
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@3/2@0/1
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A47F0 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,1_2_005A47F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A4110 GetVersionExA,CreateFileW,CreateFileA,GetDiskFreeSpaceW,GetDiskFreeSpaceA,1_2_005A4110
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005191A0 CopyFileA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,1_2_005191A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00556230 CopyFileA,RegOpenKeyExA,RegSetValueExA,RegCloseKey,CopyFileA,GetUserNameA,CopyFileA,SHGetFolderPathA,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,ShellExecuteA,1_2_00556230
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\bgEoRLupllWTRAp.pdfJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeFile created: C:\Users\user\AppData\Local\Temp\adobeDL8YL5T4U3oiJump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile opened: C:\Windows\system32\0d1903ecbb5bf6ef80622a77571fd1ca577007d1dbc1da5f200c0b1d21d0fd50AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
                        Source: Rr6TGP9rEq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C000400000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, Au3Check.exe, 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, bgEoRLupllWTRAp.pdf.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C000400000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, bgEoRLupllWTRAp.pdf.0.drBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                        Source: Rr6TGP9rEq.exeReversingLabs: Detection: 52%
                        Source: Rr6TGP9rEq.exeVirustotal: Detection: 63%
                        Source: Au3Check.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
                        Source: unknownProcess created: C:\Users\user\Desktop\Rr6TGP9rEq.exe "C:\Users\user\Desktop\Rr6TGP9rEq.exe"
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeProcess created: C:\Program Files (x86)\AutoIt3\Au3Check.exe "C:\Program Files (x86)\autoit3\Au3Check.exe"
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeProcess created: C:\Program Files (x86)\AutoIt3\Au3Check.exe "C:\Program Files (x86)\autoit3\Au3Check.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSection loaded: devobj.dllJump to behavior
                        Source: Rr6TGP9rEq.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: Rr6TGP9rEq.exeStatic PE information: Image base 0x140000000 > 0x60000000
                        Source: Rr6TGP9rEq.exeStatic file information: File size 5046784 > 1048576
                        Source: Rr6TGP9rEq.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x142600
                        Source: Rr6TGP9rEq.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x354c00
                        Source: Rr6TGP9rEq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: CopyFileA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,1_2_005191A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054C7F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0054C7F0
                        Source: bgEoRLupllWTRAp.pdf.0.drStatic PE information: real checksum: 0x0 should be: 0x15af84
                        Source: XPCwyNRACAjFfEg.pdf.0.drStatic PE information: real checksum: 0x465e9 should be: 0x5125f
                        Source: Rr6TGP9rEq.exeStatic PE information: section name: .xdata
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005EFA97 push ecx; ret 1_2_005EFAAA
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\XPCwyNRACAjFfEg.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\bgEoRLupllWTRAp.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\XPCwyNRACAjFfEg.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\bgEoRLupllWTRAp.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\bgEoRLupllWTRAp.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\XPCwyNRACAjFfEg.pdfJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\XPCwyNRACAjFfEg.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeFile created: C:\Users\user\bgEoRLupllWTRAp.pdfJump to dropped file
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005955B0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_005955B0
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_1-120451
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_1-119193
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,1_2_00573A40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeWindow / User API: threadDelayed 2176Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeWindow / User API: threadDelayed 6244Jump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeDropped PE file which has not been started: C:\Users\user\XPCwyNRACAjFfEg.pdfJump to dropped file
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeDropped PE file which has not been started: C:\Users\user\bgEoRLupllWTRAp.pdfJump to dropped file
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-119917
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeAPI coverage: 3.7 %
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 3104Thread sleep count: 54 > 30Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 3104Thread sleep count: 2176 > 30Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 3104Thread sleep time: -219776s >= -30000sJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 3592Thread sleep count: 350 > 30Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 3104Thread sleep count: 6244 > 30Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exe TID: 3104Thread sleep time: -630644s >= -30000sJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeLast function: Thread delayed
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeLast function: Thread delayed
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00579610 GetKeyboardLayoutList followed by cmp: cmp ecx, edx and CTI: je 0057962Ah1_2_00579610
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00577750 GetKeyboardLayoutList followed by cmp: cmp eax, 0eh and CTI: jc 00577760h country: Hungarian (hu)1_2_00577750
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00577780 GetKeyboardLayoutList followed by cmp: cmp eax, 21h and CTI: jc 00577790h country: Indonesian (id)1_2_00577780
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00577D40 GetKeyboardLayoutList followed by cmp: cmp eax, 2eh and CTI: jc 00577D50h country: Upper Sorbian (hsb)1_2_00577D40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A4670 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 005A46C1h1_2_005A4670
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0051E150 FindFirstFileA,GetLastError,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,GetFileAttributesA,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,__Mtx_unlock,1_2_0051E150
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054E2D0 SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CopyFileA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,CopyFileA,__Mtx_unlock,__Mtx_unlock,1_2_0054E2D0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0051A750 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,__Mtx_unlock,1_2_0051A750
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005ED997 FindClose,FindFirstFileExW,GetLastError,1_2_005ED997
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005EDA1D GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,1_2_005EDA1D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00530D83 FindFirstFileA,FindNextFileA,GetLastError,FindClose,1_2_00530D83
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0051C430 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,1_2_0051C430
                        Source: Au3Check.exe, 00000001.00000003.1827137520.00000000009E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}|
                        Source: Au3Check.exe, 00000001.00000003.1827137520.00000000009E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&
                        Source: Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: Au3Check.exe, 00000001.00000002.4167359109.000000000019D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_A1A98C04
                        Source: Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_A1A98C048$
                        Source: Au3Check.exe, 00000001.00000002.4167604295.00000000009D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}>
                        Source: Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}&
                        Source: Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000z
                        Source: Au3Check.exe, 00000001.00000002.4167604295.00000000009D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: Rr6TGP9rEq.exe, 00000000.00000002.1809939764.0000022DE89D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@@
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00524280 IsDebuggerPresent,1_2_00524280
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 CreateThread,FindCloseChangeNotification,Sleep,GetTempPathA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,SetCurrentDirectoryA,CreateMutexA,GetLastError,Sleep,Sleep,Sleep,shutdown,closesocket,WSACleanup,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,Sleep,Sleep,Sleep,GetModuleHandleA,GetProcAddress,GetCurrentProcess,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,CreateThread,CreateThread,CreateThread,FreeLibrary,WaitForSingleObject,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,WaitForSingleObject,CloseHandle,OutputDebugStringA,CreateMutexA,GetLastError,Sleep,Sleep,Sleep,Sleep,Sleep,shutdown,closesocket,Sleep,1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054C7F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0054C7F0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov ecx, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574577 mov eax, dword ptr fs:[00000030h]1_2_00574577
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00573A40 mov eax, dword ptr fs:[00000030h]1_2_00573A40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00573A40 mov eax, dword ptr fs:[00000030h]1_2_00573A40
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00573E4B mov eax, dword ptr fs:[00000030h]1_2_00573E4B
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00573E4B mov eax, dword ptr fs:[00000030h]1_2_00573E4B
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00573E4B mov eax, dword ptr fs:[00000030h]1_2_00573E4B
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00573E4B mov eax, dword ptr fs:[00000030h]1_2_00573E4B
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0052C0A0 mov eax, dword ptr fs:[00000030h]1_2_0052C0A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0052C0A0 mov eax, dword ptr fs:[00000030h]1_2_0052C0A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00524280 mov eax, dword ptr fs:[00000030h]1_2_00524280
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0052C0A0 mov eax, dword ptr fs:[00000030h]1_2_0052C0A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00525498 mov eax, dword ptr fs:[00000030h]1_2_00525498
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0052C0A0 mov eax, dword ptr fs:[00000030h]1_2_0052C0A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574638 mov eax, dword ptr fs:[00000030h]1_2_00574638
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005257B8 mov eax, dword ptr fs:[00000030h]1_2_005257B8
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005757A3 mov eax, dword ptr fs:[00000030h]1_2_005757A3
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005248E0 mov eax, dword ptr fs:[00000030h]1_2_005248E0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0054D910 mov eax, dword ptr fs:[00000030h]1_2_0054D910
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005759E5 mov eax, dword ptr fs:[00000030h]1_2_005759E5
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00525A10 mov ecx, dword ptr fs:[00000030h]1_2_00525A10
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0052FC20 mov eax, dword ptr fs:[00000030h]1_2_0052FC20
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_0052C0A0 mov eax, dword ptr fs:[00000030h]1_2_0052C0A0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00524DC9 mov eax, dword ptr fs:[00000030h]1_2_00524DC9
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00574EC8 mov eax, dword ptr fs:[00000030h]1_2_00574EC8
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00595240 GetProcessHeap,InternetOpenA,InternetOpenUrlA,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,CharNextA,CharNextA,CharNextA,CharNextA,1_2_00595240
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005F006D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_005F006D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005F45A4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_005F45A4
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005EFCC4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_005EFCC4

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeMemory allocated: C:\Program Files (x86)\AutoIt3\Au3Check.exe base: 510000 protect: page execute and read and writeJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00529F50 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,1_2_00529F50
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeMemory written: C:\Program Files (x86)\AutoIt3\Au3Check.exe base: 510000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeMemory written: C:\Program Files (x86)\AutoIt3\Au3Check.exe base: 510000Jump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeMemory written: C:\Program Files (x86)\AutoIt3\Au3Check.exe base: 3F0008Jump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeProcess created: C:\Program Files (x86)\AutoIt3\Au3Check.exe "C:\Program Files (x86)\autoit3\Au3Check.exe"Jump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00524400 cpuid 1_2_00524400
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: EnumSystemLocalesW,1_2_0061004D
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,1_2_006100D8
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,1_2_0061032B
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_00610454
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,1_2_0051C430
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,1_2_006074CE
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,1_2_0061055A
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_00610630
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoEx,FormatMessageA,1_2_005ED793
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,1_2_0060FCBB
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: GetLocaleInfoW,1_2_0060FEC0
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: EnumSystemLocalesW,1_2_0060FF67
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: EnumSystemLocalesW,1_2_00606F4A
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: EnumSystemLocalesW,1_2_0060FFB2
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeQueries volume information: C:\Program Files (x86)\AutoIt3\Au3Check.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Rr6TGP9rEq.exeQueries volume information: C:\Program Files (x86)\AutoIt3\Au3Check.exe VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005EF26A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,1_2_005EF26A
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00556230 CopyFileA,RegOpenKeyExA,RegSetValueExA,RegCloseKey,CopyFileA,GetUserNameA,CopyFileA,SHGetFolderPathA,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,ShellExecuteA,1_2_00556230
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_00609160 GetTimeZoneInformation,1_2_00609160
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeCode function: 1_2_005A4110 GetVersionExA,CreateFileW,CreateFileA,GetDiskFreeSpaceW,GetDiskFreeSpaceA,1_2_005A4110
                        Source: C:\Program Files (x86)\AutoIt3\Au3Check.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000800000.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Rr6TGP9rEq.exe.22dedf70000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000940000.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000380000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.Au3Check.exe.510000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000a8c000.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000600000.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Rr6TGP9rEq.exe.22dedf70000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Rr6TGP9rEq.exe.22dee0c0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.Au3Check.exe.510000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000600000.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Rr6TGP9rEq.exe.22dee0c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000a8c000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c0004f2000.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c00052c000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000572000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000940000.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000800000.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Au3Check.exe PID: 7164, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\bgEoRLupllWTRAp.pdf, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000800000.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Rr6TGP9rEq.exe.22dedf70000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000940000.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000380000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.Au3Check.exe.510000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000a8c000.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000600000.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Rr6TGP9rEq.exe.22dedf70000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Rr6TGP9rEq.exe.22dee0c0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.Au3Check.exe.510000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000600000.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Rr6TGP9rEq.exe.22dee0c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000a8c000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c0004f2000.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c00052c000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000572000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000940000.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Rr6TGP9rEq.exe.c000800000.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Au3Check.exe PID: 7164, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\bgEoRLupllWTRAp.pdf, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                        Command and Scripting Interpreter
                        1
                        DLL Side-Loading
                        411
                        Process Injection
                        121
                        Masquerading
                        OS Credential Dumping12
                        System Time Discovery
                        Remote Services1
                        Screen Capture
                        2
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts12
                        Native API
                        Boot or Logon Initialization Scripts1
                        DLL Side-Loading
                        11
                        Virtualization/Sandbox Evasion
                        LSASS Memory141
                        Security Software Discovery
                        Remote Desktop Protocol1
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)411
                        Process Injection
                        Security Account Manager11
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Ingress Tool Transfer
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Deobfuscate/Decode Files or Information
                        NTDS11
                        Process Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                        Obfuscated Files or Information
                        LSA Secrets1
                        Application Window Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        DLL Side-Loading
                        Cached Domain Credentials1
                        Account Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                        System Owner/User Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                        File and Directory Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow46
                        System Information Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Rr6TGP9rEq.exe53%ReversingLabsWin64.Adware.RedCap
                        Rr6TGP9rEq.exe64%VirustotalBrowse
                        Rr6TGP9rEq.exe100%AviraTR/Redcap.mfglo
                        Rr6TGP9rEq.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://www.winimage.com/zLibDll0%URL Reputationsafe
                        https://ipinfo.io/0%URL Reputationsafe
                        https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
                        https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
                        https://www.autoitscript.com/autoit3/0%Avira URL Cloudsafe
                        https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
                        https://t.me/RiseProSUPPORT0%VirustotalBrowse
                        https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%VirustotalBrowse
                        https://www.autoitscript.com/autoit3/0%VirustotalBrowse
                        https://www.maxmind.com/en/locate-my-ip-address0%VirustotalBrowse
                        No contacted domains info
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllRr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C000400000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, bgEoRLupllWTRAp.pdf.0.drfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.winimage.com/zLibDllRr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C000400000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, Au3Check.exe, 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, bgEoRLupllWTRAp.pdf.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://t.me/RiseProSUPPORTAu3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://ipinfo.io/Au3Check.exefalse
                        • URL Reputation: safe
                        unknown
                        https://www.autoitscript.com/autoit3/Rr6TGP9rEq.exe, 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp, Rr6TGP9rEq.exe, 00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, Au3Check.exe, 00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp, XPCwyNRACAjFfEg.pdf.0.drfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.maxmind.com/en/locate-my-ip-addressAu3Check.exefalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        193.233.132.67
                        unknownRussian Federation
                        2895FREE-NET-ASFREEnetEUfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1491466
                        Start date and time:2024-08-12 11:28:08 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 1s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:6
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Rr6TGP9rEq.exe
                        renamed because original name is a hash value
                        Original Sample Name:297270c13474cdcd006acc261c98050a.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@3/2@0/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target Rr6TGP9rEq.exe, PID 7124 because there are no executed function
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        TimeTypeDescription
                        05:29:48API Interceptor1043257x Sleep call for process: Au3Check.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        193.233.132.67file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                        • 193.233.132.67:8081/static/crypted_f961bb26.exe
                        SecuriteInfo.com.Win32.PWSX-gen.9534.16812.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                        • 193.233.132.67:8081/static/crypted_f961bb26.exe
                        file.exeGet hashmaliciousRisePro StealerBrowse
                        • 193.233.132.67:666/static/rise.exe
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        FREE-NET-ASFREEnetEUSecuriteInfo.com.Trojan.InjectNET.17.6536.18785.exeGet hashmaliciousRedLineBrowse
                        • 147.45.44.131
                        SecuriteInfo.com.Trojan.InjectNET.17.31870.20719.exeGet hashmaliciousRedLineBrowse
                        • 147.45.44.73
                        284ae9899ae53d03d27bd3f72892d843fe5bbecb097f5.exeGet hashmaliciousAmadey, DarkTortilla, Djvu, LummaC Stealer, RedLine, Stealc, VidarBrowse
                        • 147.45.47.169
                        5zFCjSBLvw.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                        • 147.45.44.104
                        file.exeGet hashmaliciousAmadey, Cryptbot, Neoreklami, PureLog Stealer, RedLine, Stealc, VidarBrowse
                        • 147.45.60.44
                        file.exeGet hashmaliciousDarkTortilla, NeoreklamiBrowse
                        • 147.45.60.44
                        SecuriteInfo.com.Trojan.InjectNET.17.3445.31574.exeGet hashmaliciousUnknownBrowse
                        • 147.45.44.138
                        SecuriteInfo.com.Trojan.InjectNET.17.30163.22147.exeGet hashmaliciousUnknownBrowse
                        • 147.45.44.131
                        SecuriteInfo.com.Trojan.InjectNET.17.12466.260.exeGet hashmaliciousLummaCBrowse
                        • 147.45.44.131
                        SecuriteInfo.com.Trojan.InjectNET.17.30163.22147.exeGet hashmaliciousUnknownBrowse
                        • 147.45.44.131
                        No context
                        No context
                        Process:C:\Users\user\Desktop\Rr6TGP9rEq.exe
                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):284088
                        Entropy (8bit):6.583673771403912
                        Encrypted:false
                        SSDEEP:3072:4wOvOIXbP5KVkD8QC2mCBFv9m7usyT8tKQ9clyPqlO91/iDVSsWUG0bCP0nVyiGe:nCb4VQjVsxyItKQNhigibouMBPwPCs
                        MD5:262D6B1FED356C09AEB4666335031DF2
                        SHA1:6D46B1E195D1FFBCF5D5197A1291C6EA790EBA92
                        SHA-256:DA17AB28094D89B0A94FB32715E2BCDFE9947031711CB94DD9F1CE541BF3948E
                        SHA-512:45FB554A35C38967E77D00D0E5F70FC0901276FF2DFAE5A341E3A3D0CCF17DD4FBF6478DC5CF58E0C54D34AD6F739E8149E0E8FBBFE46318F7A9DDAD7B89CBD4
                        Malicious:true
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.~.2.-.2.-.2.-n.G-.2.-n.E-J2.-n.D-.2.-.Z.,.2.-.Z.,.2.-.Z.,.2.-.J%-.2.-.2.-.2.-.[.,.2.-.[I-.2.-.2!-.2.-.[.,.2.-Rich.2.-........................PE..L...g.(c.....................6......&........0....@..................................e......................................,b..<....p...............l..h&...........L..8............................L..@............0..,............................text............................... ..`.rdata...8...0...:..."..............@..@.data........p.......\..............@....rsrc........p.......f..............@..@................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\Rr6TGP9rEq.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):1357136
                        Entropy (8bit):6.739954842849538
                        Encrypted:false
                        SSDEEP:24576:9jhWSkCh5jR4pkIhn1Fg7YqPCxYL+ID4ntel4LbKbmNTwExzpKPSaYQ1:Ob6jCkIhn1PGyuFbmNTXzAPSaX
                        MD5:F1EE4E4D017CC4F4D219194699B41D29
                        SHA1:301399A3ACE2E43794359AF582B7B2EDE1DD97EF
                        SHA-256:006657553CE820ADAFECAFC222944C84EC584F1E2E0ABA054A36D4F101A997E9
                        SHA-512:7822E172F28AD80926713E8DC20E77913D4A5ED483FD688B293E4173E0D3107652E844909830F029CC2DAF4A60F23BD1A09AEFA534DA2B3135DEDE6D5ABFE5C0
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: C:\Users\user\bgEoRLupllWTRAp.pdf, Author: Joe Security
                        Reputation:low
                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$......."...f.{Tf.{Tf.{T-.xUk.{T-.~U..{T-.|Ug.{T)..Tb.{T)..Ut.{T).xUq.{T).~U3.{T-..U..{T-.}Ug.{T-.zU}.{Tf.zT@.{T..rUz.{T..{Ug.{T...Tg.{Tf..Tg.{T..yUg.{TRichf.{T................PE..L.....e...............".....0....................@..........................0............@.............................L...\...........X+.......................z..8k..8...........................xj..@............................................text...X........................... ..`.rdata...<.......>..................@..@.data....H...0...4..................@....rsrc...X+.......,...J..............@..@.reloc...z.......|...v..............@..B................................................................................................................................................................................................................................................................
                        File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                        Entropy (8bit):7.020958484955603
                        TrID:
                        • Win64 Executable (generic) (12005/4) 74.95%
                        • Generic Win/DOS Executable (2004/3) 12.51%
                        • DOS Executable Generic (2002/1) 12.50%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                        File name:Rr6TGP9rEq.exe
                        File size:5'046'784 bytes
                        MD5:297270c13474cdcd006acc261c98050a
                        SHA1:40fd185b12939822e4cc02da09ae3d38aea83306
                        SHA256:ddc4a98828ac3afea03294fd57189778ce57e305d075f08f0ace443352d5447b
                        SHA512:cb1a42bf6c34f3042809f29a6cb2e11f4699c4d1718e5da340fac205a6875145cae2a690736206d8c19ad68916efc5c835d3488a1aa272f0d0e00cddeb150d00
                        SSDEEP:49152:/s+CpclD5n5jx/cOOXjdyfpPaG02dj6cwH4n1Yzb5UBAyXjYeBhZ8jGdn7h:XxlDnZpPx024cw47
                        TLSH:03369C87BC9004F4C0EE933689A655827B31BC480F3067D73A50BEB92E7ABD5AD75718
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$.&....L................@..............................S.......M...`... ............................
                        Icon Hash:a9d337070f113428
                        Entrypoint:0x1400014c0
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                        TLS Callbacks:0x40137f80, 0x1, 0x40137f50, 0x1, 0x4013b9e0, 0x1
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:1
                        File Version Major:6
                        File Version Minor:1
                        Subsystem Version Major:6
                        Subsystem Version Minor:1
                        Import Hash:5929190c8765f5bc37b052ab5c6c53e7
                        Instruction
                        dec eax
                        sub esp, 28h
                        dec eax
                        mov eax, dword ptr [004BEF35h]
                        mov dword ptr [eax], 00000001h
                        call 00007F0BD87E3D1Fh
                        nop
                        nop
                        dec eax
                        add esp, 28h
                        ret
                        nop dword ptr [eax]
                        dec eax
                        sub esp, 28h
                        dec eax
                        mov eax, dword ptr [004BEF15h]
                        mov dword ptr [eax], 00000000h
                        call 00007F0BD87E3CFFh
                        nop
                        nop
                        dec eax
                        add esp, 28h
                        ret
                        nop dword ptr [eax]
                        dec eax
                        sub esp, 28h
                        call 00007F0BD89258ACh
                        dec eax
                        test eax, eax
                        sete al
                        movzx eax, al
                        neg eax
                        dec eax
                        add esp, 28h
                        ret
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        dec eax
                        lea ecx, dword ptr [00000009h]
                        jmp 00007F0BD87E4039h
                        nop dword ptr [eax+00h]
                        ret
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        push ebp
                        dec eax
                        mov ebp, esp
                        dec eax
                        sub esp, 10h
                        dec eax
                        mov ecx, dword ptr [00158619h]
                        dec eax
                        mov edx, dword ptr [0015860Ah]
                        dec eax
                        cmp eax, ecx
                        jnl 00007F0BD87E407Ah
                        jnc 00007F0BD87E4094h
                        dec eax
                        shl eax, 04h
                        dec eax
                        mov ecx, dword ptr [edx+eax]
                        dec eax
                        mov ebx, dword ptr [edx+eax+08h]
                        dec eax
                        mov eax, ecx
                        dec eax
                        add esp, 10h
                        pop ebp
                        ret
                        dec eax
                        test ecx, ecx
                        jbe 00007F0BD87E406Fh
                        dec eax
                        mov eax, dword ptr [edx]
                        dec eax
                        mov ebx, dword ptr [edx+08h]
                        dec eax
                        add esp, 10h
                        pop ebp
                        ret
                        xor eax, eax
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x5230000x4e.edata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x5240000x13d0.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5280000x1ab5.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4c10000x7398.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x52a0000x56d8.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x4bfd600x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x52447c0x440.idata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x1425100x1426001689c0a61f068e655e9cc9a429bb9cd1False0.45523337533927877data6.262547988503689IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x1440000x27b300x27c002ccac218f42c3f0561e3d8062d0978e2False0.34171088836477986data4.1391825243617415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rdata0x16c0000x354b900x354c006cf0780f922948988c9e9a536d11e12eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .pdata0x4c10000x73980x7400f168e58d0a77ce383fb0fae8433af4aaFalse0.42298626077586204data5.435032323770333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .xdata0x4c90000xc380xe00cea507ee74ab8c28fdbe399dd8878db3False0.2544642857142857data3.962633143064429IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .bss0x4ca0000x588600x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .edata0x5230000x4e0x200e47cf641fe57baf17bad501765a3a96aFalse0.1328125data0.835069313857098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                        .idata0x5240000x13d00x140041b114f6ee85dc581b4af4e0204adde3False0.3171875data4.495096723445719IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .CRT0x5260000x700x2000eac8bed04ff70b62412779975fa2666False0.08203125data0.47139462148086453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .tls0x5270000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x5280000x1ab50x1c00a6f614766ad09b44db5b2ef7c06c8c7bFalse0.7693917410714286data6.966829299150213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0x52a0000x56d80x5800331e21ea698e2d37d0c9f5a9dacc775fFalse0.3044655539772727data5.382899971776336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x52813c0x117ePNG image data, 256 x 256, 8-bit/color RGB, non-interlaced0.9678427869584636
                        RT_GROUP_ICON0x5292bc0x14data1.05
                        RT_VERSION0x5292d00x378dataEnglishUnited States0.47072072072072074
                        RT_MANIFEST0x5296480x46dXML 1.0 document, ASCII textEnglishUnited States0.4510150044130627
                        DLLImport
                        KERNEL32.dllAddAtomA, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreA, CreateThread, CreateWaitableTimerExW, DeleteAtom, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, FindAtomA, FormatMessageA, FreeEnvironmentStringsW, GetAtomNameA, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetErrorMode, GetHandleInformation, GetLastError, GetProcAddress, GetProcessAffinityMask, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, RaiseFailFastException, ReleaseMutex, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetLastError, SetProcessAffinityMask, SetProcessPriorityBoost, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                        msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _beginthread, _beginthreadex, _cexit, _commode, _endthreadex, _errno, _fmode, _initterm, _lock, _memccpy, _onexit, _setjmp, _strdup, _ultoa, _unlock, abort, calloc, exit, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memcpy, memmove, memset, printf, realloc, signal, strerror, strlen, strncmp, vfprintf, wcslen
                        NameOrdinalAddress
                        _cgo_dummy_export10x140521a90
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                        2024-08-12T11:29:18.496103+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)1497305000192.168.2.4193.233.132.67
                        2024-08-12T11:29:15.502619+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet1497305000192.168.2.4193.233.132.67
                        TimestampSource PortDest PortSource IPDest IP
                        Aug 12, 2024 11:29:15.475203991 CEST497305000192.168.2.4193.233.132.67
                        Aug 12, 2024 11:29:15.481153011 CEST500049730193.233.132.67192.168.2.4
                        Aug 12, 2024 11:29:15.481267929 CEST497305000192.168.2.4193.233.132.67
                        Aug 12, 2024 11:29:15.502619028 CEST497305000192.168.2.4193.233.132.67
                        Aug 12, 2024 11:29:15.507800102 CEST500049730193.233.132.67192.168.2.4
                        Aug 12, 2024 11:29:18.496103048 CEST497305000192.168.2.4193.233.132.67
                        Aug 12, 2024 11:29:18.501389027 CEST500049730193.233.132.67192.168.2.4
                        Aug 12, 2024 11:29:36.828337908 CEST500049730193.233.132.67192.168.2.4
                        Aug 12, 2024 11:29:36.828521967 CEST497305000192.168.2.4193.233.132.67

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:05:29:02
                        Start date:12/08/2024
                        Path:C:\Users\user\Desktop\Rr6TGP9rEq.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\Rr6TGP9rEq.exe"
                        Imagebase:0x7ff682120000
                        File size:5'046'784 bytes
                        MD5 hash:297270C13474CDCD006ACC261C98050A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Go lang
                        Yara matches:
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:05:29:12
                        Start date:12/08/2024
                        Path:C:\Program Files (x86)\AutoIt3\Au3Check.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\autoit3\Au3Check.exe"
                        Imagebase:0x400000
                        File size:234'088 bytes
                        MD5 hash:3BE697D1A92115D5CA76A633A527DFB7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:moderate
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:45.6%
                          Total number of Nodes:1558
                          Total number of Limit Nodes:37
                          execution_graph 119178 574577 119179 574592 119178->119179 119610 512980 119179->119610 119183 5745b2 119631 51ab40 119183->119631 119185 5745bd 119186 574602 119185->119186 119187 57a5c0 40 API calls 119185->119187 119652 57c860 119186->119652 119189 5745f2 119187->119189 119191 57a5c0 40 API calls 119189->119191 119190 57460d CreateThread FindCloseChangeNotification 119192 5746e7 119190->119192 119197 574636 119190->119197 119191->119186 119194 512980 40 API calls 119192->119194 119193 574640 GetPEB 119193->119197 119195 57470e GetTempPathA 119194->119195 119659 51aeb0 119195->119659 119197->119193 119197->119197 119199 5746bd Sleep 119197->119199 119199->119192 119199->119193 119200 57474d 119201 512980 40 API calls 119200->119201 119202 57478b 119201->119202 119664 57e650 119202->119664 119206 5747bb 119672 5128d0 119206->119672 119208 5747c6 119209 5128d0 39 API calls 119208->119209 119210 5747d1 119209->119210 119211 5128d0 39 API calls 119210->119211 119212 5747dc 119211->119212 119213 512980 40 API calls 119212->119213 119214 57481a 119213->119214 119215 57e650 40 API calls 119214->119215 119216 57483c 119215->119216 119217 5128d0 39 API calls 119216->119217 119218 57484a 119217->119218 119219 5128d0 39 API calls 119218->119219 119220 574855 119219->119220 119677 51a690 119220->119677 119222 574866 119223 57487b 119222->119223 119224 57486a 119222->119224 119227 51a690 81 API calls 119223->119227 119742 51a750 90 API calls 2 library calls 119224->119742 119226 574878 119226->119223 119228 57488d 119227->119228 119229 5748a3 119228->119229 119230 574891 119228->119230 119233 5748ad CreateDirectoryA 119229->119233 119743 51a750 90 API calls 2 library calls 119230->119743 119232 5748a0 119232->119229 119234 5748ce 119233->119234 119235 5748bc 119233->119235 119238 5748d9 CreateDirectoryA 119234->119238 119744 525a10 101 API calls 4 library calls 119235->119744 119237 5748c6 119237->119234 119240 576bf6 OutputDebugStringA 119237->119240 119239 574969 119238->119239 119257 5748e6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 119238->119257 119245 574974 GetPEB 119239->119245 119241 576c0e 119240->119241 119242 576da3 Sleep shutdown closesocket 119240->119242 119241->119242 119243 576c18 119241->119243 119247 576ddc 119242->119247 119248 576deb 119242->119248 119827 5784b0 40 API calls 3 library calls 119243->119827 119256 574987 SetCurrentDirectoryA 119245->119256 119247->119248 119252 576de2 Sleep 119247->119252 119249 5128d0 39 API calls 119248->119249 119253 576df8 119249->119253 119250 574946 119745 525a10 101 API calls 4 library calls 119250->119745 119251 576c27 119828 5784b0 40 API calls 3 library calls 119251->119828 119252->119252 119255 5128d0 39 API calls 119253->119255 119260 576e03 119255->119260 119687 57a5c0 119256->119687 119257->119250 119259 576c36 119829 5784b0 40 API calls 3 library calls 119259->119829 119262 576e0e 119260->119262 119263 5128d0 39 API calls 119260->119263 119268 5128d0 39 API calls 119262->119268 119263->119262 119264 576c45 119830 5784b0 40 API calls 3 library calls 119264->119830 119267 576c54 119831 5784b0 40 API calls 3 library calls 119267->119831 119271 576e28 119268->119271 119272 576c63 119832 5784b0 40 API calls 3 library calls 119272->119832 119274 576c72 119276 57a770 40 API calls 119274->119276 119275 574a1f 119277 574a36 119275->119277 119284 574c0f __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 119275->119284 119278 576c83 119276->119278 119746 57e4d0 40 API calls __Strxfrm 119277->119746 119833 52a290 40 API calls 3 library calls 119278->119833 119281 574a85 119282 574a8f CreateMutexA 119281->119282 119285 5128d0 39 API calls 119282->119285 119283 576c88 119283->119242 119834 57e4d0 40 API calls __Strxfrm 119283->119834 119691 51b830 119284->119691 119288 574aa5 GetLastError 119285->119288 119288->119248 119290 574ab6 119288->119290 119289 576ce2 119292 576cec CreateMutexA 119289->119292 119291 574ac1 Sleep 119290->119291 119291->119291 119295 574acd 119291->119295 119293 5128d0 39 API calls 119292->119293 119296 576d02 GetLastError 119293->119296 119294 574cb5 119294->119294 119737 57cfc0 119294->119737 119301 512980 40 API calls 119295->119301 119296->119248 119297 576d13 Sleep 119296->119297 119299 576d48 119297->119299 119303 512980 40 API calls 119299->119303 119300 574cef 119306 57e650 40 API calls 119300->119306 119302 574af7 119301->119302 119747 52f690 79 API calls 2 library calls 119302->119747 119305 576d59 119303->119305 119835 52f690 79 API calls 2 library calls 119305->119835 119310 574d10 119306->119310 119307 574afc 119308 574b43 shutdown closesocket WSACleanup 119307->119308 119311 574b20 Sleep 119307->119311 119312 574b70 GetPEB 119308->119312 119315 5128d0 39 API calls 119310->119315 119311->119308 119311->119311 119317 574b80 119312->119317 119313 576d5e 119313->119242 119314 576d80 Sleep 119313->119314 119314->119242 119314->119314 119316 574d2c 119315->119316 119318 5128d0 39 API calls 119316->119318 119317->119312 119325 574d37 119318->119325 119319 574df2 119748 52c0a0 56 API calls std::_Facet_Register 119319->119748 119321 574d50 GetPEB 119321->119325 119322 574e02 119323 57a5c0 40 API calls 119322->119323 119324 574e14 119323->119324 119337 574e30 119324->119337 119344 574ea0 119324->119344 119325->119319 119325->119321 119328 574dc8 Sleep 119325->119328 119327 574f5c 119330 512980 40 API calls 119327->119330 119328->119319 119328->119321 119329 57a5f0 39 API calls 119329->119337 119331 574f83 119330->119331 119333 512980 40 API calls 119331->119333 119332 5128d0 39 API calls 119332->119337 119335 574faa 119333->119335 119334 512ae0 40 API calls 119334->119344 119340 512980 40 API calls 119335->119340 119336 57a5c0 40 API calls 119336->119337 119337->119329 119337->119332 119337->119336 119339 574e91 Sleep 119337->119339 119749 52c0a0 56 API calls std::_Facet_Register 119337->119749 119339->119324 119339->119344 119342 574fd1 119340->119342 119341 5128d0 39 API calls 119341->119344 119343 512980 40 API calls 119342->119343 119345 574fef 119343->119345 119344->119327 119344->119334 119344->119341 119750 51ae50 40 API calls 119344->119750 119346 512980 40 API calls 119345->119346 119347 57500d 119346->119347 119348 512980 40 API calls 119347->119348 119349 57502b 119348->119349 119350 512980 40 API calls 119349->119350 119351 575049 119350->119351 119352 512980 40 API calls 119351->119352 119353 575067 119352->119353 119354 512980 40 API calls 119353->119354 119355 575085 119354->119355 119356 512980 40 API calls 119355->119356 119357 5750a3 119356->119357 119751 576ea0 42 API calls std::_Facet_Register 119357->119751 119359 57514e OutputDebugStringA 119752 52f810 41 API calls 119359->119752 119361 5750bc 119361->119359 119363 575124 GetModuleHandleA GetProcAddress 119361->119363 119362 575160 119753 52f880 41 API calls 119362->119753 119363->119359 119365 575143 GetCurrentProcess 119363->119365 119365->119359 119366 575165 119754 52f8f0 41 API calls 119366->119754 119368 57516a 119755 52f960 41 API calls 119368->119755 119370 57516f 119756 52f9d0 41 API calls 119370->119756 119372 5755e3 119373 512980 40 API calls 119372->119373 119374 5755fe 119373->119374 119376 512980 40 API calls 119374->119376 119375 575174 119375->119372 119757 57e710 40 API calls 2 library calls 119375->119757 119378 57560e 119376->119378 119379 512980 40 API calls 119378->119379 119385 57561e 119379->119385 119380 5751c2 119380->119372 119758 57e710 40 API calls 2 library calls 119380->119758 119382 57520c 119759 58e540 40 API calls CallUnexpected 119382->119759 119384 575219 OutputDebugStringA 119386 575251 119384->119386 119782 57bb50 40 API calls CallUnexpected 119385->119782 119760 57e710 40 API calls 2 library calls 119386->119760 119389 575262 119761 58e540 40 API calls CallUnexpected 119389->119761 119391 575d32 119785 518400 40 API calls std::ios_base::_Ios_base_dtor 119391->119785 119392 57526f 119762 57e710 40 API calls 2 library calls 119392->119762 119394 575d50 119396 575d60 119394->119396 119397 576b1a 119394->119397 119786 55c620 40 API calls 119396->119786 119459 576b15 119397->119459 119818 5784b0 40 API calls 3 library calls 119397->119818 119399 5752a2 119763 58e540 40 API calls CallUnexpected 119399->119763 119402 575d65 119787 55f280 40 API calls 119402->119787 119403 5128d0 39 API calls 119408 576bb4 119403->119408 119404 57e710 40 API calls 119523 575666 119404->119523 119405 5752af 119764 57e710 40 API calls 2 library calls 119405->119764 119411 5128d0 39 API calls 119408->119411 119409 576b3c 119819 5784b0 40 API calls 3 library calls 119409->119819 119410 575d6a OutputDebugStringA 119788 577200 39 API calls 119410->119788 119414 576bbf 119411->119414 119418 5128d0 39 API calls 119414->119418 119416 576b4b 119820 5784b0 40 API calls 3 library calls 119416->119820 119417 575d7b 119789 577200 39 API calls 119417->119789 119423 576bca 119418->119423 119419 58e4a0 40 API calls 119419->119523 119420 5752fd 119765 58e540 40 API calls CallUnexpected 119420->119765 119825 576f60 39 API calls std::ios_base::_Ios_base_dtor 119423->119825 119425 576b5a 119821 5784b0 40 API calls 3 library calls 119425->119821 119426 575d85 CreateThread CreateThread 119790 54c7f0 9 API calls 119426->119790 119428 576bd5 119826 576fc0 39 API calls std::ios_base::_Ios_base_dtor 119428->119826 119429 57530a 119766 57e710 40 API calls 2 library calls 119429->119766 119433 576b69 119822 5784b0 40 API calls 3 library calls 119433->119822 119434 575dba 119435 575e73 119434->119435 119791 54ca80 43 API calls 3 library calls 119434->119791 119795 54d910 42 API calls 3 library calls 119435->119795 119436 576be0 119439 5128d0 39 API calls 119436->119439 119444 576beb 119439->119444 119442 576b78 119823 5784b0 40 API calls 3 library calls 119442->119823 119447 5128d0 39 API calls 119444->119447 119445 57535f 119767 58e540 40 API calls CallUnexpected 119445->119767 119446 576b87 119449 57a770 40 API calls 119446->119449 119447->119240 119451 576b98 119449->119451 119450 57536c 119768 57e710 40 API calls 2 library calls 119450->119768 119824 52a290 40 API calls 3 library calls 119451->119824 119452 575dcd 119792 57e710 40 API calls 2 library calls 119452->119792 119453 575e85 119796 57e710 40 API calls 2 library calls 119453->119796 119458 5753b0 119769 58e540 40 API calls CallUnexpected 119458->119769 119459->119403 119460 575e29 119793 5784b0 40 API calls 3 library calls 119460->119793 119461 575eea 119797 5784b0 40 API calls 3 library calls 119461->119797 119462 57e840 40 API calls 119462->119523 119466 5753bd 119770 57e710 40 API calls 2 library calls 119466->119770 119467 575e31 119794 57e710 40 API calls 2 library calls 119467->119794 119468 575ef2 119798 57e710 40 API calls 2 library calls 119468->119798 119472 57540f 119771 58e540 40 API calls CallUnexpected 119472->119771 119473 575f03 119478 575f27 WaitForSingleObject GetPEB 119473->119478 119475 575e42 119475->119435 119477 575e6c FreeLibrary 119475->119477 119476 57541c 119772 57e710 40 API calls 2 library calls 119476->119772 119477->119435 119486 575f40 GetPEB 119478->119486 119480 575472 119773 58e540 40 API calls CallUnexpected 119480->119773 119482 57547f OutputDebugStringA 119483 5754b9 119482->119483 119774 57e710 40 API calls 2 library calls 119483->119774 119485 5754ca 119775 58e540 40 API calls CallUnexpected 119485->119775 119495 575fd7 GetPEB 119486->119495 119489 5754d7 119776 57e710 40 API calls 2 library calls 119489->119776 119490 57a5f0 39 API calls 119490->119523 119492 57551b 119777 58e540 40 API calls CallUnexpected 119492->119777 119494 575528 119778 57e710 40 API calls 2 library calls 119494->119778 119504 576067 119495->119504 119499 575581 119779 58e540 40 API calls CallUnexpected 119499->119779 119501 5128d0 39 API calls 119501->119523 119502 57558e 119780 57e710 40 API calls 2 library calls 119502->119780 119799 55fad0 177 API calls 119504->119799 119505 5755d6 119781 58e540 40 API calls CallUnexpected 119505->119781 119506 512ae0 40 API calls 119506->119523 119509 5760f0 7 API calls 119510 57a770 40 API calls 119509->119510 119511 576191 119510->119511 119512 57a770 40 API calls 119511->119512 119513 5761a2 119512->119513 119514 57a770 40 API calls 119513->119514 119515 5761b3 119514->119515 119517 57a770 40 API calls 119515->119517 119516 51ae50 40 API calls 119516->119523 119518 5761c2 119517->119518 119800 51c430 144 API calls 2 library calls 119518->119800 119520 5761c7 GetPEB 119521 5761d6 GetPEB 119520->119521 119524 576270 WaitForSingleObject GetPEB 119521->119524 119523->119391 119523->119404 119523->119419 119523->119462 119523->119490 119523->119501 119523->119506 119523->119516 119783 5775f0 40 API calls CallUnexpected 119523->119783 119784 57bb50 40 API calls CallUnexpected 119523->119784 119526 576315 WaitForSingleObject GetPEB 119524->119526 119528 5763c0 GetPEB 119526->119528 119530 576457 GetPEB 119528->119530 119532 5764f0 GetPEB 119530->119532 119534 576582 CloseHandle GetPEB 119532->119534 119536 576620 GetPEB 119534->119536 119538 5766b2 GetPEB 119536->119538 119540 576742 GetPEB 119538->119540 119542 5767d2 119540->119542 119801 57e400 40 API calls 119542->119801 119544 5768ac 119545 57e650 40 API calls 119544->119545 119546 5768bc 119545->119546 119547 57cfc0 40 API calls 119546->119547 119548 5768e8 119547->119548 119549 5128d0 39 API calls 119548->119549 119550 5768ff 119549->119550 119551 5128d0 39 API calls 119550->119551 119552 57690a 119551->119552 119553 51aeb0 40 API calls 119552->119553 119554 57692f 119553->119554 119554->119554 119555 57cfc0 40 API calls 119554->119555 119556 576965 119555->119556 119557 5128d0 39 API calls 119556->119557 119558 57697c 119557->119558 119559 5128d0 39 API calls 119558->119559 119560 576987 119559->119560 119561 512980 40 API calls 119560->119561 119562 5769a9 119561->119562 119563 57a770 40 API calls 119562->119563 119564 5769b8 119563->119564 119802 515f90 141 API calls std::ios_base::_Ios_base_dtor 119564->119802 119566 5769bf 119567 57a770 40 API calls 119566->119567 119568 5769d0 119567->119568 119569 57a770 40 API calls 119568->119569 119570 5769e1 119569->119570 119803 52fc20 97 API calls 5 library calls 119570->119803 119572 5769e6 119573 576a6c 119572->119573 119804 5784b0 40 API calls 3 library calls 119572->119804 119574 57a770 40 API calls 119573->119574 119576 576a89 119574->119576 119811 5784b0 40 API calls 3 library calls 119576->119811 119577 576a0b 119805 5784b0 40 API calls 3 library calls 119577->119805 119579 576a98 119812 5784b0 40 API calls 3 library calls 119579->119812 119582 576a1a 119806 5784b0 40 API calls 3 library calls 119582->119806 119583 576aa7 119813 5784b0 40 API calls 3 library calls 119583->119813 119586 576a29 119807 5784b0 40 API calls 3 library calls 119586->119807 119588 576ab6 119814 5784b0 40 API calls 3 library calls 119588->119814 119589 576a38 119808 5784b0 40 API calls 3 library calls 119589->119808 119592 576ac5 119815 5784b0 40 API calls 3 library calls 119592->119815 119593 576a47 119809 5784b0 40 API calls 3 library calls 119593->119809 119596 576ad4 119816 5784b0 40 API calls 3 library calls 119596->119816 119597 576a56 119599 57a770 40 API calls 119597->119599 119601 576a67 119599->119601 119600 576ae3 119602 57a770 40 API calls 119600->119602 119810 52a290 40 API calls 3 library calls 119601->119810 119604 576af4 119602->119604 119817 556230 145 API calls __fread_nolock 119604->119817 119606 576af9 119607 5128d0 39 API calls 119606->119607 119608 576b0a 119607->119608 119609 5128d0 39 API calls 119608->119609 119609->119459 119611 5129a2 119610->119611 119611->119611 119836 512ae0 119611->119836 119613 5129b4 119614 57a770 119613->119614 119615 57a799 119614->119615 119616 57a851 119615->119616 119622 57a7aa 119615->119622 119868 512270 40 API calls 119616->119868 119617 57a7b6 __Strxfrm 119617->119183 119619 57a7db 119625 5ef290 std::_Facet_Register 40 API calls 119619->119625 119620 57a856 119869 5121d0 40 API calls 3 library calls 119620->119869 119622->119617 119622->119619 119623 57a814 119622->119623 119624 57a81d 119622->119624 119623->119619 119623->119620 119629 5ef290 std::_Facet_Register 40 API calls 119624->119629 119630 57a7f5 __Strxfrm 119624->119630 119626 57a7ee 119625->119626 119626->119630 119870 5f47b0 39 API calls 2 library calls 119626->119870 119629->119630 119630->119183 119651 51ab9c std::ios_base::_Ios_base_dtor 119631->119651 119632 51acf1 119633 51ad96 119632->119633 119634 51ad0d 119632->119634 119638 51adb3 119633->119638 119639 51ada6 119633->119639 119640 51ad60 std::ios_base::_Ios_base_dtor 119633->119640 119635 51ae42 119634->119635 119636 51ad2c 119634->119636 119874 57dc60 40 API calls 119635->119874 119646 512ae0 40 API calls 119636->119646 119873 5873f0 40 API calls 119638->119873 119643 57a770 40 API calls 119639->119643 119642 51ae25 std::ios_base::_Ios_base_dtor 119640->119642 119875 5f47b0 39 API calls 2 library calls 119640->119875 119641 512ae0 40 API calls 119641->119651 119642->119185 119643->119640 119648 51ad4d 119646->119648 119872 579630 40 API calls 119648->119872 119651->119632 119651->119635 119651->119640 119651->119641 119871 5872c0 40 API calls 119651->119871 119653 57c869 119652->119653 119656 57c8ac std::ios_base::_Ios_base_dtor 119652->119656 119876 57fa40 39 API calls std::ios_base::_Ios_base_dtor 119653->119876 119655 57c873 119655->119656 119877 5f47b0 39 API calls 2 library calls 119655->119877 119656->119190 119878 57a680 40 API calls 3 library calls 119659->119878 119661 51aec7 119663 51af0f 119661->119663 119879 5f50bd 39 API calls __Strxfrm 119661->119879 119663->119200 119880 57a4f0 119664->119880 119666 5747ad 119667 57a5f0 119666->119667 119668 57a621 std::ios_base::_Ios_base_dtor 119667->119668 119669 57a5fe 119667->119669 119668->119206 119669->119668 119886 5f47b0 39 API calls 2 library calls 119669->119886 119673 5128db 119672->119673 119674 5128f6 std::ios_base::_Ios_base_dtor 119672->119674 119673->119674 119887 5f47b0 39 API calls 2 library calls 119673->119887 119674->119208 119888 5ee812 119677->119888 119680 51a6fe 119891 5ee4bb 71 API calls _unexpected 119680->119891 119682 51a6a9 119684 51a6bd GetFileAttributesA 119682->119684 119685 51a6d4 __Mtx_unlock 119682->119685 119684->119685 119686 51a6c9 GetLastError 119684->119686 119685->119222 119686->119685 119688 57a5e1 119687->119688 119689 57a5cd 119687->119689 119688->119275 119920 57a350 40 API calls 4 library calls 119689->119920 119921 51a440 GetCurrentProcess IsWow64Process 119691->119921 119694 512ae0 40 API calls 119695 51b8d9 RegOpenKeyExA 119694->119695 119697 51b954 RegQueryValueExA 119695->119697 119701 51b9e5 119695->119701 119699 51b9b3 119697->119699 119700 51b9dc RegCloseKey 119697->119700 119960 57a350 40 API calls 4 library calls 119699->119960 119700->119701 119701->119701 119702 512ae0 40 API calls 119701->119702 119704 51ba59 __fread_nolock 119702->119704 119705 51ba6d GetCurrentHwProfileA 119704->119705 119706 51ba81 119705->119706 119707 51baac 119705->119707 119961 57a350 40 API calls 4 library calls 119706->119961 119708 51bab4 SetupDiGetClassDevsA 119707->119708 119710 51bb0d 119708->119710 119713 51badb 119708->119713 119962 51b1a0 49 API calls ___std_exception_copy 119710->119962 119712 51bb1b 119712->119713 119714 51c141 119713->119714 119716 51bb5e 119713->119716 119964 512270 40 API calls 119714->119964 119923 5820e0 119716->119923 119718 51c146 119965 5f47b0 39 API calls 2 library calls 119718->119965 119719 51bb89 119721 51bbbc __Strxfrm 119719->119721 119963 5806c0 40 API calls 4 library calls 119719->119963 119938 57a480 119721->119938 119726 51bc62 119943 581ed0 119726->119943 119728 51bcb5 119729 57a480 40 API calls 119728->119729 119730 51bcc8 119729->119730 119731 581ed0 40 API calls 119730->119731 119732 51bd2c std::ios_base::_Ios_base_dtor 119731->119732 119732->119718 119733 51bf0a std::ios_base::_Ios_base_dtor __Strxfrm 119732->119733 119733->119733 119734 512ae0 40 API calls 119733->119734 119736 51c065 std::ios_base::_Ios_base_dtor 119734->119736 119735 51c124 std::ios_base::_Ios_base_dtor 119735->119294 119736->119735 119966 5f47b0 39 API calls 2 library calls 119736->119966 119738 57d005 119737->119738 119741 57cfd8 __Strxfrm 119737->119741 119973 5806c0 40 API calls 4 library calls 119738->119973 119740 57d018 119740->119300 119741->119300 119742->119226 119743->119232 119744->119237 119745->119239 119746->119281 119747->119307 119748->119322 119749->119337 119750->119344 119751->119361 119752->119362 119753->119366 119754->119368 119755->119370 119756->119375 119757->119380 119758->119382 119759->119384 119760->119389 119761->119392 119762->119399 119763->119405 119764->119420 119765->119429 119766->119445 119767->119450 119768->119458 119769->119466 119770->119472 119771->119476 119772->119480 119773->119482 119774->119485 119775->119489 119776->119492 119777->119494 119778->119499 119779->119502 119780->119505 119781->119372 119782->119523 119783->119523 119784->119523 119785->119394 119786->119402 119787->119410 119788->119417 119789->119426 119790->119434 119791->119452 119792->119460 119793->119467 119794->119475 119795->119453 119796->119461 119797->119468 119798->119473 119799->119509 119800->119520 119801->119544 119802->119566 119803->119572 119804->119577 119805->119582 119806->119586 119807->119589 119808->119593 119809->119597 119810->119573 119811->119579 119812->119583 119813->119588 119814->119592 119815->119596 119816->119600 119817->119606 119818->119409 119819->119416 119820->119425 119821->119433 119822->119442 119823->119446 119824->119459 119825->119428 119826->119436 119827->119251 119828->119259 119829->119264 119830->119267 119831->119272 119832->119274 119833->119283 119834->119289 119835->119313 119837 512ba5 119836->119837 119841 512af6 119836->119841 119862 512270 40 API calls 119837->119862 119839 512b02 __Strxfrm 119839->119613 119840 512baa 119863 5121d0 40 API calls 3 library calls 119840->119863 119841->119839 119845 512b65 119841->119845 119846 512b6e 119841->119846 119848 512b2a 119841->119848 119844 512b3d 119851 512b46 __Strxfrm 119844->119851 119864 5f47b0 39 API calls 2 library calls 119844->119864 119845->119840 119845->119848 119850 5ef290 std::_Facet_Register 40 API calls 119846->119850 119846->119851 119852 5ef290 119848->119852 119850->119851 119851->119613 119853 5ef295 ___std_exception_copy 119852->119853 119854 5ef2af 119853->119854 119857 5121d0 Concurrency::cancel_current_task 119853->119857 119867 6017d8 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 119853->119867 119854->119844 119856 5ef2bb 119856->119856 119857->119856 119865 5f0efb RaiseException 119857->119865 119859 5121ec 119866 5f0651 39 API calls ___std_exception_copy 119859->119866 119861 512213 119861->119844 119863->119844 119865->119859 119866->119861 119867->119853 119869->119626 119871->119651 119872->119640 119873->119640 119876->119655 119878->119661 119879->119661 119881 57a504 119880->119881 119882 57a514 __Strxfrm 119881->119882 119885 5806c0 40 API calls 4 library calls 119881->119885 119882->119666 119884 57a55a 119884->119666 119885->119884 119892 5ee5ec 119888->119892 119893 5ee64e 119892->119893 119894 5ee614 GetCurrentThreadId 119892->119894 119896 5ee678 119893->119896 119897 5ee652 GetCurrentThreadId 119893->119897 119895 5ee61f GetCurrentThreadId 119894->119895 119901 5ee63a 119894->119901 119895->119901 119898 5ee716 GetCurrentThreadId 119896->119898 119902 5ee699 119896->119902 119899 5ee661 119897->119899 119898->119899 119900 5ee75f GetCurrentThreadId 119899->119900 119899->119901 119900->119901 119910 5ef8b5 119901->119910 119917 5eec91 GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 119902->119917 119906 51a6a2 119906->119680 119906->119682 119907 5ee6d5 GetCurrentThreadId 119907->119899 119909 5ee6a4 __Xtime_diff_to_millis2 119907->119909 119909->119899 119909->119901 119909->119907 119918 5eec91 GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 119909->119918 119911 5ef8be IsProcessorFeaturePresent 119910->119911 119912 5ef8bd 119910->119912 119914 5f00aa 119911->119914 119912->119906 119919 5f006d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 119914->119919 119916 5f018d 119916->119906 119917->119909 119918->119909 119919->119916 119920->119688 119922 51a460 119921->119922 119922->119694 119924 582112 119923->119924 119929 58213d __Strxfrm 119923->119929 119925 58211f 119924->119925 119926 58216b 119924->119926 119927 582162 119924->119927 119928 5ef290 std::_Facet_Register 40 API calls 119925->119928 119926->119929 119932 5ef290 std::_Facet_Register 40 API calls 119926->119932 119927->119925 119930 5821bc 119927->119930 119931 582132 119928->119931 119929->119719 119967 5121d0 40 API calls 3 library calls 119930->119967 119931->119929 119968 5f47b0 39 API calls 2 library calls 119931->119968 119932->119929 119939 57a490 119938->119939 119939->119939 119942 57a4a7 __Strxfrm 119939->119942 119969 5806c0 40 API calls 4 library calls 119939->119969 119941 57a4e2 119941->119726 119942->119726 119944 581f12 119943->119944 119945 5820ce 119944->119945 119946 582004 119944->119946 119955 581f17 __Strxfrm 119944->119955 119970 512270 40 API calls 119945->119970 119948 582014 119946->119948 119951 58205d 119946->119951 119952 582066 119946->119952 119950 5ef290 std::_Facet_Register 40 API calls 119948->119950 119949 5820d3 119971 5121d0 40 API calls 3 library calls 119949->119971 119954 582029 119950->119954 119951->119948 119951->119949 119956 5ef290 std::_Facet_Register 40 API calls 119952->119956 119959 582034 __Strxfrm 119952->119959 119954->119959 119972 5f47b0 39 API calls 2 library calls 119954->119972 119955->119728 119956->119959 119959->119728 119960->119700 119961->119707 119962->119712 119963->119721 119967->119931 119969->119941 119971->119954 119973->119740 119974 51a210 119975 5ef290 std::_Facet_Register 40 API calls 119974->119975 119976 51a248 119975->119976 119977 512ae0 40 API calls 119976->119977 119978 51a28b 119977->119978 119996 5f5362 119978->119996 119981 51a377 std::ios_base::_Ios_base_dtor 119983 51a34e 119983->119981 120025 5f47b0 39 API calls 2 library calls 119983->120025 119989 5f9136 66 API calls 119990 51a2fc 119989->119990 119992 51a318 119990->119992 120011 57cf60 119990->120011 120016 5fdbdf 119992->120016 120026 5f52a0 119996->120026 119999 5f9136 120000 5f9149 ___std_exception_copy 119999->120000 120081 5f8e8d 120000->120081 120005 5f4eeb 120006 5f4efe ___std_exception_copy 120005->120006 120160 5f4801 120006->120160 120009 5f44dc ___std_exception_copy 39 API calls 120010 51a2f0 120009->120010 120010->119989 120012 57cfa7 120011->120012 120015 57cf78 __fread_nolock 120011->120015 120211 580560 120012->120211 120014 57cfba 120014->119992 120015->119992 120229 5fdbfc 120016->120229 120019 5f8be8 120020 5f8bfb ___std_exception_copy 120019->120020 120370 5f8ac3 120020->120370 120022 5f8c07 120023 5f44dc ___std_exception_copy 39 API calls 120022->120023 120024 5f8c13 120023->120024 120024->119983 120029 5f52ac __FrameHandler3::FrameUnwindToState 120026->120029 120027 5f52b3 120051 5fd23f 14 API calls __dosmaperr 120027->120051 120029->120027 120031 5f52d3 120029->120031 120030 5f52b8 120052 5f47a0 39 API calls ___std_exception_copy 120030->120052 120033 5f52d8 120031->120033 120034 5f52e5 120031->120034 120053 5fd23f 14 API calls __dosmaperr 120033->120053 120043 606688 120034->120043 120037 51a2d7 120037->119983 120037->119999 120039 5f52f5 120054 5fd23f 14 API calls __dosmaperr 120039->120054 120040 5f5302 120055 5f5340 LeaveCriticalSection __fread_nolock 120040->120055 120044 606694 __FrameHandler3::FrameUnwindToState 120043->120044 120056 5ffd09 EnterCriticalSection 120044->120056 120046 6066a2 120057 60672c 120046->120057 120051->120030 120052->120037 120053->120037 120054->120037 120055->120037 120056->120046 120064 60674f 120057->120064 120058 6066af 120071 6066e8 120058->120071 120059 6067a7 120076 6063f3 14 API calls 3 library calls 120059->120076 120061 6067b0 120077 606db3 14 API calls __dosmaperr 120061->120077 120064->120058 120064->120059 120074 5fcd90 EnterCriticalSection 120064->120074 120075 5fcda4 LeaveCriticalSection 120064->120075 120065 6067b9 120065->120058 120078 60758e 6 API calls _unexpected 120065->120078 120067 6067d8 120079 5fcd90 EnterCriticalSection 120067->120079 120070 6067eb 120070->120058 120080 5ffd51 LeaveCriticalSection 120071->120080 120073 5f52ee 120073->120039 120073->120040 120074->120064 120075->120064 120076->120061 120077->120065 120078->120067 120079->120070 120080->120073 120083 5f8e99 __FrameHandler3::FrameUnwindToState 120081->120083 120082 5f8e9f 120108 5f4723 39 API calls 2 library calls 120082->120108 120083->120082 120086 5f8ee2 120083->120086 120085 5f8eba 120092 5f44dc 120085->120092 120098 5fcd90 EnterCriticalSection 120086->120098 120088 5f8eee 120099 5f9010 120088->120099 120090 5f8f04 120109 5f8f2d LeaveCriticalSection __fread_nolock 120090->120109 120093 5f44e8 120092->120093 120094 5f44ff 120093->120094 120158 5f4587 39 API calls 2 library calls 120093->120158 120097 51a2ea 120094->120097 120159 5f4587 39 API calls 2 library calls 120094->120159 120097->120005 120098->120088 120100 5f9036 120099->120100 120101 5f9023 120099->120101 120110 5f8f37 120100->120110 120101->120090 120103 5f90e7 120103->120090 120105 5f9059 120105->120103 120114 5f55d3 120105->120114 120108->120085 120109->120085 120111 5f8f48 120110->120111 120113 5f8fa0 120110->120113 120111->120113 120123 5fe13d 41 API calls 2 library calls 120111->120123 120113->120105 120115 5f55ec 120114->120115 120119 5f5613 120114->120119 120115->120119 120124 605f82 120115->120124 120117 5f5608 120131 60538b 64 API calls 3 library calls 120117->120131 120120 5fe17d 120119->120120 120134 5fe05c 120120->120134 120122 5fe196 120122->120103 120123->120113 120125 605fa3 120124->120125 120126 605f8e 120124->120126 120125->120117 120132 5fd23f 14 API calls __dosmaperr 120126->120132 120128 605f93 120133 5f47a0 39 API calls ___std_exception_copy 120128->120133 120130 605f9e 120130->120117 120131->120119 120132->120128 120133->120130 120140 60a6de 120134->120140 120136 5fe06e 120137 5fe08a SetFilePointerEx 120136->120137 120139 5fe076 __wsopen_s 120136->120139 120138 5fe0a2 GetLastError 120137->120138 120137->120139 120138->120139 120139->120122 120141 60a700 120140->120141 120142 60a6eb 120140->120142 120146 60a725 120141->120146 120155 5fd22c 14 API calls __dosmaperr 120141->120155 120153 5fd22c 14 API calls __dosmaperr 120142->120153 120145 60a6f0 120154 5fd23f 14 API calls __dosmaperr 120145->120154 120146->120136 120147 60a730 120156 5fd23f 14 API calls __dosmaperr 120147->120156 120149 60a6f8 120149->120136 120151 60a738 120157 5f47a0 39 API calls ___std_exception_copy 120151->120157 120153->120145 120154->120149 120155->120147 120156->120151 120157->120149 120158->120094 120159->120097 120161 5f480d __FrameHandler3::FrameUnwindToState 120160->120161 120162 5f4835 120161->120162 120163 5f4814 120161->120163 120171 5fcd90 EnterCriticalSection 120162->120171 120175 5f4723 39 API calls 2 library calls 120163->120175 120166 5f482d 120166->120009 120167 5f4840 120172 5f4910 120167->120172 120171->120167 120177 5f4942 120172->120177 120174 5f484f 120176 5f4877 LeaveCriticalSection __fread_nolock 120174->120176 120175->120166 120176->120166 120178 5f4979 120177->120178 120179 5f4951 120177->120179 120180 605f82 __fread_nolock 39 API calls 120178->120180 120194 5f4723 39 API calls 2 library calls 120179->120194 120182 5f4982 120180->120182 120191 5fe11f 120182->120191 120185 5f4a2c 120195 5f4cae 44 API calls 4 library calls 120185->120195 120187 5f4a3b 120188 5f496c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 120187->120188 120188->120174 120189 5f4a43 120189->120188 120196 5f4ae3 43 API calls 2 library calls 120189->120196 120197 5fdf37 120191->120197 120194->120188 120195->120187 120196->120188 120199 5fdf43 __FrameHandler3::FrameUnwindToState 120197->120199 120198 5f49a0 120198->120185 120198->120188 120198->120189 120199->120198 120200 5fdf86 120199->120200 120202 5fdfcc 120199->120202 120209 5f4723 39 API calls 2 library calls 120200->120209 120208 60a462 EnterCriticalSection 120202->120208 120204 5fdfd2 120205 5fdff3 120204->120205 120206 5fe05c __fread_nolock 41 API calls 120204->120206 120210 5fe054 LeaveCriticalSection __wsopen_s 120205->120210 120206->120205 120208->120204 120209->120198 120210->120198 120212 5806a9 120211->120212 120217 580585 120211->120217 120226 512270 40 API calls 120212->120226 120213 58059a 120220 5ef290 std::_Facet_Register 40 API calls 120213->120220 120215 5806ae 120227 5121d0 40 API calls 3 library calls 120215->120227 120217->120213 120218 5805f0 120217->120218 120219 5805e3 120217->120219 120223 5ef290 std::_Facet_Register 40 API calls 120218->120223 120224 5805aa __fread_nolock __Strxfrm 120218->120224 120219->120213 120219->120215 120220->120224 120223->120224 120225 580667 std::ios_base::_Ios_base_dtor __fread_nolock __Strxfrm 120224->120225 120228 5f47b0 39 API calls 2 library calls 120224->120228 120225->120014 120227->120224 120230 5fdc08 __FrameHandler3::FrameUnwindToState 120229->120230 120231 51a348 120230->120231 120232 5fdc1b __fread_nolock 120230->120232 120233 5fdc52 120230->120233 120231->120019 120256 5fd23f 14 API calls __dosmaperr 120232->120256 120242 5fcd90 EnterCriticalSection 120233->120242 120236 5fdc5c 120243 5fda06 120236->120243 120237 5fdc35 120257 5f47a0 39 API calls ___std_exception_copy 120237->120257 120242->120236 120245 5fda18 __fread_nolock 120243->120245 120248 5fda35 120243->120248 120244 5fda25 120324 5fd23f 14 API calls __dosmaperr 120244->120324 120245->120244 120245->120248 120253 5fda76 __fread_nolock 120245->120253 120258 5fdc91 LeaveCriticalSection __fread_nolock 120248->120258 120249 5fdba1 __fread_nolock 120327 5fd23f 14 API calls __dosmaperr 120249->120327 120252 605f82 __fread_nolock 39 API calls 120252->120253 120253->120248 120253->120249 120253->120252 120259 604623 120253->120259 120326 5f8a2b 39 API calls 4 library calls 120253->120326 120254 5fda2a 120325 5f47a0 39 API calls ___std_exception_copy 120254->120325 120256->120237 120257->120231 120258->120231 120260 604635 120259->120260 120261 60464d 120259->120261 120344 5fd22c 14 API calls __dosmaperr 120260->120344 120262 60498f 120261->120262 120266 604690 120261->120266 120362 5fd22c 14 API calls __dosmaperr 120262->120362 120264 60463a 120345 5fd23f 14 API calls __dosmaperr 120264->120345 120270 60469b 120266->120270 120271 604642 120266->120271 120276 6046cb 120266->120276 120268 604994 120363 5fd23f 14 API calls __dosmaperr 120268->120363 120346 5fd22c 14 API calls __dosmaperr 120270->120346 120271->120253 120273 6046a0 120347 5fd23f 14 API calls __dosmaperr 120273->120347 120278 6046e4 120276->120278 120279 6046f1 120276->120279 120280 60471f 120276->120280 120277 6046a8 120364 5f47a0 39 API calls ___std_exception_copy 120277->120364 120278->120279 120286 60470d 120278->120286 120348 5fd22c 14 API calls __dosmaperr 120279->120348 120328 606e2d 120280->120328 120282 6046f6 120349 5fd23f 14 API calls __dosmaperr 120282->120349 120335 610d44 120286->120335 120288 6046fd 120350 5f47a0 39 API calls ___std_exception_copy 120288->120350 120289 60486b 120292 6048df 120289->120292 120295 604884 GetConsoleMode 120289->120295 120294 6048e3 ReadFile 120292->120294 120293 604739 120352 606db3 14 API calls __dosmaperr 120293->120352 120298 604957 GetLastError 120294->120298 120299 6048fb 120294->120299 120295->120292 120300 604895 120295->120300 120297 604740 120301 604765 120297->120301 120302 60474a 120297->120302 120303 604964 120298->120303 120304 6048bb 120298->120304 120299->120298 120305 6048d4 120299->120305 120300->120294 120306 60489b ReadConsoleW 120300->120306 120355 5fe13d 41 API calls 2 library calls 120301->120355 120353 5fd23f 14 API calls __dosmaperr 120302->120353 120360 5fd23f 14 API calls __dosmaperr 120303->120360 120322 604708 __fread_nolock 120304->120322 120356 5fd1e5 14 API calls __dosmaperr 120304->120356 120317 604920 120305->120317 120318 604937 120305->120318 120305->120322 120306->120305 120311 6048b5 GetLastError 120306->120311 120311->120304 120312 60474f 120354 5fd22c 14 API calls __dosmaperr 120312->120354 120313 604969 120361 5fd22c 14 API calls __dosmaperr 120313->120361 120358 604335 44 API calls 3 library calls 120317->120358 120320 604950 120318->120320 120318->120322 120359 60417b 42 API calls __fread_nolock 120320->120359 120357 606db3 14 API calls __dosmaperr 120322->120357 120323 604955 120323->120322 120324->120254 120325->120248 120326->120253 120327->120254 120329 606e6b 120328->120329 120330 606e3b _strftime 120328->120330 120366 5fd23f 14 API calls __dosmaperr 120329->120366 120330->120329 120332 606e56 RtlAllocateHeap 120330->120332 120365 6017d8 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 120330->120365 120332->120330 120333 604730 120332->120333 120351 606db3 14 API calls __dosmaperr 120333->120351 120336 610d51 120335->120336 120337 610d5e 120335->120337 120367 5fd23f 14 API calls __dosmaperr 120336->120367 120340 610d6a 120337->120340 120368 5fd23f 14 API calls __dosmaperr 120337->120368 120339 610d56 120339->120289 120340->120289 120342 610d8b 120369 5f47a0 39 API calls ___std_exception_copy 120342->120369 120344->120264 120345->120271 120346->120273 120347->120277 120348->120282 120349->120288 120350->120322 120351->120293 120352->120297 120353->120312 120354->120322 120355->120286 120356->120322 120357->120271 120358->120322 120359->120323 120360->120313 120361->120322 120362->120268 120363->120277 120364->120271 120365->120330 120366->120333 120367->120339 120368->120342 120369->120339 120371 5f8acf __FrameHandler3::FrameUnwindToState 120370->120371 120372 5f8afc 120371->120372 120373 5f8ad9 120371->120373 120375 5f8af4 120372->120375 120381 5fcd90 EnterCriticalSection 120372->120381 120396 5f4723 39 API calls 2 library calls 120373->120396 120375->120022 120377 5f8b1a 120382 5f8b5a 120377->120382 120379 5f8b27 120397 5f8b52 LeaveCriticalSection __fread_nolock 120379->120397 120381->120377 120383 5f8b8a 120382->120383 120384 5f8b67 120382->120384 120386 5f55d3 ___scrt_uninitialize_crt 64 API calls 120383->120386 120393 5f8b82 120383->120393 120409 5f4723 39 API calls 2 library calls 120384->120409 120387 5f8ba2 120386->120387 120398 606ded 120387->120398 120390 605f82 __fread_nolock 39 API calls 120391 5f8bb6 120390->120391 120402 604a3f 120391->120402 120393->120379 120396->120375 120397->120375 120399 606e04 120398->120399 120400 5f8baa 120398->120400 120399->120400 120411 606db3 14 API calls __dosmaperr 120399->120411 120400->120390 120404 604a68 120402->120404 120406 5f8bbd 120402->120406 120403 604ab7 120420 5f4723 39 API calls 2 library calls 120403->120420 120404->120403 120407 604a8f 120404->120407 120406->120393 120410 606db3 14 API calls __dosmaperr 120406->120410 120412 6049ae 120407->120412 120409->120393 120410->120393 120411->120400 120413 6049ba __FrameHandler3::FrameUnwindToState 120412->120413 120421 60a462 EnterCriticalSection 120413->120421 120415 6049c8 120416 6049f9 120415->120416 120422 604b12 120415->120422 120435 604a33 LeaveCriticalSection __wsopen_s 120416->120435 120419 604a1c 120419->120406 120420->120406 120421->120415 120423 60a6de __wsopen_s 39 API calls 120422->120423 120424 604b22 120423->120424 120425 604b28 120424->120425 120427 604b5a 120424->120427 120429 60a6de __wsopen_s 39 API calls 120424->120429 120436 60a64d 15 API calls 2 library calls 120425->120436 120427->120425 120428 60a6de __wsopen_s 39 API calls 120427->120428 120430 604b66 FindCloseChangeNotification 120428->120430 120431 604b51 120429->120431 120430->120425 120432 604b72 GetLastError 120430->120432 120433 60a6de __wsopen_s 39 API calls 120431->120433 120432->120425 120433->120427 120434 604b80 __wsopen_s 120434->120416 120435->120419 120436->120434 120437 52e0a0 WSAStartup 120438 52e1b7 120437->120438 120439 52e0d8 120437->120439 120439->120438 120440 52e10e getaddrinfo 120439->120440 120441 52e1b1 WSACleanup 120440->120441 120443 52e167 120440->120443 120441->120438 120442 52e1c5 freeaddrinfo 120442->120441 120444 52e1d1 120442->120444 120443->120442 120445 52e175 socket 120443->120445 120445->120441 120446 52e18b connect 120445->120446 120447 52e1c1 120446->120447 120448 52e19d closesocket 120446->120448 120447->120442 120448->120445 120449 52e1a7 freeaddrinfo 120448->120449 120449->120441 120450 573a40 GetCursorPos 120451 573a55 GetCursorPos 120450->120451 120452 573b28 GetPEB 120451->120452 120454 573a67 120451->120454 120452->120454 120453 573a73 GetPEB 120453->120454 120454->120452 120454->120453 120455 573b9d Sleep 120454->120455 120456 573ae8 Sleep GetCursorPos 120454->120456 120457 573bc7 120454->120457 120455->120451 120456->120452 120456->120454 120458 606a18 120463 6067ee 120458->120463 120461 606a57 120464 60680d 120463->120464 120465 606820 120464->120465 120474 606835 120464->120474 120483 5fd23f 14 API calls __dosmaperr 120465->120483 120467 606825 120484 5f47a0 39 API calls ___std_exception_copy 120467->120484 120469 606955 120470 606830 120469->120470 120488 5fd23f 14 API calls __dosmaperr 120469->120488 120470->120461 120480 5fe7f3 120470->120480 120472 606a06 120489 5f47a0 39 API calls ___std_exception_copy 120472->120489 120474->120469 120474->120474 120485 5fcaee 39 API calls 2 library calls 120474->120485 120476 6069a5 120476->120469 120486 5fcaee 39 API calls 2 library calls 120476->120486 120478 6069c3 120478->120469 120487 5fcaee 39 API calls 2 library calls 120478->120487 120490 5fe19b 120480->120490 120483->120467 120484->120470 120485->120476 120486->120478 120487->120469 120488->120472 120489->120470 120492 5fe1a7 __FrameHandler3::FrameUnwindToState 120490->120492 120491 5fe1ae 120510 5fd23f 14 API calls __dosmaperr 120491->120510 120492->120491 120494 5fe1d9 120492->120494 120501 5fe785 120494->120501 120495 5fe1b3 120511 5f47a0 39 API calls ___std_exception_copy 120495->120511 120500 5fe1bd 120500->120461 120513 5f8ce7 120501->120513 120507 5fe7bb 120508 5fe1fd 120507->120508 120569 606db3 14 API calls __dosmaperr 120507->120569 120512 5fe230 LeaveCriticalSection __wsopen_s 120508->120512 120510->120495 120511->120500 120512->120500 120570 5f50f0 120513->120570 120516 5f8d0b 120518 5f8cca 120516->120518 120582 5f8c18 120518->120582 120521 5fe813 120522 5fe830 120521->120522 120523 5fe85e 120522->120523 120524 5fe845 120522->120524 120607 60a53a 120523->120607 120621 5fd22c 14 API calls __dosmaperr 120524->120621 120527 5fe84a 120622 5fd23f 14 API calls __dosmaperr 120527->120622 120529 5fe86c 120623 5fd22c 14 API calls __dosmaperr 120529->120623 120530 5fe883 120620 5fe4cc CreateFileW 120530->120620 120534 5fe857 120534->120507 120535 5fe871 120624 5fd23f 14 API calls __dosmaperr 120535->120624 120536 5fe939 GetFileType 120539 5fe98b 120536->120539 120540 5fe944 GetLastError 120536->120540 120538 5fe90e GetLastError 120626 5fd1e5 14 API calls __dosmaperr 120538->120626 120629 60a485 15 API calls 2 library calls 120539->120629 120627 5fd1e5 14 API calls __dosmaperr 120540->120627 120541 5fe8bc 120541->120536 120541->120538 120625 5fe4cc CreateFileW 120541->120625 120545 5fe952 CloseHandle 120545->120527 120546 5fe97b 120545->120546 120628 5fd23f 14 API calls __dosmaperr 120546->120628 120548 5fe901 120548->120536 120548->120538 120550 5fe9ac 120552 5fea0e 120550->120552 120630 5fe6db 73 API calls 3 library calls 120550->120630 120551 5fe980 120551->120527 120632 5fe276 74 API calls 4 library calls 120552->120632 120555 5fea2d 120557 5fea3b 120555->120557 120558 5fea38 120555->120558 120556 5fe9f8 120556->120552 120559 5fe9ff 120556->120559 120561 5feab7 CloseHandle 120557->120561 120564 5feb18 120557->120564 120558->120559 120631 604ae2 42 API calls 2 library calls 120559->120631 120633 5fe4cc CreateFileW 120561->120633 120563 5feae2 120563->120564 120565 5feaec GetLastError 120563->120565 120564->120534 120634 5fd1e5 14 API calls __dosmaperr 120565->120634 120567 5feaf8 120635 60a64d 15 API calls 2 library calls 120567->120635 120569->120508 120571 5f510e 120570->120571 120572 5f5107 120570->120572 120571->120572 120579 605bdb 39 API calls 3 library calls 120571->120579 120572->120516 120578 6072a8 5 API calls std::_Lockit::_Lockit 120572->120578 120574 5f512f 120580 605ec6 39 API calls __Strxfrm 120574->120580 120576 5f5145 120581 605f24 39 API calls _strftime 120576->120581 120578->120516 120579->120574 120580->120576 120581->120572 120583 5f8c26 120582->120583 120584 5f8c40 120582->120584 120600 5f8d26 14 API calls _strftime 120583->120600 120585 5f8c47 120584->120585 120586 5f8c66 120584->120586 120589 5f8c30 120585->120589 120601 5f8d40 15 API calls _strftime 120585->120601 120602 606f13 MultiByteToWideChar _strftime 120586->120602 120589->120507 120589->120521 120591 5f8c7c GetLastError 120603 5fd1e5 14 API calls __dosmaperr 120591->120603 120593 5f8c75 120593->120591 120594 5f8ca2 120593->120594 120605 5f8d40 15 API calls _strftime 120593->120605 120594->120589 120606 606f13 MultiByteToWideChar _strftime 120594->120606 120597 5f8c88 120604 5fd23f 14 API calls __dosmaperr 120597->120604 120598 5f8cb9 120598->120589 120598->120591 120600->120589 120601->120589 120602->120593 120603->120597 120604->120589 120605->120594 120606->120598 120608 60a546 __FrameHandler3::FrameUnwindToState 120607->120608 120636 5ffd09 EnterCriticalSection 120608->120636 120610 60a594 120637 60a644 120610->120637 120612 60a572 120640 60a314 15 API calls 3 library calls 120612->120640 120613 60a54d 120613->120610 120613->120612 120617 60a5e1 EnterCriticalSection 120613->120617 120616 60a577 120616->120610 120641 60a462 EnterCriticalSection 120616->120641 120617->120610 120618 60a5ee LeaveCriticalSection 120617->120618 120618->120613 120620->120541 120621->120527 120622->120534 120623->120535 120624->120527 120625->120548 120626->120527 120627->120545 120628->120551 120629->120550 120630->120556 120631->120534 120632->120555 120633->120563 120634->120567 120635->120564 120636->120613 120642 5ffd51 LeaveCriticalSection 120637->120642 120639 5fe863 120639->120529 120639->120530 120640->120616 120641->120610 120642->120639 120643 573e4b 120644 573e50 120643->120644 120645 573f64 MessageBoxA 120644->120645 120646 573eac __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 120644->120646 120645->120646 120680 573f7e 120645->120680 120647 574079 GetProcessId 120646->120647 120650 574099 120647->120650 120648 5128d0 39 API calls 120649 576e28 120648->120649 120656 5740d0 120650->120656 120681 524280 GetPEB IsDebuggerPresent 120650->120681 120652 5740b6 120653 5740be GetPEB 120652->120653 120654 574148 120652->120654 120653->120656 120682 5243c0 GetTickCount64 Sleep GetTickCount64 120654->120682 120658 574161 120656->120658 120662 5742ea 120656->120662 120657 57414d 120657->120656 120659 574155 GetPEB 120657->120659 120658->120656 120683 524400 GetModuleHandleA 120658->120683 120659->120658 120661 574228 120684 524490 46 API calls std::ios_base::_Ios_base_dtor 120661->120684 120668 574327 120662->120668 120673 574260 120662->120673 120664 57422f 120685 524730 IsDebuggerPresent IsProcessorFeaturePresent GetVolumeInformationA 120664->120685 120667 57424f GetPEB 120667->120673 120671 57435c 120668->120671 120675 574361 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 120668->120675 120669 574236 120669->120667 120686 5242c0 GetUserNameA GetComputerNameA GetCurrentProcess TerminateProcess __fread_nolock 120669->120686 120688 527dc0 112 API calls 4 library calls 120671->120688 120672 574247 120672->120662 120672->120667 120673->120662 120687 5248e0 20 API calls 120673->120687 120676 574411 SetThreadExecutionState 120675->120676 120677 574422 SetThreadExecutionState 120676->120677 120678 574429 120676->120678 120677->120678 120679 574459 GetPEB 120678->120679 120679->120680 120680->120648 120681->120652 120682->120657 120683->120661 120684->120664 120685->120669 120686->120672 120687->120668 120688->120675 120689 60872d 120690 60873a 120689->120690 120694 608752 120689->120694 120739 5fd23f 14 API calls __dosmaperr 120690->120739 120692 60873f 120740 5f47a0 39 API calls ___std_exception_copy 120692->120740 120695 6087b1 120694->120695 120703 60874a 120694->120703 120741 609423 14 API calls 2 library calls 120694->120741 120697 605f82 __fread_nolock 39 API calls 120695->120697 120698 6087ca 120697->120698 120709 60450a 120698->120709 120701 605f82 __fread_nolock 39 API calls 120702 608803 120701->120702 120702->120703 120704 605f82 __fread_nolock 39 API calls 120702->120704 120705 608811 120704->120705 120705->120703 120706 605f82 __fread_nolock 39 API calls 120705->120706 120707 60881f 120706->120707 120708 605f82 __fread_nolock 39 API calls 120707->120708 120708->120703 120710 604516 __FrameHandler3::FrameUnwindToState 120709->120710 120711 60451e 120710->120711 120715 604539 120710->120715 120743 5fd22c 14 API calls __dosmaperr 120711->120743 120713 604523 120744 5fd23f 14 API calls __dosmaperr 120713->120744 120714 604550 120745 5fd22c 14 API calls __dosmaperr 120714->120745 120715->120714 120718 60458b 120715->120718 120720 604594 120718->120720 120721 6045a9 120718->120721 120719 604555 120746 5fd23f 14 API calls __dosmaperr 120719->120746 120748 5fd22c 14 API calls __dosmaperr 120720->120748 120742 60a462 EnterCriticalSection 120721->120742 120725 604599 120749 5fd23f 14 API calls __dosmaperr 120725->120749 120726 6045af 120729 6045e3 120726->120729 120730 6045ce 120726->120730 120727 60455d 120747 5f47a0 39 API calls ___std_exception_copy 120727->120747 120733 604623 __fread_nolock 51 API calls 120729->120733 120750 5fd23f 14 API calls __dosmaperr 120730->120750 120735 6045de 120733->120735 120734 6045d3 120751 5fd22c 14 API calls __dosmaperr 120734->120751 120752 60461b LeaveCriticalSection __wsopen_s 120735->120752 120738 60452b 120738->120701 120738->120703 120739->120692 120740->120703 120741->120695 120742->120726 120743->120713 120744->120738 120745->120719 120746->120727 120747->120738 120748->120725 120749->120727 120750->120734 120751->120735 120752->120738 120753 574638 120754 574640 GetPEB 120753->120754 120755 574650 Sleep 120754->120755 120755->120754 120757 5746e7 120755->120757 120758 512980 40 API calls 120757->120758 120759 57470e GetTempPathA 120758->120759 120761 51aeb0 40 API calls 120759->120761 120762 57474d 120761->120762 120763 512980 40 API calls 120762->120763 120764 57478b 120763->120764 120765 57e650 40 API calls 120764->120765 120766 5747ad 120765->120766 120767 57a5f0 39 API calls 120766->120767 120768 5747bb 120767->120768 120769 5128d0 39 API calls 120768->120769 120770 5747c6 120769->120770 120771 5128d0 39 API calls 120770->120771 120772 5747d1 120771->120772 120773 5128d0 39 API calls 120772->120773 120774 5747dc 120773->120774 120775 512980 40 API calls 120774->120775 120776 57481a 120775->120776 120777 57e650 40 API calls 120776->120777 120778 57483c 120777->120778 120779 5128d0 39 API calls 120778->120779 120780 57484a 120779->120780 120781 5128d0 39 API calls 120780->120781 120782 574855 120781->120782 120783 51a690 81 API calls 120782->120783 120784 574866 120783->120784 120785 57487b 120784->120785 120786 57486a 120784->120786 120789 51a690 81 API calls 120785->120789 121172 51a750 90 API calls 2 library calls 120786->121172 120788 574878 120788->120785 120790 57488d 120789->120790 120791 5748a3 120790->120791 120792 574891 120790->120792 120795 5748ad CreateDirectoryA 120791->120795 121173 51a750 90 API calls 2 library calls 120792->121173 120794 5748a0 120794->120791 120796 5748ce 120795->120796 120797 5748bc 120795->120797 120800 5748d9 CreateDirectoryA 120796->120800 121174 525a10 101 API calls 4 library calls 120797->121174 120799 5748c6 120799->120796 120802 576bf6 OutputDebugStringA 120799->120802 120801 574969 120800->120801 120819 5748e6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 120800->120819 120807 574974 GetPEB 120801->120807 120803 576c0e 120802->120803 120804 576da3 Sleep shutdown closesocket 120802->120804 120803->120804 120805 576c18 120803->120805 120809 576ddc 120804->120809 120810 576deb 120804->120810 121257 5784b0 40 API calls 3 library calls 120805->121257 120818 574987 SetCurrentDirectoryA 120807->120818 120809->120810 120814 576de2 Sleep 120809->120814 120811 5128d0 39 API calls 120810->120811 120815 576df8 120811->120815 120812 574946 121175 525a10 101 API calls 4 library calls 120812->121175 120813 576c27 121258 5784b0 40 API calls 3 library calls 120813->121258 120814->120814 120817 5128d0 39 API calls 120815->120817 120822 576e03 120817->120822 120831 57a5c0 40 API calls 120818->120831 120819->120812 120821 576c36 121259 5784b0 40 API calls 3 library calls 120821->121259 120824 576e0e 120822->120824 120825 5128d0 39 API calls 120822->120825 120830 5128d0 39 API calls 120824->120830 120825->120824 120826 576c45 121260 5784b0 40 API calls 3 library calls 120826->121260 120829 576c54 121261 5784b0 40 API calls 3 library calls 120829->121261 120833 576e28 120830->120833 120837 574a1f 120831->120837 120834 576c63 121262 5784b0 40 API calls 3 library calls 120834->121262 120836 576c72 120838 57a770 40 API calls 120836->120838 120839 574a36 120837->120839 120846 574c0f __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 120837->120846 120840 576c83 120838->120840 121176 57e4d0 40 API calls __Strxfrm 120839->121176 121263 52a290 40 API calls 3 library calls 120840->121263 120843 574a85 120844 574a8f CreateMutexA 120843->120844 120847 5128d0 39 API calls 120844->120847 120845 576c88 120845->120804 121264 57e4d0 40 API calls __Strxfrm 120845->121264 120849 51b830 56 API calls 120846->120849 120850 574aa5 GetLastError 120847->120850 120856 574cb5 120849->120856 120850->120810 120852 574ab6 120850->120852 120851 576ce2 120854 576cec CreateMutexA 120851->120854 120853 574ac1 Sleep 120852->120853 120853->120853 120857 574acd 120853->120857 120855 5128d0 39 API calls 120854->120855 120858 576d02 GetLastError 120855->120858 120856->120856 120860 57cfc0 40 API calls 120856->120860 120863 512980 40 API calls 120857->120863 120858->120810 120859 576d13 Sleep 120858->120859 120861 576d48 120859->120861 120862 574cef 120860->120862 120865 512980 40 API calls 120861->120865 120868 57e650 40 API calls 120862->120868 120864 574af7 120863->120864 121177 52f690 79 API calls 2 library calls 120864->121177 120867 576d59 120865->120867 121265 52f690 79 API calls 2 library calls 120867->121265 120872 574d10 120868->120872 120869 574afc 120870 574b43 shutdown closesocket WSACleanup 120869->120870 120873 574b20 Sleep 120869->120873 120874 574b70 GetPEB 120870->120874 120877 5128d0 39 API calls 120872->120877 120873->120870 120873->120873 120879 574b80 120874->120879 120875 576d5e 120875->120804 120876 576d80 Sleep 120875->120876 120876->120804 120876->120876 120878 574d2c 120877->120878 120880 5128d0 39 API calls 120878->120880 120879->120874 120887 574d37 120880->120887 120881 574df2 121178 52c0a0 56 API calls std::_Facet_Register 120881->121178 120883 574d50 GetPEB 120883->120887 120884 574e02 120885 57a5c0 40 API calls 120884->120885 120886 574e14 120885->120886 120899 574e30 120886->120899 120906 574ea0 120886->120906 120887->120881 120887->120883 120890 574dc8 Sleep 120887->120890 120889 574f5c 120892 512980 40 API calls 120889->120892 120890->120881 120890->120883 120891 57a5f0 39 API calls 120891->120899 120893 574f83 120892->120893 120895 512980 40 API calls 120893->120895 120894 5128d0 39 API calls 120894->120899 120897 574faa 120895->120897 120896 512ae0 40 API calls 120896->120906 120902 512980 40 API calls 120897->120902 120898 57a5c0 40 API calls 120898->120899 120899->120891 120899->120894 120899->120898 120901 574e91 Sleep 120899->120901 121179 52c0a0 56 API calls std::_Facet_Register 120899->121179 120901->120886 120901->120906 120903 574fd1 120902->120903 120905 512980 40 API calls 120903->120905 120904 5128d0 39 API calls 120904->120906 120907 574fef 120905->120907 120906->120889 120906->120896 120906->120904 121180 51ae50 40 API calls 120906->121180 120908 512980 40 API calls 120907->120908 120909 57500d 120908->120909 120910 512980 40 API calls 120909->120910 120911 57502b 120910->120911 120912 512980 40 API calls 120911->120912 120913 575049 120912->120913 120914 512980 40 API calls 120913->120914 120915 575067 120914->120915 120916 512980 40 API calls 120915->120916 120917 575085 120916->120917 120918 512980 40 API calls 120917->120918 120919 5750a3 120918->120919 121181 576ea0 42 API calls std::_Facet_Register 120919->121181 120921 57514e OutputDebugStringA 121182 52f810 41 API calls 120921->121182 120923 5750bc 120923->120921 120925 575124 GetModuleHandleA GetProcAddress 120923->120925 120924 575160 121183 52f880 41 API calls 120924->121183 120925->120921 120927 575143 GetCurrentProcess 120925->120927 120927->120921 120928 575165 121184 52f8f0 41 API calls 120928->121184 120930 57516a 121185 52f960 41 API calls 120930->121185 120932 57516f 121186 52f9d0 41 API calls 120932->121186 120934 5755e3 120935 512980 40 API calls 120934->120935 120936 5755fe 120935->120936 120938 512980 40 API calls 120936->120938 120937 575174 120937->120934 121187 57e710 40 API calls 2 library calls 120937->121187 120940 57560e 120938->120940 120941 512980 40 API calls 120940->120941 120947 57561e 120941->120947 120942 5751c2 120942->120934 121188 57e710 40 API calls 2 library calls 120942->121188 120944 57520c 121189 58e540 40 API calls CallUnexpected 120944->121189 120946 575219 OutputDebugStringA 120948 575251 120946->120948 121212 57bb50 40 API calls CallUnexpected 120947->121212 121190 57e710 40 API calls 2 library calls 120948->121190 120951 575262 121191 58e540 40 API calls CallUnexpected 120951->121191 120953 575d32 121215 518400 40 API calls std::ios_base::_Ios_base_dtor 120953->121215 120954 57526f 121192 57e710 40 API calls 2 library calls 120954->121192 120956 575d50 120958 575d60 120956->120958 120959 576b1a 120956->120959 121216 55c620 40 API calls 120958->121216 121021 576b15 120959->121021 121248 5784b0 40 API calls 3 library calls 120959->121248 120961 5752a2 121193 58e540 40 API calls CallUnexpected 120961->121193 120964 575d65 121217 55f280 40 API calls 120964->121217 120965 5128d0 39 API calls 120970 576bb4 120965->120970 120966 57e710 40 API calls 121085 575666 120966->121085 120967 5752af 121194 57e710 40 API calls 2 library calls 120967->121194 120973 5128d0 39 API calls 120970->120973 120971 576b3c 121249 5784b0 40 API calls 3 library calls 120971->121249 120972 575d6a OutputDebugStringA 121218 577200 39 API calls 120972->121218 120976 576bbf 120973->120976 120980 5128d0 39 API calls 120976->120980 120978 576b4b 121250 5784b0 40 API calls 3 library calls 120978->121250 120979 575d7b 121219 577200 39 API calls 120979->121219 120985 576bca 120980->120985 120981 58e4a0 40 API calls 120981->121085 120982 5752fd 121195 58e540 40 API calls CallUnexpected 120982->121195 121255 576f60 39 API calls std::ios_base::_Ios_base_dtor 120985->121255 120987 576b5a 121251 5784b0 40 API calls 3 library calls 120987->121251 120988 575d85 CreateThread CreateThread 121220 54c7f0 9 API calls 120988->121220 120990 576bd5 121256 576fc0 39 API calls std::ios_base::_Ios_base_dtor 120990->121256 120991 57530a 121196 57e710 40 API calls 2 library calls 120991->121196 120995 576b69 121252 5784b0 40 API calls 3 library calls 120995->121252 120996 575dba 120997 575e73 120996->120997 121221 54ca80 43 API calls 3 library calls 120996->121221 121225 54d910 42 API calls 3 library calls 120997->121225 120998 576be0 121001 5128d0 39 API calls 120998->121001 121006 576beb 121001->121006 121004 576b78 121253 5784b0 40 API calls 3 library calls 121004->121253 121009 5128d0 39 API calls 121006->121009 121007 57535f 121197 58e540 40 API calls CallUnexpected 121007->121197 121008 576b87 121011 57a770 40 API calls 121008->121011 121009->120802 121013 576b98 121011->121013 121012 57536c 121198 57e710 40 API calls 2 library calls 121012->121198 121254 52a290 40 API calls 3 library calls 121013->121254 121014 575dcd 121222 57e710 40 API calls 2 library calls 121014->121222 121015 575e85 121226 57e710 40 API calls 2 library calls 121015->121226 121020 5753b0 121199 58e540 40 API calls CallUnexpected 121020->121199 121021->120965 121022 575e29 121223 5784b0 40 API calls 3 library calls 121022->121223 121023 575eea 121227 5784b0 40 API calls 3 library calls 121023->121227 121024 57e840 40 API calls 121024->121085 121028 5753bd 121200 57e710 40 API calls 2 library calls 121028->121200 121029 575e31 121224 57e710 40 API calls 2 library calls 121029->121224 121030 575ef2 121228 57e710 40 API calls 2 library calls 121030->121228 121034 57540f 121201 58e540 40 API calls CallUnexpected 121034->121201 121035 575f03 121040 575f27 WaitForSingleObject GetPEB 121035->121040 121037 575e42 121037->120997 121039 575e6c FreeLibrary 121037->121039 121038 57541c 121202 57e710 40 API calls 2 library calls 121038->121202 121039->120997 121048 575f40 GetPEB 121040->121048 121042 575472 121203 58e540 40 API calls CallUnexpected 121042->121203 121044 57547f OutputDebugStringA 121045 5754b9 121044->121045 121204 57e710 40 API calls 2 library calls 121045->121204 121047 5754ca 121205 58e540 40 API calls CallUnexpected 121047->121205 121057 575fd7 GetPEB 121048->121057 121051 5754d7 121206 57e710 40 API calls 2 library calls 121051->121206 121052 57a5f0 39 API calls 121052->121085 121054 57551b 121207 58e540 40 API calls CallUnexpected 121054->121207 121056 575528 121208 57e710 40 API calls 2 library calls 121056->121208 121066 576067 121057->121066 121061 575581 121209 58e540 40 API calls CallUnexpected 121061->121209 121063 5128d0 39 API calls 121063->121085 121064 57558e 121210 57e710 40 API calls 2 library calls 121064->121210 121229 55fad0 177 API calls 121066->121229 121067 5755d6 121211 58e540 40 API calls CallUnexpected 121067->121211 121070 5760f0 7 API calls 121071 57a770 40 API calls 121070->121071 121072 576191 121071->121072 121073 57a770 40 API calls 121072->121073 121074 5761a2 121073->121074 121075 57a770 40 API calls 121074->121075 121076 5761b3 121075->121076 121078 57a770 40 API calls 121076->121078 121077 51ae50 40 API calls 121077->121085 121079 5761c2 121078->121079 121230 51c430 144 API calls 2 library calls 121079->121230 121080 512ae0 40 API calls 121080->121085 121082 5761c7 GetPEB 121083 5761d6 GetPEB 121082->121083 121086 576270 WaitForSingleObject GetPEB 121083->121086 121085->120953 121085->120966 121085->120981 121085->121024 121085->121052 121085->121063 121085->121077 121085->121080 121213 5775f0 40 API calls CallUnexpected 121085->121213 121214 57bb50 40 API calls CallUnexpected 121085->121214 121088 576315 WaitForSingleObject GetPEB 121086->121088 121090 5763c0 GetPEB 121088->121090 121092 576457 GetPEB 121090->121092 121094 5764f0 GetPEB 121092->121094 121096 576582 CloseHandle GetPEB 121094->121096 121098 576620 GetPEB 121096->121098 121100 5766b2 GetPEB 121098->121100 121102 576742 GetPEB 121100->121102 121104 5767d2 121102->121104 121231 57e400 40 API calls 121104->121231 121106 5768ac 121107 57e650 40 API calls 121106->121107 121108 5768bc 121107->121108 121109 57cfc0 40 API calls 121108->121109 121110 5768e8 121109->121110 121111 5128d0 39 API calls 121110->121111 121112 5768ff 121111->121112 121113 5128d0 39 API calls 121112->121113 121114 57690a 121113->121114 121115 51aeb0 40 API calls 121114->121115 121116 57692f 121115->121116 121116->121116 121117 57cfc0 40 API calls 121116->121117 121118 576965 121117->121118 121119 5128d0 39 API calls 121118->121119 121120 57697c 121119->121120 121121 5128d0 39 API calls 121120->121121 121122 576987 121121->121122 121123 512980 40 API calls 121122->121123 121124 5769a9 121123->121124 121125 57a770 40 API calls 121124->121125 121126 5769b8 121125->121126 121232 515f90 141 API calls std::ios_base::_Ios_base_dtor 121126->121232 121128 5769bf 121129 57a770 40 API calls 121128->121129 121130 5769d0 121129->121130 121131 57a770 40 API calls 121130->121131 121132 5769e1 121131->121132 121233 52fc20 97 API calls 5 library calls 121132->121233 121134 5769e6 121135 576a6c 121134->121135 121234 5784b0 40 API calls 3 library calls 121134->121234 121136 57a770 40 API calls 121135->121136 121138 576a89 121136->121138 121241 5784b0 40 API calls 3 library calls 121138->121241 121139 576a0b 121235 5784b0 40 API calls 3 library calls 121139->121235 121141 576a98 121242 5784b0 40 API calls 3 library calls 121141->121242 121144 576a1a 121236 5784b0 40 API calls 3 library calls 121144->121236 121145 576aa7 121243 5784b0 40 API calls 3 library calls 121145->121243 121148 576a29 121237 5784b0 40 API calls 3 library calls 121148->121237 121150 576ab6 121244 5784b0 40 API calls 3 library calls 121150->121244 121151 576a38 121238 5784b0 40 API calls 3 library calls 121151->121238 121154 576ac5 121245 5784b0 40 API calls 3 library calls 121154->121245 121155 576a47 121239 5784b0 40 API calls 3 library calls 121155->121239 121158 576ad4 121246 5784b0 40 API calls 3 library calls 121158->121246 121159 576a56 121161 57a770 40 API calls 121159->121161 121163 576a67 121161->121163 121162 576ae3 121164 57a770 40 API calls 121162->121164 121240 52a290 40 API calls 3 library calls 121163->121240 121166 576af4 121164->121166 121247 556230 145 API calls __fread_nolock 121166->121247 121168 576af9 121169 5128d0 39 API calls 121168->121169 121170 576b0a 121169->121170 121171 5128d0 39 API calls 121170->121171 121171->121021 121172->120788 121173->120794 121174->120799 121175->120801 121176->120843 121177->120869 121178->120884 121179->120899 121180->120906 121181->120923 121182->120924 121183->120928 121184->120930 121185->120932 121186->120937 121187->120942 121188->120944 121189->120946 121190->120951 121191->120954 121192->120961 121193->120967 121194->120982 121195->120991 121196->121007 121197->121012 121198->121020 121199->121028 121200->121034 121201->121038 121202->121042 121203->121044 121204->121047 121205->121051 121206->121054 121207->121056 121208->121061 121209->121064 121210->121067 121211->120934 121212->121085 121213->121085 121214->121085 121215->120956 121216->120964 121217->120972 121218->120979 121219->120988 121220->120996 121221->121014 121222->121022 121223->121029 121224->121037 121225->121015 121226->121023 121227->121030 121228->121035 121229->121070 121230->121082 121231->121106 121232->121128 121233->121134 121234->121139 121235->121144 121236->121148 121237->121151 121238->121155 121239->121159 121240->121135 121241->121141 121242->121145 121243->121150 121244->121154 121245->121158 121246->121162 121247->121168 121248->120971 121249->120978 121250->120987 121251->120995 121252->121004 121253->121008 121254->121021 121255->120990 121256->120998 121257->120813 121258->120821 121259->120826 121260->120829 121261->120834 121262->120836 121263->120845 121264->120851 121265->120875
                          APIs
                          • CreateThread.KERNELBASE(00000000,00000000,0052F1D0,00000000,00000000,00000000), ref: 0057461C
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00574623
                          • Sleep.KERNELBASE(00000001), ref: 005746D8
                          • GetTempPathA.KERNEL32(000000FB,?,0100C8CB), ref: 00574737
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ChangeCloseCreateFindNotificationPathSleepTempThread
                          • String ID: drthdrthdrthdr hrtd hr$#@#^@#TGRERTERYERY$45 hgfch rtdyt gfch$ewetwertyer eytdryrtdy$jjj$ntdll.dll$td ydrthrhfty$.6$d4
                          • API String ID: 3366971898-4161778564
                          • Opcode ID: d4457a634c1ecdb7a9ef507b363ee9c52fb4417ae2afffde31a989ecd81a4506
                          • Instruction ID: b71d5980b67cee39c8459b662e1fd82ab401feb57e89d18f504e6eb52c44ca32
                          • Opcode Fuzzy Hash: d4457a634c1ecdb7a9ef507b363ee9c52fb4417ae2afffde31a989ecd81a4506
                          • Instruction Fuzzy Hash: 8A33F634A042198BCB25EF64DC99BEDBB75FF84304F1480D9E4496B252EB30AE85DF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 979 573e4b 980 573e50-573e54 979->980 981 573e56 980->981 982 573e58-573e67 call 512a20 980->982 981->982 985 573e9c-573eaa 982->985 986 573e69-573e70 982->986 985->980 987 573eac 985->987 986->985 988 573e72-573e7c 986->988 989 573f8c-573fd8 call 57cdb0 call 614a10 987->989 990 573e80-573e91 call 512a20 988->990 991 573e7e 988->991 1001 573fea-573fec 989->1001 1002 573fda-573fe4 989->1002 990->985 997 573e93-573e9a 990->997 991->990 997->985 998 573eb1-573f7c call 577a30 call 577040 MessageBoxA 997->998 1013 573f86 998->1013 1014 573f7e-573f81 998->1014 1003 574002-57400c 1001->1003 1004 573fee 1001->1004 1002->1001 1008 574012-57403b call 614a10 1003->1008 1004->1003 1006 573ff0-573ff6 1004->1006 1006->1003 1009 573ff8-573ffa 1006->1009 1017 57404d-57404f 1008->1017 1018 57403d-574047 1008->1018 1009->1008 1012 573ffc 1009->1012 1012->1003 1016 573ffe-574000 1012->1016 1013->989 1019 576e0e-576e16 1014->1019 1016->1003 1016->1008 1022 574065-57406f 1017->1022 1023 574051 1017->1023 1018->1017 1020 576e1d-576e3a call 5128d0 1019->1020 1021 576e18 call 5137e0 1019->1021 1021->1020 1024 574079-574094 GetProcessId call 577bc0 1022->1024 1023->1022 1027 574053-574059 1023->1027 1031 574099-5740ab call 57a1e0 1024->1031 1027->1022 1030 57405b-57405d 1027->1030 1030->1024 1032 57405f 1030->1032 1036 5740b1-5740b8 call 524280 1031->1036 1037 5741ea-57421d call 577bc0 call 57a1e0 1031->1037 1032->1022 1034 574061-574063 1032->1034 1034->1022 1034->1024 1043 5740be-5740ca GetPEB 1036->1043 1044 574148-57414f call 5243c0 1036->1044 1049 574223-574238 call 524400 call 524490 call 524730 1037->1049 1050 5742ea-57431d call 577bc0 call 57a1e0 1037->1050 1047 5740d0-5740ec 1043->1047 1044->1037 1053 574155-57415e GetPEB 1044->1053 1051 5740ee-5740f3 1047->1051 1052 574139-57413b 1047->1052 1084 57424f-57425b GetPEB 1049->1084 1085 57423a-57423c 1049->1085 1072 574327-57435a call 577bc0 call 57a1e0 1050->1072 1073 57431f-574322 call 5248e0 1050->1073 1051->1052 1055 5740f5-5740fd 1051->1055 1052->1047 1058 574161-57417d 1053->1058 1060 574100-574113 1055->1060 1062 57417f-574184 1058->1062 1063 5741c9-5741cb 1058->1063 1065 574115-574128 1060->1065 1066 574132-574137 1060->1066 1062->1063 1068 574186-57418e 1062->1068 1063->1058 1065->1065 1070 57412a-574130 1065->1070 1066->1052 1066->1060 1074 574190-5741a3 1068->1074 1070->1066 1071 57413d-574143 1070->1071 1076 5741d3-5741e6 1071->1076 1096 574361-5743d3 call 577bc0 call 57a1e0 call 614a10 1072->1096 1097 57435c call 527dc0 1072->1097 1073->1072 1079 5741a5-5741b8 1074->1079 1080 5741c2-5741c7 1074->1080 1076->1037 1079->1079 1083 5741ba-5741c0 1079->1083 1080->1063 1080->1074 1083->1080 1088 5741cd-5741d0 1083->1088 1086 574260-57427c 1084->1086 1085->1084 1089 57423e-574240 1085->1089 1091 57427e-574283 1086->1091 1092 5742c9-5742cb 1086->1092 1088->1076 1089->1084 1090 574242-574249 call 5242c0 1089->1090 1090->1050 1090->1084 1091->1092 1095 574285-57428d 1091->1095 1092->1086 1099 574290-5742a3 1095->1099 1111 5743e5-5743e7 1096->1111 1112 5743d5-5743df 1096->1112 1097->1096 1102 5742a5-5742b8 1099->1102 1103 5742c2-5742c7 1099->1103 1102->1102 1105 5742ba-5742c0 1102->1105 1103->1092 1103->1099 1105->1103 1108 5742cd-5742e6 1105->1108 1108->1050 1113 5743fd-574407 1111->1113 1114 5743e9 1111->1114 1112->1111 1116 574411-574420 SetThreadExecutionState 1113->1116 1114->1113 1115 5743eb-5743f1 1114->1115 1115->1113 1117 5743f3-5743f5 1115->1117 1118 574422-574427 SetThreadExecutionState 1116->1118 1119 574429-574462 call 577b20 GetPEB 1116->1119 1117->1116 1120 5743f7 1117->1120 1118->1119 1124 574465-574481 1119->1124 1120->1113 1122 5743f9-5743fb 1120->1122 1122->1113 1122->1116 1125 574483-574488 1124->1125 1126 5744cb-5744cd 1124->1126 1125->1126 1127 57448a-574490 1125->1127 1126->1019 1126->1124 1128 574492-5744a5 1127->1128 1129 5744a7-5744ba 1128->1129 1130 5744c4-5744c9 1128->1130 1129->1129 1131 5744bc-5744c2 1129->1131 1130->1126 1130->1128 1131->1130
                          APIs
                          • MessageBoxA.USER32(00000000,E7FAFAC5,FAE1F3C6,00000014), ref: 00573F73
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00574018
                          • GetProcessId.KERNELBASE(0000A9BD,00000000,00000000,00000003,00000000,00000000,00000000,00000003,00000000,00000000), ref: 0057407E
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: MessageProcessUnothrow_t@std@@@__ehfuncinfo$??2@
                          • String ID: /*************/$P7a$PN^$WVV$';$A8${8
                          • API String ID: 1999352760-2137135086
                          • Opcode ID: 050fc2e557f3481ce162944258dde15767b40f4ade1633b30e88c150466a5772
                          • Instruction ID: b5ef58809efb0d65fc33bf7d59b7d00ddc2dee8836c65ed06a66b3b31a7f6dd8
                          • Opcode Fuzzy Hash: 050fc2e557f3481ce162944258dde15767b40f4ade1633b30e88c150466a5772
                          • Instruction Fuzzy Hash: D012F534A44225CBCB24CF14E894BAABBB2FF84704F14859DD94A6F751DB30AE85DF80

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1358 52e0a0-52e0d2 WSAStartup 1359 52e1b7-52e1c0 1358->1359 1360 52e0d8-52e102 call 516bd0 * 2 1358->1360 1365 52e104-52e108 1360->1365 1366 52e10e-52e165 getaddrinfo 1360->1366 1365->1359 1365->1366 1367 52e1b1 WSACleanup 1366->1367 1368 52e167-52e16d 1366->1368 1367->1359 1369 52e1c5-52e1cf freeaddrinfo 1368->1369 1370 52e16f 1368->1370 1369->1367 1371 52e1d1-52e1d9 1369->1371 1372 52e175-52e189 socket 1370->1372 1372->1367 1373 52e18b-52e19b connect 1372->1373 1374 52e1c1 1373->1374 1375 52e19d-52e1a5 closesocket 1373->1375 1374->1369 1375->1372 1376 52e1a7-52e1ab freeaddrinfo 1375->1376 1376->1367
                          APIs
                          • WSAStartup.WS2_32 ref: 0052E0CA
                          • getaddrinfo.WS2_32(?,?,?,00647320), ref: 0052E15D
                          • socket.WS2_32(?,?,?), ref: 0052E17E
                          • connect.WS2_32(00000000,?,00000000), ref: 0052E192
                          • closesocket.WS2_32(00000000), ref: 0052E19E
                          • freeaddrinfo.WS2_32(?,?,?,?,00647320,?,?,?,?,?,?), ref: 0052E1AB
                          • WSACleanup.WS2_32 ref: 0052E1B1
                          • freeaddrinfo.WS2_32(?,?,?,?,00647320,?,?,?,?,?,?), ref: 0052E1C6
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: freeaddrinfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                          • String ID:
                          • API String ID: 58224237-0
                          • Opcode ID: 1dbee7ac01d11c3f207edcc2f62f04c2f9b17a49c32e817fbbe5caba0fd6d19f
                          • Instruction ID: cac3c2b77853f7bcff5336494e2cb69a9d7d0fc41575315bd56aa2d47c9794b8
                          • Opcode Fuzzy Hash: 1dbee7ac01d11c3f207edcc2f62f04c2f9b17a49c32e817fbbe5caba0fd6d19f
                          • Instruction Fuzzy Hash: C5317E72604310AFD7209F25EC4976ABBE5FF85724F044B2DF9B8962E0D3359814CB92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1485 573a40-573a53 GetCursorPos 1486 573a55-573a61 GetCursorPos 1485->1486 1487 573a67-573a6d 1486->1487 1488 573b28-573b31 GetPEB 1486->1488 1487->1488 1490 573a73-573a7f GetPEB 1487->1490 1489 573b34-573b48 1488->1489 1491 573b4a-573b4f 1489->1491 1492 573b99-573b9b 1489->1492 1493 573a80-573a94 1490->1493 1491->1492 1494 573b51-573b59 1491->1494 1492->1489 1495 573a96-573a9b 1493->1495 1496 573ae4-573ae6 1493->1496 1497 573b60-573b73 1494->1497 1495->1496 1498 573a9d-573aa3 1495->1498 1496->1493 1499 573b75-573b88 1497->1499 1500 573b92-573b97 1497->1500 1501 573aa5-573ab8 1498->1501 1499->1499 1502 573b8a-573b90 1499->1502 1500->1492 1500->1497 1503 573add-573ae2 1501->1503 1504 573aba 1501->1504 1502->1500 1505 573b9d-573bc2 Sleep 1502->1505 1503->1496 1503->1501 1506 573ac0-573ad3 1504->1506 1505->1486 1506->1506 1507 573ad5-573adb 1506->1507 1507->1503 1508 573ae8-573b1a Sleep GetCursorPos 1507->1508 1508->1488 1509 573b1c-573b22 1508->1509 1509->1488 1510 573bc7-573bd8 call 516bd0 1509->1510 1513 573bde 1510->1513 1514 573bda-573bdc 1510->1514 1515 573be0-573bfd call 516bd0 1513->1515 1514->1515
                          APIs
                          • GetCursorPos.USER32(?), ref: 00573A53
                          • GetCursorPos.USER32(?), ref: 00573A59
                          • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00573DB6), ref: 00573B08
                          • GetCursorPos.USER32(?), ref: 00573B0E
                          • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00573DB6), ref: 00573BBA
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Cursor$Sleep
                          • String ID:
                          • API String ID: 1847515627-0
                          • Opcode ID: 5b94d7a6f0a2fee03543c2f0ead46ddc954a7b4c5d191674bbc66f5b5d2c93bd
                          • Instruction ID: 109e3ac0b1173c44c13e9c1300e26bde590a3ab1e53f643b58ef21546360212a
                          • Opcode Fuzzy Hash: 5b94d7a6f0a2fee03543c2f0ead46ddc954a7b4c5d191674bbc66f5b5d2c93bd
                          • Instruction Fuzzy Hash: 6451BA35A04219CFCB24CF58D8D5EA9BBB1FF48724B29859AD449AB311D731EE05EB80

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1132 5fe813-5fe843 call 5fe561 1135 5fe85e-5fe86a call 60a53a 1132->1135 1136 5fe845-5fe850 call 5fd22c 1132->1136 1142 5fe86c-5fe881 call 5fd22c call 5fd23f 1135->1142 1143 5fe883-5fe8cc call 5fe4cc 1135->1143 1141 5fe852-5fe859 call 5fd23f 1136->1141 1152 5feb38-5feb3c 1141->1152 1142->1141 1150 5fe8ce-5fe8d7 1143->1150 1151 5fe939-5fe942 GetFileType 1143->1151 1155 5fe90e-5fe934 GetLastError call 5fd1e5 1150->1155 1156 5fe8d9-5fe8dd 1150->1156 1157 5fe98b-5fe98e 1151->1157 1158 5fe944-5fe975 GetLastError call 5fd1e5 CloseHandle 1151->1158 1155->1141 1156->1155 1161 5fe8df-5fe90c call 5fe4cc 1156->1161 1159 5fe997-5fe99d 1157->1159 1160 5fe990-5fe995 1157->1160 1158->1141 1169 5fe97b-5fe986 call 5fd23f 1158->1169 1164 5fe9a1-5fe9ef call 60a485 1159->1164 1165 5fe99f 1159->1165 1160->1164 1161->1151 1161->1155 1175 5fea0e-5fea36 call 5fe276 1164->1175 1176 5fe9f1-5fe9fd call 5fe6db 1164->1176 1165->1164 1169->1141 1181 5fea3b-5fea7c 1175->1181 1182 5fea38-5fea39 1175->1182 1176->1175 1183 5fe9ff 1176->1183 1185 5fea7e-5fea82 1181->1185 1186 5fea9d-5feaab 1181->1186 1184 5fea01-5fea09 call 604ae2 1182->1184 1183->1184 1184->1152 1185->1186 1187 5fea84-5fea98 1185->1187 1188 5feb36 1186->1188 1189 5feab1-5feab5 1186->1189 1187->1186 1188->1152 1189->1188 1192 5feab7-5feaea CloseHandle call 5fe4cc 1189->1192 1195 5feb1e-5feb32 1192->1195 1196 5feaec-5feb18 GetLastError call 5fd1e5 call 60a64d 1192->1196 1195->1188 1196->1195
                          APIs
                            • Part of subcall function 005FE4CC: CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000), ref: 005FE4E9
                          • GetLastError.KERNEL32 ref: 005FE927
                          • __dosmaperr.LIBCMT ref: 005FE92E
                          • GetFileType.KERNELBASE(00000000), ref: 005FE93A
                          • GetLastError.KERNEL32 ref: 005FE944
                          • __dosmaperr.LIBCMT ref: 005FE94D
                          • CloseHandle.KERNEL32(00000000), ref: 005FE96D
                          • CloseHandle.KERNEL32(?), ref: 005FEABA
                          • GetLastError.KERNEL32 ref: 005FEAEC
                          • __dosmaperr.LIBCMT ref: 005FEAF3
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                          • String ID: H
                          • API String ID: 4237864984-2852464175
                          • Opcode ID: 537428f3d2f85738b8f2939a80b42b263b1d887533b52fe75c43d5593ccacdd7
                          • Instruction ID: cd9ee92fd73fccb5f37b13421650b881d2e7d05a91940067c6664dce6f9cd352
                          • Opcode Fuzzy Hash: 537428f3d2f85738b8f2939a80b42b263b1d887533b52fe75c43d5593ccacdd7
                          • Instruction Fuzzy Hash: 7AA12432A001599FCF19AF68DC96BBD3FB2BB46314F14015DFA019B2A1DB399D06C752

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1201 51b830-51b863 call 51a440 1204 51b865 1201->1204 1205 51b86a-51b87e 1201->1205 1204->1205 1206 51b880-51b88b 1205->1206 1206->1206 1207 51b88d-51b8bd 1206->1207 1208 51b8c0-51b8c5 1207->1208 1208->1208 1209 51b8c7-51b921 call 512ae0 1208->1209 1212 51b925-51b930 1209->1212 1212->1212 1213 51b932-51b94e RegOpenKeyExA 1212->1213 1214 51b9e5-51b9f9 1213->1214 1215 51b954-51b97d 1213->1215 1216 51ba00-51ba0b 1214->1216 1217 51b980-51b98b 1215->1217 1216->1216 1219 51ba0d-51ba3d 1216->1219 1217->1217 1218 51b98d-51b9b1 RegQueryValueExA 1217->1218 1220 51b9b3-51b9bc 1218->1220 1221 51b9dc-51b9df RegCloseKey 1218->1221 1222 51ba40-51ba45 1219->1222 1223 51b9c0-51b9c5 1220->1223 1221->1214 1222->1222 1224 51ba47-51ba7f call 512ae0 call 5f14f0 GetCurrentHwProfileA 1222->1224 1223->1223 1225 51b9c7-51b9d7 call 57a350 1223->1225 1231 51ba81-51ba8a 1224->1231 1232 51baac-51bad9 call 51b360 SetupDiGetClassDevsA 1224->1232 1225->1221 1233 51ba90-51ba95 1231->1233 1238 51badb-51bb0b 1232->1238 1239 51bb0d-51bb1b call 51b1a0 1232->1239 1233->1233 1235 51ba97-51baa7 call 57a350 1233->1235 1235->1232 1240 51bb1e-51bb3c 1238->1240 1239->1240 1243 51bb40-51bb45 1240->1243 1243->1243 1244 51bb47-51bb58 1243->1244 1245 51c141 call 512270 1244->1245 1246 51bb5e-51bb6b 1244->1246 1251 51c146 call 5f47b0 1245->1251 1248 51bb73-51bb9a call 5820e0 1246->1248 1249 51bb6d 1246->1249 1254 51bba2-51bbba 1248->1254 1255 51bb9c 1248->1255 1249->1248 1256 51c14b-51c150 call 5f47b0 1251->1256 1257 51bbf3-51bc08 call 5806c0 1254->1257 1258 51bbbc-51bbce 1254->1258 1255->1254 1267 51bc0a-51bd39 call 57a480 call 581ed0 call 57a480 call 581ed0 1257->1267 1260 51bbd0 1258->1260 1261 51bbd6-51bbf1 call 5f0f70 1258->1261 1260->1261 1261->1267 1276 51bd3b-51bd4a 1267->1276 1277 51bd6a-51bd77 1267->1277 1278 51bd60-51bd67 call 5ef511 1276->1278 1279 51bd4c-51bd5a 1276->1279 1280 51bd79-51bd88 1277->1280 1281 51bda8-51bdcd 1277->1281 1278->1277 1279->1251 1279->1278 1285 51bd8a-51bd98 1280->1285 1286 51bd9e-51bda5 call 5ef511 1280->1286 1282 51bdfb-51be05 1281->1282 1283 51bdcf-51bddb 1281->1283 1289 51be33-51be52 1282->1289 1290 51be07-51be13 1282->1290 1287 51bdf1-51bdf8 call 5ef511 1283->1287 1288 51bddd-51bdeb 1283->1288 1285->1251 1285->1286 1286->1281 1287->1282 1288->1251 1288->1287 1296 51be83-51beab 1289->1296 1297 51be54-51be63 1289->1297 1294 51be15-51be23 1290->1294 1295 51be29-51be30 call 5ef511 1290->1295 1294->1251 1294->1295 1295->1289 1299 51bead-51bebc 1296->1299 1300 51bedc-51bee6 1296->1300 1303 51be65-51be73 1297->1303 1304 51be79-51be80 call 5ef511 1297->1304 1306 51bed2-51bed9 call 5ef511 1299->1306 1307 51bebe-51becc 1299->1307 1308 51bf14-51bf9b 1300->1308 1309 51bee8-51bef4 1300->1309 1303->1251 1303->1304 1304->1296 1306->1300 1307->1251 1307->1306 1315 51bfa6-51bfab 1308->1315 1316 51bf9d-51bfa3 1308->1316 1313 51bef6-51bf04 1309->1313 1314 51bf0a-51bf11 call 5ef511 1309->1314 1313->1251 1313->1314 1314->1308 1317 51bfd6-51bfd8 1315->1317 1318 51bfad 1315->1318 1316->1315 1322 51c000 1317->1322 1323 51bfda-51bffe call 5f0f70 1317->1323 1321 51bfb2-51bfce call 595b20 1318->1321 1331 51bfd0 1321->1331 1327 51c00a-51c01d call 595980 1322->1327 1323->1327 1333 51c030-51c04f 1327->1333 1334 51c01f-51c02f 1327->1334 1331->1317 1335 51c050-51c055 1333->1335 1334->1333 1335->1335 1336 51c057-51c06e call 512ae0 1335->1336 1339 51c070-51c07f 1336->1339 1340 51c09f-51c0c3 1336->1340 1341 51c081-51c08f 1339->1341 1342 51c095-51c09c call 5ef511 1339->1342 1343 51c0c5-51c0d6 1340->1343 1344 51c0f8-51c101 1340->1344 1341->1256 1341->1342 1342->1340 1348 51c0d8-51c0e9 1343->1348 1349 51c0ee-51c0f5 call 5ef511 1343->1349 1345 51c103-51c112 1344->1345 1346 51c12e-51c140 1344->1346 1350 51c124-51c12b call 5ef511 1345->1350 1351 51c114-51c122 1345->1351 1348->1256 1353 51c0eb 1348->1353 1349->1344 1350->1346 1351->1256 1351->1350 1353->1349
                          APIs
                            • Part of subcall function 0051A440: GetCurrentProcess.KERNEL32(?), ref: 0051A44F
                            • Part of subcall function 0051A440: IsWow64Process.KERNEL32(00000000), ref: 0051A456
                          • RegOpenKeyExA.KERNELBASE(80000002,C0D5DDC2,00000000,00020019,00000000,FAF8FCC4,FAF8FCC5), ref: 0051B946
                          • RegQueryValueExA.KERNELBASE(00000000,FCF0F3DC,00000000,00020019,?,00000400), ref: 0051B9A9
                          • RegCloseKey.ADVAPI32(00000000), ref: 0051B9DF
                          • GetCurrentHwProfileA.ADVAPI32(?), ref: 0051BA77
                          • SetupDiGetClassDevsA.SETUPAPI(0061F540,00000000,00000000,00000012), ref: 0051BAD0
                            • Part of subcall function 0051B1A0: LocalAlloc.KERNEL32(00000040,0000001C), ref: 0051B1F0
                            • Part of subcall function 0051B1A0: SetupDiEnumDeviceInfo.SETUPAPI(?,00000000,00000000), ref: 0051B1FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CurrentProcessSetup$AllocClassCloseDeviceDevsEnumInfoLocalOpenProfileQueryValueWow64
                          • String ID: :$_$_$_
                          • API String ID: 2396838628-4119709311
                          • Opcode ID: 6cb66c2b9353e0e3607024f480d67fad21603ef19342be715195c3926695248c
                          • Instruction ID: 85fd847d36f659da2e412c83d67beb768fed9d99eb769387f98681d705afb972
                          • Opcode Fuzzy Hash: 6cb66c2b9353e0e3607024f480d67fad21603ef19342be715195c3926695248c
                          • Instruction Fuzzy Hash: 2A528F70D002599FEB18CF68CC98BEDBFB5BF45304F1481A9E449AB282E7755A85CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1377 604623-604633 1378 604635-604648 call 5fd22c call 5fd23f 1377->1378 1379 60464d-60464f 1377->1379 1393 6049a7 1378->1393 1380 604655-60465b 1379->1380 1381 60498f-60499c call 5fd22c call 5fd23f 1379->1381 1380->1381 1383 604661-60468a 1380->1383 1398 6049a2 call 5f47a0 1381->1398 1383->1381 1386 604690-604699 1383->1386 1390 6046b3-6046b5 1386->1390 1391 60469b-6046ae call 5fd22c call 5fd23f 1386->1391 1396 60498b-60498d 1390->1396 1397 6046bb-6046bf 1390->1397 1391->1398 1399 6049aa-6049ad 1393->1399 1396->1399 1397->1396 1401 6046c5-6046c9 1397->1401 1398->1393 1401->1391 1404 6046cb-6046e2 1401->1404 1406 6046e4-6046e7 1404->1406 1407 604717-60471d 1404->1407 1410 6046e9-6046ef 1406->1410 1411 60470d-604715 1406->1411 1408 6046f1-604708 call 5fd22c call 5fd23f call 5f47a0 1407->1408 1409 60471f-604726 1407->1409 1441 6048c2 1408->1441 1414 604728 1409->1414 1415 60472a-60472b call 606e2d 1409->1415 1410->1408 1410->1411 1413 60478a-6047a9 1411->1413 1417 604865-60486e call 610d44 1413->1417 1418 6047af-6047bb 1413->1418 1414->1415 1423 604730-604748 call 606db3 * 2 1415->1423 1429 604870-604882 1417->1429 1430 6048df 1417->1430 1418->1417 1422 6047c1-6047c3 1418->1422 1422->1417 1426 6047c9-6047ea 1422->1426 1445 604765-604788 call 5fe13d 1423->1445 1446 60474a-604760 call 5fd23f call 5fd22c 1423->1446 1426->1417 1431 6047ec-604802 1426->1431 1429->1430 1435 604884-604893 GetConsoleMode 1429->1435 1433 6048e3-6048f9 ReadFile 1430->1433 1431->1417 1436 604804-604806 1431->1436 1439 604957-604962 GetLastError 1433->1439 1440 6048fb-604901 1433->1440 1435->1430 1442 604895-604899 1435->1442 1436->1417 1443 604808-60482b 1436->1443 1447 604964-604976 call 5fd23f call 5fd22c 1439->1447 1448 60497b-60497e 1439->1448 1440->1439 1449 604903 1440->1449 1451 6048c5-6048cf call 606db3 1441->1451 1442->1433 1450 60489b-6048b3 ReadConsoleW 1442->1450 1443->1417 1444 60482d-604843 1443->1444 1444->1417 1453 604845-604847 1444->1453 1445->1413 1446->1441 1447->1441 1460 604984-604986 1448->1460 1461 6048bb-6048c1 call 5fd1e5 1448->1461 1457 604906-604918 1449->1457 1458 6048d4-6048dd 1450->1458 1459 6048b5 GetLastError 1450->1459 1451->1399 1453->1417 1463 604849-604860 1453->1463 1457->1451 1467 60491a-60491e 1457->1467 1458->1457 1459->1461 1460->1451 1461->1441 1463->1417 1471 604920-604930 call 604335 1467->1471 1472 604937-604944 1467->1472 1484 604933-604935 1471->1484 1477 604950-604955 call 60417b 1472->1477 1478 604946 call 60448c 1472->1478 1482 60494b-60494e 1477->1482 1478->1482 1482->1484 1484->1451
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 151553ef43e1e2bc9f9febcb4bf39ac9ae964ade4cb46c6b6e6c8b694a297cd3
                          • Instruction ID: 109cc01d0d77480a202ffb14ea5874ef3c6ceaa841186f58249773a979873ac9
                          • Opcode Fuzzy Hash: 151553ef43e1e2bc9f9febcb4bf39ac9ae964ade4cb46c6b6e6c8b694a297cd3
                          • Instruction Fuzzy Hash: 8BB1D3B4A44249AFDB29DFA8D881BAF7BB3BF46304F144158F644973D1CB709942CBA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1518 5fe276-5fe2a1 1519 5fe4ba 1518->1519 1520 5fe2a7-5fe2b0 1518->1520 1523 5fe4bc-5fe4c0 1519->1523 1521 5fe2d7-5fe2e9 1520->1521 1522 5fe2b2-5fe2c1 call 602733 1520->1522 1525 5fe32f 1521->1525 1526 5fe2eb-5fe2f0 1521->1526 1534 5fe2c7-5fe2cf 1522->1534 1535 5fe4c1-5fe4f0 call 5f47cd CreateFileW 1522->1535 1529 5fe331-5fe337 1525->1529 1527 5fe31e-5fe329 1526->1527 1528 5fe2f2-5fe2f7 1526->1528 1527->1529 1532 5fe32b-5fe32d 1527->1532 1528->1527 1531 5fe2f9-5fe2fe 1528->1531 1529->1519 1533 5fe33d-5fe341 1529->1533 1531->1532 1537 5fe300-5fe305 1531->1537 1532->1529 1533->1519 1538 5fe347-5fe35b 1533->1538 1539 5fe31a-5fe31c 1534->1539 1540 5fe2d1 1534->1540 1537->1532 1542 5fe307-5fe30c 1537->1542 1543 5fe35d-5fe35f 1538->1543 1544 5fe369-5fe36f 1538->1544 1539->1521 1540->1521 1548 5fe30e-5fe313 1542->1548 1549 5fe315-5fe318 1542->1549 1550 5fe3d6-5fe3ee call 604623 1543->1550 1551 5fe361-5fe363 1543->1551 1545 5fe46f-5fe478 1544->1545 1546 5fe375-5fe378 1544->1546 1554 5fe47a-5fe47d 1545->1554 1555 5fe486-5fe48c 1545->1555 1546->1545 1553 5fe37e-5fe381 1546->1553 1548->1529 1548->1549 1549->1529 1561 5fe3f5-5fe3fd 1550->1561 1562 5fe3f0-5fe3f3 1550->1562 1551->1519 1551->1544 1557 5fe396-5fe3a6 call 5fe13d 1553->1557 1558 5fe383-5fe386 1553->1558 1554->1519 1559 5fe47f-5fe484 1554->1559 1560 5fe491 1555->1560 1576 5fe46c-5fe46e 1557->1576 1577 5fe3ac-5fe3bf call 5fe13d 1557->1577 1558->1557 1563 5fe388-5fe38b 1558->1563 1559->1560 1565 5fe494-5fe4ab call 605354 1560->1565 1567 5fe3ff-5fe402 1561->1567 1568 5fe414-5fe41d 1561->1568 1562->1561 1566 5fe3c1-5fe3c8 call 5fd23f 1562->1566 1563->1545 1569 5fe391 1563->1569 1565->1566 1586 5fe4b1-5fe4b8 1565->1586 1566->1523 1572 5fe404-5fe40a 1567->1572 1573 5fe452-5fe465 call 5fe13d 1567->1573 1574 5fe41f-5fe42a call 5fd23f 1568->1574 1575 5fe42c-5fe432 1568->1575 1569->1519 1572->1568 1581 5fe40c-5fe40f 1572->1581 1573->1519 1591 5fe467 1573->1591 1574->1566 1575->1573 1584 5fe434-5fe447 call 5fe13d 1575->1584 1576->1545 1577->1566 1592 5fe3cd-5fe3d0 1577->1592 1581->1519 1584->1566 1594 5fe44d-5fe450 1584->1594 1586->1519 1586->1565 1591->1566 1592->1519 1592->1550 1594->1519
                          APIs
                          • CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000), ref: 005FE4E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID: -_$-_$@
                          • API String ID: 823142352-1923655781
                          • Opcode ID: da123e846fedc5db3ecdf16f24c98cbab7acb55469fbb823188b2144493ccd76
                          • Instruction ID: 9dbc50ba7136b585ab31b4306fc00bbc8b14d45e1bff178b5d3171021034cbef
                          • Opcode Fuzzy Hash: da123e846fedc5db3ecdf16f24c98cbab7acb55469fbb823188b2144493ccd76
                          • Instruction Fuzzy Hash: A461D17190010DAADF259A68DC8FBBD3E66FB00364F28492AFB14D72F1D23DDD819661

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1595 5ef290-5ef293 1596 5ef2a2-5ef2a5 call 5fdf2c 1595->1596 1598 5ef2aa-5ef2ad 1596->1598 1599 5ef2af-5ef2b0 1598->1599 1600 5ef295-5ef2a0 call 6017d8 1598->1600 1600->1596 1603 5ef2b1-5ef2b5 1600->1603 1604 5121d0-512220 call 5121b0 call 5f0efb call 5f0651 1603->1604 1605 5ef2bb 1603->1605 1605->1605
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051220E
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: bea4122cb0115a8b9d65407e7c28dc79c0f8986298e99f954259dd21c054b8b6
                          • Instruction ID: 1c5126556307acc7506a7b22bebd4661648819c9edd32a102af14d01b999c4a3
                          • Opcode Fuzzy Hash: bea4122cb0115a8b9d65407e7c28dc79c0f8986298e99f954259dd21c054b8b6
                          • Instruction Fuzzy Hash: 03012B3940030DABCB18EFA9DC058AA7FEDBA00320B444439FB58DB591EB30E990C791

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1612 51a690-51a6a7 call 5ee812 1615 51a6a9-51a6ab 1612->1615 1616 51a6fe-51a704 call 5ee4bb 1612->1616 1618 51a6e7 1615->1618 1619 51a6ad-51a6af 1615->1619 1622 51a6e9-51a6fd call 5ee823 1618->1622 1621 51a6b2-51a6b7 1619->1621 1621->1621 1623 51a6b9-51a6bb 1621->1623 1623->1618 1625 51a6bd-51a6c7 GetFileAttributesA 1623->1625 1627 51a6e3-51a6e5 1625->1627 1628 51a6c9-51a6d2 GetLastError 1625->1628 1627->1622 1628->1627 1629 51a6d4-51a6d7 1628->1629 1629->1627 1630 51a6d9-51a6dc 1629->1630 1630->1627 1631 51a6de-51a6e1 1630->1631 1631->1618 1631->1627
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesErrorFileLastMtx_unlock
                          • String ID:
                          • API String ID: 441747541-0
                          • Opcode ID: ef09833f780a66896017453d8b4d86062b002d51d542c2492cbd5857399587a9
                          • Instruction ID: 0349615ae64a19efd38a0a50a047703d525dc799bf83c99c267b3f5a77ece004
                          • Opcode Fuzzy Hash: ef09833f780a66896017453d8b4d86062b002d51d542c2492cbd5857399587a9
                          • Instruction Fuzzy Hash: B4F08171D47151167E3A96B56C5A4F93F0AB95332C72C4622E845C6553F607CCC18593

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1632 5f4942-5f494f 1633 5f4979-5f498d call 605f82 1632->1633 1634 5f4951-5f4974 call 5f4723 1632->1634 1640 5f498f 1633->1640 1641 5f4992-5f499b call 5fe11f 1633->1641 1639 5f4ae0-5f4ae2 1634->1639 1640->1641 1643 5f49a0-5f49af 1641->1643 1644 5f49bf-5f49c8 1643->1644 1645 5f49b1 1643->1645 1648 5f49dc-5f4a10 1644->1648 1649 5f49ca-5f49d7 1644->1649 1646 5f4a89-5f4a8e 1645->1646 1647 5f49b7-5f49b9 1645->1647 1650 5f4ade-5f4adf 1646->1650 1647->1644 1647->1646 1652 5f4a6d-5f4a79 1648->1652 1653 5f4a12-5f4a1c 1648->1653 1651 5f4adc 1649->1651 1650->1639 1651->1650 1654 5f4a7b-5f4a82 1652->1654 1655 5f4a90-5f4a93 1652->1655 1656 5f4a1e-5f4a2a 1653->1656 1657 5f4a43-5f4a4f 1653->1657 1654->1646 1659 5f4a96-5f4a9e 1655->1659 1656->1657 1660 5f4a2c-5f4a3e call 5f4cae 1656->1660 1657->1655 1658 5f4a51-5f4a6b call 5f4e59 1657->1658 1658->1659 1663 5f4ada 1659->1663 1664 5f4aa0-5f4aa6 1659->1664 1660->1650 1663->1651 1667 5f4abe-5f4ac2 1664->1667 1668 5f4aa8-5f4abc call 5f4ae3 1664->1668 1669 5f4ad5-5f4ad7 1667->1669 1670 5f4ac4-5f4ad2 call 614a10 1667->1670 1668->1650 1669->1663 1670->1669
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: O_
                          • API String ID: 0-2128823147
                          • Opcode ID: c5f0ec7b1c6fc88c5d3552c0a52f83b287307c3b3ab2d58feece3c7eb62e9dd7
                          • Instruction ID: 1626921da8c42e604611b2bb99c594bcf26711910522ccb0e1e1e219ed5d14a1
                          • Opcode Fuzzy Hash: c5f0ec7b1c6fc88c5d3552c0a52f83b287307c3b3ab2d58feece3c7eb62e9dd7
                          • Instruction Fuzzy Hash: 6E51A070A0010CAFDB14CF58C885ABBBFB6FF89364F248158E9899B252D2759E41CF94

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1675 5fe4cc-5fe4f0 CreateFileW
                          APIs
                          • CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000), ref: 005FE4E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID: -_
                          • API String ID: 823142352-366110843
                          • Opcode ID: 7efdeef83c5fd10c923e3c940ec20b2c2a22c038daffbfa16762055254062c6f
                          • Instruction ID: d4ec3953310a42f1145e6c9d46ee810abcd2f47364c341068cdf969d7cebf13a
                          • Opcode Fuzzy Hash: 7efdeef83c5fd10c923e3c940ec20b2c2a22c038daffbfa16762055254062c6f
                          • Instruction Fuzzy Hash: 10D06C3200010DFBDF028F84DC06EDA3BAAFB88724F018010BE1856020C732E861EB90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1676 604b12-604b26 call 60a6de 1679 604b28-604b2a 1676->1679 1680 604b2c-604b34 1676->1680 1683 604b7a-604b9a call 60a64d 1679->1683 1681 604b36-604b3d 1680->1681 1682 604b3f-604b42 1680->1682 1681->1682 1687 604b4a-604b5e call 60a6de * 2 1681->1687 1685 604b60-604b70 call 60a6de FindCloseChangeNotification 1682->1685 1686 604b44-604b48 1682->1686 1692 604bac 1683->1692 1693 604b9c-604baa call 5fd208 1683->1693 1685->1679 1695 604b72-604b78 GetLastError 1685->1695 1686->1685 1686->1687 1687->1679 1687->1685 1697 604bae-604bb1 1692->1697 1693->1697 1695->1683
                          APIs
                          • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,006049F9,00000000,CF830579,00641140,0000000C,00604AB5,005F8BBD,?), ref: 00604B68
                          • GetLastError.KERNEL32(?,006049F9,00000000,CF830579,00641140,0000000C,00604AB5,005F8BBD,?), ref: 00604B72
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ChangeCloseErrorFindLastNotification
                          • String ID:
                          • API String ID: 1687624791-0
                          • Opcode ID: 3d9ce4fbcdb03520ecb0a5912ac885b713a4830c7c0afca97f1f0e1ace3bba7c
                          • Instruction ID: c10d4ba88b41c38f99e868d3ce223be98d395987f124be8c56ebbeacbc602431
                          • Opcode Fuzzy Hash: 3d9ce4fbcdb03520ecb0a5912ac885b713a4830c7c0afca97f1f0e1ace3bba7c
                          • Instruction Fuzzy Hash: 9F112532AD42145AC73C2774A945BBF7B5B8B867B4F29021DFA088B2D2EF22DC418159

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1701 5fe05c-5fe074 call 60a6de 1704 5fe08a-5fe0a0 SetFilePointerEx 1701->1704 1705 5fe076-5fe07d 1701->1705 1707 5fe0b5-5fe0bf 1704->1707 1708 5fe0a2-5fe0b3 GetLastError call 5fd208 1704->1708 1706 5fe084-5fe088 1705->1706 1709 5fe0db-5fe0de 1706->1709 1707->1706 1711 5fe0c1-5fe0d6 1707->1711 1708->1706 1711->1709
                          APIs
                          • SetFilePointerEx.KERNELBASE(00000000,00000000,00640DF8,0051A3EB,00000002,0051A3EB,00000000,?,?,?,005FE166,00000000,?,0051A3EB,00000002,00640DF8), ref: 005FE098
                          • GetLastError.KERNEL32(0051A3EB,?,?,?,005FE166,00000000,?,0051A3EB,00000002,00640DF8,00000000,0051A3EB,00000000,00640DF8,0000000C,005F915E), ref: 005FE0A5
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 93cdd5da7aea4e9ef497547a5c686bf92fa3bf4d0ebb8168052cd25fc50d6389
                          • Instruction ID: 2ff2419506d98a44966b5bbe1b925a6fa90e768581c1e160a5e87b6d4cacebb8
                          • Opcode Fuzzy Hash: 93cdd5da7aea4e9ef497547a5c686bf92fa3bf4d0ebb8168052cd25fc50d6389
                          • Instruction Fuzzy Hash: E2012B36610109AFCF058F65CC0ACAF3F2AFB85324B240248F9119B1E1EA71ED41CBD0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1713 51a210-51a2ab call 5ef290 call 512ae0 1718 51a2b0-51a2bb 1713->1718 1718->1718 1719 51a2bd-51a2c8 1718->1719 1720 51a2ca 1719->1720 1721 51a2cd-51a2de call 5f5362 1719->1721 1720->1721 1724 51a351-51a357 1721->1724 1725 51a2e0-51a305 call 5f9136 call 5f4eeb call 5f9136 1721->1725 1726 51a381-51a393 1724->1726 1727 51a359-51a365 1724->1727 1741 51a307 1725->1741 1742 51a30c-51a316 1725->1742 1729 51a377-51a37e call 5ef511 1727->1729 1730 51a367-51a375 1727->1730 1729->1726 1730->1729 1732 51a394-51a399 call 5f47b0 1730->1732 1741->1742 1743 51a328-51a32f call 57cf60 1742->1743 1744 51a318-51a31c 1742->1744 1748 51a334-51a33a 1743->1748 1745 51a320-51a326 1744->1745 1746 51a31e 1744->1746 1745->1748 1746->1745 1749 51a33c 1748->1749 1750 51a33e-51a349 call 5fdbdf call 5f8be8 1748->1750 1749->1750 1754 51a34e 1750->1754 1754->1724
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __fread_nolock
                          • String ID:
                          • API String ID: 2638373210-0
                          • Opcode ID: b4786ccb5abc9ce717ff485e748ee77bf778934dad8dbca2040e27a9d6ecf089
                          • Instruction ID: f454b76df3c6e6b47d09ca7971dfbfa404390bf54b9db760909911edbbf78c03
                          • Opcode Fuzzy Hash: b4786ccb5abc9ce717ff485e748ee77bf778934dad8dbca2040e27a9d6ecf089
                          • Instruction Fuzzy Hash: D44126709012059FEB15DF68C849BAEBFF4FF41700F20896DF5159B282D7B99981CB92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1755 580560-58057f 1756 5806a9 call 512270 1755->1756 1757 580585-580598 1755->1757 1761 5806ae call 5121d0 1756->1761 1758 58059a 1757->1758 1759 5805c0-5805c8 1757->1759 1764 58059c-5805a1 1758->1764 1762 5805ca-5805cf 1759->1762 1763 5805d1-5805d5 1759->1763 1769 5806b3-5806b8 call 5f47b0 1761->1769 1762->1764 1766 5805d9-5805e1 1763->1766 1767 5805d7 1763->1767 1768 5805a4-5805a5 call 5ef290 1764->1768 1770 5805f0-5805f2 1766->1770 1771 5805e3-5805e8 1766->1771 1767->1766 1773 5805aa-5805af 1768->1773 1776 580601 1770->1776 1777 5805f4-5805ff call 5ef290 1770->1777 1771->1761 1775 5805ee 1771->1775 1773->1769 1778 5805b5-5805be 1773->1778 1775->1768 1781 580603-580629 1776->1781 1777->1781 1778->1781 1783 58062b-580655 call 5f0f70 call 5f14f0 1781->1783 1784 580680-5806a6 call 5f0f70 call 5f14f0 1781->1784 1793 580669-58067d call 5ef511 1783->1793 1794 580657-580665 1783->1794 1794->1769 1795 580667 1794->1795 1795->1793
                          APIs
                          • Concurrency::cancel_current_task.LIBCPMT ref: 005806AE
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Concurrency::cancel_current_task
                          • String ID:
                          • API String ID: 118556049-0
                          • Opcode ID: 5b8477abd5dfbafd0efb1f6b93b48d469f4d73f05dc056d89ab6e976788f4514
                          • Instruction ID: f4df40b54ea0e01903499650bc81dd24ea63272c68eae7a981902edc8bdabf84
                          • Opcode Fuzzy Hash: 5b8477abd5dfbafd0efb1f6b93b48d469f4d73f05dc056d89ab6e976788f4514
                          • Instruction Fuzzy Hash: D041E372A001199BCB15EF69DC806AE7FA5BF88350F140569FC05EB382E730DD648BE1
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __wsopen_s
                          • String ID:
                          • API String ID: 3347428461-0
                          • Opcode ID: 8724513643eea024314cd992aba80936861fde2c76bcb2830cae26b6e57b53eb
                          • Instruction ID: e2ec2eeca04dbcec3af327adc70d07eb0f27b612226570652ba90cce4d3ed369
                          • Opcode Fuzzy Hash: 8724513643eea024314cd992aba80936861fde2c76bcb2830cae26b6e57b53eb
                          • Instruction Fuzzy Hash: C61145B1A0020AAFCB09DF58E9459DB7BF5EF48308F104069F808EB351D630EA21CBA4
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,0060D635,4D88C033,?,0060D635,00000220,?,006057EF,4D88C033), ref: 00606E5F
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: f277032d07f74d98d26ee67a4081d6e3cf48d9ad72ec3fcc61f729327466e9ae
                          • Instruction ID: 405eab3e05091c55a44e066254b1307802ad3694a5dfa42e2ccc3a23f6b6e793
                          • Opcode Fuzzy Hash: f277032d07f74d98d26ee67a4081d6e3cf48d9ad72ec3fcc61f729327466e9ae
                          • Instruction Fuzzy Hash: FFE0E5391C87255ADB382A65DC0479B7B5B9B817E1F040121FD05D62D1CB20CD2081E8
                          APIs
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0056B6A4
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateDirectory
                          • String ID: $ $-$-$\$\$\$\$\$\$\$\$\$\$\$_$_$_$type must be boolean, but is
                          • API String ID: 4241100979-3297522916
                          • Opcode ID: 74a2649cc73b63e85cbb92f078080c665b0e644dc4d3d35cf837e04065200db4
                          • Instruction ID: d24c8ae9fb2ca65fd9d65074adc5e14bd2aacf0b955cc93019a63677e7ec256f
                          • Opcode Fuzzy Hash: 74a2649cc73b63e85cbb92f078080c665b0e644dc4d3d35cf837e04065200db4
                          • Instruction Fuzzy Hash: A0F3CA709042598FEB29CF28CC997EEBFB5BF45304F1481E9D049A7292EB709A85CF51
                          APIs
                          • FindFirstFileA.KERNEL32(?,?,?,BEBDB8CD,?,?,BEBDB8CD,BEBDB8CE), ref: 0051E29B
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileFindFirst
                          • String ID: .$\$y
                          • API String ID: 1974802433-705995259
                          • Opcode ID: d5cf5c937341de7555c206c065dd4ed148498b14d134b9fa0f6b233247d5766d
                          • Instruction ID: 0debe1d1cefbe2e016e1a1b6a5c0d7a2f3d86c31578789a040498b0f3841bbd5
                          • Opcode Fuzzy Hash: d5cf5c937341de7555c206c065dd4ed148498b14d134b9fa0f6b233247d5766d
                          • Instruction Fuzzy Hash: 96D21770D002499BEF18DFA8DC8A6EDBF76BF55300F14826CE855A7292E7309A85CB51
                          APIs
                          • RegOpenKeyExA.ADVAPI32(80000002,C0D5DDC2,00000000,00020019,00000000), ref: 0051C6DD
                          • RegQueryValueExA.ADVAPI32(00000000,FCF0F3DC,00000000,00020019,?,00000400), ref: 0051C753
                          • RegCloseKey.ADVAPI32(00000000), ref: 0051C788
                          • GetCurrentHwProfileA.ADVAPI32(?), ref: 0051C82F
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCurrentOpenProfileQueryValue
                          • String ID: 1.8$?$@$Maestro_build
                          • API String ID: 1240309278-2215060601
                          • Opcode ID: 74622d2d23146962ea74465dab412a5a05e0b8a596b50d840ed6e11caf542412
                          • Instruction ID: 965cbe2944e9e4dca211cb5164a7a934ebb86f62df10307db8c94f357ab5bea7
                          • Opcode Fuzzy Hash: 74622d2d23146962ea74465dab412a5a05e0b8a596b50d840ed6e11caf542412
                          • Instruction Fuzzy Hash: 90E226B180422D9EEF20DF60DC49BEEBBB9BF54304F4440D9E549A6242EB715B89CF61
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?), ref: 0054E327
                          • GetFileAttributesA.KERNEL32(?,?,F8F6C6CE,?,?), ref: 0054E449
                          • GetLastError.KERNEL32(?,F8F6C6CE,?,?), ref: 0054E456
                          • __Mtx_unlock.LIBCPMT ref: 0054E475
                          • GetFileAttributesA.KERNEL32(?,F5F7E6CE,?,?,F8F6C6CE,?,?), ref: 0054E540
                          • GetLastError.KERNEL32(?,?,F8F6C6CE,?,?), ref: 0054E547
                          • __Mtx_unlock.LIBCPMT ref: 0054E566
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesErrorFileLastMtx_unlock$FolderPath
                          • String ID: .$\$\$\$\$s$s
                          • API String ID: 3673586248-1144724142
                          • Opcode ID: c5b35c3c0de7a5c6547ee5e1fc31e57aadc931bfb04b53c93f4a64a620e158f6
                          • Instruction ID: 10219ed061191ef3858e1867691b92154a9b46c4a14170a9559d69b539a6b69c
                          • Opcode Fuzzy Hash: c5b35c3c0de7a5c6547ee5e1fc31e57aadc931bfb04b53c93f4a64a620e158f6
                          • Instruction Fuzzy Hash: A8F2B0709002598FDB28CF68CC99BEDBFB5BF45304F1482E9E449A7282E7749A85CF51
                          APIs
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0055457D
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0055465A
                          • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 005548B7
                          • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 005549C7
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CopyCreateDirectoryFile
                          • String ID: l
                          • API String ID: 3761107634-2517025534
                          • Opcode ID: 9c06706c2e23829d60ad9b4cec8d8e09c6fc4ee4b66e1d4e4f4e4dd47470083b
                          • Instruction ID: 9efe3b6ca018ca63d62c6543126ce19b4ca8f299d242fdeb64662cce40c495bc
                          • Opcode Fuzzy Hash: 9c06706c2e23829d60ad9b4cec8d8e09c6fc4ee4b66e1d4e4f4e4dd47470083b
                          • Instruction Fuzzy Hash: 66F29174C042599AEF25EB60DC5ABEDBB75BF54304F0481D9D84967282EB701BC8CFA2
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Concurrency::cancel_current_task
                          • String ID: Maestro_build$P
                          • API String ID: 118556049-1949223644
                          • Opcode ID: b98a9700821180d8546c6a2616d5c088904ad59dd7e02ab2e14466a7b202e238
                          • Instruction ID: 911f59d124184d0b2fafd50eb57e465d0cdd164d5b6a234b0341ae034b03c148
                          • Opcode Fuzzy Hash: b98a9700821180d8546c6a2616d5c088904ad59dd7e02ab2e14466a7b202e238
                          • Instruction Fuzzy Hash: 29537D7081425D9ADF25EB64DC6ABEDBB78BF54304F4440D9E84963282EB701F89CF62
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0054B596
                          • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 0054B6B5
                          • GetPrivateProfileStringA.KERNEL32(?,FCE7F3C1,00000000,?,00000104,?), ref: 0054B76A
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfile$FolderNamesPathSectionString
                          • String ID: %IUL$)$/$1S@W$423-$LX+N$T.ft$\$\
                          • API String ID: 1539182551-1036846380
                          • Opcode ID: 26aa1a02f0b41a2cf7c5e3ea8f631e0bc8666d7ca988c272212ee01ae794d59a
                          • Instruction ID: f9df44f6845e5c32539d2e11733de2cdd82c46e1597fdae863865555bcb9db57
                          • Opcode Fuzzy Hash: 26aa1a02f0b41a2cf7c5e3ea8f631e0bc8666d7ca988c272212ee01ae794d59a
                          • Instruction Fuzzy Hash: EAC2B0709042599FDB28CF28CC99BEDBFB5BF45308F1445E9E449AB282DB709A84CF51
                          APIs
                          • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00647420,00000000), ref: 0055130F
                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 0055134A
                          • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 00551375
                          • RegQueryValueExA.ADVAPI32(?,FDF2FFD4,00000000,00000001,?,00000104), ref: 00551475
                          • RegQueryValueExA.ADVAPI32(?,C4D2DFD8,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 005515BF
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 00551610
                          • RegQueryValueExA.ADVAPI32(?,C4D2DFD8,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 005516BC
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 00551717
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 00551772
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 005517C9
                          • RegCloseKey.ADVAPI32(?), ref: 0055204D
                          • RegEnumKeyA.ADVAPI32(?,00000001,?,00000104), ref: 0055207C
                          • RegCloseKey.ADVAPI32(?), ref: 00552090
                          Strings
                          • cannot use operator[] with a string argument with , xrefs: 005520EB
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: QueryValue$CloseEnumOpen
                          • String ID: cannot use operator[] with a string argument with
                          • API String ID: 2041898428-2766135566
                          • Opcode ID: a3ebc4535adffc76adf3b3738b3dcd7947c2baccb1005750a0726a6149ebcf53
                          • Instruction ID: 32be46e609e94597c80adf459f73f746bb7487762cc4922aae0d6a0e24e7ac66
                          • Opcode Fuzzy Hash: a3ebc4535adffc76adf3b3738b3dcd7947c2baccb1005750a0726a6149ebcf53
                          • Instruction Fuzzy Hash: 94928A708002599EDB25DF64CC59BEEBFB8BF59304F1081DAD449A7282EB715B88CF61
                          APIs
                          • GetPrivateProfileStringA.KERNEL32(?,FCE7F3C1,00000000,?,00000104,?), ref: 0054B76A
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID: %IUL$)$/$1S@W$423-$LX+N$T.ft$\$\
                          • API String ID: 1096422788-1036846380
                          • Opcode ID: b54c9da0e3bbc1a0ff2ac293fad0b28825219f0303064f449dd2ad3e9cc7c595
                          • Instruction ID: 8e9e0f9f49cfea2b31dd46c4c68097962cea160601d96ba0ad23ad3ed197763e
                          • Opcode Fuzzy Hash: b54c9da0e3bbc1a0ff2ac293fad0b28825219f0303064f449dd2ad3e9cc7c595
                          • Instruction Fuzzy Hash: 4FA2AE709042599FDB68CF28CC98BEDBFB5BF85308F1445D9D449AB282DB709A84CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: $+$+Inf$-Inf$-x0$0123456789ABCDEF0123456789abcdef$Inf$NaN$gfff
                          • API String ID: 0-3242634575
                          • Opcode ID: 6be73e1bee1737f9b0bf3526189eda0d078409bb85fa4aed6e23f403afaaf2ef
                          • Instruction ID: 9339eb918f032133901ee87b91e32ea65193c69ed80769c87147ffc464a990b4
                          • Opcode Fuzzy Hash: 6be73e1bee1737f9b0bf3526189eda0d078409bb85fa4aed6e23f403afaaf2ef
                          • Instruction Fuzzy Hash: F8821371A187828BD7268F28C49436FBFE0BBC7344F185D9DE4C597292E635C949CB82
                          APIs
                          • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00647420,00000000), ref: 0055130F
                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 0055134A
                          • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 00551375
                          • RegQueryValueExA.ADVAPI32(?,FDF2FFD4,00000000,00000001,?,00000104), ref: 00551475
                          • RegQueryValueExA.ADVAPI32(?,C4D2DFD8,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 005515BF
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 00551610
                          • RegQueryValueExA.ADVAPI32(?,C4D2DFD8,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 005516BC
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 00551717
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 00551772
                          • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 005517C9
                          • RegEnumKeyA.ADVAPI32(?,00000001,?,00000104), ref: 0055207C
                          • RegCloseKey.ADVAPI32(?), ref: 00552090
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: QueryValue$EnumOpen$Close
                          • String ID:
                          • API String ID: 2931576859-0
                          • Opcode ID: 3185b2f9e022a0e4281c119b5001ebfdd72a5f3e711a130f6d454c0ad398a34f
                          • Instruction ID: bf7cffb422b052b17d279f819b1ccb2c4d0dc993a821bca3202a459963db6f85
                          • Opcode Fuzzy Hash: 3185b2f9e022a0e4281c119b5001ebfdd72a5f3e711a130f6d454c0ad398a34f
                          • Instruction Fuzzy Hash: FA828C708002599EDB25CF64CC59BEEBFB8BF59304F1041EAD549A7282EB745B88CF61
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,00000000), ref: 0053C54A
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FolderPath
                          • String ID: A$\$\$\$\$\$\$\$cannot use operator[] with a string argument with
                          • API String ID: 1514166925-727479227
                          • Opcode ID: 2b9d0cd6590cfde177b2f0c86f81aa106fa5901ae1f0a707f6768f6b5ed6ef50
                          • Instruction ID: 68f6583f34444414230fd5932c8409c5f04c29849d20f0eaab03894cc716c804
                          • Opcode Fuzzy Hash: 2b9d0cd6590cfde177b2f0c86f81aa106fa5901ae1f0a707f6768f6b5ed6ef50
                          • Instruction Fuzzy Hash: 50339F719002598FDB28DF68CC897EEBFB5BF45304F1481D9E449A7282D770AA85CFA1
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00519283
                          • Process32First.KERNEL32(00000000,00000128), ref: 00519293
                          • Process32Next.KERNEL32(00000000,00000128), ref: 005192B0
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process32$CreateFirstNextSnapshotToolhelp32
                          • String ID: /$/\/$\$k:R
                          • API String ID: 1238713047-4104199226
                          • Opcode ID: a5532653b63562a5f2077e431d5726220666d687bdcd84f60ada98ca753d347d
                          • Instruction ID: 34c8f9642be17b32a3256bc95882219b530ac5a1136b3e202f5b2f5ba3852d2f
                          • Opcode Fuzzy Hash: a5532653b63562a5f2077e431d5726220666d687bdcd84f60ada98ca753d347d
                          • Instruction Fuzzy Hash: 7892F571D002499FEF19CFA8C8A46EEBFB5BF45314F14426DD445AB282E7305E86CBA1
                          APIs
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 005955FC
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 0059563E
                          • GetProcAddress.KERNEL32(00000000,E4E7E6D9), ref: 00595686
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 005956C7
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 00595708
                          • GetProcAddress.KERNEL32(00000000,E4E7E6D9), ref: 00595746
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 0059578E
                          • GetProcAddress.KERNEL32(00000000,E4E7E6D9), ref: 005957D6
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 00595817
                          • GetProcAddress.KERNEL32(00000000,F1E7FCD8), ref: 0059585D
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc
                          • String ID:
                          • API String ID: 190572456-0
                          • Opcode ID: 4b754765c7de2766ed18039b3f4a1b09bc732e9621cc5057ea13f0b15216dd1e
                          • Instruction ID: d295fe6d2213ccf14067a8061b50dd42fd58c7a2cb02a829134d74316b2cf658
                          • Opcode Fuzzy Hash: 4b754765c7de2766ed18039b3f4a1b09bc732e9621cc5057ea13f0b15216dd1e
                          • Instruction Fuzzy Hash: 878192B481429C9EDF19CFA4D445AEEBFB9FF06304F5080AED441AB641E378430ACB66
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: +$,$-$.$.,+-$>$@$@$H$Q
                          • API String ID: 0-262771488
                          • Opcode ID: 2bb66d51075f4c401b0db156811db391b67e66e397475115847e4b2db615038b
                          • Instruction ID: 8752559fba0ace90c3a357913066fd11b23a9f1e9c103f160f80f9d3d9435b13
                          • Opcode Fuzzy Hash: 2bb66d51075f4c401b0db156811db391b67e66e397475115847e4b2db615038b
                          • Instruction Fuzzy Hash: 3C13A870A00685CFCB28DF59C480BAABBB1FF48348F15819DD985AB392E775E915CF90
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: $-$-$;$\$\$\$authorization: $cannot use operator[] with a string argument with
                          • API String ID: 1646373207-2790917795
                          • Opcode ID: a0704703ff41f95840d6c1a40cf62073c665fc4bb64bed1915ae0f7227094da3
                          • Instruction ID: 1726c2c7295f21a312b46300aecbc9cf27d7f63e3f92ad48f9d3303e9e22e77a
                          • Opcode Fuzzy Hash: a0704703ff41f95840d6c1a40cf62073c665fc4bb64bed1915ae0f7227094da3
                          • Instruction Fuzzy Hash: 3402D170D002498FDB08DFA8D8897DEBFB5BF49304F14816DE41AEB682D7349984CB95
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: !kg$$%$DUD$\$\
                          • API String ID: 0-1765724623
                          • Opcode ID: 28cbaa501cdcaaacbe9a262be1a7b512847423d18e0189d29e2302b6db6c2d5a
                          • Instruction ID: 8f4323a8f7dc29b35ca56e3d2402a3b31bdf1748558a5be058b9bb353037299f
                          • Opcode Fuzzy Hash: 28cbaa501cdcaaacbe9a262be1a7b512847423d18e0189d29e2302b6db6c2d5a
                          • Instruction Fuzzy Hash: D3A29F719002598FEB29CF68CC947EEBFB1BF45300F148299E549AB382D7749A85CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: "$@$\
                          • API String ID: 0-2984034985
                          • Opcode ID: 530ea1cf219928335f19f711fd8fe7888f8fd1fb243b39c807b7645a5d823a5e
                          • Instruction ID: 299d13d077eb9e1e02f20bf93c75fc29995f88e9131dcaa4ba4ce054d5853ad4
                          • Opcode Fuzzy Hash: 530ea1cf219928335f19f711fd8fe7888f8fd1fb243b39c807b7645a5d823a5e
                          • Instruction Fuzzy Hash: 76629BB08042688AEF29CB28CC587DEBFB5BF45304F1441EDD04AA7292DB755B89CF56
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: )iyi$3$CTHE$`of$$f$ig{O$rsap
                          • API String ID: 0-3302844315
                          • Opcode ID: 6255c12e757de48f8cdf6573ca1ec0f952f70c51e66f426cca9b6f063774671b
                          • Instruction ID: dce13b608b115a52cecd379d7084ea7b93ab151eefb2b4a18366fa114fe02687
                          • Opcode Fuzzy Hash: 6255c12e757de48f8cdf6573ca1ec0f952f70c51e66f426cca9b6f063774671b
                          • Instruction Fuzzy Hash: E213CDB0D042598BDB25DF24C8897EEBFB4BF55304F1481E9D449A7282DB349B89CF91
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00610738
                          • IsValidCodePage.KERNEL32(00000000), ref: 00610776
                          • IsValidLocale.KERNEL32(?,00000001), ref: 00610789
                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 006107D1
                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 006107EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                          • String ID: `Db
                          • API String ID: 415426439-2151651399
                          • Opcode ID: a774324960514bf7e47775b86eee49274d3166e292b8f3856b81aec5450ae46d
                          • Instruction ID: cea180f9ada95ffaab8fc2f0e31e664feea79005358fe1332d94b11a1dc7d497
                          • Opcode Fuzzy Hash: a774324960514bf7e47775b86eee49274d3166e292b8f3856b81aec5450ae46d
                          • Instruction Fuzzy Hash: 0E518471A04205AFEF50DFA4CC41AEF77BABF48700F184469E515E7291DBB1A9C4CB64
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,FBE7E7F0), ref: 00533453
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FolderPath
                          • String ID: &$\$\$cannot use operator[] with a string argument with
                          • API String ID: 1514166925-52429261
                          • Opcode ID: 5f919d01a9d6b41b5ab30d5ceab17a2acfda4c3d86bdfcc93d922ec34dccf0a5
                          • Instruction ID: 033a29b7cb64f61e935033b811d2884b7fd150a0db67442f7ad7a0392ea486c1
                          • Opcode Fuzzy Hash: 5f919d01a9d6b41b5ab30d5ceab17a2acfda4c3d86bdfcc93d922ec34dccf0a5
                          • Instruction Fuzzy Hash: F6E2AF719002598FDF28CF68CC997EDBFB5BF45300F1481A9E449AB282D774AA85CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: $$,$,$.$.$type must be boolean, but is
                          • API String ID: 0-4086305923
                          • Opcode ID: 418949fa4a9cd8fb4a894cc4d4efc4ff38dd95366f4bf337d2086056cd9473be
                          • Instruction ID: ac7e200bfb6a209bebd9599cde24b37e439dee2344eb2631c99865d0ad68e111
                          • Opcode Fuzzy Hash: 418949fa4a9cd8fb4a894cc4d4efc4ff38dd95366f4bf337d2086056cd9473be
                          • Instruction Fuzzy Hash: 7313CD709002698FEB29DF68D858BEDBFB4BF46300F1481D9D449AB292DB319E84CF51
                          APIs
                          • GetLocaleInfoW.KERNEL32(?,2000000B,00610766,00000002,00000000,?,?,?,00610766,?,00000000), ref: 006104ED
                          • GetLocaleInfoW.KERNEL32(?,20001004,00610766,00000002,00000000,?,?,?,00610766,?,00000000), ref: 00610516
                          • GetACP.KERNEL32(?,?,00610766,?,00000000), ref: 0061052B
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale
                          • String ID: ACP$OCP
                          • API String ID: 2299586839-711371036
                          • Opcode ID: 8779f752ec26bc537e469adf8f0eb0d9de74fac0e04ab07ea39aed8d74cc262e
                          • Instruction ID: 6921c22a5b73752f2e79181c7c085aa43c13f970720e2cf6a69524655fe3ab9a
                          • Opcode Fuzzy Hash: 8779f752ec26bc537e469adf8f0eb0d9de74fac0e04ab07ea39aed8d74cc262e
                          • Instruction Fuzzy Hash: E221B622700105E6FF308F64DA41AEB76E7AF54B64B5E8474EA0ADB214EBB2DDC1C750
                          APIs
                          • InternetCloseHandle.WININET(?), ref: 00595403
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,74DEF380), ref: 00595475
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,74DEF380), ref: 0059548C
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,74DEF380), ref: 005954A5
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CharNext$CloseHandleInternet
                          • String ID:
                          • API String ID: 581584189-0
                          • Opcode ID: 7d28dc5c691a0dd1b4395843922dd54029e115c9f1ffaa38c874db2298a0954c
                          • Instruction ID: 89a3e24a2ad303a942da38ddaa8079e7779fe52c009ba1fb59335f1ce82a20c5
                          • Opcode Fuzzy Hash: 7d28dc5c691a0dd1b4395843922dd54029e115c9f1ffaa38c874db2298a0954c
                          • Instruction Fuzzy Hash: 3E81DF71A0060AABDF15CFA9DC51BEEBFB9FF49340F144069E908A3251E7709E518BA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: %$\$\$\$\
                          • API String ID: 0-255543811
                          • Opcode ID: dd5eed4a0ef1eda8ba3aa38720e934a229a48d1d32dd810ec5e9faafe38897d0
                          • Instruction ID: 344c74aec86082ad30959ca54e5c2aa36017a362d37338dd48ca4bb9056809f9
                          • Opcode Fuzzy Hash: dd5eed4a0ef1eda8ba3aa38720e934a229a48d1d32dd810ec5e9faafe38897d0
                          • Instruction Fuzzy Hash: 42D2AB709002598FDB29CF68DC897EEBFB5BF55300F1482E9E449AB282D7709A85CF51
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: %$\$\$\$\
                          • API String ID: 0-255543811
                          • Opcode ID: 194f852d9f900e6856e58e1955b4a8309c3c9e2d569060910bc6e0ea46588792
                          • Instruction ID: 23dafe3da46321ba2ca9f08064dc8ae32f917759a6b1a352f263b4b4100321f0
                          • Opcode Fuzzy Hash: 194f852d9f900e6856e58e1955b4a8309c3c9e2d569060910bc6e0ea46588792
                          • Instruction Fuzzy Hash: 92D2AB709002598FDB29CF68DC897EEBFB5BF55300F1482E9E449AB282D7709A85CF51
                          APIs
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0055B5E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FolderPath
                          • String ID: *
                          • API String ID: 1514166925-163128923
                          • Opcode ID: a8276e29d583391688afec0868f2c6a59796de8620cb59e0451e5a6b2eadf4a4
                          • Instruction ID: 262b3f29bf6feb708f3cc44f07279391231cba88545f761de1733d69757f3836
                          • Opcode Fuzzy Hash: a8276e29d583391688afec0868f2c6a59796de8620cb59e0451e5a6b2eadf4a4
                          • Instruction Fuzzy Hash: 6D42B071D002489FEF18CFA8D8987EDBFB5BF45300F2481AED859A7282E7715A49CB51
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                          • Instruction ID: fa72119d763c41ce507c4b5e08828b50c96f072b29f168590d063ceb56f1789b
                          • Opcode Fuzzy Hash: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                          • Instruction Fuzzy Hash: CF023C71E012199BDF14CFA9C9806BEFBF1FF88314F248669D619E7381DB35A9418B90
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressConcurrency::cancel_current_taskHandleModuleProc
                          • String ID: C$Content-Type: application/x-www-form-urlencoded$https://ipinfo.io/$https://www.maxmind.com/en/locate-my-ip-address
                          • API String ID: 2385143733-2400714340
                          • Opcode ID: a4d9850abf7888587847929ef497dce24d0e2f451c3598609469d549ffb619b8
                          • Instruction ID: d8432a5da1ae175fc55bdda7341a7f5c057a8cbdde4add86962f88158ce2db84
                          • Opcode Fuzzy Hash: a4d9850abf7888587847929ef497dce24d0e2f451c3598609469d549ffb619b8
                          • Instruction Fuzzy Hash: 03C28B709042699ADF24EB64DC5ABEEBF75BF95304F0440D8E44977282EB701B89CF62
                          APIs
                          • CreateFileW.KERNEL32(00000000,?,00000003,00000000,?,?,00000000), ref: 005A4208
                          • CreateFileA.KERNEL32(00000000,?,00000003,00000000,?,?,00000000), ref: 005A4210
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 79ba54dee12a99d5e1f57adf10db26b1d13320eb8772cbdecd632756f3e3447e
                          • Instruction ID: 3676b17facff502085dcb45424836d17350e3ee2611662772394f07abfecafd0
                          • Opcode Fuzzy Hash: 79ba54dee12a99d5e1f57adf10db26b1d13320eb8772cbdecd632756f3e3447e
                          • Instruction Fuzzy Hash: A071EDB16043018BDB10CF68D845BAFBBE9FFC6314F04492EF99986251E775C985CB92
                          APIs
                          • GetSystemTime.KERNEL32(?), ref: 005A468A
                          • GetCurrentProcessId.KERNEL32 ref: 005A46B5
                          • GetTickCount.KERNEL32 ref: 005A46CA
                          • QueryPerformanceCounter.KERNEL32(?), ref: 005A46E1
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CountCounterCurrentPerformanceProcessQuerySystemTickTime
                          • String ID:
                          • API String ID: 4122616988-0
                          • Opcode ID: 97fe228d6c22aeb01a6a25a303f63774e305b3b128eecb279eae291899a5a0ae
                          • Instruction ID: 48371d23f9f3a07e7bd576459557e1182cf3547f86edcaf45f2c2e9010a357fc
                          • Opcode Fuzzy Hash: 97fe228d6c22aeb01a6a25a303f63774e305b3b128eecb279eae291899a5a0ae
                          • Instruction Fuzzy Hash: 10115B76A00628DBCB10CFA8D8885DDFBF5FB4A320B448476EC49D7315D631E941CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: "$\$\$\
                          • API String ID: 0-2102624741
                          • Opcode ID: 6ed92f3a8db808a27ad8e8535da3ee69adc9f5ac005cdb7611c68b15107d5d8a
                          • Instruction ID: dc92eacf9792847825e59d1aca090d51c1f0f2732aafd9ef451bd24d1e2e8d39
                          • Opcode Fuzzy Hash: 6ed92f3a8db808a27ad8e8535da3ee69adc9f5ac005cdb7611c68b15107d5d8a
                          • Instruction Fuzzy Hash: 7382BC709002698BDB18CF68CC897EDBFB5BF45308F5482DDE449AB692D7706B85CB90
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0061012C
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00610176
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0061023C
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale$ErrorLast
                          • String ID:
                          • API String ID: 661929714-0
                          • Opcode ID: ea1edd574c659cbbff25b15299977892a1982ce7fcb8ee6de896cd842c47c802
                          • Instruction ID: acff281ffb4f7c04b33e7ba8199395a31f602d0a8f58c8705136e7de43cac57e
                          • Opcode Fuzzy Hash: ea1edd574c659cbbff25b15299977892a1982ce7fcb8ee6de896cd842c47c802
                          • Instruction Fuzzy Hash: 7C61A07154420B9FEF68DF24CC86BEA77AAEF14300F18416AE915C6689F7B4DAC1CB50
                          APIs
                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 005F469C
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 005F46A6
                          • UnhandledExceptionFilter.KERNEL32(005F4484,?,?,?,?,?,00000000), ref: 005F46B3
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                          • String ID:
                          • API String ID: 3906539128-0
                          • Opcode ID: 3e5dd56b1fb5298e7fb7ab45f600f5bf7168b0abf22b21694986f8e3c7a7ff96
                          • Instruction ID: 905088620edd0f85bb75edbfb52fa4982d2a50057dc8b094d84a935e8a6aaa62
                          • Opcode Fuzzy Hash: 3e5dd56b1fb5298e7fb7ab45f600f5bf7168b0abf22b21694986f8e3c7a7ff96
                          • Instruction Fuzzy Hash: 8031C37590122DABCB21DF64D8897DDBBB8BF48310F5041EAE50CA7251EB749F858F44
                          Strings
                          • invalid distance too far back, xrefs: 005994D9
                          • invalid distance code, xrefs: 005994C3
                          • invalid literal/length code, xrefs: 005994AA
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
                          • API String ID: 0-3255898291
                          • Opcode ID: e79e1e614b61c4b8435e2ccd599855c6680f9d307dc00e9d6710b568c99d3ff3
                          • Instruction ID: 77a11e599059b916f01e501a1d8551dbe1548a6263d35bbc6de10ef0a69f7a06
                          • Opcode Fuzzy Hash: e79e1e614b61c4b8435e2ccd599855c6680f9d307dc00e9d6710b568c99d3ff3
                          • Instruction Fuzzy Hash: 9DF16C71E002599FCF04CFADC5906ACBFF2FF99304B2485AED495AB342D635AA46CB50
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: z
                          • API String ID: 0-1657960367
                          • Opcode ID: 9b87f67ac102212b6fb959b30c056054221d409a6255cdafe151d50f5dfe12b9
                          • Instruction ID: 23fffd6a2e18449e0dc776b918d2be6d5f0b777395f723bbc7bac046a330addf
                          • Opcode Fuzzy Hash: 9b87f67ac102212b6fb959b30c056054221d409a6255cdafe151d50f5dfe12b9
                          • Instruction Fuzzy Hash: 2C4399B180426ADADF25EF68C8196EEBF75BF45300F4442C9D84937282D7711B89CFA2
                          APIs
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005A28FB
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005A294D
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                          • String ID:
                          • API String ID: 885266447-0
                          • Opcode ID: e1169bf2a2d88f9097cbc5291f777eb9e6fb9c7e2e75234ed14d65dbaf6a6de8
                          • Instruction ID: 1a288245f105955c42638d63c3b92732988b2e147f454b26f39e54aec7b28d5f
                          • Opcode Fuzzy Hash: e1169bf2a2d88f9097cbc5291f777eb9e6fb9c7e2e75234ed14d65dbaf6a6de8
                          • Instruction Fuzzy Hash: 96F1E271E0021A8BCF14CF5DD8912BDFFF2FB89310F1982AAE595AB291DB7549418B90
                          APIs
                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00530535
                          • LocalFree.KERNEL32(?), ref: 00530564
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CryptDataFreeLocalUnprotect
                          • String ID:
                          • API String ID: 1561624719-0
                          • Opcode ID: 0b81b86400fb19b0c18e7d408a73abd1e8b37d4cb140fcbbaa70da07f718e2da
                          • Instruction ID: 533ed626120b7f29397a842dcb3c38181b91d0bf0c4ca9f00f6c73a8ca9525a8
                          • Opcode Fuzzy Hash: 0b81b86400fb19b0c18e7d408a73abd1e8b37d4cb140fcbbaa70da07f718e2da
                          • Instruction Fuzzy Hash: E4E09B73D4021D16DF2096A49C55BEEBB68FB54761F015073ED49F6181D6254E048EE2
                          APIs
                          • GetSystemTimePreciseAsFileTime.KERNEL32(?,?,005EEC78,?,?,?,?,005240EB,?,00573C2E), ref: 005EF283
                          • GetSystemTimeAsFileTime.KERNEL32(?,?,?,005EEC78,?,?,?,?,005240EB,?,00573C2E), ref: 005EF287
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Time$FileSystem$Precise
                          • String ID:
                          • API String ID: 743729956-0
                          • Opcode ID: 0169edcfba86221f0bdc54baff4c70f354a88b29cfc713275bb8e683c312cc1e
                          • Instruction ID: 2d59f8a3579d4c648ca915ac350bcc63844a2a3133431e75e29c03c861c3550a
                          • Opcode Fuzzy Hash: 0169edcfba86221f0bdc54baff4c70f354a88b29cfc713275bb8e683c312cc1e
                          • Instruction Fuzzy Hash: 03D0223A5005B8E78B092FD1FC048DC7F2AFA0AB503088077FA0983124CF211C008BC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: +
                          • API String ID: 0-2126386893
                          • Opcode ID: 33d096c3b9e13fc021566d33fb60f7e95d58920849c9cd52ed11a8b7900c165d
                          • Instruction ID: 374603c5a67e8d60c14232c678459eda74b44ca88c802696e027eb6a3e68e53d
                          • Opcode Fuzzy Hash: 33d096c3b9e13fc021566d33fb60f7e95d58920849c9cd52ed11a8b7900c165d
                          • Instruction Fuzzy Hash: 43726C709002698FDB18CF68D8987DDBBB5BF46300F2482EDD059AB782E7749A85CF50
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: %s-mj%08X
                          • API String ID: 0-77246884
                          • Opcode ID: 448fc39f872702818dadb165210a53d9838cf7a70e9be67fe8432c37282cff97
                          • Instruction ID: 0dbe326acba404a3471f2d881f5791bbcd8aac032625ffafd9517a7fc1f43873
                          • Opcode Fuzzy Hash: 448fc39f872702818dadb165210a53d9838cf7a70e9be67fe8432c37282cff97
                          • Instruction Fuzzy Hash: DD126C70604B019FD764CF69C890BAABBE5FFC8314F54892DE99A87251DB31F841CB4A
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __allrem
                          • String ID:
                          • API String ID: 2933888876-0
                          • Opcode ID: 1ae21db2f24bae033a874413a08895cf9ef0a6936569dd53fef1bb6e24226d22
                          • Instruction ID: 6a0d4a47c696437260d3519ce59a653953009ccc764e9f33138adf274d0c262f
                          • Opcode Fuzzy Hash: 1ae21db2f24bae033a874413a08895cf9ef0a6936569dd53fef1bb6e24226d22
                          • Instruction Fuzzy Hash: 10616A71610740DFCB28CF6DC88056AFBF5AF99300B088AAEDD86DB756D630E955CB90
                          APIs
                            • Part of subcall function 00606DB3: HeapFree.KERNEL32(00000000,00000000,?,0060ECA9,005F89C3,00000000,005F89C3,?,0060EF4A,005F89C3,00000007,005F89C3,?,0060F43E,005F89C3,005F89C3), ref: 00606DC9
                            • Part of subcall function 00606DB3: GetLastError.KERNEL32(005F89C3,?,0060ECA9,005F89C3,00000000,005F89C3,?,0060EF4A,005F89C3,00000007,005F89C3,?,0060F43E,005F89C3,005F89C3), ref: 00606DD4
                          • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00609313,00000000,00000000,00000000), ref: 006091D2
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFreeHeapInformationLastTimeZone
                          • String ID:
                          • API String ID: 3335090040-0
                          • Opcode ID: 047590866a50a0a3ed8b40d57cce0762a1a26530c912eb94fe7bf74fde8b5ecb
                          • Instruction ID: e162799986963195751de8b80979baba6591c4f421e9c48cbe9f5458a8cdcaf4
                          • Opcode Fuzzy Hash: 047590866a50a0a3ed8b40d57cce0762a1a26530c912eb94fe7bf74fde8b5ecb
                          • Instruction Fuzzy Hash: 9941E675940125AFCB18EF65EC0699B7F7BAF42760B10416AF454A72E2EB309E00CBA4
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0061037F
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$InfoLocale
                          • String ID:
                          • API String ID: 3736152602-0
                          • Opcode ID: 0ba3c15ef53b571376abd5d4431c1df9cad4954e471b662ac661dff2d933006d
                          • Instruction ID: 2fb6de2176c0ce4f7ee092243e70b1668ea74a5f3fc3c3dcd330d37dbe979520
                          • Opcode Fuzzy Hash: 0ba3c15ef53b571376abd5d4431c1df9cad4954e471b662ac661dff2d933006d
                          • Instruction Fuzzy Hash: 2521A132611207ABEF289B25DC81AFB37AAEB04310F14017AF915D6281EBB4EDC08B54
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: 2a2e03b90355dc0d59000aeef2c7e7f9d6bd4af588e3a47cd3e57602e03e1696
                          • Instruction ID: 5bc310b744196eac31cd953c03f2a46461962f343431ff8d175d28990ca305ab
                          • Opcode Fuzzy Hash: 2a2e03b90355dc0d59000aeef2c7e7f9d6bd4af588e3a47cd3e57602e03e1696
                          • Instruction Fuzzy Hash: 71B1A1356007059FEF20CAA4CC41ABEFBF5FF44310F144E1AE9AAD2690D371A946CB61
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: d
                          • API String ID: 0-2564639436
                          • Opcode ID: a46c03965f89406d21e4840a8879490cd355410da3bfc95495e00d4f6904263f
                          • Instruction ID: 75acc801fc2566a54498e5fa300652ea53ace401c0fd58e5b07d4af67fa206e7
                          • Opcode Fuzzy Hash: a46c03965f89406d21e4840a8879490cd355410da3bfc95495e00d4f6904263f
                          • Instruction Fuzzy Hash: A9C171716047428FC715CF29C48056ABFE2BFDA344F1885ADE8998B346DB35ED06CBA1
                          APIs
                          • GetModuleHandleA.KERNEL32(FAE1F7FA), ref: 0052446D
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: HandleModule
                          • String ID:
                          • API String ID: 4139908857-0
                          • Opcode ID: cc950a95dce5ff95e785122f5184d828b507a2eedb93c1b78dded785e97a1ba2
                          • Instruction ID: fc9eef203d3167730693a814ddc29224c8ca56efc21fde2109924a4f19aa2584
                          • Opcode Fuzzy Hash: cc950a95dce5ff95e785122f5184d828b507a2eedb93c1b78dded785e97a1ba2
                          • Instruction Fuzzy Hash: AC015BB1915218AFDB00DFA9D8856CEFBF8FF08310F5085AAE419E7241D375A205CBA0
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,006103D5,00000000,00000000,?), ref: 00610586
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$InfoLocale
                          • String ID:
                          • API String ID: 3736152602-0
                          • Opcode ID: 005763b52e6410c09ce1b8511ea4d81e0cd6910015807635b6cb8cacbb8b1f0a
                          • Instruction ID: afbc30c313302886a278c6a7cc5870b223ca7b81aa3bf5c4daa390f34718b25b
                          • Opcode Fuzzy Hash: 005763b52e6410c09ce1b8511ea4d81e0cd6910015807635b6cb8cacbb8b1f0a
                          • Instruction Fuzzy Hash: B401DB32600116ABEF289B248A45AFB776BDB40754F194429EC46A31C0EAB4FDC2CD90
                          APIs
                            • Part of subcall function 00605BDB: GetLastError.KERNEL32(005F47AC,00000000,006002A8,?,?,00000003,005F45A3,FF176ACC,005F4512,?,00000000,005F4721), ref: 00605BDF
                            • Part of subcall function 00605BDB: SetLastError.KERNEL32(00000000,00000000,005F4721,?,?,?,?,?,00000000,005F47AC,00000000,00000000,00000000,00000000,00000000,005F89CE), ref: 00605C81
                          • EnumSystemLocalesW.KERNEL32(0061032B,00000001,FFFFFFFF,?,-00000050,?,006106D4,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00610097
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystem
                          • String ID:
                          • API String ID: 2417226690-0
                          • Opcode ID: 698648870ab998a35d3e21d8a0abd4c583c67cc4dd88312cd9ec148d8011cb59
                          • Instruction ID: 92fdf73d9813b16d46527402e4dcafd7e11d96ef09186ef227328806549dfeaf
                          • Opcode Fuzzy Hash: 698648870ab998a35d3e21d8a0abd4c583c67cc4dd88312cd9ec148d8011cb59
                          • Instruction Fuzzy Hash: 3BF0C2362007049FEB246F359881BEA7B92FB84369F19842DF9464B690D6B1ACC2CB50
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00603B89,?,20001004,00000000,00000002,?,?,0060317B), ref: 00607502
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: cf4ae74dd506eeff0fb7818d64b21c8a87832422d4a35f6e3d9fd1103e66f4e9
                          • Instruction ID: d7bf2133b4ce6a2b2b4f4f9f6111c25f4b3395656b1c5b3b48320380bd496042
                          • Opcode Fuzzy Hash: cf4ae74dd506eeff0fb7818d64b21c8a87832422d4a35f6e3d9fd1103e66f4e9
                          • Instruction Fuzzy Hash: 35E01A32984528BBCB162F61EC04EEF3F67AB44750F048425FC05652A1CB32AA21AAD4
                          APIs
                          • IsDebuggerPresent.KERNEL32(?,?,?,00000000,00000001,?,00000000), ref: 00524293
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: DebuggerPresent
                          • String ID:
                          • API String ID: 1347740429-0
                          • Opcode ID: e411a5c97a685fbefe1d6a0eadf707ea147b736d87097e6eb6e3d0c70a403559
                          • Instruction ID: af295caf409a97897ccc08494b60c97847354ea6889fadeb0d238c1f306e2683
                          • Opcode Fuzzy Hash: e411a5c97a685fbefe1d6a0eadf707ea147b736d87097e6eb6e3d0c70a403559
                          • Instruction Fuzzy Hash: B3E07234141215EBCB02CF8AA9423EABBECFB16310F180089F808D3700C226CA00AB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: ffad52e287b60b8b48c8f6c01dcfbe838c716be90c45fb450b26370899277487
                          • Instruction ID: 80a956d39aa894fe09583f73f8bfb0f9b4aae5ffc161a2b174383d22acec2d80
                          • Opcode Fuzzy Hash: ffad52e287b60b8b48c8f6c01dcfbe838c716be90c45fb450b26370899277487
                          • Instruction Fuzzy Hash: FA818F71951648AEEF219AB4C840BEDFFF0EF05201F1489E8E8D5E3B41D678D64AC7A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: invalid block type
                          • API String ID: 0-1830746294
                          • Opcode ID: e6d8240b112a78a09a0ed4fa221f66ddd0840ef3361a09ce087ebf80c5767fda
                          • Instruction ID: c22ac230a91375823e95ac23d54dcd14ecd5d61067096e2ce1fa5a83b435216f
                          • Opcode Fuzzy Hash: e6d8240b112a78a09a0ed4fa221f66ddd0840ef3361a09ce087ebf80c5767fda
                          • Instruction Fuzzy Hash: 856139B5E006158BDB08CF59C4442ADBFB1FB88314F14C1AED8189B756D776DA46CF90
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6094c59931180dee46fcb7a570bc31a5db8888ad96c1c80ab7b2378a9d329632
                          • Instruction ID: e5dd06fb9e742d12c9ff5ec71d543e2fc7c19b9c22be57ac397748bf796f4e1f
                          • Opcode Fuzzy Hash: 6094c59931180dee46fcb7a570bc31a5db8888ad96c1c80ab7b2378a9d329632
                          • Instruction Fuzzy Hash: 18929D74A083528FC714DF29D48062EBBF2BFCA304F15496DE8968B752D735E845CBA2
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 979fb8f93f60bc7e3a4f33676972e644137c874c556c6cda60a5e639773166af
                          • Instruction ID: 415b1f69013bfa3049c8e2b4ed8b5237d22e1e852f5f384cd5cb82c0dd775f7d
                          • Opcode Fuzzy Hash: 979fb8f93f60bc7e3a4f33676972e644137c874c556c6cda60a5e639773166af
                          • Instruction Fuzzy Hash: 1E526EB190424A8EDB48DF68C4156AEFFF4FF09304F1482AED845EB642E7719689CBD1
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fae9debd5fdadac9df3dae3d946f93778898e26d91da155b118361be0891ff27
                          • Instruction ID: 370c5f4bd44a3509d8dc4cd2ce649ec4dedf7e18bf458a220bb2bd81d7134c04
                          • Opcode Fuzzy Hash: fae9debd5fdadac9df3dae3d946f93778898e26d91da155b118361be0891ff27
                          • Instruction Fuzzy Hash: 27323621D69F414DD7379634CC22336A24AAFB73D4F15E727F81AB5AA9EF29C9834100
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c28d73c0b092ef984f92d42c05f47b3fe9854d4a3893dd605d8e8d710e45b8fc
                          • Instruction ID: 6368f64f042d4186b98edcf152e7f41783211b9fb6a6a35570034c0507328270
                          • Opcode Fuzzy Hash: c28d73c0b092ef984f92d42c05f47b3fe9854d4a3893dd605d8e8d710e45b8fc
                          • Instruction Fuzzy Hash: 0B025A35600B008FCB24CF29C484A6ABBF2FF89314F55495EE9968BB92DB75F851CB50
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Concurrency::cancel_current_taskFolderNamesPathPrivateProfileSection
                          • String ID:
                          • API String ID: 1185923200-0
                          • Opcode ID: 79e802052aba22b5e1dbcb441e2bdf86f60f083011ecf5141175cf5ab1925fd0
                          • Instruction ID: f36b6d8507c617a9eed6374c82864c0465579252861624bd1a23b8658af1d30a
                          • Opcode Fuzzy Hash: 79e802052aba22b5e1dbcb441e2bdf86f60f083011ecf5141175cf5ab1925fd0
                          • Instruction Fuzzy Hash: A2E1EF74D042898FCB15DB68CC49BEDBFB6BF99314F1880D9D449A7342EB705A48CBA1
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 88923f8df2a61e7006f5ecf14fd7805f83e68085996bdc7208aa9031238299ab
                          • Instruction ID: 490e25d703bf2389942f55cccb75498ed556e8392beed292251798a5721673df
                          • Opcode Fuzzy Hash: 88923f8df2a61e7006f5ecf14fd7805f83e68085996bdc7208aa9031238299ab
                          • Instruction Fuzzy Hash: 36D19D706007418BEB24CF39C49479ABBE1FF58314F548A6DD4EE8B781EB74A489CB91
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 970760fb301abcd751a2535e2fc00994ad1a2215bf31372becfa56a4f6f65e52
                          • Instruction ID: 09a458d104271dc0fdde13bedee7aebcdf8d8c07d5a10f8380e34d6c8dc67631
                          • Opcode Fuzzy Hash: 970760fb301abcd751a2535e2fc00994ad1a2215bf31372becfa56a4f6f65e52
                          • Instruction Fuzzy Hash: FA7104B4E011468FEB14CF68D8D17FEBFB6FB1A300F050169D85597782CB289996C7A0
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 41d31ba86242bfd7bd76f9ba221a1519e07e8bc4f3f0aa95c67da6b44e1bb030
                          • Instruction ID: d5569f474a28144352b1a2fb2cc242acae7b9b31f6f407bc9e283419549aa584
                          • Opcode Fuzzy Hash: 41d31ba86242bfd7bd76f9ba221a1519e07e8bc4f3f0aa95c67da6b44e1bb030
                          • Instruction Fuzzy Hash: ED61B431500709AFDF30CAA8C880BEEBFE5FF45310F208AB9E595D26A0D275E685C751
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 01fa3ee8db4cf0f3d1f92b962ccb34bcd4349841ee1e19269a56cd65cbf3ca22
                          • Instruction ID: 9c21d87bae517280a858c4eeda8aaec5cbd6f708df631f964d5dd397f332ed9e
                          • Opcode Fuzzy Hash: 01fa3ee8db4cf0f3d1f92b962ccb34bcd4349841ee1e19269a56cd65cbf3ca22
                          • Instruction Fuzzy Hash: 506144316109664FD728CF5EECC04663752E78A301386661AEAC1DB2A6C735F527DBE0
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 920c44e739ca4d08db5b5969fbc7a5a158caad0a814d8dad7807257cb044add9
                          • Instruction ID: 2988480aa988442f801a26c19e2885f991f9754534a8e66d8d31943de64ceac2
                          • Opcode Fuzzy Hash: 920c44e739ca4d08db5b5969fbc7a5a158caad0a814d8dad7807257cb044add9
                          • Instruction Fuzzy Hash: 70517F72D00219AFDF14CF98C981AFEBFB6FF88314F598459E915AB201D7389A50DB90
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f57c5513b2a6ddb8df53c919b5ef77e69e08df4e3d3e96d3fc4e754907942400
                          • Instruction ID: ce92f9a939328a0158453f0a07f9d7cc3c329335ca545680f6950edaadd9edde
                          • Opcode Fuzzy Hash: f57c5513b2a6ddb8df53c919b5ef77e69e08df4e3d3e96d3fc4e754907942400
                          • Instruction Fuzzy Hash: B2118C30614665CBCB29CF18D0A0BA9FBA2BF46754BA9408EC8855F792E771AD45CBC0
                          APIs
                          • Sleep.KERNELBASE(00000001), ref: 005746D8
                          • GetTempPathA.KERNEL32(000000FB,?,0100C8CB), ref: 00574737
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: PathSleepTemp
                          • String ID:
                          • API String ID: 119084202-0
                          • Opcode ID: 7254be406cc0f86c6983815bf956a4fbaaafac700f82c4976941d6250270d2b0
                          • Instruction ID: 62f13091fafeaa674e6152a60e9caddd73a184611d12e33a3a6f7f3d21cd2891
                          • Opcode Fuzzy Hash: 7254be406cc0f86c6983815bf956a4fbaaafac700f82c4976941d6250270d2b0
                          • Instruction Fuzzy Hash: DA113A35A04655CBCB25CF04D0A0A6AF7B1FF45758B298589C8691F715D731E94ACFC0
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3469e2706c7b8808072a0d70d13407581380fe56500d1ba4e961cf50c2cc6b8c
                          • Instruction ID: dbc702a08d152575c0d9f4efb0c0dd8df9a70d10112f3a1208ba3dba4c9c81cc
                          • Opcode Fuzzy Hash: 3469e2706c7b8808072a0d70d13407581380fe56500d1ba4e961cf50c2cc6b8c
                          • Instruction Fuzzy Hash: 9FC0CAB06042108BCA28DB1CB480866B7E6AF98210328CA2EE08A83600E672ED009B90
                          APIs
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,74DEF380), ref: 00595475
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,74DEF380), ref: 0059548C
                          • CharNextA.USER32(?,00000000,?,-00000023,?,?,?,?,?,?,?,00000000,00000000,74DEF380), ref: 005954A5
                          Strings
                          • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36, xrefs: 0059557F
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CharNext
                          • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36
                          • API String ID: 3213498283-2732702261
                          • Opcode ID: 784c1c15fe1aa32dc9641f7e8f4a1616ef73e0240794f039d3c2f399316f2aa8
                          • Instruction ID: 82ab2f4c158aeb7807b1b6c9c6983b4b0e06d12b8b8d8b892858048b83120db6
                          • Opcode Fuzzy Hash: 784c1c15fe1aa32dc9641f7e8f4a1616ef73e0240794f039d3c2f399316f2aa8
                          • Instruction Fuzzy Hash: 9E416939940614ABCF52DF689C80AADBFB7FF4A311F094069ED88D7321E7314E568B50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwind
                          • String ID: csm$csm$csm$b
                          • API String ID: 944608866-1124614693
                          • Opcode ID: d8b54be5ecb7279b6850f66950320b191d0dfffbac8d575c94d8bfe3c3c2b9cd
                          • Instruction ID: 0f0791b8eb696a74d2c5a4c60a6e97a1b940f28bd6bde632a280b20980339126
                          • Opcode Fuzzy Hash: d8b54be5ecb7279b6850f66950320b191d0dfffbac8d575c94d8bfe3c3c2b9cd
                          • Instruction Fuzzy Hash: BEB1557180020EEBEF15DFA4C8899BEBFB5FF94310B14455AEA01AB202D739DA51CF91
                          APIs
                          • DecodePointer.KERNEL32(?,811C9DC5,?,?,?,?,?,?,?,0061448A), ref: 006133C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: DecodePointer
                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                          • API String ID: 3527080286-3064271455
                          • Opcode ID: 297b0b9c951f5bd73616194bbc5f425296444d194a741a00c02861a85b5f6bf7
                          • Instruction ID: eb24b1fd0acbca56f8e351c06700685752a34fbad8da3c68b7611e48c0ed5fd8
                          • Opcode Fuzzy Hash: 297b0b9c951f5bd73616194bbc5f425296444d194a741a00c02861a85b5f6bf7
                          • Instruction Fuzzy Hash: AD5147B4900A2ACBCF119F59E80C1EDBFB7FB49704F184056D492AA354CB798BA5CF54
                          APIs
                          • LocalAlloc.KERNEL32(00000040,0000001C), ref: 0051B1F0
                          • SetupDiEnumDeviceInfo.SETUPAPI(?,00000000,00000000), ref: 0051B1FF
                          • LocalAlloc.KERNEL32(00000040,0000001C,?,00000000,00000000), ref: 0051B239
                          • SetupDiEnumDeviceInterfaces.SETUPAPI(?,00000000,0061F540,00000000,00000000), ref: 0051B251
                          • SetupDiGetDeviceInterfaceDetailA.SETUPAPI(?,00000000,00000000,00000000,?,00000000), ref: 0051B26D
                          • SetupDiGetDeviceInterfaceDetailA.SETUPAPI(?,?,00000000,?,00000000,00000000), ref: 0051B28F
                          • LocalFree.KERNEL32(?,?,?,?,?,00000000,?,00000000,00000000), ref: 0051B2C0
                          • LocalFree.KERNEL32(?,?,?,00000000,?,00000000,00000000), ref: 0051B2C5
                          • LocalFree.KERNEL32(?,?,?,00000000,?,00000000,00000000), ref: 0051B2C8
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: Local$DeviceSetup$Free$AllocDetailEnumInterface$InfoInterfaces
                          • String ID:
                          • API String ID: 45558158-0
                          • Opcode ID: 2fc3ded58bfc13478eb5c79bd7a3a87bc892eb8f736f92cd3746db8217bbe1cd
                          • Instruction ID: dcbd8c47dab12788d076ee99284abccb88a065d76e521a727a8699a6d87d0e63
                          • Opcode Fuzzy Hash: 2fc3ded58bfc13478eb5c79bd7a3a87bc892eb8f736f92cd3746db8217bbe1cd
                          • Instruction Fuzzy Hash: 59413CB5A40309AFDB60DFA9DC41B9EFBF9FB48700F14852AE519E7650E774A9008F60
                          APIs
                            • Part of subcall function 005A3E50: GetVersionExA.KERNEL32(?), ref: 005A3E76
                          • GetVersionExA.KERNEL32(?), ref: 005A43F3
                          • DeleteFileW.KERNEL32(00000000), ref: 005A4412
                          • GetFileAttributesW.KERNEL32(00000000), ref: 005A4419
                          • GetLastError.KERNEL32 ref: 005A4426
                          • Sleep.KERNEL32(00000064), ref: 005A443C
                          • DeleteFileA.KERNEL32(00000000), ref: 005A4445
                          • GetFileAttributesA.KERNEL32(00000000), ref: 005A444C
                          • GetLastError.KERNEL32 ref: 005A4459
                          • Sleep.KERNEL32(00000064), ref: 005A446F
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$AttributesDeleteErrorLastSleepVersion
                          • String ID:
                          • API String ID: 1421123951-0
                          • Opcode ID: f8063c74552b481fd06f19973c27757e23bbc73517f8b7ace63e1d926da70a25
                          • Instruction ID: f12187bb19c7de63b763daf322be59253268958384ebdcdee2e6486cc4a4a7a1
                          • Opcode Fuzzy Hash: f8063c74552b481fd06f19973c27757e23bbc73517f8b7ace63e1d926da70a25
                          • Instruction Fuzzy Hash: B721E5359002149BCF10ABB8AC886BE7BF5FB8F335F20C666E91EC2241EB7449419F51
                          APIs
                          • GetFileAttributesA.KERNEL32(?), ref: 0051E53C
                          • GetLastError.KERNEL32 ref: 0051E547
                          • __Mtx_unlock.LIBCPMT ref: 0051E562
                          • __Mtx_unlock.LIBCPMT ref: 0051E571
                          • CreateDirectoryA.KERNEL32(?,00000000), ref: 0051E588
                          • CopyFileA.KERNEL32(?,?,00000000), ref: 0051E5F0
                          • FindNextFileA.KERNEL32(00000000,?), ref: 0051E604
                          • FindClose.KERNEL32(00000000), ref: 0051E614
                          • GetLastError.KERNEL32 ref: 0051E61A
                          • GetLastError.KERNEL32 ref: 0051E630
                          • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,00000000), ref: 0051E7F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorFileLast$FindMtx_unlock$AttributesCloseCopyCreateDirectoryFolderNextPath
                          • String ID: .
                          • API String ID: 3822727861-248832578
                          • Opcode ID: 7274ac666042fce18f5da42e2aaab16039180c3a5f3221c4465ad78747679616
                          • Instruction ID: cc643f09935a8db41ae752f69f293d5549082a7b86f8cfb2f7faef721874937b
                          • Opcode Fuzzy Hash: 7274ac666042fce18f5da42e2aaab16039180c3a5f3221c4465ad78747679616
                          • Instruction Fuzzy Hash: 24D1DD719002488BEB1CDF28DC8ABEDBF76BF55310F548258E819A7792D734A9C1CB90
                          APIs
                          • RegGetValueA.ADVAPI32(80000002,E0E0EBC2,F5FEFDD5,0001FFFF,00000001,?,00000104), ref: 0051C2B2
                          • GetComputerNameExA.KERNEL32(00000002,?,00000104), ref: 0051C31C
                          • LsaOpenPolicy.ADVAPI32(00000000,006456CC,00000001,00000000), ref: 0051C375
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ComputerNameOpenPolicyValue
                          • String ID: %wZ
                          • API String ID: 642710655-705104578
                          • Opcode ID: 964aefc5871dd21a5c9538ff98d78de7ddb1eada1a6ce6d5199e0dce2fdc983d
                          • Instruction ID: 53d75ef2b57e7537aa9568300706464194d523846beed17187213c53db81b639
                          • Opcode Fuzzy Hash: 964aefc5871dd21a5c9538ff98d78de7ddb1eada1a6ce6d5199e0dce2fdc983d
                          • Instruction Fuzzy Hash: E871AEB1940258DFEF20CFA4D849BEEBFB8BF05300F04456EE559AB241E7B65689CB50
                          APIs
                          • InternetSetOptionA.WININET(00000000,00000006,00000000,00000004), ref: 00595100
                          • HttpOpenRequestA.WININET(00000000,D0D2D7D9,?,00000000,00000000,00000000,80000000,00000000), ref: 00595175
                          • GetLastError.KERNEL32(00000000,00000000), ref: 005951A0
                          • InternetQueryOptionA.WININET(00000000,0000001F,80000000,?), ref: 005951CB
                          • InternetSetOptionA.WININET(00000000,0000001F,00000100,00000004), ref: 005951E1
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: InternetOption$ErrorHttpLastOpenQueryRequest
                          • String ID:
                          • API String ID: 482189329-0
                          • Opcode ID: 519fd74dd3c4f222391f2ca2af2559af22bd4b98511b1bc3005cd8a4b1fc17a0
                          • Instruction ID: 5b8c9bedebde1194860fb76edaae1b081af8cb9346664c6cb1fb08c8a3d67b62
                          • Opcode Fuzzy Hash: 519fd74dd3c4f222391f2ca2af2559af22bd4b98511b1bc3005cd8a4b1fc17a0
                          • Instruction Fuzzy Hash: 79419575A40209BBEB21CF94DC49FAF7BB9EB45704F104059FA05BB280E7B49B04DB55
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005132C6
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 00513350
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy___std_exception_destroy
                          • String ID: +4Q$@3Q$`!Q$`!Q
                          • API String ID: 2970364248-74169555
                          • Opcode ID: 4864e0c79e1366dd5093894e37f81f5854b3674c835b86367817a7941c249697
                          • Instruction ID: b5b0fe487274b767b858b553b5df9d72fcf648426577df82a92fcc68c27a451e
                          • Opcode Fuzzy Hash: 4864e0c79e1366dd5093894e37f81f5854b3674c835b86367817a7941c249697
                          • Instruction Fuzzy Hash: 0F51A0719002499FDB08DF98D899BDEBFF6FF48310F14812AE815A7382D7749A81CB90
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 005EE614
                          • GetCurrentThreadId.KERNEL32 ref: 005EE631
                          • GetCurrentThreadId.KERNEL32 ref: 005EE652
                          • GetCurrentThreadId.KERNEL32 ref: 005EE6D5
                          • __Xtime_diff_to_millis2.LIBCPMT ref: 005EE6ED
                          • GetCurrentThreadId.KERNEL32 ref: 005EE719
                          • GetCurrentThreadId.KERNEL32 ref: 005EE75F
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: CurrentThread$Xtime_diff_to_millis2
                          • String ID:
                          • API String ID: 1280559528-0
                          • Opcode ID: 3f88ef1a2d2011dffc1c2fc882fd28097b322cc5f72d9f408a340324effe5f81
                          • Instruction ID: 88f078ad942b6932a47670ca62396092b47e1f7c3e5f555803c1c8cfb6601926
                          • Opcode Fuzzy Hash: 3f88ef1a2d2011dffc1c2fc882fd28097b322cc5f72d9f408a340324effe5f81
                          • Instruction Fuzzy Hash: 2B51D235910695CFCF28DF65D9878A9BBF2FF58310B25846AE8869B241DB30EC41CF50
                          APIs
                          • FreeLibrary.KERNEL32(00000000,?,00607227,005F89C3,005FD244,00000000,00000000,00000000,?,00607451,00000022,FlsSetValue,00623B28,p;b,00000000), ref: 006071D9
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLibrary
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3664257935-537541572
                          • Opcode ID: f8d4f676038b4a1c1e92fe3a192567e8e6eea8b5b4a7a5488bbce0034ba26d6c
                          • Instruction ID: ae0f51698ac3b6db2dc74ba7b7089233ecbde21ea45b0c469ad33d081da09915
                          • Opcode Fuzzy Hash: f8d4f676038b4a1c1e92fe3a192567e8e6eea8b5b4a7a5488bbce0034ba26d6c
                          • Instruction Fuzzy Hash: F3210576E88210ABC7259B64DC40A9B37ABAF42374F1901A0FD06A73D0E770FE01CAD1
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: __freea$Info
                          • String ID:
                          • API String ID: 541289543-0
                          • Opcode ID: 0e97ea135973d165fea505ffd3e37dedda8393d8cdaafd6b8c96c8c791a21e9b
                          • Instruction ID: 6b4b08a6c4141cddeef66d6f77359d8fee98aaeb2da538d478682b8eecdfc7ea
                          • Opcode Fuzzy Hash: 0e97ea135973d165fea505ffd3e37dedda8393d8cdaafd6b8c96c8c791a21e9b
                          • Instruction Fuzzy Hash: 8471C672904266ABDF24AF54CC42BEF7BABAF49310F2C0059E946BB381D7359F858750
                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 0052449B
                          • IsProcessorFeaturePresent.KERNEL32(00000015), ref: 005244A7
                          • RegOpenKeyExA.ADVAPI32(80000002,C0C0CBC2,00000000,00020019,?), ref: 0052452C
                          • RegOpenKeyExA.ADVAPI32(80000002,C0C0CBC2,00000000,00020019,?), ref: 005245AA
                          • RegCloseKey.ADVAPI32(?), ref: 005245B5
                          • GetComputerNameA.KERNEL32(?,?), ref: 005245CA
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: OpenPresent$CloseComputerDebuggerFeatureNameProcessor
                          • String ID:
                          • API String ID: 2393775839-0
                          • Opcode ID: c91fda855e356346202d83207b76113f7fd768b696904c9fa85ad288ff5d02c5
                          • Instruction ID: a4d6608399f69672e76826d58c64b4d2bdeb0311dc4ac1c13f27252e962d2912
                          • Opcode Fuzzy Hash: c91fda855e356346202d83207b76113f7fd768b696904c9fa85ad288ff5d02c5
                          • Instruction Fuzzy Hash: E871AD7090026CAEDF14CFA4E884AEDBFB9FF0A304F14415DE845AB282E770A545CF64
                          APIs
                          • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 005155C4
                          • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 005155FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_fs_directory_iterator_advance@8
                          • String ID: .
                          • API String ID: 2610647541-248832578
                          • Opcode ID: 252926316b0406c02cc289696f9d4ec0676907b97eb3fad9dd05e55569c75e58
                          • Instruction ID: 7b1524c8d28a175596b4280d414dbaa6a727882fdf04ff40149e83bc3aa0e623
                          • Opcode Fuzzy Hash: 252926316b0406c02cc289696f9d4ec0676907b97eb3fad9dd05e55569c75e58
                          • Instruction Fuzzy Hash: 22C1EF75A00A26DFEB24CF18C4846E9BBB2FF84320F554669D8559B290F735ADC4CBD0
                          APIs
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 005175BE
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 005175CD
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_destroy
                          • String ID: at line $, column $`!Q
                          • API String ID: 4194217158-3570351978
                          • Opcode ID: d9c15410a5c118c90975e1361f7b6b8c659fa07921b49db98d2c8164c43f73fa
                          • Instruction ID: 51829fd37b9b8bb6353c0acd2004eea68b089b5f882f566cc4a003031960c869
                          • Opcode Fuzzy Hash: d9c15410a5c118c90975e1361f7b6b8c659fa07921b49db98d2c8164c43f73fa
                          • Instruction Fuzzy Hash: FC61F971A042499FEB08DF68DC84B9DBFB6FF88300F14462CE415A7782D774AA80CB90
                          APIs
                            • Part of subcall function 00513190: ___std_exception_copy.LIBVCRUNTIME ref: 005132C6
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051345F
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: +4Q$@3Q$@3Q$`!Q
                          • API String ID: 2659868963-2244486879
                          • Opcode ID: c5b10aef47ef45ffe0d1ae1e360459a342529804b669f832fc9a30a48d1e5127
                          • Instruction ID: a667031697b3c26895c80163bd6b5ef16fee3c5dfab99ccee6be91f318a90bbf
                          • Opcode Fuzzy Hash: c5b10aef47ef45ffe0d1ae1e360459a342529804b669f832fc9a30a48d1e5127
                          • Instruction Fuzzy Hash: 173183B1900209AFCB18DFA8D845AEEFFF9FB48310F14852AF515E7641E774A690CB94
                          APIs
                            • Part of subcall function 005F0EFB: RaiseException.KERNEL32(E06D7363,00000001,00000003,00573D00,00573D00,?,?,005ED708,00573D00,006409C4,00000000,00573D00,00000000,00000001), ref: 005F0F5B
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051345F
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionRaise___std_exception_copy
                          • String ID: +4Q$@3Q$@3Q$`!Q
                          • API String ID: 3109751735-2244486879
                          • Opcode ID: 02ac4cfb0c47430e8a23a32c09928d6e41d60212aa2f893110cab2f538bc7af1
                          • Instruction ID: 12060f76310e50b19a33cad5673592cf0d75d8ad7a4bf63da4a8e8ddf17dc5c9
                          • Opcode Fuzzy Hash: 02ac4cfb0c47430e8a23a32c09928d6e41d60212aa2f893110cab2f538bc7af1
                          • Instruction Fuzzy Hash: D2014FB650020AAF8704DFA8D405896FFFDBF44310704842AE62987611EBB0E554CB90
                          APIs
                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,63EEBEBE,005F47AC,?,00000000,0061D2B1,000000FF,?,005FF151,FF176ACC,?,005FF125,00000000), ref: 005FF1AA
                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005FF1BC
                          • FreeLibrary.KERNEL32(00000000,?,00000000,0061D2B1,000000FF,?,005FF151,FF176ACC,?,005FF125,00000000), ref: 005FF1DE
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 6adf3e2a5eb246f5847bf128e56d0028e075a653c01457c80dbe34131a118d62
                          • Instruction ID: 30b4ab417910c1936268a30238db8041801f599f36a9fde87c0e473a2ca430f5
                          • Opcode Fuzzy Hash: 6adf3e2a5eb246f5847bf128e56d0028e075a653c01457c80dbe34131a118d62
                          • Instruction Fuzzy Hash: A4016775544A2AFFDB119B50DC05FEEBBB9FB04B21F048536EC11E2690DB789900CB90
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057D06F
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057D096
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q$uQ
                          • API String ID: 2659868963-1635935002
                          • Opcode ID: 5542d998bc9f276b9de09799c8a3c6af9b9b123f1bbfd2b1cd3a1a1f2b2d10bd
                          • Instruction ID: 1c9a36f9857229ba223778fa611c24b24e81897b96aed9abb7d89dd684721aa4
                          • Opcode Fuzzy Hash: 5542d998bc9f276b9de09799c8a3c6af9b9b123f1bbfd2b1cd3a1a1f2b2d10bd
                          • Instruction Fuzzy Hash: AF01A4B650060AAF8704DF59D409892FFFAFF58710704852BA529CBB11E7B0E568CFA0
                          APIs
                            • Part of subcall function 005A3E50: GetVersionExA.KERNEL32(?), ref: 005A3E76
                          • GetVersionExA.KERNEL32(?,?,?,?), ref: 005A4591
                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?), ref: 005A45B6
                          • GetFullPathNameW.KERNEL32(00000000,00000003,00000000,00000000,?), ref: 005A45D6
                          • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?), ref: 005A45EF
                          • GetFullPathNameA.KERNEL32(00000000,00000003,00000000,00000000,?), ref: 005A4621
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: FullNamePath$Version
                          • String ID:
                          • API String ID: 495861893-0
                          • Opcode ID: 2be0e66c9867936495926d750cff8215042d4e4d483c097261c3efae2f7eb728
                          • Instruction ID: 1aed157da81442f69b2fa1603fa575926d78917411fff9065881f5dbe4b18c7e
                          • Opcode Fuzzy Hash: 2be0e66c9867936495926d750cff8215042d4e4d483c097261c3efae2f7eb728
                          • Instruction Fuzzy Hash: 32212DB2A0110967D7107B64EC4AFBF7B69FFC3314F044034F90A57252DB689905C7A6
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005177B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q$invalid_iterator
                          • API String ID: 2659868963-2457165433
                          • Opcode ID: d6f76faeaf49e0222cf05479c9f35fb5ba9f559c2f5d370a5a66870217d9c61c
                          • Instruction ID: f62e94db0ad494021ba79c1c6ab61c43f77cf161d7567bd430a832aac0064341
                          • Opcode Fuzzy Hash: d6f76faeaf49e0222cf05479c9f35fb5ba9f559c2f5d370a5a66870217d9c61c
                          • Instruction Fuzzy Hash: 32514EB09002499FDB18CF68D89479DFFF2FB48310F148669E419EB792E774A980CB90
                          APIs
                            • Part of subcall function 005F0EFB: RaiseException.KERNEL32(E06D7363,00000001,00000003,00573D00,00573D00,?,?,005ED708,00573D00,006409C4,00000000,00573D00,00000000,00000001), ref: 005F0F5B
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005150C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionRaise___std_exception_copy
                          • String ID: @3Q$`!Q$recursive_directory_iterator::operator++
                          • API String ID: 3109751735-2614750537
                          • Opcode ID: 940839b5e45b1404ea1042a13614301229402a96202b5476458da35579457fed
                          • Instruction ID: ac821ef525c603702dd6d1eb30e45b0a1dd67158fec3a7d53841dd302c2629e9
                          • Opcode Fuzzy Hash: 940839b5e45b1404ea1042a13614301229402a96202b5476458da35579457fed
                          • Instruction Fuzzy Hash: C33180B6800609EFC714DF54D945F8AFBF8FB44710F048669E92A93781DB74BA14CBA1
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057D0DF
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0057D106
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 9940d1acb60a71fbee33f00c383a2ae0849cec9c513006fc10dc722c846f653f
                          • Instruction ID: f16c871ece39802eadb44443dbbaa31ab9a1d752b09aec970a6d89af778da10d
                          • Opcode Fuzzy Hash: 9940d1acb60a71fbee33f00c383a2ae0849cec9c513006fc10dc722c846f653f
                          • Instruction Fuzzy Hash: CBF0C4B650060AAF8708DF58D409892FFEAFA54710705853BA529CBB01E7B0E568CFA0
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0058B3DF
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0058B406
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 56f60a0efb31b411004c69370bca0858b066b4b0414069862f8a2c64f9a23001
                          • Instruction ID: 306760a5b0a0c58843ef841e6875e3707fc5825cc462c9d7c96577c4f011cd96
                          • Opcode Fuzzy Hash: 56f60a0efb31b411004c69370bca0858b066b4b0414069862f8a2c64f9a23001
                          • Instruction Fuzzy Hash: 38F0C4B650060AAF8708DF58D409896BFEAFA54710305852BE52ACBB01E7B0E568CFA0
                          APIs
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,005F4078,00000000,?,00646988,?,?,?,005F421B,00000004,InitializeCriticalSectionEx,006215CC,InitializeCriticalSectionEx), ref: 005F40D4
                          • GetLastError.KERNEL32(?,005F4078,00000000,?,00646988,?,?,?,005F421B,00000004,InitializeCriticalSectionEx,006215CC,InitializeCriticalSectionEx,00000000,?,005F3E62), ref: 005F40DE
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 005F4106
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad$ErrorLast
                          • String ID: api-ms-
                          • API String ID: 3177248105-2084034818
                          • Opcode ID: 59487e1819e3e4d6b9e0c1747807fa37e43665c41ce29fecf557bf2bb1e1545e
                          • Instruction ID: a2e08ee297dbade59886715e4f378b6e993b11ecfa08f4690378606ea8d8bb1b
                          • Opcode Fuzzy Hash: 59487e1819e3e4d6b9e0c1747807fa37e43665c41ce29fecf557bf2bb1e1545e
                          • Instruction Fuzzy Hash: 5AE01A3068820CB6EF105BA1EC06F6A3E6BBB11B50F148031FA0DA84E1EB75E9909944
                          APIs
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AdjustPointer
                          • String ID:
                          • API String ID: 1740715915-0
                          • Opcode ID: 5731da0b598b6d78cba2267ac0d38802d5865d48c1e3f55e07ead866f44965bf
                          • Instruction ID: 5eec340306c823e1933e993c72371c1d434a78851c523fb4fa1ac709dc1a7f83
                          • Opcode Fuzzy Hash: 5731da0b598b6d78cba2267ac0d38802d5865d48c1e3f55e07ead866f44965bf
                          • Instruction Fuzzy Hash: C151A37560160A9FFB289F14D845FBA7FA5FF40310F244529EE0187291DB3AAA85CB90
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 599017c89d470981fefea27f155824e36b1cd886e50e5685f193db0a798847b3
                          • Instruction ID: d4829d4132f064b77d27710cf36a8de4e1c66b2f3ae118b727fdcacd4f6d6dda
                          • Opcode Fuzzy Hash: 599017c89d470981fefea27f155824e36b1cd886e50e5685f193db0a798847b3
                          • Instruction Fuzzy Hash: 17410BB2640709AFD724AF38D845B7ABFB5FF84710F10453AF201DBA91D77999408790
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f0729fb4909c83ad4ecad4a37ccf2d15157d5c48bf3d7ee6d86927987860ca1e
                          • Instruction ID: fb378e397ff78bbf523c6f26fed8c2958a372a6ed2e70450098e802c70bdbf05
                          • Opcode Fuzzy Hash: f0729fb4909c83ad4ecad4a37ccf2d15157d5c48bf3d7ee6d86927987860ca1e
                          • Instruction Fuzzy Hash: EB21927564020EAF9B10AF65DC8497A7F6ABF903647118935FB18D7981EB38ED0187A0
                          APIs
                          • GetUserNameA.ADVAPI32(?,00000100), ref: 005242F8
                          • GetComputerNameA.KERNEL32(?,00000100), ref: 0052431F
                          • GetCurrentProcess.KERNEL32(00000000), ref: 005243A8
                          • TerminateProcess.KERNEL32(00000000), ref: 005243AF
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: NameProcess$ComputerCurrentTerminateUser
                          • String ID:
                          • API String ID: 1086297622-0
                          • Opcode ID: efc96081783eca5f1435bdafcca3e43d9d15e3ae63d095d8cea5d459068e07b2
                          • Instruction ID: 2ec99e40e4e0dc7aa4aeba2e0c9d04edbe3f883add55e5bfc39333803fc6a03e
                          • Opcode Fuzzy Hash: efc96081783eca5f1435bdafcca3e43d9d15e3ae63d095d8cea5d459068e07b2
                          • Instruction Fuzzy Hash: 29218671C4425CABDF10DBE0EC49BDEBBBCAF18305F1041AAE945D7182E7759289CBA1
                          APIs
                          • WriteConsoleW.KERNEL32(00000000,00000000,005F9087,00000000,00000000,?,00610F2F,00000000,00000001,?,?,?,00604FA4,?,00000000,00000000), ref: 006141C9
                          • GetLastError.KERNEL32(?,00610F2F,00000000,00000001,?,?,?,00604FA4,?,00000000,00000000,?,?,?,0060557E,00000000), ref: 006141D5
                            • Part of subcall function 0061419B: CloseHandle.KERNEL32(FFFFFFFE,006141E5,?,00610F2F,00000000,00000001,?,?,?,00604FA4,?,00000000,00000000,?,?), ref: 006141AB
                          • ___initconout.LIBCMT ref: 006141E5
                            • Part of subcall function 0061415D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0061418C,00610F1C,?,?,00604FA4,?,00000000,00000000,?), ref: 00614170
                          • WriteConsoleW.KERNEL32(00000000,00000000,005F9087,00000000,?,00610F2F,00000000,00000001,?,?,?,00604FA4,?,00000000,00000000,?), ref: 006141FA
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                          • String ID:
                          • API String ID: 2744216297-0
                          • Opcode ID: 2df3bda3c0e5d09e80aa0c8a33cf6a574ce7d1a610a517150f5924b888a4aa47
                          • Instruction ID: e0d9bf839152ae3d0ffba15970a65bfe3bdf4559e6a1c33c460443f4262b885b
                          • Opcode Fuzzy Hash: 2df3bda3c0e5d09e80aa0c8a33cf6a574ce7d1a610a517150f5924b888a4aa47
                          • Instruction Fuzzy Hash: 6AF0123A000125BBCF226FD1DC099D93F67FF0A3A1F098015FA1D96630CA3289A09B90
                          APIs
                          • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,?,?,?,?,?,?,00000000,006322E8,00000000), ref: 0052E557
                          • GetProcAddress.KERNEL32(00000000,C7D2C1C6), ref: 0052E562
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Ws2_32.dll
                          • API String ID: 1646373207-3093949381
                          • Opcode ID: aab0e015a796fbe62367bd9e587ee8f51ff09821fcadbac78285a68e97363212
                          • Instruction ID: 5d11e451eab1dadb33dbd2028f9dc5e161f010a06ed81c37cb2250edaa70f5ea
                          • Opcode Fuzzy Hash: aab0e015a796fbe62367bd9e587ee8f51ff09821fcadbac78285a68e97363212
                          • Instruction Fuzzy Hash: F7E1BF70600221DFEB25CF68D88166DBFE2FF56310F24495DE4A69B3D2DB70A941CB91
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005134AF
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: @3Q$`!Q
                          • API String ID: 2659868963-2844704439
                          • Opcode ID: 26ccfd862ffb857bb4669486b6ba2dac6845ac4ee95a905b4cba5cf52c6d838b
                          • Instruction ID: 25ad08f5b60d01b37825a46c904af3658f3564112f679ec65ed8c1bd6faafb21
                          • Opcode Fuzzy Hash: 26ccfd862ffb857bb4669486b6ba2dac6845ac4ee95a905b4cba5cf52c6d838b
                          • Instruction Fuzzy Hash: 83F0A5B660470AAF8708CF59D401896FBE9FB99320305853BE529C7B00E7B0E5248BA4
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 00513078
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 0b78440d9291ec1e783ac7c08242bf6ad28a5221b5ecd803e107569c13f4949b
                          • Instruction ID: fd0ee94aa4340964ea0801a4b488dd923d23cd9493619fa2b0658b0e48f51f6f
                          • Opcode Fuzzy Hash: 0b78440d9291ec1e783ac7c08242bf6ad28a5221b5ecd803e107569c13f4949b
                          • Instruction Fuzzy Hash: 8FE012B29013099BC710DFA8D8059CAFFF9AB59711F0486BAE948D7301F6B0D5948BD1
                          APIs
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 005175F1
                          • ___std_exception_destroy.LIBVCRUNTIME ref: 00517600
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_destroy
                          • String ID: `!Q
                          • API String ID: 4194217158-660956851
                          • Opcode ID: 73c2244f9fc807076d07fba8c252deb731c01c674e66a1b7b70aaacd15a80fed
                          • Instruction ID: 5a724f3f3b6cfa56aa7d7f67e3638b0da99a29a9cf31a3c22f9e69b4d3e12872
                          • Opcode Fuzzy Hash: 73c2244f9fc807076d07fba8c252deb731c01c674e66a1b7b70aaacd15a80fed
                          • Instruction Fuzzy Hash: B3E026F240074813C720AF549C0DBCABEEDAF60314F08083AFA5092342E7B4E65883E0
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 005130AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: c2d4a24d0ab07bacfbe2ccd4410b2f665a8b3164d6c814142d23e2f662bdd90c
                          • Instruction ID: dfb2b47b467553cec50254d5e986dda1a7ca0008b7d94c0be3c8d9d1d4d169cd
                          • Opcode Fuzzy Hash: c2d4a24d0ab07bacfbe2ccd4410b2f665a8b3164d6c814142d23e2f662bdd90c
                          • Instruction Fuzzy Hash: 6BE012B25042199FC714DF48D805896BFDDEB15754709843EF649DB301E670D4508BA8
                          APIs
                          • ___std_exception_copy.LIBVCRUNTIME ref: 0051224E
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp, Offset: 00510000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_510000_Au3Check.jbxd
                          Yara matches
                          Similarity
                          • API ID: ___std_exception_copy
                          • String ID: `!Q$`!Q
                          • API String ID: 2659868963-674047163
                          • Opcode ID: 401f76050f5728a0f12d10cc5740254eae01a823aea7712218f10f69a5bc145a
                          • Instruction ID: dd1332e80cdb1cd88eb2bdc2220f6f74893cb9ca54e2ef14f5cfe7b4d910754c
                          • Opcode Fuzzy Hash: 401f76050f5728a0f12d10cc5740254eae01a823aea7712218f10f69a5bc145a
                          • Instruction Fuzzy Hash: A2E012B25042159BC714DF48D805896BFDDEB15754749843EF649DB301E770D8508BA4