Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uCLkYbZQoA.exe

Overview

General Information

Sample name:uCLkYbZQoA.exe
renamed because original name is a hash value
Original sample name:36cba9f836266dd47c2629af72d7fa24.exe
Analysis ID:1447638
MD5:36cba9f836266dd47c2629af72d7fa24
SHA1:277628e74f7f1dc7aa16412d5c476f62bab39e89
SHA256:3ce9fcec1c68c11c4502acdd2c0f0e18c5b5593cb0dbe8ca2fd7ac42189617cc
Tags:exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • uCLkYbZQoA.exe (PID: 7268 cmdline: "C:\Users\user\Desktop\uCLkYbZQoA.exe" MD5: 36CBA9F836266DD47C2629AF72D7FA24)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://47.110.247.171/chdyz/chdyz.dllAvira URL Cloud: Label: malware
Source: http://47.110.247.171/chdyz/chdyz.exeAvira URL Cloud: Label: malware
Source: http://47.110.247.171/chdyz/chdyz.7z.tmpSuper-ECVirustotal: Detection: 9%Perma Link
Source: http://47.110.247.171/chdyz/chdyz.7zVirustotal: Detection: 11%Perma Link
Source: http://47.110.247.171/login/verup.phpVirustotal: Detection: 9%Perma Link
Source: http://47.110.247.171/login/login.phpVirustotal: Detection: 9%Perma Link
Source: http://47.110.247.171/chdyz/chdyz.dllVirustotal: Detection: 14%Perma Link
Source: http://47.110.247.171/Virustotal: Detection: 9%Perma Link
Source: http://47.110.247.171/chdyz/chdyz.exeVirustotal: Detection: 15%Perma Link
Source: uCLkYbZQoA.exeReversingLabs: Detection: 58%
Source: uCLkYbZQoA.exeVirustotal: Detection: 65%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 77.5% probability
Source: uCLkYbZQoA.exeJoe Sandbox ML: detected
Source: uCLkYbZQoA.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004234C0 FindNextFileA,FindClose,FindFirstFileA,FindClose,0_2_004234C0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0042B8A0 FindFirstFileA,FindClose,0_2_0042B8A0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004B60FD __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,0_2_004B60FD
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00419130 FindFirstFileA,SendMessageA,SendMessageA,FindNextFileA,FindClose,SendMessageA,0_2_00419130
Source: Joe Sandbox ViewIP Address: 47.110.247.171 47.110.247.171
Source: global trafficHTTP traffic detected: POST /login/verup.php HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: text/html, application/xhtml+xml, */*Accept-Encoding: gbk, GB2312Accept-Language: zh-cnUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)Content-Length: 26Host: 47.110.247.171
Source: global trafficHTTP traffic detected: POST /login/login.php HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: text/html, application/xhtml+xml, */*Accept-Encoding: gbk, GB2312Accept-Language: zh-cnUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)Content-Length: 12Host: 47.110.247.171
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00436A20 ioctlsocket,recvfrom,0_2_00436A20
Source: unknownHTTP traffic detected: POST /login/verup.php HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: text/html, application/xhtml+xml, */*Accept-Encoding: gbk, GB2312Accept-Language: zh-cnUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)Content-Length: 26Host: 47.110.247.171
Source: uCLkYbZQoA.exe, 00000000.00000003.1699111246.00000000005BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.110.247.171/
Source: uCLkYbZQoA.exeString found in binary or memory: http://47.110.247.171/chdyz/chdyz.7z
Source: uCLkYbZQoA.exeString found in binary or memory: http://47.110.247.171/chdyz/chdyz.7z.tmpSuper-EC
Source: uCLkYbZQoA.exeString found in binary or memory: http://47.110.247.171/chdyz/chdyz.dll
Source: uCLkYbZQoA.exeString found in binary or memory: http://47.110.247.171/chdyz/chdyz.exe
Source: uCLkYbZQoA.exeString found in binary or memory: http://47.110.247.171/login/login.php
Source: uCLkYbZQoA.exe, 00000000.00000003.1699111246.00000000005D3000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000003.1699235413.00000000005D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.110.247.171/login/login.phpl_
Source: uCLkYbZQoA.exeString found in binary or memory: http://47.110.247.171/login/verup.php
Source: uCLkYbZQoA.exeString found in binary or memory: http://47.110.247.171/login/verup.php0-1
Source: uCLkYbZQoA.exe, 00000000.00000003.1699111246.00000000005BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.110.247.171/wR
Source: uCLkYbZQoA.exeString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
Source: uCLkYbZQoA.exe, 00000000.00000003.1699053207.0000000000600000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000003.2300427638.00000000005E2000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000003.1699280374.0000000000601000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pan.baidu.com/s/1D28osmCWE-A_Oote3X5wsg?pwd=985d
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0043FAE0 GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,GlobalFree,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0043FAE0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0043FAE0 GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,GlobalFree,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0043FAE0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0043FC40 OpenClipboard,GetClipboardData,CloseClipboard,GlobalSize,GlobalLock,GlobalUnlock,CloseClipboard,0_2_0043FC40
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004782B0 GetWindowRect,GetWindowDC,CreateCompatibleDC,SetBkMode,CreateCompatibleBitmap,SelectObject,BitBlt,0_2_004782B0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004BA7D4 GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_004BA7D4
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0042BA50 GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_0042BA50
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004217600_2_00421760
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004B7F510_2_004B7F51
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045E1490_2_0045E149
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0042C1100_2_0042C110
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004521200_2_00452120
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004481C00_2_004481C0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045024D0_2_0045024D
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0044A2C00_2_0044A2C0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004602900_2_00460290
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045E6060_2_0045E606
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0043A7400_2_0043A740
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045A7800_2_0045A780
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004507B20_2_004507B2
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0046E8E00_2_0046E8E0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045E8F10_2_0045E8F1
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0046A9D00_2_0046A9D0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00470A300_2_00470A30
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045EAA40_2_0045EAA4
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0046CBF00_2_0046CBF0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045ACC00_2_0045ACC0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00464D4E0_2_00464D4E
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00450D100_2_00450D10
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045ED1E0_2_0045ED1E
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00456DB00_2_00456DB0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0046EE600_2_0046EE60
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00424FC00_2_00424FC0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00464F9E0_2_00464F9E
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004570C00_2_004570C0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045F1500_2_0045F150
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004AD2760_2_004AD276
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045D3F00_2_0045D3F0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0046B4700_2_0046B470
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004574F00_2_004574F0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045F6200_2_0045F620
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004B163D0_2_004B163D
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0044D7F00_2_0044D7F0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045F8500_2_0045F850
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00423AD00_2_00423AD0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0044DB200_2_0044DB20
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045DC300_2_0045DC30
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0045BF700_2_0045BF70
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0042DF300_2_0042DF30
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: String function: 004567F0 appears 73 times
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: String function: 00456570 appears 37 times
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: String function: 004563E0 appears 73 times
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: String function: 004A7C38 appears 70 times
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: String function: 004B7011 appears 44 times
Source: uCLkYbZQoA.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal72.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00470ED0 CreateToolhelp32Snapshot,Process32First,Process32Next,FindCloseChangeNotification,0_2_00470ED0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0040F400 LoadTypeLib,GetUserDefaultLCID,LHashValOfNameSys,RegisterTypeLib,CoCreateInstance,CoCreateInstance,CoCreateInstance,OleRun,CoCreateInstance,CoCreateInstance,0_2_0040F400
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004B6785 __EH_prolog,FindResourceA,LoadResource,LockResource,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,0_2_004B6785
Source: uCLkYbZQoA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: uCLkYbZQoA.exeReversingLabs: Detection: 58%
Source: uCLkYbZQoA.exeVirustotal: Detection: 65%
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3F4DACA4-160D-11D2-A8E9-00104B365C9F}\InprocServer32Jump to behavior
Source: uCLkYbZQoA.exeStatic file information: File size 1056768 > 1048576
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00422D50 GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,FreeLibrary,FreeLibrary,0_2_00422D50
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004A5030 push eax; ret 0_2_004A505E
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004A7C38 push eax; ret 0_2_004A7C56
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00421760 IsWindow,IsIconic,SetActiveWindow,IsWindow,IsWindow,DestroyAcceleratorTable,DestroyMenu,DestroyAcceleratorTable,DestroyMenu,DestroyAcceleratorTable,DestroyMenu,KiUserCallbackDispatcher,SetWindowPos,IsWindow,SendMessageA,SendMessageA,DestroyAcceleratorTable,IsWindow,IsWindow,IsWindow,IsWindow,IsWindow,GetParent,GetFocus,IsWindow,SendMessageA,IsWindow,GetFocus,SetFocus,0_2_00421760
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00426B30 DestroyIcon,IsWindowVisible,IsIconic,IsZoomed,GetWindowRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMenu,DeleteMenu,GetSystemMenu,0_2_00426B30
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0042AF20 IsIconic,IsZoomed,LoadLibraryA,GetProcAddress,GetProcAddress,FreeLibrary,SystemParametersInfoA,IsWindow,ShowWindow,0_2_0042AF20
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004A356F MonitorFromWindow,IsIconic,GetWindowPlacement,GetWindowRect,0_2_004A356F
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeAPI coverage: 8.7 %
Source: C:\Users\user\Desktop\uCLkYbZQoA.exe TID: 7292Thread sleep time: -60000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004234C0 FindNextFileA,FindClose,FindFirstFileA,FindClose,0_2_004234C0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_0042B8A0 FindFirstFileA,FindClose,0_2_0042B8A0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004B60FD __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,0_2_004B60FD
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00419130 FindFirstFileA,SendMessageA,SendMessageA,FindNextFileA,FindClose,SendMessageA,0_2_00419130
Source: uCLkYbZQoA.exe, 00000000.00000002.2893370678.00000000005A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWph^%SystemRoot%\system32\mswsock.dllkt
Source: uCLkYbZQoA.exe, 00000000.00000003.1699235413.00000000005D9000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000003.2300396487.00000000005D9000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000002.2893579159.00000000005E3000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000003.2300427638.00000000005E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00422D50 GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,FreeLibrary,FreeLibrary,0_2_00422D50
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_00449020 GetProcessHeap,OleInitialize,GetModuleFileNameA,SetCurrentDirectoryA,LoadCursorA,GetStockObject,GetCurrentThreadId,0_2_00449020
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004A65E0 GetLocalTime,GetSystemTime,GetTimeZoneInformation,0_2_004A65E0
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004B005F GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_004B005F
Source: C:\Users\user\Desktop\uCLkYbZQoA.exeCode function: 0_2_004B7F51 __EH_prolog,GetVersion,0_2_004B7F51
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
1
Input Capture
2
System Time Discovery
Remote Services1
Screen Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol1
Input Capture
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares1
Archive Collected Data
1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
Process Discovery
Distributed Component Object Model3
Clipboard Data
11
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
uCLkYbZQoA.exe58%ReversingLabsWin32.Trojan.Zusy
uCLkYbZQoA.exe65%VirustotalBrowse
uCLkYbZQoA.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://pan.baidu.com/s/1D28osmCWE-A_Oote3X5wsg?pwd=985d0%Avira URL Cloudsafe
http://47.110.247.171/login/login.phpl_0%Avira URL Cloudsafe
http://47.110.247.171/chdyz/chdyz.7z.tmpSuper-EC0%Avira URL Cloudsafe
http://47.110.247.171/login/login.php0%Avira URL Cloudsafe
http://www.eyuyan.com)DVarFileInfo$0%Avira URL Cloudsafe
http://47.110.247.171/chdyz/chdyz.7z0%Avira URL Cloudsafe
http://47.110.247.171/login/verup.php0-10%Avira URL Cloudsafe
http://47.110.247.171/wR0%Avira URL Cloudsafe
https://pan.baidu.com/s/1D28osmCWE-A_Oote3X5wsg?pwd=985d0%VirustotalBrowse
http://47.110.247.171/chdyz/chdyz.7z.tmpSuper-EC10%VirustotalBrowse
http://47.110.247.171/login/verup.php0%Avira URL Cloudsafe
http://47.110.247.171/chdyz/chdyz.7z12%VirustotalBrowse
http://47.110.247.171/login/verup.php0-13%VirustotalBrowse
http://47.110.247.171/login/verup.php10%VirustotalBrowse
http://47.110.247.171/chdyz/chdyz.dll100%Avira URL Cloudmalware
http://47.110.247.171/0%Avira URL Cloudsafe
http://47.110.247.171/chdyz/chdyz.exe100%Avira URL Cloudmalware
http://47.110.247.171/login/login.php10%VirustotalBrowse
http://47.110.247.171/chdyz/chdyz.dll15%VirustotalBrowse
http://47.110.247.171/10%VirustotalBrowse
http://47.110.247.171/chdyz/chdyz.exe16%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://47.110.247.171/login/login.phpfalse
  • 10%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://47.110.247.171/login/verup.phpfalse
  • 10%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.eyuyan.com)DVarFileInfo$uCLkYbZQoA.exefalse
  • Avira URL Cloud: safe
unknown
https://pan.baidu.com/s/1D28osmCWE-A_Oote3X5wsg?pwd=985duCLkYbZQoA.exe, 00000000.00000003.1699053207.0000000000600000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000003.2300427638.00000000005E2000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000003.1699280374.0000000000601000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://47.110.247.171/chdyz/chdyz.7z.tmpSuper-ECuCLkYbZQoA.exefalse
  • 10%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://47.110.247.171/login/login.phpl_uCLkYbZQoA.exe, 00000000.00000003.1699111246.00000000005D3000.00000004.00000020.00020000.00000000.sdmp, uCLkYbZQoA.exe, 00000000.00000003.1699235413.00000000005D5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://47.110.247.171/login/verup.php0-1uCLkYbZQoA.exefalse
  • 3%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://47.110.247.171/chdyz/chdyz.7zuCLkYbZQoA.exefalse
  • 12%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://47.110.247.171/wRuCLkYbZQoA.exe, 00000000.00000003.1699111246.00000000005BB000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://47.110.247.171/chdyz/chdyz.dlluCLkYbZQoA.exefalse
  • 15%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
http://47.110.247.171/uCLkYbZQoA.exe, 00000000.00000003.1699111246.00000000005BB000.00000004.00000020.00020000.00000000.sdmpfalse
  • 10%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://47.110.247.171/chdyz/chdyz.exeuCLkYbZQoA.exefalse
  • 16%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
47.110.247.171
unknownChina
37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447638
Start date and time:2024-05-26 08:39:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 39s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:uCLkYbZQoA.exe
renamed because original name is a hash value
Original Sample Name:36cba9f836266dd47c2629af72d7fa24.exe
Detection:MAL
Classification:mal72.winEXE@1/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 96%
  • Number of executed functions: 62
  • Number of non-executed functions: 249
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, MoUsoCoreWorker.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.31.169.57
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, iris-de-prod-azsc-v2-weu-b.westeurope.cloudapp.azure.com, ctldl.windowsupdate.com, arc.trafficmanager.net, 6.d.a.8.b.e.f.b.0.0.0.0.0.0.0.0.4.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, arc.msn.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
  • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
TimeTypeDescription
02:39:59API Interceptor2x Sleep call for process: uCLkYbZQoA.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
47.110.247.171WIxlt6C9uz.exeGet hashmaliciousUnknownBrowse
  • 47.110.247.171/login/login.php
WIxlt6C9uz.exeGet hashmaliciousUnknownBrowse
  • 47.110.247.171/login/login.php
SecuriteInfo.com.Win32.MalwareX-gen.16608.3922.dllGet hashmaliciousUnknownBrowse
  • 47.110.247.171/login/t.php
SecuriteInfo.com.Win32.MalwareX-gen.16608.3922.dllGet hashmaliciousUnknownBrowse
  • 47.110.247.171/login/t.php
XSpitaNHqG.exeGet hashmaliciousUnknownBrowse
  • 47.110.247.171/login/login.php
t3CNhrFqlK.dllGet hashmaliciousUnknownBrowse
  • 47.110.247.171/login/t.php
XSpitaNHqG.exeGet hashmaliciousUnknownBrowse
  • 47.110.247.171/login/login.php
t3CNhrFqlK.dllGet hashmaliciousUnknownBrowse
  • 47.110.247.171/login/t.php
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdBEddZjSb7A.elfGet hashmaliciousUnknownBrowse
  • 47.108.217.163
hgVOQGUGqk.elfGet hashmaliciousUnknownBrowse
  • 8.185.61.106
QN5PrDr5St.elfGet hashmaliciousUnknownBrowse
  • 106.14.214.192
M2Vf6ASl3g.elfGet hashmaliciousUnknownBrowse
  • 114.215.215.188
msjYmnMpqK.exeGet hashmaliciousUnknownBrowse
  • 47.104.173.216
msjYmnMpqK.exeGet hashmaliciousUnknownBrowse
  • 47.104.173.216
VWOm7n5MsV.elfGet hashmaliciousUnknownBrowse
  • 8.184.34.215
hs1vfUvu3u.elfGet hashmaliciousMiraiBrowse
  • 223.7.237.162
venom.exeGet hashmaliciousMetasploitBrowse
  • 47.120.44.103
http://toenpocket.pro/Get hashmaliciousHTMLPhisherBrowse
  • 203.107.62.140
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.425515175081969
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:uCLkYbZQoA.exe
File size:1'056'768 bytes
MD5:36cba9f836266dd47c2629af72d7fa24
SHA1:277628e74f7f1dc7aa16412d5c476f62bab39e89
SHA256:3ce9fcec1c68c11c4502acdd2c0f0e18c5b5593cb0dbe8ca2fd7ac42189617cc
SHA512:02801256dd4341ee4f8ec46a363ad5271bab9db110253a1ac79dc1612b860703ab669e03b653f9f935d56c19b7c35eaa3d118e52f17ebfbdc10e115040a6b776
SSDEEP:24576:F0MgCdHTUzZJdlevZPamfhE/Um7D1fUggepjfJ+gaELmecS:F0MgCdHTkJAUmfhtIaEJB
TLSH:1425AF01B68282F5E64A197004F66737EB3A96870B12CFD7E7A4DD385C33691E13B25E
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,...M._.M._.M._.R._.M._.R._.M._3Q._.M._.Q._.M._.R._.M._.R._.M._.M._.O._3E._.M._.k._nM._.k._.M._XR._.M._XR._.M._.M._.M._wK._.M.
Icon Hash:043b697071334422
Entrypoint:0x4a3970
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x665212BC [Sat May 25 16:33:00 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:de6a340ccaab4aa62f1436825c99450b
Instruction
push ebp
mov ebp, esp
push FFFFFFFFh
push 004D5548h
push 004A69F4h
mov eax, dword ptr fs:[00000000h]
push eax
mov dword ptr fs:[00000000h], esp
sub esp, 58h
push ebx
push esi
push edi
mov dword ptr [ebp-18h], esp
call dword ptr [004C51A0h]
xor edx, edx
mov dl, ah
mov dword ptr [00533E14h], edx
mov ecx, eax
and ecx, 000000FFh
mov dword ptr [00533E10h], ecx
shl ecx, 08h
add ecx, edx
mov dword ptr [00533E0Ch], ecx
shr eax, 10h
mov dword ptr [00533E08h], eax
push 00000001h
call 00007F729D30592Fh
pop ecx
test eax, eax
jne 00007F729D3001DAh
push 0000001Ch
call 00007F729D300298h
pop ecx
call 00007F729D30563Ah
test eax, eax
jne 00007F729D3001DAh
push 00000010h
call 00007F729D300287h
pop ecx
xor esi, esi
mov dword ptr [ebp-04h], esi
call 00007F729D305468h
call dword ptr [004C5364h]
mov dword ptr [00539064h], eax
call 00007F729D305326h
mov dword ptr [00533D80h], eax
call 00007F729D3050CFh
call 00007F729D305011h
call 00007F729D303676h
mov dword ptr [ebp-30h], esi
lea eax, dword ptr [ebp-5Ch]
push eax
call dword ptr [004C51E8h]
call 00007F729D304FA2h
mov dword ptr [ebp-64h], eax
test byte ptr [ebp-30h], 00000001h
je 00007F729D3001D8h
movzx eax, word ptr [ebp+00h]
Programming Language:
  • [ C ] VS98 (6.0) SP6 build 8804
  • [C++] VS98 (6.0) SP6 build 8804
  • [C++] VS98 (6.0) build 8168
  • [ C ] VS98 (6.0) build 8168
  • [EXP] VC++ 6.0 SP5 build 8804
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xdded80x118.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x13a0000x61bc.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xc50000x7b4.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xc3ee20xc4000e6514cb2f624df5f913e520897e6c164False0.5231883769132653data6.578377247668283IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xc50000x1b5520x1c00091aac68872a5e18200263327d9bf6034False0.3055943080357143data4.641371332156871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xe10000x5806a0x1a000848ca09a905e3ac9849f53de0979ca13False0.326904296875data5.367706592968136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x13a0000x61bc0x7000ba0877a18db5765095f0668697aa3e05False0.26810128348214285data5.164274086382286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
TEXTINCLUDE0x13abf40xbASCII text, with no line terminatorsChineseChina1.7272727272727273
TEXTINCLUDE0x13ac000x16dataChineseChina1.3636363636363635
TEXTINCLUDE0x13ac180x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
RT_CURSOR0x13ad6c0x134dataChineseChina0.5811688311688312
RT_CURSOR0x13aea00x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
RT_CURSOR0x13afd40x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
RT_CURSOR0x13b1080xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
RT_BITMAP0x13b1bc0x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.3598901098901099
RT_BITMAP0x13b3280x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
RT_BITMAP0x13b5700x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
RT_BITMAP0x13b6b40x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
RT_BITMAP0x13b80c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
RT_BITMAP0x13b9640x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
RT_BITMAP0x13babc0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
RT_BITMAP0x13bc140x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
RT_BITMAP0x13bd6c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
RT_BITMAP0x13bec40x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
RT_BITMAP0x13c01c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
RT_BITMAP0x13c1740x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
RT_BITMAP0x13c7580xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
RT_BITMAP0x13c8100x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
RT_BITMAP0x13c97c0x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
RT_ICON0x13cac00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
RT_ICON0x13cda80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
RT_ICON0x13ced00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.18738273921200752
RT_MENU0x13df780xcdataChineseChina1.5
RT_MENU0x13df840x284dataChineseChina0.5
RT_DIALOG0x13e2080x98dataChineseChina0.7171052631578947
RT_DIALOG0x13e2a00x17adataChineseChina0.5185185185185185
RT_DIALOG0x13e41c0xfadataChineseChina0.696
RT_DIALOG0x13e5180xeadataChineseChina0.6239316239316239
RT_DIALOG0x13e6040x8aedataChineseChina0.39603960396039606
RT_DIALOG0x13eeb40xb2dataChineseChina0.7359550561797753
RT_DIALOG0x13ef680xccdataChineseChina0.7647058823529411
RT_DIALOG0x13f0340xb2dataChineseChina0.6629213483146067
RT_DIALOG0x13f0e80xe2dataChineseChina0.6637168141592921
RT_DIALOG0x13f1cc0x18cdataChineseChina0.5227272727272727
RT_STRING0x13f3580x50dataChineseChina0.85
RT_STRING0x13f3a80x2cdataChineseChina0.5909090909090909
RT_STRING0x13f3d40x78dataChineseChina0.925
RT_STRING0x13f44c0x1c4dataChineseChina0.8141592920353983
RT_STRING0x13f6100x12adataChineseChina0.5201342281879194
RT_STRING0x13f73c0x146dataChineseChina0.6288343558282209
RT_STRING0x13f8840x40dataChineseChina0.65625
RT_STRING0x13f8c40x64dataChineseChina0.73
RT_STRING0x13f9280x1d8dataChineseChina0.6758474576271186
RT_STRING0x13fb000x114dataChineseChina0.6376811594202898
RT_STRING0x13fc140x24dataChineseChina0.4444444444444444
RT_GROUP_CURSOR0x13fc380x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
RT_GROUP_CURSOR0x13fc4c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
RT_GROUP_CURSOR0x13fc600x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
RT_GROUP_ICON0x13fc840x14data1.2
RT_GROUP_ICON0x13fc980x14dataChineseChina1.2
RT_GROUP_ICON0x13fcac0x14dataChineseChina1.25
RT_VERSION0x13fcc00x240dataChineseChina0.5642361111111112
RT_MANIFEST0x13ff000x2b9XML 1.0 document, ASCII text, with very long lines (697), with no line terminators0.5279770444763271
DLLImport
WINMM.dllmidiStreamOut, midiOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, waveOutClose, waveOutGetNumDevs, waveOutOpen, midiOutUnprepareHeader, midiStreamOpen, midiStreamProperty, midiStreamStop, midiOutReset, midiStreamClose, midiStreamRestart, waveOutUnprepareHeader, waveOutRestart, waveOutPrepareHeader
WS2_32.dllsocket, bind, htons, WSAAsyncSelect, closesocket, send, WSACleanup, WSAStartup, gethostbyname, inet_ntoa, inet_addr, gethostname, ntohl, recvfrom, ioctlsocket, connect, recv, listen, getpeername, accept, getsockname, __WSAFDIsSet, select, ntohs, WSAGetLastError
KERNEL32.dllSetLastError, GetTimeZoneInformation, GetVersion, TerminateThread, lstrcmpiA, MapViewOfFile, CreateFileMappingA, UnmapViewOfFile, FormatMessageA, CreateMutexA, ReleaseMutex, SuspendThread, UnhandledExceptionFilter, GetACP, HeapSize, ExitThread, RaiseException, GetLocalTime, GetSystemTime, RtlUnwind, GetStartupInfoA, GetOEMCP, GetCPInfo, GetProcessVersion, SetErrorMode, GlobalFlags, GetCurrentThread, GetFileTime, TlsGetValue, LocalReAlloc, TlsSetValue, TlsFree, GlobalHandle, TlsAlloc, LocalAlloc, lstrcmpA, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, DuplicateHandle, lstrcpynA, FileTimeToLocalFileTime, FileTimeToSystemTime, InterlockedDecrement, InterlockedIncrement, TerminateProcess, GetCurrentProcess, GetFileSize, SetFilePointer, CreateToolhelp32Snapshot, Process32First, Process32Next, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, GetModuleFileNameA, WideCharToMultiByte, MultiByteToWideChar, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, InterlockedExchange, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, GlobalLock, GlobalUnlock, FindFirstFileA, FindClose, GetFileAttributesA, DeleteFileA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, GetCommandLineA, GetTickCount, CreateProcessA, WaitForSingleObject, CloseHandle, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetEnvironmentVariableA, HeapDestroy, HeapCreate, VirtualFree, SetEnvironmentVariableA, LCMapStringA, LCMapStringW, VirtualAlloc, IsBadWritePtr, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, SetStdHandle, LocalFree
USER32.dllPostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, CopyAcceleratorTableA, GetKeyState, TranslateAcceleratorA, IsWindowEnabled, ShowWindow, SystemParametersInfoA, LoadImageA, LoadStringA, GetMenuCheckMarkDimensions, GetMenuState, SetMenuItemBitmaps, CheckMenuItem, MoveWindow, ModifyMenuA, AppendMenuA, CreatePopupMenu, DrawIconEx, CreateIconFromResource, CreateIconFromResourceEx, RegisterClipboardFormatA, SetRectEmpty, DispatchMessageA, WindowFromPoint, DrawFocusRect, DrawEdge, DrawFrameControl, TranslateMessage, LoadIconA, UnregisterClassA, GetDesktopWindow, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, IntersectRect, SetWindowTextA, IsDialogMessageA, EnumDisplaySettingsA, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, ReleaseDC, IsChild, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, WaitForInputIdle, ClientToScreen, GetClassNameA, GetDlgItem, GetWindowTextA, DrawTextA, SetWindowsHookExA, UnhookWindowsHookEx, EnumThreadWindows, GetWindowTextLengthA, EnumChildWindows, CallNextHookEx, CallWindowProcA, GetWindowDC, GetSysColorBrush, FrameRect, EnableMenuItem, GetSubMenu, GetDlgCtrlID, CreateAcceleratorTableA, ScrollWindowEx, CreateMenu, GetMessageA, CharUpperA, BeginPaint, EndPaint, TabbedTextOutA, GrayStringA, DestroyWindow, CreateDialogIndirectParamA, EndDialog, GetNextDlgTabItem, GetWindowPlacement, RegisterWindowMessageA, GetForegroundWindow, GetLastActivePopup, GetMessageTime, RemovePropA, GetPropA, SetPropA, GetClassLongA, CreateWindowExA, GetMenuItemID, GetMenuItemCount, RegisterClassA, GetScrollPos, AdjustWindowRectEx, MapWindowPoints, SendDlgItemMessageA
GDI32.dllExtSelectClipRgn, ExcludeClipRect, GetClipBox, ScaleWindowExtEx, SetWindowExtEx, SetWindowOrgEx, ScaleViewportExtEx, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, Arc, GetTextExtentPoint32A, GetDeviceCaps, BeginPath, GetWindowOrgEx, GetWindowExtEx, GetDIBits, RealizePalette, SelectPalette, StretchBlt, CreatePalette, GetSystemPaletteEntries, CreateDIBitmap, DeleteObject, SelectClipRgn, CreatePolygonRgn, GetClipRgn, SetStretchBltMode, SetPixel, CreateRectRgnIndirect, SetBkColor, SetBkMode, LineTo, MoveToEx, SetTextColor, CreateEllipticRgnIndirect, GetTextMetricsA, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SetMapMode, SetROP2, SetPolyFillMode, RestoreDC, SaveDC, GetViewportExtEx, PtVisible, RectVisible, TextOutA, ExtTextOutA, Escape, CreateCompatibleDC, GetPixel, BitBlt, StartPage, StartDocA, DeleteDC, EndDoc, EndPage, GetObjectA, GetStockObject, CreateFontIndirectA, CreateSolidBrush, FillRgn, CreateRectRgn, CombineRgn, PatBlt, CreatePen, SelectObject, CreateBitmap, CreateDCA, CreateCompatibleBitmap, GetPolyFillMode, GetStretchBltMode, GetROP2, GetBkColor, EndPath, GetTextColor, CreateRoundRectRgn, CreateEllipticRgn, GetViewportOrgEx, GetBkMode, PathToRegion
MSIMG32.dllGradientFill
WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter
ADVAPI32.dllRegOpenKeyExA, RegSetValueExA, RegQueryValueA, RegCreateKeyExA, RegCloseKey
SHELL32.dllShell_NotifyIconA, ShellExecuteA
ole32.dllCLSIDFromProgID, OleRun, CoCreateInstance, CLSIDFromString, OleUninitialize, OleInitialize
OLEAUT32.dllUnRegisterTypeLib, LoadTypeLib, LHashValOfNameSys, RegisterTypeLib, SafeArrayPutElement, SafeArrayCreate, SafeArrayDestroy, SysAllocString, VariantInit, VariantCopyInd, SafeArrayGetElement, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayGetDim, SafeArrayGetLBound, SafeArrayGetUBound, VariantChangeType, VariantClear, VariantCopy
COMCTL32.dllImageList_GetIcon, ImageList_GetImageCount, ImageList_SetBkColor, _TrackMouseEvent, ImageList_Destroy, ImageList_Read, ImageList_Duplicate
comdlg32.dllChooseColorA, GetFileTitleA, GetSaveFileNameA, GetOpenFileNameA
Language of compilation systemCountry where language is spokenMap
ChineseChina
TimestampSource PortDest PortSource IPDest IP
May 26, 2024 08:39:55.654582024 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:39:55.659555912 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:39:55.659648895 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:39:55.659770966 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:39:55.659806013 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:39:55.701304913 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:39:55.701319933 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:00.639497995 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:00.695543051 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:01.182554007 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:01.182554960 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:01.190354109 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:01.196198940 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:01.993457079 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:01.995601892 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:01.995800018 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:02.000853062 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.054856062 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:02.241645098 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.243351936 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.243464947 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:02.248493910 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.251183033 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.251250029 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:02.255156040 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.304968119 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:02.496406078 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.498560905 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.498801947 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:40:02.503348112 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.503364086 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:40:02.503424883 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:41:02.630690098 CEST4973280192.168.2.447.110.247.171
May 26, 2024 08:41:02.636858940 CEST804973247.110.247.171192.168.2.4
May 26, 2024 08:41:02.636998892 CEST4973280192.168.2.447.110.247.171
TimestampSource PortDest PortSource IPDest IP
May 26, 2024 08:40:44.938066959 CEST5354219162.159.36.2192.168.2.4
May 26, 2024 08:40:45.536604881 CEST53583251.1.1.1192.168.2.4
  • 47.110.247.171
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.44973247.110.247.171807268C:\Users\user\Desktop\uCLkYbZQoA.exe
TimestampBytes transferredDirectionData
May 26, 2024 08:39:55.659770966 CEST359OUTPOST /login/verup.php HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: text/html, application/xhtml+xml, */*
Accept-Encoding: gbk, GB2312
Accept-Language: zh-cn
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Content-Length: 26
Host: 47.110.247.171
May 26, 2024 08:39:55.659806013 CEST26OUTData Raw: 26 74 79 70 65 3d 67 65 74 75 70 26 76 65 72 3d 32 30 32 34 30 35 32 36 30 31
Data Ascii: &type=getup&ver=2024052601
May 26, 2024 08:40:00.639497995 CEST373INHTTP/1.1 200 OK
Server: nginx/1.15.11
Date: Sun, 26 May 2024 06:40:00 GMT
Content-Type: text/html;charset=utf8
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: PHP/7.3.4
Set-Cookie: PHPSESSID=a2gmqfsfo4oeec85s471qq5a7j; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Data Raw: 31 0d 0a 31 0d 0a 30 0d 0a 0d 0a
Data Ascii: 110
May 26, 2024 08:40:01.182554007 CEST359OUTPOST /login/login.php HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: text/html, application/xhtml+xml, */*
Accept-Encoding: gbk, GB2312
Accept-Language: zh-cn
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Content-Length: 12
Host: 47.110.247.171
May 26, 2024 08:40:01.182554960 CEST12OUTData Raw: 26 74 79 70 65 3d 4e 6f 74 69 63 65
Data Ascii: &type=Notice
May 26, 2024 08:40:01.993457079 CEST1236INHTTP/1.1 200 OK
Server: nginx/1.15.11
Date: Sun, 26 May 2024 06:40:01 GMT
Content-Type: text/html;charset=utf8
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: PHP/7.3.4
Set-Cookie: PHPSESSID=e84fv8985osm9slv4kd88rfh8m; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Data Raw: 31 66 30 66 0d 0a 20 e4 bd 9c e8 80 85 51 51 ef bc 9a 37 31 35 31 32 33 35 37 31 20 20 20 20 63 68 64 79 7a e2 91 a0 e7 be a4 ef bc 9a 33 30 36 35 36 31 36 34 32 0d 0a 20 e8 be 85 e5 8a a9 e4 b8 8b e8 bd bd e5 9c b0 e5 9d 80 3a 68 74 74 70 73 3a 2f 2f 70 61 6e 2e 62 61 69 64 75 2e 63 6f 6d 2f 73 2f 31 44 32 38 6f 73 6d 43 57 45 2d 41 5f 4f 6f 74 65 33 58 35 77 73 67 3f 70 77 64 3d 39 38 35 64 20 e6 8f 90 e5 8f 96 e7 a0 81 3a 20 39 38 35 64 20 0d 0a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 20 32 30 32 34 e5 b9 b4 35 e6 9c 88 32 36 e6 97 a5 0d 0a 20 0d 0a 20 63 68 64 79 7a 20 76 32 2e 31 35 2e 30 0d 0a 0d 0a 20 31 2e e6 96 b0 e5 a2 9e e8 bf 9e e7 bb ad e6 8c 87 e4 bb a4 e5 8a 9f e8 83 bd 28 e9 87 8c e9 9d a2 e6 9c 89 e6 89 93 e5 bc 80 4e 50 43 e7 9a 84 e6 8c 87 e4 bb a4 [TRUNCATED]
Data Ascii: 1f0f QQ715123571 chdyz306561642 :https://pan.baidu.com/s/1D28osmCWE-A_Oote3X5wsg?pwd=985d : 985d ----------------------------------------------------------------------------------------- 2024526 chdyz v2.15.0 1.(NPC) ----------------------------------------------------------------------------------------- 2024524 chdyz v2.14.42 1.-> 2. ----------------------------------------------------------------------------------------- 2024523 chdyz v2.14.41 1. 2.1
May 26, 2024 08:40:01.995601892 CEST1236INData Raw: 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d
Data Ascii: ----------------------------------------------------------------------------------------- 2024522 chdyz v2.14.40 1. 2. -------------
May 26, 2024 08:40:02.000853062 CEST448INData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 20 32 30 32 34 e5 b9 b4 31 e6 9c 88 33 30 e6 97 a5 0d 0a 20 0d 0a 20 63 68 64 79 7a 20 76 32 2e 31 34 2e 33 35 0d 0a 0d 0a 20 31 2e e4 bf ae e5 a4 8d e6 8d a1 e7 89
Data Ascii: ------------------------- 2024130 chdyz v2.14.35 1. 2.V6V7 3.
May 26, 2024 08:40:02.241645098 CEST1236INData Raw: bb a4 e9 a2 84 e8 a7 88 e4 b8 80 e7 9b b4 e5 88 b7 e5 b1 8f e7 9a 84 e9 97 ae e9 a2 98 0d 0a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d
Data Ascii: ----------------------------------------------------------------------------------------- 2023119 chdyz v2.14.33 1. -------------------------------------
May 26, 2024 08:40:02.243351936 CEST1236INData Raw: 8b e7 bb a7 e7 bb ad e5 88 a4 e6 96 ad ef bc 8c e8 a7 92 e8 89 b2 e4 b8 ba e7 ab 99 e7 ab 8b e6 88 96 e8 80 85 e5 80 92 e5 9c b0 e6 89 8d e4 bc 9a e5 88 a4 e6 96 ad e4 b8 ba e6 ad bb e4 ba a1 0d 0a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d
Data Ascii: ----------------------------------------------------------------------------------------- 20231024 chdyz v2.14.27 1.Y
May 26, 2024 08:40:02.248493910 CEST1236INData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 20 32 30 32 33 e5 b9 b4 31 30 e6 9c 88 32 30 e6 97 a5 0d 0a
Data Ascii: ------------------------------------------------------------ 20231020 chdyz v2.14.22 1.-> --------------------------------------
May 26, 2024 08:40:02.251183033 CEST1236INData Raw: e6 9c 88 31 35 e6 97 a5 0d 0a 20 0d 0a 20 63 68 64 79 7a 20 76 32 2e 31 34 2e 31 38 0d 0a 0d 0a 20 31 2e e4 bf ae e5 a4 8d e6 92 9e e5 a2 99 e4 b8 8d e5 9b 9e e5 a4 b4 e7 9a 84 e9 97 ae e9 a2 98 0d 0a 0d 0a 20 32 2e e4 bf ae e5 a4 8d e8 84 9a e6
Data Ascii: 15 chdyz v2.14.18 1. 2. 3. 4.2
May 26, 2024 08:40:02.255156040 CEST896INData Raw: 32 30 32 33 e5 b9 b4 31 30 e6 9c 88 31 30 e6 97 a5 0d 0a 20 0d 0a 20 63 68 64 79 7a 20 76 32 2e 31 34 2e 31 33 0d 0a 0d 0a 20 31 2e e6 97 a0 e8 a7 86 e8 ba ab e5 90 8e e6 80 aa e7 89 a9 e7 9a 84 e8 af 86 e5 88 ab e8 8c 83 e5 9b b4 e4 bb 8e e6 94
Data Ascii: 20231010 chdyz v2.14.13 1. 2. 3.
May 26, 2024 08:40:02.496406078 CEST1236INData Raw: 20 33 2e e4 bc 98 e5 8c 96 e6 8a 80 e8 83 bd e9 87 8a e6 94 be 0d 0a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d
Data Ascii: 3. ----------------------------------------------------------------------------------------- 2023106 chdyz v2.14.10 1. 2. --------------


Click to jump to process

Click to jump to process

Target ID:0
Start time:02:39:54
Start date:26/05/2024
Path:C:\Users\user\Desktop\uCLkYbZQoA.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\uCLkYbZQoA.exe"
Imagebase:0x400000
File size:1'056'768 bytes
MD5 hash:36CBA9F836266DD47C2629AF72D7FA24
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:3.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:17.4%
    Total number of Nodes:1436
    Total number of Limit Nodes:78
    execution_graph 60352 40f400 60356 40f428 60352->60356 60370 40f538 60352->60370 60355 40f550 CoCreateInstance 60357 40f572 CoCreateInstance 60355->60357 60358 40f587 60355->60358 60356->60370 60394 42d080 9 API calls 60356->60394 60357->60358 60359 40f58b OleRun 60358->60359 60367 40f5b4 60358->60367 60361 40f5ab 60359->60361 60365 40f59a 60359->60365 60389 40f380 60361->60389 60362 40f45b LoadTypeLib 60363 40f46d 60362->60363 60371 40f4da 60362->60371 60395 42d080 9 API calls 60363->60395 60369 40f478 GetUserDefaultLCID LHashValOfNameSys 60372 40f4b4 60369->60372 60370->60359 60375 4c0008 60370->60375 60397 410980 GetProcessHeap HeapFree 60371->60397 60372->60371 60396 42d080 9 API calls 60372->60396 60374 40f500 RegisterTypeLib 60374->60371 60376 4c0015 60375->60376 60377 4c0057 60375->60377 60380 4c001d lstrlenA 60376->60380 60381 4c0019 60376->60381 60378 4c005f lstrlenA 60377->60378 60379 4c005b 60377->60379 60383 4a5030 60378->60383 60382 4c008d CLSIDFromProgID 60379->60382 60398 4a5030 60380->60398 60384 4c004b CLSIDFromString 60381->60384 60387 40f54c 60382->60387 60386 4c0076 MultiByteToWideChar 60383->60386 60384->60387 60386->60382 60387->60355 60387->60367 60388 4c0034 MultiByteToWideChar 60388->60384 60390 40f3b0 60389->60390 60391 40f38f 60389->60391 60392 40f3ba 60390->60392 60400 42b850 60390->60400 60391->60367 60392->60367 60394->60362 60395->60369 60396->60374 60397->60370 60399 4a503c 60398->60399 60399->60388 60399->60399 60401 42b859 60400->60401 60402 42b87e 60400->60402 60401->60402 60403 42b86b RtlFreeHeap 60401->60403 60402->60392 60403->60402 60404 417640 60432 4b53e8 60404->60432 60406 417665 60407 4176a5 60406->60407 60436 4113a0 60406->60436 60409 4177df 60445 4b7606 60409->60445 60412 4176a1 60412->60407 60412->60409 60452 4324a0 122 API calls 60412->60452 60415 417732 60415->60409 60453 4bc070 58 API calls __EH_prolog 60415->60453 60416 417832 60417 417868 60416->60417 60418 41783a SendMessageA 60416->60418 60420 417884 60417->60420 60421 41786d SendMessageA 60417->60421 60421->60420 60422 41774a GetSysColor 60454 432580 52 API calls __ftol 60422->60454 60424 41776b 60425 4177b3 60424->60425 60426 4177a9 DestroyIcon 60424->60426 60431 417770 60424->60431 60428 4177c0 60425->60428 60455 4b5411 29 API calls __startOneArgErrorHandling 60425->60455 60426->60425 60456 4b5411 29 API calls __startOneArgErrorHandling 60428->60456 60457 4bc0e2 59 API calls __EH_prolog 60431->60457 60435 4b53ee 60432->60435 60434 4b540c 60434->60406 60435->60434 60470 4a5337 60435->60470 60438 4113c1 60436->60438 60437 41146d 60437->60412 60438->60437 60501 4bc5a0 29 API calls __EH_prolog 60438->60501 60440 41141c 60502 4bc67c 32 API calls __EH_prolog 60440->60502 60442 411443 60503 4bce48 39 API calls __EH_prolog 60442->60503 60444 411457 60444->60412 60504 4bec24 60445->60504 60450 417818 60450->60407 60458 4763b0 60450->60458 60452->60415 60453->60422 60454->60424 60455->60428 60456->60431 60457->60409 60459 476401 GetStockObject 60458->60459 60460 4763bb 60458->60460 60562 4bc303 57 API calls 60459->60562 60556 411530 60460->60556 60464 47640f 60466 476416 SendMessageA 60464->60466 60467 476413 60464->60467 60465 4763d0 60468 4763d4 SendMessageA 60465->60468 60469 4763e9 SendMessageA 60465->60469 60466->60416 60467->60466 60468->60416 60469->60416 60473 4a5349 60470->60473 60474 4a5346 60473->60474 60476 4a5350 __startOneArgErrorHandling 60473->60476 60474->60435 60476->60474 60477 4a5375 60476->60477 60478 4a53a2 60477->60478 60479 4a53e5 60477->60479 60486 4a53d0 60478->60486 60495 4ab7e4 29 API calls __startOneArgErrorHandling 60478->60495 60485 4a5407 60479->60485 60479->60486 60481 4a53b8 60496 4acdc1 5 API calls __startOneArgErrorHandling 60481->60496 60482 4a5454 RtlAllocateHeap 60484 4a53d7 60482->60484 60484->60476 60498 4ab7e4 29 API calls __startOneArgErrorHandling 60485->60498 60486->60482 60486->60484 60487 4a53c3 60497 4a53dc LeaveCriticalSection __startOneArgErrorHandling 60487->60497 60489 4a540e 60499 4ad864 6 API calls __startOneArgErrorHandling 60489->60499 60492 4a5421 60500 4a543b LeaveCriticalSection __startOneArgErrorHandling 60492->60500 60494 4a542e 60494->60484 60494->60486 60495->60481 60496->60487 60497->60486 60498->60489 60499->60492 60500->60494 60501->60440 60502->60442 60503->60444 60523 4bf1ac 60504->60523 60507 4b7650 60507->60450 60509 4b7578 60507->60509 60510 4bf1ac 21 API calls 60509->60510 60511 4b7589 60510->60511 60512 4b75bc CreateWindowExA 60511->60512 60513 4b759a GetCurrentThreadId SetWindowsHookExA 60511->60513 60516 4b75c4 60512->60516 60513->60512 60514 4b75b7 60513->60514 60555 4b31c8 RaiseException 60514->60555 60517 4bf1ac 21 API calls 60516->60517 60518 4b75d4 60517->60518 60519 4bec24 28 API calls 60518->60519 60520 4b75db 60519->60520 60521 4b75f3 60520->60521 60522 4b75e8 UnhookWindowsHookEx 60520->60522 60521->60450 60522->60521 60524 4bf1e2 TlsGetValue 60523->60524 60525 4bf1b5 60523->60525 60526 4bf1f5 60524->60526 60527 4bf1cf 60525->60527 60550 4bedac RaiseException TlsAlloc InitializeCriticalSection 60525->60550 60530 4bf208 60526->60530 60531 4bec33 60526->60531 60540 4bee45 EnterCriticalSection 60527->60540 60529 4bf1e0 60529->60524 60551 4befb4 8 API calls __startOneArgErrorHandling 60530->60551 60531->60507 60534 4bf241 60531->60534 60535 4bf24b __EH_prolog 60534->60535 60536 4bf279 60535->60536 60553 4bfe97 6 API calls 60535->60553 60536->60507 60538 4bf262 60554 4bff07 LeaveCriticalSection 60538->60554 60546 4bee64 60540->60546 60541 4bee9e GlobalAlloc 60545 4beed3 60541->60545 60542 4beeb1 GlobalHandle GlobalUnlock GlobalReAlloc 60542->60545 60543 4bef20 __startOneArgErrorHandling 60544 4bef35 LeaveCriticalSection 60543->60544 60544->60529 60547 4beefc GlobalLock 60545->60547 60548 4beee1 GlobalHandle GlobalLock LeaveCriticalSection 60545->60548 60546->60541 60546->60542 60546->60543 60547->60543 60552 4b31c8 RaiseException 60548->60552 60550->60527 60551->60531 60553->60538 60554->60536 60557 41154c CreateFontIndirectA 60556->60557 60558 41153e 60556->60558 60563 4bc318 60557->60563 60558->60557 60569 4bc36f 58 API calls 60558->60569 60562->60464 60564 4bc328 60563->60564 60565 411587 60563->60565 60570 4bc291 57 API calls __EH_prolog 60564->60570 60565->60459 60565->60465 60567 4bc32f 60571 4b5069 29 API calls 60567->60571 60569->60557 60570->60567 60571->60565 60572 4234c0 60573 4234d2 60572->60573 60574 42350c FindNextFileA 60573->60574 60575 423520 FindClose 60573->60575 60576 423527 FindFirstFileA 60573->60576 60577 423586 60573->60577 60578 423582 60573->60578 60574->60573 60575->60576 60576->60573 60577->60578 60579 42358a FindClose 60577->60579 60579->60578 60580 471800 60583 476280 60580->60583 60582 47180a SendMessageA 60584 476295 60583->60584 60584->60582 60585 477a00 60586 477a16 60585->60586 60587 477a0f 60585->60587 60592 477780 60586->60592 60612 477960 SetWindowLongA GetProcessHeap HeapFree RedrawWindow 60587->60612 60590 477a14 60591 477a1b EnumChildWindows 60590->60591 60593 47778c 60592->60593 60594 47793d 60593->60594 60613 477520 GetClassNameA 60593->60613 60594->60591 60596 47779a 60596->60594 60597 4777b3 GetWindowLongA GetProcessHeap HeapAlloc GetFocus 60596->60597 60598 477803 SetWindowLongA 60597->60598 60599 4777fb 60597->60599 60600 477924 RedrawWindow 60598->60600 60601 47781d 60598->60601 60599->60598 60600->60591 60602 477824 SendMessageA 60601->60602 60603 477881 60601->60603 60608 477848 60601->60608 60602->60608 60604 477886 60603->60604 60605 47788e SendMessageA 60603->60605 60604->60605 60607 477520 7 API calls 60605->60607 60609 4778a6 60607->60609 60608->60600 60609->60600 60610 4778ab SendMessageA 60609->60610 60611 4778bd 60610->60611 60611->60600 60612->60590 60614 47754f lstrcmpiA 60613->60614 60615 47755d 60614->60615 60616 477569 lstrcmpiA 60614->60616 60615->60614 60615->60616 60617 47758b GetWindowLongA 60616->60617 60618 477579 60616->60618 60619 47759f 60617->60619 60620 4775d7 60617->60620 60618->60596 60619->60620 60621 4775a6 60619->60621 60622 4775c4 GetWindowTextLengthA 60619->60622 60623 47763f GetParent GetClassNameA 60619->60623 60620->60596 60621->60620 60621->60622 60622->60620 60623->60620 60624 4790c0 60625 4793b3 60624->60625 60656 4782b0 GetWindowRect GetWindowDC CreateCompatibleDC SetBkMode 60625->60656 60628 47946b 60630 47946f InflateRect CreateSolidBrush FrameRect DeleteObject InflateRect 60628->60630 60629 479459 GetSysColor 60629->60630 60631 4794b5 CreateSolidBrush FillRect DeleteObject 60630->60631 60634 4794d7 60630->60634 60632 47952a InflateRect 60631->60632 60633 479540 60632->60633 60637 47957c GetSysColor SetPixel SetPixel SetPixel SetPixel 60633->60637 60663 4784b0 GradientFill GradientFill 60633->60663 60662 4784b0 GradientFill GradientFill 60634->60662 60638 4795dc GetSysColor 60637->60638 60639 4795ea 60637->60639 60640 4795ee SetPixel SetPixel SetPixel SetPixel 60638->60640 60639->60640 60641 479634 GetSysColor 60640->60641 60642 479642 60640->60642 60643 479646 8 API calls 60641->60643 60642->60643 60644 4796d4 InflateRect DrawFocusRect InflateRect 60643->60644 60645 479700 GetWindowTextA 60643->60645 60644->60645 60646 47971f 60645->60646 60647 4797ae 60645->60647 60648 479725 OffsetRect 60646->60648 60649 479734 SetTextColor SendMessageA SelectObject GetWindowLongA 60646->60649 60665 478380 6 API calls 60647->60665 60648->60649 60653 479789 60649->60653 60651 4797c0 60664 476c30 32 API calls 60653->60664 60655 4797a3 SelectObject 60655->60647 60657 4782ec 60656->60657 60658 4782fa CreateCompatibleBitmap 60656->60658 60659 478329 SelectObject 60657->60659 60658->60659 60660 47836b GetClientRect FillRect GetSysColorBrush FrameRect 60659->60660 60661 47833a BitBlt 60659->60661 60660->60628 60660->60629 60661->60660 60662->60632 60663->60637 60664->60655 60665->60651 60666 477a80 60667 477ab1 60666->60667 60668 477aba 60667->60668 60669 477b09 60667->60669 60670 477ad8 60667->60670 60673 477b41 60669->60673 60674 477b0e CallWindowProcA 60669->60674 60671 477ae2 CallWindowProcA 60670->60671 60672 477bce 60670->60672 60700 477e10 60672->60700 60677 477b76 60673->60677 60678 477b49 60673->60678 60736 477960 SetWindowLongA GetProcessHeap HeapFree RedrawWindow 60674->60736 60677->60672 60682 477b7b 6 API calls 60677->60682 60678->60672 60681 477b4f CallWindowProcA 60678->60681 60679 477bdd 60683 477bf2 60679->60683 60737 477d00 _TrackMouseEvent 60679->60737 60680 477b2c 60682->60672 60685 477c03 CallWindowProcA 60683->60685 60686 477c1d 60683->60686 60685->60686 60687 477c24 DefWindowProcA 60686->60687 60688 477c3a 60686->60688 60687->60688 60691 477c4b 60688->60691 60692 477c78 60688->60692 60697 477c4e 60688->60697 60689 477ca2 60694 477cbf 60689->60694 60695 477ca9 DefWindowProcA 60689->60695 60690 477c88 CallWindowProcA 60690->60689 60696 477c70 60691->60696 60691->60697 60705 47a520 60692->60705 60695->60694 60738 47ab90 28 API calls 60696->60738 60697->60689 60697->60690 60699 477c76 60699->60697 60701 477e26 60700->60701 60702 477e31 60700->60702 60701->60702 60703 478069 GetClientRect 60701->60703 60702->60679 60704 478084 60703->60704 60704->60679 60706 47a53f 60705->60706 60707 4782b0 7 API calls 60706->60707 60708 47a571 GetClientRect GetWindowTextA 60707->60708 60709 47a5dd SendMessageA SelectObject 60708->60709 60710 47a59c 60708->60710 60739 47a500 60709->60739 60712 47a5b7 GetTextExtentPoint32A 60710->60712 60714 47a6be 36 API calls 60712->60714 60715 47a9f3 GetTextMetricsA 60714->60715 60716 47aafd 60714->60716 60720 47a500 60715->60720 60718 47ab07 SelectObject 60716->60718 60719 47ab13 60716->60719 60717 47a63f FillRect 60717->60714 60718->60719 60741 478380 6 API calls 60719->60741 60721 47aa10 GetWindowLongA 60720->60721 60724 47aa28 60721->60724 60726 47aa2d 60724->60726 60727 47aa79 60724->60727 60728 47ab2c 60724->60728 60725 47ab21 60725->60697 60730 47aa4c SetPixel 60726->60730 60731 47aacb SetTextColor DrawTextA 60726->60731 60729 47ab34 60727->60729 60732 47aa81 60727->60732 60728->60726 60728->60729 60729->60731 60735 47ab5f SetPixel 60729->60735 60730->60730 60733 47aa6e 60730->60733 60731->60716 60732->60731 60734 47aaa6 SetPixel 60732->60734 60733->60731 60734->60731 60734->60734 60735->60733 60735->60735 60736->60680 60737->60683 60738->60699 60740 47a50b GetTextExtentPoint32A GetWindowLongA 60739->60740 60740->60717 60741->60725 60742 420dcb 60743 420dd3 60742->60743 60744 420de5 60742->60744 60749 42b750 RtlAllocateHeap 60743->60749 60753 42b6a0 HeapAlloc 60744->60753 60747 420ddd 60748 420def 60748->60747 60750 42b770 60749->60750 60751 42b779 60749->60751 60754 4230f0 133 API calls 60750->60754 60751->60747 60753->60748 60754->60751 60755 4b7382 60756 4bf1ac 21 API calls 60755->60756 60757 4b7397 60756->60757 60758 4b73a0 CallNextHookEx 60757->60758 60759 4b73b7 60757->60759 60760 4b756f 60758->60760 60761 4bec24 28 API calls 60759->60761 60762 4b73c7 60761->60762 60763 4b74df CallNextHookEx 60762->60763 60764 4b743c 60762->60764 60765 4b73f0 GetClassLongA 60762->60765 60763->60760 60773 4b7562 UnhookWindowsHookEx 60763->60773 60768 4b74ed GetWindowLongA 60764->60768 60769 4b7444 60764->60769 60765->60763 60766 4b7404 60765->60766 60771 4b7428 lstrcmpiA 60766->60771 60772 4b7411 GlobalGetAtomNameA 60766->60772 60768->60763 60770 4b74fd GetPropA 60768->60770 60788 4b70ef 58 API calls 60769->60788 60770->60763 60775 4b7510 SetPropA GetPropA 60770->60775 60771->60763 60771->60764 60772->60771 60773->60760 60775->60763 60776 4b7524 GlobalAddAtomA 60775->60776 60777 4b7539 60776->60777 60778 4b753e SetWindowLongA 60776->60778 60777->60778 60778->60763 60779 4b74ca 60780 4b74cf SetWindowLongA 60779->60780 60780->60763 60781 4b744c 60781->60779 60789 4b6edf 60781->60789 60784 4b7496 60785 4b749b GetWindowLongA 60784->60785 60786 4b74b8 60785->60786 60786->60763 60787 4b74bc SetWindowLongA 60786->60787 60787->60763 60788->60781 60790 4b6ee9 __EH_prolog 60789->60790 60791 4bf1ac 21 API calls 60790->60791 60793 4b6f01 60791->60793 60792 4b6f5e 60799 4b7f0d 60792->60799 60793->60792 60805 4b6d6c GetWindowRect 60793->60805 60796 4b6f87 60796->60779 60796->60784 60821 4b7f51 60799->60821 60884 4b7011 60799->60884 60800 4b6f6f 60800->60796 60808 4b6d8f 60800->60808 60801 4b7f2f 60801->60800 60889 4b7943 60801->60889 60806 4b9917 GetWindowLongA 60805->60806 60807 4b6d85 60806->60807 60807->60792 60809 4b6d9c 60808->60809 60810 4b6e03 60808->60810 60811 4b9917 GetWindowLongA 60809->60811 60810->60796 60812 4b6da6 60811->60812 60812->60810 60813 4b6dad GetWindowRect 60812->60813 60813->60810 60814 4b6dc4 60813->60814 60814->60810 60815 4b6dcc GetWindow 60814->60815 60816 4b70aa 58 API calls 60815->60816 60817 4b6ddd 60816->60817 60819 4b6de8 60817->60819 60992 4b9aa6 IsWindowEnabled 60817->60992 60819->60810 60963 4b8fae 60819->60963 60822 4b7f5b __EH_prolog 60821->60822 60823 4b7fcf 60822->60823 60874 4b7f72 60822->60874 60894 4b70aa 60822->60894 60825 4b7fec 60823->60825 60826 4b7fd4 60823->60826 60911 4bfe97 6 API calls 60825->60911 60910 4b6e69 66 API calls 60826->60910 60829 4b7fe4 60829->60825 60829->60874 60832 4b800d 60833 4b802b 60832->60833 60841 4b8052 60832->60841 60912 4bff07 LeaveCriticalSection 60833->60912 60834 4b80cf 60913 4bff07 LeaveCriticalSection 60834->60913 60837 4b80ed 60914 4bff07 LeaveCriticalSection 60837->60914 60838 4b811b 60843 4b828b 60838->60843 60844 4b8142 60838->60844 60845 4b8302 60838->60845 60846 4b82c1 60838->60846 60847 4b82d5 60838->60847 60848 4b8319 60838->60848 60849 4b8159 60838->60849 60850 4b8310 60838->60850 60851 4b8215 60838->60851 60852 4b82a9 60838->60852 60853 4b8328 60838->60853 60854 4b82e2 60838->60854 60855 4b812c 60838->60855 60856 4b823e 60838->60856 60857 4b83b0 60838->60857 60858 4b82b7 60838->60858 60838->60874 60878 4b8167 60838->60878 60879 4b81d4 60838->60879 60839 4b8109 GetVersion 60839->60838 60841->60834 60841->60837 60841->60857 60842 4b8038 60842->60838 60842->60839 60842->60874 60863 4b70aa 58 API calls 60843->60863 60868 4b70aa 58 API calls 60844->60868 60871 4b70aa 58 API calls 60845->60871 60924 4baa36 57 API calls 60846->60924 60875 4b70aa 58 API calls 60847->60875 60860 4b70aa 58 API calls 60848->60860 60870 4b70aa 58 API calls 60849->60870 60859 4b70aa 58 API calls 60850->60859 60861 4b70aa 58 API calls 60851->60861 60922 4bb7c3 57 API calls 60852->60922 60872 4b70aa 58 API calls 60853->60872 60853->60874 60876 4b70aa 58 API calls 60854->60876 60915 4bb7c3 57 API calls 60855->60915 60921 4baa36 57 API calls 60856->60921 60925 4bff07 LeaveCriticalSection 60857->60925 60923 4baa36 57 API calls 60858->60923 60859->60874 60860->60874 60861->60874 60873 4b8293 60863->60873 60868->60874 60870->60874 60871->60874 60872->60874 60877 4b70aa 58 API calls 60873->60877 60874->60801 60875->60874 60876->60874 60877->60874 60916 4b70d1 60878->60916 60920 4bb856 58 API calls __EH_prolog 60879->60920 60882 4b8193 60919 4b7738 58 API calls __EH_prolog 60882->60919 60885 4bf1ac 21 API calls 60884->60885 60886 4b7023 60885->60886 60888 4b7943 2 API calls 60886->60888 60887 4b7036 60887->60801 60888->60887 60890 4b7972 CallWindowProcA 60889->60890 60891 4b7950 60889->60891 60892 4b7985 60890->60892 60891->60890 60893 4b795e DefWindowProcA 60891->60893 60892->60800 60893->60892 60926 4b7038 60894->60926 60896 4b70b3 60934 4bb120 60896->60934 60898 4b70c0 60940 4b9b09 60898->60940 60900 4b70ca 60901 4b6e08 60900->60901 60952 4b9917 60901->60952 60903 4b6e1a 60904 4b6e62 60903->60904 60955 4b8676 60903->60955 60904->60823 60906 4b6e28 60907 4b8676 62 API calls 60906->60907 60908 4b6e34 60907->60908 60908->60904 60909 4b6e4d SendMessageA 60908->60909 60909->60904 60910->60829 60911->60832 60912->60842 60913->60874 60914->60842 60915->60874 60917 4b7038 57 API calls 60916->60917 60918 4b70d8 60917->60918 60918->60882 60919->60879 60920->60874 60921->60874 60922->60874 60923->60874 60924->60874 60925->60874 60927 4b7042 __EH_prolog 60926->60927 60944 4bec4a 60927->60944 60929 4b7048 60930 4b53e8 29 API calls 60929->60930 60932 4b7086 60929->60932 60931 4b706a 60930->60931 60931->60932 60949 4bb0bb 29 API calls __EH_prolog 60931->60949 60932->60896 60935 4bb12a __EH_prolog 60934->60935 60936 4bb19f 60935->60936 60939 4bb13b 60935->60939 60950 4b31c8 RaiseException 60935->60950 60951 4b5069 29 API calls 60936->60951 60939->60898 60941 4b9b2c 60940->60941 60942 4b9b10 60940->60942 60941->60900 60942->60941 60943 4b9b16 GetParent 60942->60943 60943->60941 60945 4bec24 28 API calls 60944->60945 60946 4bec4f 60945->60946 60947 4bf1ac 21 API calls 60946->60947 60948 4bec60 60947->60948 60948->60929 60949->60932 60951->60939 60953 4b992a 60952->60953 60954 4b991e GetWindowLongA 60952->60954 60954->60903 60956 4b8681 60955->60956 60958 4b867a 60955->60958 60956->60906 60958->60956 60959 4b8696 60958->60959 60962 4b8631 62 API calls 60958->60962 60960 4b70aa 58 API calls 60959->60960 60961 4b869c 60960->60961 60961->60906 60962->60958 60964 4b9917 GetWindowLongA 60963->60964 60965 4b8fc1 60964->60965 60966 4b8fcb 60965->60966 60968 4b8fe1 GetWindow 60965->60968 60969 4b8fd6 GetParent 60965->60969 60967 4b9008 GetWindowRect 60966->60967 60970 4b90ac GetParent GetClientRect GetClientRect MapWindowPoints 60967->60970 60971 4b9021 60967->60971 60972 4b8fec 60968->60972 60969->60972 60975 4b90d9 60970->60975 60973 4b9035 60971->60973 60974 4b9025 GetWindowLongA 60971->60974 60972->60967 60976 4b8ff2 SendMessageA 60972->60976 60977 4b9049 60973->60977 60978 4b9083 GetWindowRect 60973->60978 60974->60973 60993 4b9a30 60975->60993 60976->60966 60976->60967 60997 4a3405 28 API calls 60977->60997 61000 4a356f 14 API calls 60978->61000 60981 4b9096 61001 4a35da 12 API calls 60981->61001 60982 4b904e 60998 4a356f 14 API calls 60982->60998 60985 4b909c CopyRect 60985->60975 60989 4b9061 60999 4a35da 12 API calls 60989->60999 60991 4b9067 CopyRect CopyRect 60991->60975 60992->60819 60994 4b9a3a SetWindowPos 60993->60994 60995 4b915c 60993->60995 60994->60995 60995->60810 60997->60982 60998->60989 60999->60991 61000->60981 61001->60985 61002 4b7306 61003 4bf241 7 API calls 61002->61003 61004 4b731a 61003->61004 61008 4b7364 61004->61008 61036 4b8e79 7 API calls 61004->61036 61007 4b7368 61008->61007 61009 4b71a7 61008->61009 61037 4a7c38 61009->61037 61011 4b71b1 GetPropA 61012 4b7291 61011->61012 61013 4b71e4 61011->61013 61014 4b70aa 58 API calls 61012->61014 61015 4b71ed 61013->61015 61016 4b7270 61013->61016 61017 4b7299 61014->61017 61018 4b724c SetWindowLongA RemovePropA GlobalFindAtomA GlobalDeleteAtom 61015->61018 61019 4b71f2 61015->61019 61020 4b70aa 58 API calls 61016->61020 61021 4b70aa 58 API calls 61017->61021 61022 4b72af CallWindowProcA 61018->61022 61019->61022 61023 4b71fd 61019->61023 61024 4b7276 61020->61024 61025 4b72a1 61021->61025 61027 4b7238 61022->61027 61026 4b70aa 58 API calls 61023->61026 61038 4b6e69 66 API calls 61024->61038 61030 4b6e08 64 API calls 61025->61030 61031 4b7203 61026->61031 61027->61007 61029 4b7288 61032 4b72ab 61029->61032 61030->61032 61033 4b6d6c 2 API calls 61031->61033 61032->61022 61032->61027 61034 4b7213 CallWindowProcA 61033->61034 61035 4b6d8f 95 API calls 61034->61035 61035->61027 61036->61008 61037->61011 61038->61029 61039 416d10 61040 4b53e8 29 API calls 61039->61040 61041 416d2e 61040->61041 61042 416d70 61041->61042 61043 4113a0 39 API calls 61041->61043 61044 416d6c 61043->61044 61044->61042 61053 411510 61044->61053 61047 4bc318 57 API calls 61048 416db7 61047->61048 61049 4b7606 32 API calls 61048->61049 61050 416e0d 61049->61050 61050->61042 61051 4763b0 63 API calls 61050->61051 61052 416e24 61051->61052 61054 411523 CreateSolidBrush 61053->61054 61055 41151b GetSysColor 61053->61055 61054->61047 61055->61054 61056 41a890 61057 4b53e8 29 API calls 61056->61057 61058 41a8b6 61057->61058 61059 41a8f6 61058->61059 61060 4113a0 39 API calls 61058->61060 61061 41a8f2 61060->61061 61061->61059 61062 411510 GetSysColor 61061->61062 61063 41a986 CreateSolidBrush 61062->61063 61064 4bc318 57 API calls 61063->61064 61068 41a99e 61064->61068 61065 41aa60 61066 4b7606 32 API calls 61065->61066 61067 41aa99 61066->61067 61067->61059 61070 4763b0 63 API calls 61067->61070 61068->61065 61087 4324a0 122 API calls 61068->61087 61072 41aab3 61070->61072 61071 41a9bd 61071->61065 61088 4bc070 58 API calls __EH_prolog 61071->61088 61076 41aaeb SendMessageA 61072->61076 61077 41aaed SendMessageA 61072->61077 61075 41a9d5 61089 432580 52 API calls __ftol 61075->61089 61076->61077 61079 41a9ee 61080 41aa35 61079->61080 61081 41aa2b DestroyIcon 61079->61081 61086 41a9f3 61079->61086 61083 41aa42 61080->61083 61090 4b5411 29 API calls __startOneArgErrorHandling 61080->61090 61081->61080 61091 4b5411 29 API calls __startOneArgErrorHandling 61083->61091 61092 4bc0e2 59 API calls __EH_prolog 61086->61092 61087->61071 61088->61075 61089->61079 61090->61083 61091->61086 61092->61065 61093 42b250 61096 42b230 61093->61096 61099 422d50 61096->61099 61098 42b241 61100 422e15 61099->61100 61101 422d7b 61099->61101 61102 4230b6 61100->61102 61105 422e43 61100->61105 61180 4a4608 6 API calls 61100->61180 61103 422d9a 61101->61103 61104 422da3 GetProcAddress 61101->61104 61102->61098 61176 4a4608 6 API calls 61103->61176 61109 422dc3 61104->61109 61110 422df8 61104->61110 61118 422f81 61105->61118 61120 422e6e 61105->61120 61177 42c6b0 65 API calls 61109->61177 61179 422d30 35 API calls 61110->61179 61113 422dff 61113->61098 61114 422f86 LoadLibraryA 61116 422f96 GetProcAddress 61114->61116 61114->61118 61115 422dd3 61178 423130 132 API calls 61115->61178 61116->61118 61118->61114 61122 422fdc 61118->61122 61124 422fc8 FreeLibrary 61118->61124 61119 422de7 61125 4b56a7 32 API calls 61119->61125 61121 422f4c LoadLibraryA 61120->61121 61126 422ec2 61120->61126 61127 422e9a 61120->61127 61121->61122 61123 422f59 GetProcAddress 61121->61123 61122->61102 61128 422ff1 FreeLibrary 61122->61128 61135 422ff8 61122->61135 61123->61122 61130 422f69 61123->61130 61124->61118 61125->61110 61161 4b58f0 61126->61161 61131 4b58f0 38 API calls 61127->61131 61128->61135 61130->61122 61133 422ea6 LoadLibraryA 61131->61133 61134 4b56a7 32 API calls 61133->61134 61137 422eb6 61134->61137 61138 423060 61135->61138 61139 423009 61135->61139 61136 4b58f0 38 API calls 61140 422eec LoadLibraryA 61136->61140 61137->61123 61137->61126 61183 42c6b0 65 API calls 61138->61183 61181 42c6b0 65 API calls 61139->61181 61171 4b56a7 61140->61171 61144 42301e 61182 423130 132 API calls 61144->61182 61146 423074 61184 423130 132 API calls 61146->61184 61148 4b56a7 32 API calls 61152 422f0d 61148->61152 61150 42308f 61153 4b56a7 32 API calls 61150->61153 61151 423039 61154 4b56a7 32 API calls 61151->61154 61152->61123 61157 422f44 61152->61157 61158 4b58f0 38 API calls 61152->61158 61155 4230a0 61153->61155 61156 42304a 61154->61156 61155->61098 61156->61098 61157->61121 61157->61123 61159 422f34 LoadLibraryA 61158->61159 61160 4b56a7 32 API calls 61159->61160 61160->61157 61162 4b58fa __EH_prolog 61161->61162 61163 4b5919 lstrlenA 61162->61163 61164 4b5915 61162->61164 61163->61164 61185 4b584c 61164->61185 61166 4b5937 61189 4b541c 61166->61189 61169 4b56a7 32 API calls 61170 422ed8 61169->61170 61170->61136 61172 422efc 61171->61172 61173 4b56b7 InterlockedDecrement 61171->61173 61172->61148 61173->61172 61174 4b56c5 61173->61174 61225 4b5596 31 API calls 61174->61225 61176->61104 61177->61115 61178->61119 61179->61113 61180->61105 61181->61144 61182->61151 61183->61146 61184->61150 61186 4b5860 61185->61186 61187 4b5866 61185->61187 61194 4b5514 61186->61194 61187->61166 61190 4b542b InterlockedIncrement 61189->61190 61191 4b5439 61189->61191 61192 4b5449 61190->61192 61210 4b57e4 61191->61210 61192->61169 61197 4b5529 61194->61197 61198 4b5520 61194->61198 61195 4b5531 61201 4a3851 61195->61201 61197->61195 61199 4b5570 61197->61199 61198->61187 61200 4b53e8 29 API calls 61199->61200 61200->61198 61208 4a7c38 61201->61208 61203 4a385b EnterCriticalSection 61204 4a38aa LeaveCriticalSection 61203->61204 61205 4a3879 61203->61205 61204->61198 61209 4b4ed1 29 API calls 61205->61209 61207 4a388b 61207->61204 61208->61203 61209->61207 61211 4b57f4 lstrlenA 61210->61211 61212 4b57f0 61210->61212 61211->61212 61215 4b5767 61212->61215 61214 4b5804 61214->61192 61218 4b567e 61215->61218 61217 4b5775 61217->61214 61219 4b568e 61218->61219 61220 4b56a2 61219->61220 61224 4b55de 32 API calls 61219->61224 61220->61217 61222 4b569a 61223 4b5514 31 API calls 61222->61223 61223->61220 61224->61222 61225->61172 61226 42b210 61229 449020 GetProcessHeap 61226->61229 61230 449095 GetModuleFileNameA 61229->61230 61231 449083 OleInitialize 61229->61231 61282 4a5a24 61230->61282 61231->61230 61233 4490b7 61234 4490c0 61233->61234 61235 4490db 61233->61235 61236 4b57e4 35 API calls 61234->61236 61294 4b5632 35 API calls 61235->61294 61238 4490d7 61236->61238 61239 4b57e4 35 API calls 61238->61239 61240 4490fa SetCurrentDirectoryA 61239->61240 61241 44911d 61240->61241 61242 449151 LoadCursorA GetStockObject 61241->61242 61288 42c750 61242->61288 61245 4b7606 32 API calls 61246 4491a1 GetCurrentThreadId 61245->61246 61247 4491b6 61246->61247 61253 44922a 61247->61253 61295 410ef0 7 API calls 61247->61295 61249 42b21d 61250 4491fb 61296 410ef0 7 API calls 61250->61296 61255 4492ef 61253->61255 61299 410ef0 7 API calls 61253->61299 61254 4492d6 61300 410ef0 7 API calls 61254->61300 61255->61249 61301 4b5c63 61255->61301 61256 449209 61297 410ef0 7 API calls 61256->61297 61260 449219 61298 410ef0 7 API calls 61260->61298 61262 44931b 61304 4bc5a0 29 API calls __EH_prolog 61262->61304 61264 44935e 61305 41f970 46 API calls 61264->61305 61266 449371 61306 4bc67c 32 API calls __EH_prolog 61266->61306 61268 44938a 61307 4bce48 39 API calls __EH_prolog 61268->61307 61270 449396 61308 4b5ca1 23 API calls 61270->61308 61272 44939e 61309 41ef30 7 API calls 61272->61309 61274 4494bc 61310 410980 GetProcessHeap HeapFree 61274->61310 61276 4494c4 61311 41f8b0 64 API calls 61276->61311 61278 4494da 61312 410980 GetProcessHeap HeapFree 61278->61312 61280 44953e 61313 410980 GetProcessHeap HeapFree 61280->61313 61283 4a5a41 61282->61283 61285 4a5a32 61282->61285 61314 4ab7e4 29 API calls __startOneArgErrorHandling 61283->61314 61285->61233 61286 4a5a49 61315 4ab845 LeaveCriticalSection 61286->61315 61289 4bec24 28 API calls 61288->61289 61290 42c75a GetClassInfoA 61289->61290 61291 42c772 61290->61291 61292 42c7ba 61290->61292 61316 4b7c4a 32 API calls __EH_prolog 61291->61316 61292->61245 61294->61238 61295->61250 61296->61256 61297->61260 61298->61253 61299->61254 61300->61255 61317 4b5c79 GetLastError 61301->61317 61303 4b5c6f 61303->61262 61304->61264 61305->61266 61306->61268 61307->61270 61308->61272 61309->61274 61310->61276 61311->61278 61312->61280 61313->61249 61314->61286 61315->61285 61316->61292 61318 4bf1ac 21 API calls 61317->61318 61319 4b5c92 SetLastError 61318->61319 61319->61303 61320 4226d0 61326 4226e7 61320->61326 61321 4226f4 PeekMessageA 61321->61326 61322 422805 61323 42271d IsWindow 61323->61326 61324 411070 7 API calls 61324->61326 61325 4227f1 PeekMessageA 61325->61326 61326->61321 61326->61322 61326->61323 61326->61324 61326->61325 61327 4797d0 61328 4782b0 7 API calls 61327->61328 61329 4797fb GetClientRect FillRect 61328->61329 61330 479847 GetSysColor 61329->61330 61331 479859 61329->61331 61332 47985e GetWindowLongA 61330->61332 61331->61332 61333 479874 CreateSolidBrush FrameRect DeleteObject InflateRect 61332->61333 61335 479923 GetStockObject FillRect 61333->61335 61336 47993a 61333->61336 61337 47995f InflateRect 61335->61337 61361 4784b0 GradientFill GradientFill 61336->61361 61340 479977 61337->61340 61339 4799d7 61342 4799e5 CreatePen SelectObject 61339->61342 61343 479a79 61339->61343 61340->61339 61341 4799be CreateSolidBrush FillRect DeleteObject 61340->61341 61341->61339 61344 479a16 61342->61344 61345 479a7f GetWindowTextA 61343->61345 61346 479a21 MoveToEx 61344->61346 61349 479a44 LineTo 61344->61349 61347 479a9a 61345->61347 61348 479b28 61345->61348 61346->61344 61346->61349 61351 479aa0 GetSysColor 61347->61351 61352 479aaa 61347->61352 61363 478380 6 API calls 61348->61363 61349->61344 61354 479a62 SelectObject DeleteObject 61349->61354 61353 479aad SetTextColor SendMessageA SelectObject 61351->61353 61352->61353 61356 479ad9 61353->61356 61354->61345 61355 479b3a 61362 476c30 32 API calls 61356->61362 61358 479aed SelectObject 61358->61348 61359 479afa 61358->61359 61360 479b19 DrawFocusRect 61359->61360 61360->61348 61361->61337 61362->61358 61363->61355 61364 470ed0 61365 470eda 61364->61365 61366 470ee7 CreateToolhelp32Snapshot Process32First 61365->61366 61367 470f62 FindCloseChangeNotification 61366->61367 61368 470f0b 61366->61368 61369 470f76 61367->61369 61370 470f2b Process32Next 61368->61370 61370->61367 61370->61368 61371 473bd0 61372 4b53e8 29 API calls 61371->61372 61373 473bf6 61372->61373 61374 473c38 61373->61374 61428 475fa0 61373->61428 61376 473c34 61376->61374 61377 4b70aa 58 API calls 61376->61377 61378 473dca 61377->61378 61437 4b3af3 61378->61437 61381 473de0 SendMessageA 61382 4763b0 63 API calls 61381->61382 61383 473e0b 61382->61383 61442 476110 69 API calls 61383->61442 61385 473e2f 61386 473e5a 61385->61386 61387 473e47 SendMessageA 61385->61387 61388 473e44 61385->61388 61443 476110 69 API calls 61386->61443 61460 4b41e9 57 API calls 61387->61460 61388->61387 61391 473e7e 61392 473ea0 61391->61392 61393 473e8c SendMessageA 61391->61393 61394 473e89 61391->61394 61395 473eaa 61392->61395 61396 473f39 SendMessageA 61392->61396 61461 4b41e9 57 API calls 61393->61461 61394->61393 61462 4b4559 59 API calls 61395->61462 61397 411510 GetSysColor 61396->61397 61400 473f53 SendMessageA 61397->61400 61402 411510 GetSysColor 61400->61402 61401 473eb1 IsWindow 61401->61396 61404 473ec7 61401->61404 61405 473f6d SendMessageA 61402->61405 61463 476110 69 API calls 61404->61463 61444 476090 61405->61444 61409 473fe0 61465 475640 SendMessageA 61409->61465 61410 473ee5 61418 411510 GetSysColor 61410->61418 61426 473f0b SendMessageA 61410->61426 61411 473fa5 LoadCursorA 61414 473fd2 SendMessageA 61411->61414 61415 473fb2 61411->61415 61412 473fc9 LoadCursorA 61412->61414 61414->61409 61419 4bec24 28 API calls 61415->61419 61416 473fe7 61466 475730 SendMessageA ImageList_GetImageCount ImageList_GetImageCount SendMessageA SendMessageA 61416->61466 61422 473ef6 ImageList_SetBkColor 61418->61422 61423 473fb7 LoadCursorA 61419->61423 61421 473fee 61450 4758b0 61421->61450 61422->61426 61423->61412 61423->61414 61464 4b41e9 57 API calls 61426->61464 61427 473ffc 61427->61374 61429 475fc1 61428->61429 61430 47606d 61429->61430 61467 4bc5a0 29 API calls __EH_prolog 61429->61467 61430->61376 61432 47601c 61468 4bc67c 32 API calls __EH_prolog 61432->61468 61434 476043 61469 4bce48 39 API calls __EH_prolog 61434->61469 61436 476057 61436->61376 61470 4b94fb 61437->61470 61442->61385 61443->61391 61445 4760a0 61444->61445 61547 4b997c 61445->61547 61451 4758be 61450->61451 61452 47590c 61450->61452 61453 4758c6 61451->61453 61454 4758d5 SendMessageA 61451->61454 61452->61427 61563 4b3be0 SendMessageA 61453->61563 61454->61452 61456 4758ed SendMessageA 61454->61456 61564 4b3be0 SendMessageA 61456->61564 61457 4758d0 61457->61427 61459 47590b 61459->61452 61460->61386 61461->61392 61462->61401 61463->61410 61464->61396 61465->61416 61466->61421 61467->61432 61468->61434 61469->61436 61471 4bec24 28 API calls 61470->61471 61472 4b9506 __startOneArgErrorHandling 61471->61472 61473 4bec24 28 API calls 61472->61473 61522 4b3b00 61472->61522 61474 4b953e 61473->61474 61475 4b956f 61474->61475 61529 4b7c4a 32 API calls __EH_prolog 61474->61529 61477 4b9590 61475->61477 61530 4b7c4a 32 API calls __EH_prolog 61475->61530 61479 4b95b7 61477->61479 61531 4b7c4a 32 API calls __EH_prolog 61477->61531 61480 4b95dd 61479->61480 61532 4b9443 34 API calls 61479->61532 61483 4b960a 61480->61483 61533 4b9443 34 API calls 61480->61533 61485 4b9633 61483->61485 61486 4b9616 61483->61486 61488 4b962b 61485->61488 61489 4b964d 61485->61489 61534 4b9484 6 API calls 61486->61534 61488->61485 61535 4b9484 6 API calls 61488->61535 61490 4b966a 61489->61490 61491 4b964b 61489->61491 61494 4b9683 61490->61494 61495 4b9668 61490->61495 61491->61489 61536 4b9484 6 API calls 61491->61536 61497 4b9681 61494->61497 61498 4b96a0 61494->61498 61495->61490 61537 4b9484 6 API calls 61495->61537 61497->61494 61538 4b9484 6 API calls 61497->61538 61500 4b969e 61498->61500 61501 4b96bd 61498->61501 61500->61498 61539 4b9484 6 API calls 61500->61539 61502 4b96da 61501->61502 61503 4b96bb 61501->61503 61506 4b96f7 61502->61506 61507 4b96d8 61502->61507 61503->61501 61540 4b9484 6 API calls 61503->61540 61509 4b96f5 61506->61509 61510 4b9714 61506->61510 61507->61502 61541 4b9484 6 API calls 61507->61541 61509->61506 61542 4b9484 6 API calls 61509->61542 61512 4b9712 61510->61512 61513 4b972d 61510->61513 61512->61510 61543 4b9484 6 API calls 61512->61543 61514 4b972b 61513->61514 61515 4b9746 61513->61515 61514->61513 61544 4b9484 6 API calls 61514->61544 61518 4b9763 61515->61518 61519 4b9744 61515->61519 61521 4b9761 61518->61521 61518->61522 61519->61515 61545 4b9484 6 API calls 61519->61545 61521->61518 61546 4b9484 6 API calls 61521->61546 61525 4b76ec 61522->61525 61524 4b977e 61524->61522 61526 4b76f8 61525->61526 61527 4b7606 32 API calls 61526->61527 61528 473dd8 61527->61528 61528->61374 61528->61381 61529->61475 61530->61477 61531->61479 61532->61480 61533->61483 61534->61488 61535->61491 61536->61495 61537->61497 61538->61500 61539->61503 61540->61507 61541->61509 61542->61512 61543->61514 61544->61519 61545->61521 61546->61524 61548 4760db 61547->61548 61549 4b9986 61547->61549 61551 4b994b 61548->61551 61555 4b6d52 GetWindowLongA SetWindowLongA SetWindowPos 61549->61555 61552 4b9955 61551->61552 61554 473f88 61551->61554 61556 4b6d38 61552->61556 61554->61409 61554->61411 61554->61412 61555->61548 61559 4b6ce9 GetWindowLongA 61556->61559 61560 4b6d0a SetWindowLongA 61559->61560 61561 4b6d06 61559->61561 61560->61561 61562 4b6d20 SetWindowPos 61560->61562 61561->61554 61562->61561 61563->61457 61564->61459 61565 4b7156 61566 4b7168 61565->61566 61572 4b7163 61565->61572 61567 4b70d1 57 API calls 61566->61567 61568 4b7171 61567->61568 61569 4b718c DefWindowProcA 61568->61569 61570 4b717a 61568->61570 61569->61572 61571 4b6edf 109 API calls 61570->61571 61571->61572 61573 4058dd 61574 4058e2 61573->61574 61575 405c03 61574->61575 61577 40f300 61574->61577 61578 40f31e 61577->61578 61579 4bf1ac 21 API calls 61578->61579 61580 40f337 61579->61580 61580->61575 61581 40db20 61582 40db63 61581->61582 61583 40db2b 61581->61583 61584 42b750 134 API calls 61583->61584 61585 40db34 61584->61585 61586 412260 61587 41228a 61586->61587 61594 412283 61586->61594 61588 412385 61587->61588 61589 412665 61587->61589 61590 4122aa 61587->61590 61591 41236a InvalidateRect 61587->61591 61592 4123cc 61587->61592 61593 4122f1 61587->61593 61587->61594 61595 412539 61587->61595 61596 41241a SendMessageA 61587->61596 61605 4124c7 SendMessageA SendMessageA InvalidateRect 61587->61605 61617 4125ec 61587->61617 61637 4bc36f 58 API calls 61588->61637 61600 412670 61589->61600 61619 4126ad SendMessageA SendMessageA 61589->61619 61628 4b99ad 61590->61628 61591->61594 61638 410ef0 7 API calls 61592->61638 61631 411490 61593->61631 61595->61594 61598 412553 SendMessageA InvalidateRect 61595->61598 61596->61594 61598->61594 61640 4b7a75 38 API calls 61600->61640 61602 4123e2 61639 4120e0 73 API calls 61602->61639 61604 41239b 61609 411510 GetSysColor 61604->61609 61605->61594 61616 4123a4 CreateSolidBrush 61609->61616 61610 412689 61613 4b56a7 32 API calls 61610->61613 61613->61619 61614 4123e9 61614->61594 61618 4bc318 57 API calls 61616->61618 61617->61594 61621 41263a 61617->61621 61622 41263c SendMessageA 61617->61622 61620 4123b6 RedrawWindow 61618->61620 61619->61594 61620->61594 61621->61622 61622->61594 61623 412357 61625 4b997c 3 API calls 61623->61625 61625->61594 61626 412343 61627 4b997c 3 API calls 61626->61627 61627->61594 61629 4122d1 SendMessageA 61628->61629 61630 4b99b4 SetWindowTextA 61628->61630 61629->61594 61630->61629 61632 4114a0 61631->61632 61633 4b997c 3 API calls 61632->61633 61634 4114db 61633->61634 61635 4b994b 3 API calls 61634->61635 61636 4114ea 61635->61636 61636->61594 61636->61623 61636->61626 61637->61604 61638->61602 61639->61614 61640->61610 61641 41ae20 61642 41ae2d 61641->61642 61643 41ae41 61641->61643 61642->61643 61644 41af46 SendMessageA 61642->61644 61645 411da0 61646 4b53e8 29 API calls 61645->61646 61648 411dc2 61646->61648 61647 411e04 61648->61647 61649 4113a0 39 API calls 61648->61649 61650 411e00 61649->61650 61650->61647 61651 411510 GetSysColor 61650->61651 61652 411ee4 CreateSolidBrush 61651->61652 61653 4bc318 57 API calls 61652->61653 61654 411efa 61653->61654 61655 4b7606 32 API calls 61654->61655 61656 411f35 61655->61656 61656->61647 61657 411f3e 61656->61657 61677 4120e0 73 API calls 61657->61677 61659 411f45 61660 411f62 SendMessageA 61659->61660 61661 4b9a30 SetWindowPos 61659->61661 61662 411f81 SendMessageA 61660->61662 61665 411f93 61660->61665 61661->61660 61662->61665 61663 41207f SendMessageA SendMessageA 61664 411490 3 API calls 61663->61664 61666 4120b3 61664->61666 61665->61663 61667 4b94fb 40 API calls 61665->61667 61668 411fcb 61667->61668 61669 4b7606 32 API calls 61668->61669 61671 411ffc 61669->61671 61670 412000 61670->61663 61671->61670 61672 41203c SendMessageA 61671->61672 61673 412072 61672->61673 61674 412069 61672->61674 61679 414010 66 API calls 61673->61679 61678 4b9ac1 EnableWindow 61674->61678 61677->61659 61678->61673 61679->61670 61680 421760 61684 421784 61680->61684 61681 421cfa 61682 4217f1 61683 42185c IsWindow 61682->61683 61685 4217fd 61682->61685 61683->61681 61683->61685 61684->61681 61684->61682 61686 4217ce IsWindow 61684->61686 61773 41e860 61685->61773 61686->61682 61688 4217dc 61686->61688 61689 421806 IsIconic 61688->61689 61690 4217e6 61688->61690 61691 421814 61689->61691 61692 42182f SetActiveWindow 61689->61692 61781 427f50 IsWindow EnableWindow 61690->61781 61782 4b9a7f 61691->61782 61695 4b70aa 58 API calls 61692->61695 61697 42183f 61695->61697 61698 421884 61698->61681 61760 4218da 61698->61760 61785 42fbb0 55 API calls 61698->61785 61700 421d09 61701 421d11 DestroyAcceleratorTable 61700->61701 61702 421d18 61700->61702 61701->61702 61703 421d20 DestroyMenu 61702->61703 61762 421c8f 61702->61762 61703->61762 61704 42200b 61706 42200f SendMessageA 61704->61706 61708 422031 61706->61708 61709 42205b 61706->61709 61707 421cd3 61787 410980 GetProcessHeap HeapFree 61707->61787 61708->61709 61716 4b9a7f ShowWindow 61708->61716 61710 42206b DestroyAcceleratorTable 61709->61710 61720 422072 61709->61720 61710->61720 61712 421be9 61713 421d9a KiUserCallbackDispatcher 61712->61713 61723 421e12 61712->61723 61717 4b70aa 58 API calls 61713->61717 61714 421ce0 61788 410980 GetProcessHeap HeapFree 61714->61788 61715 421ebb SetWindowPos 61715->61723 61716->61708 61717->61712 61719 421f18 61724 421f97 61719->61724 61790 42ccb0 60 API calls 61719->61790 61726 4220d9 IsWindow 61720->61726 61721 421ced 61789 410980 GetProcessHeap HeapFree 61721->61789 61723->61715 61723->61719 61724->61704 61724->61706 61731 421fe8 IsWindow 61724->61731 61725 410a80 7 API calls 61725->61760 61727 422332 61726->61727 61728 4220ef 61726->61728 61794 410980 GetProcessHeap HeapFree 61727->61794 61733 422130 IsWindow 61728->61733 61731->61724 61734 421ff6 SendMessageA 61731->61734 61732 422352 61795 410980 GetProcessHeap HeapFree 61732->61795 61733->61727 61736 42213f 61733->61736 61734->61724 61738 422180 IsWindow 61736->61738 61737 42235f 61796 410980 GetProcessHeap HeapFree 61737->61796 61738->61727 61741 42218f 61738->61741 61739 410a50 7 API calls 61739->61760 61743 4221bd IsWindow 61741->61743 61791 421650 16 API calls 61741->61791 61742 42236c 61797 410980 GetProcessHeap HeapFree 61742->61797 61746 422290 GetFocus 61743->61746 61771 4221cc 61743->61771 61748 42230e 61746->61748 61763 4222a9 61746->61763 61747 422379 61748->61727 61750 422316 IsWindow 61748->61750 61749 421c75 61753 421c84 61749->61753 61754 421c7d DestroyAcceleratorTable 61749->61754 61750->61727 61752 422321 GetFocus 61750->61752 61751 421b2d IsWindow 61751->61749 61751->61760 61752->61727 61756 42232b SetFocus 61752->61756 61757 421c88 DestroyMenu 61753->61757 61753->61762 61754->61753 61755 421c9a 61758 421ca2 DestroyAcceleratorTable 61755->61758 61759 421ca9 61755->61759 61756->61727 61757->61762 61758->61759 61761 421cb1 DestroyMenu 61759->61761 61759->61762 61760->61700 61760->61712 61760->61725 61760->61739 61760->61749 61760->61751 61760->61755 61761->61762 61786 410980 GetProcessHeap HeapFree 61762->61786 61763->61748 61765 4222eb IsWindow 61763->61765 61764 42223d IsWindow 61766 42224b GetParent 61764->61766 61764->61771 61765->61763 61767 4222f9 SendMessageA 61765->61767 61768 4b70aa 58 API calls 61766->61768 61767->61763 61768->61771 61769 410a80 7 API calls 61769->61771 61771->61746 61771->61764 61771->61769 61792 4b9aa6 IsWindowEnabled 61771->61792 61793 4b9ac1 EnableWindow 61771->61793 61774 41e868 61773->61774 61775 41e890 61774->61775 61776 41e884 61774->61776 61799 410ef0 7 API calls 61775->61799 61798 410ef0 7 API calls 61776->61798 61779 41e89a 61779->61698 61780 41e88d 61780->61698 61781->61682 61783 4b9a86 ShowWindow 61782->61783 61784 42181d 61782->61784 61783->61784 61785->61760 61786->61707 61787->61714 61788->61721 61789->61681 61790->61719 61791->61743 61792->61771 61793->61771 61794->61732 61795->61737 61796->61742 61797->61747 61798->61780 61799->61779 61800 40fdf1 61801 40fdf4 LHashValOfNameSys 61800->61801 61805 40fe15 61801->61805 61803 40fe4b 61804 41066c 61803->61804 61806 41068e 61803->61806 61809 410673 61803->61809 61807 42b750 134 API calls 61804->61807 61805->61803 61815 4b53e8 29 API calls 61805->61815 61830 40ff6d 61805->61830 61806->61809 61812 42b750 134 API calls 61806->61812 61807->61809 61808 4106fd 61845 40f2e0 21 API calls 61808->61845 61809->61808 61844 4b5411 29 API calls __startOneArgErrorHandling 61809->61844 61812->61809 61813 410706 61846 410980 GetProcessHeap HeapFree 61813->61846 61815->61830 61816 410725 61817 4104ae VariantInit 61825 4104ed 61817->61825 61818 4104ab 61818->61817 61819 410541 61820 410609 VariantClear 61819->61820 61843 40f7f0 143 API calls 61819->61843 61822 41049f 61820->61822 61822->61803 61824 41062a VariantClear 61822->61824 61823 41055f 61823->61820 61824->61803 61824->61824 61825->61819 61825->61823 61842 40f7f0 143 API calls 61825->61842 61827 410118 VariantCopyInd 61827->61830 61828 410296 VariantCopyInd 61828->61830 61829 410455 VariantInit 61829->61830 61830->61817 61830->61818 61830->61822 61830->61827 61830->61828 61830->61829 61833 410432 VariantChangeType 61830->61833 61838 42d080 9 API calls 61830->61838 61840 42d080 9 API calls 61830->61840 61833->61829 61833->61830 61834 41018f SysAllocString 61839 410980 GetProcessHeap HeapFree 61834->61839 61835 410305 SysAllocString 61841 410980 GetProcessHeap HeapFree 61835->61841 61838->61834 61839->61830 61840->61835 61841->61830 61842->61825 61843->61823 61844->61808 61845->61813 61846->61816 61847 423e70 61848 423e7e 61847->61848 61851 423e88 61848->61851 61855 4ba412 61848->61855 61850 423e99 61850->61851 61852 4b70d1 57 API calls 61850->61852 61853 423ed6 SendMessageA 61850->61853 61854 423ef9 GetParent 61850->61854 61852->61850 61853->61850 61854->61850 61854->61851 61856 4bec4a 28 API calls 61855->61856 61857 4ba417 61856->61857 61858 4ba423 61857->61858 61859 4bec24 28 API calls 61857->61859 61858->61850 61859->61858 61860 426670 61861 4b53e8 29 API calls 61860->61861 61862 426696 61861->61862 61863 4266ae 61862->61863 61924 427ad0 CreateEventA 61862->61924 61865 4113a0 39 API calls 61863->61865 61876 4266c0 61863->61876 61866 4266d9 61865->61866 61867 426806 GetSystemMetrics GetSystemMetrics 61866->61867 61868 4267e0 61866->61868 61866->61876 61867->61868 61899 426a20 61868->61899 61871 4b7606 32 API calls 61872 4268f1 61871->61872 61873 4268f5 61872->61873 61874 42690b 61872->61874 61873->61876 61877 4268fd DestroyMenu 61873->61877 61908 426ac0 GetWindowLongA SetWindowLongA SetWindowPos GetWindowLongA 61874->61908 61877->61876 61878 426912 GetWindowRect 61879 42692f 61878->61879 61880 426952 61879->61880 61925 4b99ef MoveWindow 61879->61925 61909 426550 61880->61909 61884 42696c GetStockObject 61927 4bc303 57 API calls 61884->61927 61887 42697a 61888 426981 SendMessageA 61887->61888 61889 42697e 61887->61889 61890 426999 SetWindowPos 61888->61890 61891 4269af 61888->61891 61889->61888 61890->61891 61892 4269b6 GetSystemMenu 61891->61892 61893 4269dd 61891->61893 61928 4baa36 57 API calls 61892->61928 61929 426490 77 API calls 61893->61929 61896 4269c8 61896->61893 61898 4269cc DeleteMenu 61896->61898 61897 4269e3 61897->61876 61898->61893 61900 4bec24 28 API calls 61899->61900 61901 426a2b GetClassInfoA 61900->61901 61903 426a52 LoadCursorA GetStockObject 61901->61903 61904 4268e1 61901->61904 61930 4b7c4a 32 API calls __EH_prolog 61903->61930 61904->61871 61906 426aa5 61906->61904 61931 4bc41f RaiseException 61906->61931 61908->61878 61910 426564 61909->61910 61932 42c7d0 61910->61932 61912 42657d 61913 42c7d0 65 API calls 61912->61913 61917 42658a 61913->61917 61914 4265e2 SendMessageA SendMessageA 61915 42661f 61914->61915 61916 42661c DestroyIcon 61914->61916 61918 426629 DestroyIcon 61915->61918 61919 42662c 61915->61919 61916->61915 61917->61914 61920 4265da 61917->61920 61921 4265c4 61917->61921 61918->61919 61919->61884 61926 4280d0 80 API calls 61919->61926 61920->61914 61948 423a80 GetModuleHandleA LoadImageA LoadImageA 61921->61948 61923 4265d8 61923->61914 61924->61863 61925->61880 61926->61884 61927->61887 61928->61896 61929->61897 61930->61906 61931->61904 61933 42c8ac 61932->61933 61934 42c7f9 61932->61934 61933->61912 61934->61933 61949 433680 61934->61949 61936 42c832 61937 42c89b 61936->61937 61938 42c838 61936->61938 61977 4bce48 39 API calls __EH_prolog 61937->61977 61939 42c850 DestroyIcon 61938->61939 61940 42c85a 61938->61940 61939->61940 61942 42c867 61940->61942 61974 4b5411 29 API calls __startOneArgErrorHandling 61940->61974 61975 4b5411 29 API calls __startOneArgErrorHandling 61942->61975 61945 42c873 61976 4bce48 39 API calls __EH_prolog 61945->61976 61947 42c887 61947->61912 61948->61923 61950 4b5c63 23 API calls 61949->61950 61955 4336ae 61950->61955 61952 43386c 61952->61936 61953 4b53e8 29 API calls 61954 433771 61953->61954 61956 4b53e8 29 API calls 61954->61956 61959 43385d 61954->61959 61973 43379e 61954->61973 61955->61953 61955->61959 61957 4337ab CreateIconFromResourceEx 61956->61957 61961 433814 61957->61961 61962 4337f8 61957->61962 61981 4b5ca1 23 API calls 61959->61981 61978 4b5411 29 API calls __startOneArgErrorHandling 61961->61978 61962->61961 61963 4337ff CreateIconFromResource 61962->61963 61963->61961 61965 43381a 61966 433824 61965->61966 61967 43386e 61965->61967 61966->61959 61970 433844 61966->61970 61971 43383a DestroyIcon 61966->61971 61982 4b5ca1 23 API calls 61967->61982 61969 43388a 61969->61936 61970->61973 61979 4b5411 29 API calls __startOneArgErrorHandling 61970->61979 61971->61970 61980 4b5411 29 API calls __startOneArgErrorHandling 61973->61980 61974->61942 61975->61945 61976->61947 61977->61933 61978->61965 61979->61973 61980->61959 61981->61952 61982->61969 61983 4a3970 GetVersion 62015 4a9128 HeapCreate 61983->62015 61985 4a39ce 61986 4a39db 61985->61986 61987 4a39d3 61985->61987 62027 4a8e45 37 API calls __startOneArgErrorHandling 61986->62027 62035 4a3a9d 8 API calls __startOneArgErrorHandling 61987->62035 61991 4a39e0 61992 4a39ec 61991->61992 61993 4a39e4 61991->61993 62028 4a8c89 34 API calls __startOneArgErrorHandling 61992->62028 62036 4a3a9d 8 API calls __startOneArgErrorHandling 61993->62036 61997 4a39f6 GetCommandLineA 62029 4a8b57 37 API calls __startOneArgErrorHandling 61997->62029 61999 4a3a06 62037 4a890a 49 API calls __startOneArgErrorHandling 61999->62037 62001 4a3a10 62030 4a8851 48 API calls __startOneArgErrorHandling 62001->62030 62003 4a3a15 62004 4a3a1a GetStartupInfoA 62003->62004 62031 4a87f9 48 API calls 62004->62031 62006 4a3a2c 62007 4a3a35 62006->62007 62008 4a3a3e GetModuleHandleA 62007->62008 62032 4b2b84 62008->62032 62012 4a3a59 62039 4a8681 36 API calls __startOneArgErrorHandling 62012->62039 62014 4a3a6a 62016 4a9148 62015->62016 62017 4a917e 62015->62017 62040 4a8fe0 57 API calls 62016->62040 62017->61985 62019 4a914d 62020 4a9157 62019->62020 62021 4a9164 62019->62021 62041 4aca25 HeapAlloc 62020->62041 62023 4a9181 62021->62023 62042 4ad56c 5 API calls __startOneArgErrorHandling 62021->62042 62023->61985 62025 4a9161 62025->62023 62026 4a9172 HeapDestroy 62025->62026 62026->62017 62027->61991 62028->61997 62029->61999 62030->62003 62031->62006 62043 4bb6ab 62032->62043 62037->62001 62038 4a6ee8 32 API calls 62038->62012 62039->62014 62040->62019 62041->62025 62042->62025 62044 4ba412 28 API calls 62043->62044 62045 4bb6b6 62044->62045 62046 4bec24 28 API calls 62045->62046 62047 4bb6bd 62046->62047 62054 4bfa1b SetErrorMode SetErrorMode 62047->62054 62051 4a3a50 62051->62038 62052 4bb6f2 62065 4c0149 60 API calls 62052->62065 62053 4b5514 31 API calls 62053->62052 62055 4bec24 28 API calls 62054->62055 62056 4bfa32 62055->62056 62057 4bec24 28 API calls 62056->62057 62058 4bfa41 62057->62058 62059 4bfa67 62058->62059 62066 4bfa7e 62058->62066 62061 4bec24 28 API calls 62059->62061 62062 4bfa6c 62061->62062 62063 4bb6d5 62062->62063 62085 4ba427 62062->62085 62063->62052 62063->62053 62065->62051 62067 4bec24 28 API calls 62066->62067 62068 4bfa91 GetModuleFileNameA 62067->62068 62069 4a5a24 29 API calls 62068->62069 62070 4bfac3 62069->62070 62096 4bfb9b lstrlenA lstrcpynA 62070->62096 62072 4bfadf 62073 4bfaf5 62072->62073 62101 4a78d1 29 API calls __startOneArgErrorHandling 62072->62101 62075 4bfb2f 62073->62075 62097 4baf91 62073->62097 62077 4bfb62 62075->62077 62078 4bfb47 lstrcpyA 62075->62078 62079 4bfb71 lstrcatA 62077->62079 62080 4bfb8f 62077->62080 62103 4a78d1 29 API calls __startOneArgErrorHandling 62078->62103 62104 4a78d1 29 API calls __startOneArgErrorHandling 62079->62104 62080->62059 62086 4bec24 28 API calls 62085->62086 62087 4ba42c 62086->62087 62095 4ba484 62087->62095 62105 4be9ed 62087->62105 62090 4bf241 7 API calls 62091 4ba462 62090->62091 62092 4ba46f 62091->62092 62093 4bec24 28 API calls 62091->62093 62094 4bf1ac 21 API calls 62092->62094 62093->62092 62094->62095 62095->62063 62096->62072 62098 4bec24 28 API calls 62097->62098 62099 4baf97 LoadStringA 62098->62099 62100 4bafb2 62099->62100 62102 4a78d1 29 API calls __startOneArgErrorHandling 62100->62102 62101->62073 62102->62075 62103->62077 62104->62080 62106 4bf1ac 21 API calls 62105->62106 62107 4ba438 GetCurrentThreadId SetWindowsHookExA 62106->62107 62107->62090 62108 420a39 62111 42b2e0 62108->62111 62110 420a45 62112 42b30f 62111->62112 62113 42b318 62112->62113 62119 40dec0 62112->62119 62128 476b40 62112->62128 62134 477480 62112->62134 62142 40e0b4 62112->62142 62150 42b8a0 FindFirstFileA 62112->62150 62113->62110 62120 40ded3 62119->62120 62121 40deda 62120->62121 62124 40deea 62120->62124 62153 40db70 66 API calls 62121->62153 62123 40dee5 62126 40df83 MessageBoxA 62123->62126 62124->62123 62154 42bf50 40 API calls 62124->62154 62127 40dfa5 62126->62127 62127->62113 62129 476b4f CreateThread 62128->62129 62131 476b84 62129->62131 62132 476b93 FindCloseChangeNotification 62129->62132 62155 409757 62129->62155 62131->62132 62133 476b8b 62131->62133 62132->62113 62133->62113 62135 47748b 62134->62135 62136 4774d8 62134->62136 62137 477494 FreeLibrary 62135->62137 62138 4774a1 62135->62138 62139 477512 62136->62139 62140 4774dd GetCurrentThreadId EnumThreadWindows GetCurrentThreadId SetWindowsHookExA 62136->62140 62137->62138 62138->62139 62141 4774aa GetCurrentThreadId EnumThreadWindows UnhookWindowsHookEx 62138->62141 62139->62113 62140->62113 62141->62113 62145 40e0b8 62142->62145 62149 40e0e6 62142->62149 62143 40e132 GetPrivateProfileStringA 62144 40e154 62143->62144 62158 410980 GetProcessHeap HeapFree 62144->62158 62157 410ac0 7 API calls 62145->62157 62148 40e17b 62148->62113 62149->62143 62149->62144 62151 42b8bb FindClose 62150->62151 62152 42b8ce 62150->62152 62151->62113 62152->62113 62153->62123 62154->62123 62156 40975f 62155->62156 62157->62149 62158->62148
    APIs
    • IsWindow.USER32(?), ref: 004217D2
    • IsIconic.USER32(?), ref: 0042180A
    • SetActiveWindow.USER32(?,?,?), ref: 00421833
    • IsWindow.USER32(?), ref: 0042185D
    • IsWindow.USER32(?), ref: 00421B2E
    • DestroyAcceleratorTable.USER32(?), ref: 00421C7E
    • DestroyMenu.USER32(?), ref: 00421C89
    • DestroyAcceleratorTable.USER32(?), ref: 00421CA3
    • DestroyMenu.USER32(?), ref: 00421CB2
    • DestroyAcceleratorTable.USER32(?), ref: 00421D12
    • DestroyMenu.USER32(?,000003EA,00000000,00000000,?,?,00000000,?,000007D9,00000000,00000000), ref: 00421D21
    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00421DA3
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?), ref: 00421EBB
    • IsWindow.USER32(?), ref: 00421FEC
    • SendMessageA.USER32(?,0000806F,00000000,00000000), ref: 00422001
    • SendMessageA.USER32(?,00008004,00000000,00000000), ref: 0042201E
    • DestroyAcceleratorTable.USER32(?), ref: 0042206C
    • IsWindow.USER32(?), ref: 004220E1
    • IsWindow.USER32(?), ref: 00422131
    • IsWindow.USER32(?), ref: 00422181
    • IsWindow.USER32(?), ref: 004221BE
    • IsWindow.USER32(?), ref: 00422241
    • GetParent.USER32(?), ref: 0042224F
    • GetFocus.USER32 ref: 00422290
      • Part of subcall function 00421650: IsWindow.USER32(?), ref: 004216CB
      • Part of subcall function 00421650: GetFocus.USER32 ref: 004216D5
      • Part of subcall function 00421650: IsChild.USER32(?,00000000), ref: 004216E7
    • IsWindow.USER32(?), ref: 004222EF
    • SendMessageA.USER32(?,00008076,00000000,00000000), ref: 00422304
    • IsWindow.USER32(00000000), ref: 00422317
    • GetFocus.USER32 ref: 00422321
    • SetFocus.USER32(00000000), ref: 0042232C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Destroy$AcceleratorFocusTable$MenuMessageSend$ActiveCallbackChildDispatcherIconicParentUser
    • String ID: d
    • API String ID: 2657180179-2564639436
    • Opcode ID: bce9c1e1d35da9f0e2e315b5fdd9b62544558f2c8067c7d3750e0471321cbfd9
    • Instruction ID: 3c623462867fe7dbeff1e68f21300f799ac28584cbe19ae046ca4885b47a1525
    • Opcode Fuzzy Hash: bce9c1e1d35da9f0e2e315b5fdd9b62544558f2c8067c7d3750e0471321cbfd9
    • Instruction Fuzzy Hash: C472CC71604310AFD320DF26D880BAFB7E9AF98704F51491EF94997351DB78E841CBAA

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1472 422d50-422d75 1473 422e15-422e24 1472->1473 1474 422d7b-422d86 1472->1474 1477 422e2a-422e3a 1473->1477 1478 4230d9-4230ea 1473->1478 1475 422d95-422d98 1474->1475 1476 422d88-422d92 1474->1476 1479 422d9a-422dab call 4a4608 1475->1479 1480 422dad 1475->1480 1476->1475 1481 422e4b-422e68 call 411140 1477->1481 1482 422e3c-422e46 call 4a4608 1477->1482 1485 422daf-422dc1 GetProcAddress 1479->1485 1480->1485 1493 422f81 1481->1493 1494 422e6e-422e81 call 4a56e0 1481->1494 1482->1481 1489 422dc3-422df3 call 42c6b0 call 423130 call 4b56a7 1485->1489 1490 422df8-422e12 call 422d30 1485->1490 1489->1490 1497 422f86-422f94 LoadLibraryA 1493->1497 1507 422e87-422e98 1494->1507 1508 422f4c-422f53 LoadLibraryA 1494->1508 1500 422fd1-422fda 1497->1500 1501 422f96-422fa4 GetProcAddress 1497->1501 1500->1497 1509 422fdc-422fe7 1500->1509 1504 422fa6-422fb1 1501->1504 1505 422fbc-422fc6 1501->1505 1504->1505 1513 422fb3-422fb9 1504->1513 1505->1509 1514 422fc8-422fcf FreeLibrary 1505->1514 1516 422ec2-422f0f call 4b58f0 * 2 LoadLibraryA call 4b56a7 * 2 1507->1516 1517 422e9a-422eb8 call 4b58f0 LoadLibraryA call 4b56a7 1507->1517 1508->1509 1512 422f59-422f67 GetProcAddress 1508->1512 1510 4230b6-4230b8 1509->1510 1511 422fed-422fef 1509->1511 1520 4230d0-4230d6 1510->1520 1521 4230ba-4230c5 1510->1521 1518 422ff1-422ff2 FreeLibrary 1511->1518 1519 422ff8-423007 call 411140 1511->1519 1512->1509 1523 422f69-422f74 1512->1523 1513->1505 1514->1500 1516->1512 1552 422f11-422f22 1516->1552 1517->1512 1537 422ebe 1517->1537 1518->1519 1534 423060-4230b3 call 42c6b0 call 423130 call 4b56a7 1519->1534 1535 423009-42305d call 42c6b0 call 423130 call 4b56a7 1519->1535 1520->1478 1521->1520 1526 4230c7-4230cd 1521->1526 1523->1509 1528 422f76-422f7f 1523->1528 1526->1520 1528->1509 1537->1516 1555 422f44-422f46 1552->1555 1556 422f24-422f3f call 4b58f0 LoadLibraryA call 4b56a7 1552->1556 1555->1512 1557 422f48 1555->1557 1556->1555 1557->1508
    APIs
    • GetProcAddress.KERNEL32(00000000,004F6A94), ref: 00422DB7
    • LoadLibraryA.KERNEL32(?,?,00506F58), ref: 00422EA9
    • LoadLibraryA.KERNELBASE(?,?), ref: 00422EEF
    • LoadLibraryA.KERNELBASE(?,?,00506E60,00000001), ref: 00422F37
    • LoadLibraryA.KERNELBASE(00000001), ref: 00422F4D
    • GetProcAddress.KERNEL32(00000000,?), ref: 00422F5F
    • FreeLibrary.KERNEL32(00000000), ref: 00422FF2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Library$Load$AddressProc$Free
    • String ID: \JN$tJN
    • API String ID: 3120990465-3611533410
    • Opcode ID: 8b05d4873c513e53de8059f67577ffe87b4323e1540e1b9ac2f28b6736706ade
    • Instruction ID: fb4683d244ad199c4a5a20a41523227095524d447b61870dcfc54f1cfcf397ce
    • Opcode Fuzzy Hash: 8b05d4873c513e53de8059f67577ffe87b4323e1540e1b9ac2f28b6736706ade
    • Instruction Fuzzy Hash: D5A1E0B1B00751ABC314DF65D981FABF3A8BF98304F44062EF81997341D778A9158BAA

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1832 449020-449081 GetProcessHeap 1833 449095-4490be GetModuleFileNameA call 4a5a24 1832->1833 1834 449083-44908b OleInitialize 1832->1834 1837 4490c0-4490d9 call 4b57e4 1833->1837 1838 4490db-4490ee call 4b5632 1833->1838 1834->1833 1843 4490ef-44919c call 4b57e4 SetCurrentDirectoryA call 436970 * 3 LoadCursorA GetStockObject call 42c750 call 4b7606 1837->1843 1838->1843 1855 4491a1-4491b4 GetCurrentThreadId 1843->1855 1856 4491d5-4491dd 1855->1856 1857 4491b6-4491cf 1855->1857 1858 449283-44928d 1856->1858 1859 4491e3-44922e call 410ef0 * 4 1856->1859 1857->1856 1861 4492ef-4492f5 1858->1861 1862 44928f-449293 1858->1862 1887 449230-44923b 1859->1887 1888 449252-449256 1859->1888 1863 449554-449564 1861->1863 1864 4492fb-4493bd call 410780 call 4b5c63 call 4bcdbf call 4bce0b call 4bc5a0 call 41f970 call 4bc704 call 4bc67c call 4bce48 call 4b5ca1 1861->1864 1866 449295-44929f 1862->1866 1867 4492bd-4492ea call 410ef0 * 2 1862->1867 1910 4493c3-4493c6 1864->1910 1911 4494aa-44954f call 41ef30 call 410980 call 41f8b0 call 410980 * 2 1864->1911 1871 4492a1-4492a6 1866->1871 1872 4492b8-4492bb 1866->1872 1867->1861 1871->1872 1876 4492a8-4492b2 1871->1876 1872->1866 1872->1867 1876->1872 1891 44924d-449250 1887->1891 1892 44923d-449245 1887->1892 1888->1858 1893 449258-449263 1888->1893 1891->1887 1891->1888 1892->1891 1895 449247-44924a 1892->1895 1896 449265-449276 1893->1896 1897 44927e-449281 1893->1897 1895->1891 1896->1897 1899 449278-44927b 1896->1899 1897->1858 1897->1893 1899->1897 1913 4493c9-4493d5 1910->1913 1911->1863 1915 449494-4494a4 1913->1915 1916 4493db 1913->1916 1915->1911 1915->1913 1917 4493de-4493f5 call 41e8d0 call 41efb0 1916->1917 1928 4493f7-44941c call 476b20 * 3 1917->1928 1929 44942f-44946a call 476b20 * 3 1917->1929 1946 449427-44942d 1928->1946 1947 44941e-449425 1928->1947 1944 44946c-449471 1929->1944 1945 449488-44948e 1929->1945 1948 449473-44947a 1944->1948 1949 44947c 1944->1949 1945->1915 1945->1917 1946->1945 1947->1945 1950 449482-449486 1948->1950 1949->1950 1950->1944 1950->1945
    APIs
    • GetProcessHeap.KERNEL32 ref: 00449049
    • OleInitialize.OLE32(00000000), ref: 00449085
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004490A3
    • SetCurrentDirectoryA.KERNEL32(024652B8,?), ref: 004490FD
    • LoadCursorA.USER32(00000000,00007F00), ref: 00449158
    • GetStockObject.GDI32(00000005), ref: 00449179
    • GetCurrentThreadId.KERNEL32 ref: 004491A1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Current$CursorDirectoryFileHeapInitializeLoadModuleNameObjectProcessStockThread
    • String ID: (^L$_EL_HideOwner$L$L
    • API String ID: 3783217854-1457404285
    • Opcode ID: 6cf5b118e1feb9d67705a535834a44117c0fff9c55ccb3d09bb4b7ee6cc97157
    • Instruction ID: d71d463b8c7ba89159945fdd0e5682355096ed7bf7f99b927bbec32d6b78fdc7
    • Opcode Fuzzy Hash: 6cf5b118e1feb9d67705a535834a44117c0fff9c55ccb3d09bb4b7ee6cc97157
    • Instruction Fuzzy Hash: 30E1BF70A00605AFDB54DF95CC81FEEB7B5BF44304F14416EE909AB292DB786981CBA8

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2319 40f400-40f422 2320 40f541-40f54e call 4c0008 2319->2320 2321 40f428-40f42d 2319->2321 2326 40f550-40f570 CoCreateInstance 2320->2326 2327 40f5c7-40f5cd 2320->2327 2321->2320 2323 40f433-40f438 2321->2323 2323->2320 2325 40f43e-40f467 call 410780 call 42d080 LoadTypeLib 2323->2325 2337 40f527-40f53f call 410980 2325->2337 2338 40f46d-40f4b6 call 42d080 GetUserDefaultLCID LHashValOfNameSys 2325->2338 2329 40f572-40f585 CoCreateInstance 2326->2329 2330 40f587-40f589 2326->2330 2329->2330 2330->2327 2332 40f58b-40f598 OleRun 2330->2332 2334 40f59a-40f5aa 2332->2334 2335 40f5ab-40f5af call 40f380 2332->2335 2342 40f5b4-40f5c1 2335->2342 2337->2320 2337->2332 2347 40f4b8-40f4be 2338->2347 2348 40f519-40f523 2338->2348 2342->2327 2347->2348 2349 40f4c0-40f4d8 2347->2349 2348->2337 2352 40f4e4-40f4f1 call 4a56e0 2349->2352 2353 40f4da-40f4e2 2349->2353 2354 40f50f-40f514 2352->2354 2357 40f4f3-40f509 call 42d080 RegisterTypeLib 2352->2357 2353->2354 2354->2348 2357->2354
    APIs
    • LoadTypeLib.OLEAUT32(00000000), ref: 0040F45F
      • Part of subcall function 0042D080: lstrlenA.KERNEL32(00000000,00000000,00423A33,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0042D08E
    • GetUserDefaultLCID.KERNEL32(00000000,?,?,00000001), ref: 0040F49B
    • LHashValOfNameSys.OLEAUT32(00000001,00000000), ref: 0040F4A4
    • RegisterTypeLib.OLEAUT32(?,00000000), ref: 0040F509
    • CoCreateInstance.OLE32(?,00000000,00000017,004D30B8,00000000), ref: 0040F569
    • CoCreateInstance.OLE32(?,00000000,00000007,004D30B8,00000000), ref: 0040F585
    • OleRun.OLE32(00000000), ref: 0040F590
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CreateInstanceType$DefaultHashLoadNameRegisterUserlstrlen
    • String ID: Pou
    • API String ID: 2910728731-1565865998
    • Opcode ID: f53eef73561ccd602d85ed3aa0b6a7182d9f7d00f04489f1cfa804a2957fb853
    • Instruction ID: a28f896cdccbbf2c8610f76e7cda259450322900c8795761e1f536f319cdafa4
    • Opcode Fuzzy Hash: f53eef73561ccd602d85ed3aa0b6a7182d9f7d00f04489f1cfa804a2957fb853
    • Instruction Fuzzy Hash: 94514670204342AFD710DF61DC84EABB7E8EF84748F40483EF94597291E779E9498BA6
    APIs
    • FindNextFileA.KERNELBASE(?,?), ref: 00423512
    • FindClose.KERNEL32 ref: 00423521
    • FindFirstFileA.KERNELBASE(?,?), ref: 0042352D
    • FindClose.KERNELBASE(00000000), ref: 0042358B
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Find$CloseFile$FirstNext
    • String ID:
    • API String ID: 1164774033-0
    • Opcode ID: 91aa74e0d0df918907ec7399e7c0fbb8ce1eac8e5a628843f6f8ebf43310eeb1
    • Instruction ID: a8354ff52896a06a1f038fcb7e21b975d269c8a9a1f27655c99b93bab4979936
    • Opcode Fuzzy Hash: 91aa74e0d0df918907ec7399e7c0fbb8ce1eac8e5a628843f6f8ebf43310eeb1
    • Instruction Fuzzy Hash: 28212232704730A7D3319E64E84477B7374AB84727F950626ED2D87340E77DDE854689
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00470EEB
    • Process32First.KERNEL32 ref: 00470F02
    • Process32Next.KERNEL32(00000000,?), ref: 00470F59
    • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,00000000,?), ref: 00470F63
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
    • String ID:
    • API String ID: 3243318325-0
    • Opcode ID: 0860be7b14fb76ad25953722d2b4c6e0adc7a8c72f4ade93b78fead007b50d58
    • Instruction ID: 8a874fc9a6131c9dcab8faa5d5505eccab677faca0dc05679c7963befe0472c1
    • Opcode Fuzzy Hash: 0860be7b14fb76ad25953722d2b4c6e0adc7a8c72f4ade93b78fead007b50d58
    • Instruction Fuzzy Hash: A32181715053009FC324DF6AC941ADBB7E4FF89354F00892EF94987251DB79B508CB95
    APIs
    • __EH_prolog.LIBCMT ref: 004B7F56
    • GetVersion.KERNEL32(00000007,?,?,00000000,00000000,?,0000C000,00000000,00000000,00000007), ref: 004B8109
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prologVersion
    • String ID:
    • API String ID: 1836448879-0
    • Opcode ID: 2f3cb3af199070009e43619a9dbb43ffabc7f258801c412f8064391277b124c1
    • Instruction ID: 9a374fdb2de93d36692136d346ab99611067c6ef9ec53f457a604a9a9c5324e4
    • Opcode Fuzzy Hash: 2f3cb3af199070009e43619a9dbb43ffabc7f258801c412f8064391277b124c1
    • Instruction Fuzzy Hash: BAE16A70604209EFDB14EF65CC80AFE77E9AF44715F10851BF806AA291DB39D902EB79
    APIs
    • FindFirstFileA.KERNELBASE(?,?), ref: 0042B8B0
    • FindClose.KERNEL32(00000000), ref: 0042B8BC
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: 30aac6d0fc90dd826a4b263166dee06c7b9cfdd3258f0bec508900e93e543466
    • Instruction ID: 62439c59dd59895b7baa3f1d1b59f2a679750a15c30dfc3e533e2b94d365c6e4
    • Opcode Fuzzy Hash: 30aac6d0fc90dd826a4b263166dee06c7b9cfdd3258f0bec508900e93e543466
    • Instruction Fuzzy Hash: 0BD05EB55005405BD3159BB4ED09AAA3798AB44311FC40A38B92DC52F0E77ED8588551

    Control-flow Graph

    APIs
    • GetClientRect.USER32(00000000,?), ref: 0047A579
    • GetWindowTextA.USER32(?,?,00000100), ref: 0047A58C
    • GetTextExtentPoint32A.GDI32(?,yiyuyan,00000000,?), ref: 0047A5C5
    • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 0047A5E4
    • SelectObject.GDI32(?,00000000), ref: 0047A5F0
    • GetTextExtentPoint32A.GDI32(?,?,00000000,?), ref: 0047A617
    • GetWindowLongA.USER32(?,000000F0), ref: 0047A62F
    • FillRect.USER32(?,?,?), ref: 0047A6AC
    • FillRect.USER32(?,?,?), ref: 0047A6DC
    • FillRect.USER32 ref: 0047A704
    • FillRect.USER32(?,?,?), ref: 0047A72F
    • FillRect.USER32(?,?,?), ref: 0047A75A
    • CreateSolidBrush.GDI32(00BFB8BF), ref: 0047A75D
    • FrameRect.USER32(?,?,00000000), ref: 0047A770
    • DeleteObject.GDI32(00000000), ref: 0047A777
    • GetPixel.GDI32(?,00000000,00000000), ref: 0047A784
    • SetPixel.GDI32(?,00000000,?,00000000), ref: 0047A79F
    • SetPixel.GDI32(?,00000000,?,?), ref: 0047A7B1
    • SetPixel.GDI32(?,00000000,?,?), ref: 0047A7C5
    • SetPixel.GDI32(?,00000001,?,?), ref: 0047A7D7
    • SetPixel.GDI32(?,00000002,?,?), ref: 0047A7E9
    • SetPixel.GDI32(?,00000002,?,00BFB8BF), ref: 0047A7F9
    • SetPixel.GDI32(?,00000001,?,00BFB8BF), ref: 0047A80B
    • SetPixel.GDI32(?,?,?,?), ref: 0047A821
    • SetPixel.GDI32(?,?,?,?), ref: 0047A839
    • SetPixel.GDI32(?,?,?,?), ref: 0047A851
    • SetPixel.GDI32(?,?,?,?), ref: 0047A868
    • SetPixel.GDI32(?,?,?,?), ref: 0047A881
    • SetPixel.GDI32(?,?,?,00BFB8BF), ref: 0047A897
    • SetPixel.GDI32(?,?,?,00BFB8BF), ref: 0047A8AF
    • SetPixel.GDI32(?,00000000,?,?), ref: 0047A8C1
    • SetPixel.GDI32(?,00000000,?,?), ref: 0047A8D5
    • SetPixel.GDI32(?,00000000,?,?), ref: 0047A8E9
    • SetPixel.GDI32(?,00000001,?,?), ref: 0047A8FC
    • SetPixel.GDI32(?,00000002,?,?), ref: 0047A90F
    • SetPixel.GDI32(?,00000001,?,00BFB8BF), ref: 0047A921
    • SetPixel.GDI32(?,00000002,?,00BFB8BF), ref: 0047A933
    • SetPixel.GDI32(?,?,?,?), ref: 0047A94A
    • SetPixel.GDI32(?,?,?,?), ref: 0047A963
    • SetPixel.GDI32(?,?,?,?), ref: 0047A97C
    • SetPixel.GDI32(?,?,?,?), ref: 0047A995
    • SetPixel.GDI32(?,?,?,?), ref: 0047A9AE
    • SetPixel.GDI32(?,?,?,00BFB8BF), ref: 0047A9C6
    • SetPixel.GDI32(?,?,?,00BFB8BF), ref: 0047A9DE
    • GetTextMetricsA.GDI32(?,?), ref: 0047AA00
    • GetWindowLongA.USER32(?,000000F0), ref: 0047AA18
    • SetPixel.GDI32(?,00000008,?,?), ref: 0047AA60
    • SetPixel.GDI32(?,?,?,?), ref: 0047AABA
    • SetTextColor.GDI32(?,?), ref: 0047AAD4
    • DrawTextA.USER32(?,?,000000FF,?,?), ref: 0047AAF2
    • SelectObject.GDI32(?,?), ref: 0047AB0D
    • SetPixel.GDI32(?,?,?,?), ref: 0047AB73
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Pixel$Rect$Text$Fill$ObjectWindow$ExtentLongPoint32Select$BrushClientColorCreateDeleteDrawFrameMessageMetricsSendSolid
    • String ID: yiyuyan
    • API String ID: 2337496717-4001923938
    • Opcode ID: b4d305355b89f1695586bb8cd0837cc543bd842609343fe3e2b5dcc1e5c5d3d9
    • Instruction ID: 25989655adfb1a243e7e6da8bed62b42ad9fff6ee3ad28fc3b7312b82885e18e
    • Opcode Fuzzy Hash: b4d305355b89f1695586bb8cd0837cc543bd842609343fe3e2b5dcc1e5c5d3d9
    • Instruction Fuzzy Hash: 1422F5B4608705AFD204CF28C884D6FBBF9EFC8754F148A1EB99583390D675EC458BA6

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 46 4790c0-4793b1 47 4793e3-4793ef 46->47 48 4793b3-4793b4 46->48 51 4793f3-479457 call 4782b0 GetClientRect FillRect GetSysColorBrush FrameRect 47->51 49 4793b6-4793b7 48->49 50 4793ce-4793e1 48->50 49->47 52 4793b9-4793cc 49->52 50->51 55 47946b 51->55 56 479459-479469 GetSysColor 51->56 52->51 57 47946f-4794b3 InflateRect CreateSolidBrush FrameRect DeleteObject InflateRect 55->57 56->57 58 4794d7-4794d9 57->58 59 4794b5-4794d5 CreateSolidBrush FillRect DeleteObject 57->59 61 4794df-4794e1 58->61 62 4794db-4794dd 58->62 60 47952a-47953e InflateRect 59->60 63 479552-479557 60->63 64 479540-479545 60->64 66 4794e3-4794e8 61->66 67 4794ea-4794ef 61->67 65 47950f-479525 call 4784b0 62->65 69 479563-479577 call 4784b0 63->69 64->63 68 479547-479549 64->68 65->60 66->65 70 4794f1-4794f3 67->70 71 47950a 67->71 73 47954b-479550 68->73 74 479559-47955c 68->74 79 47957c-4795da GetSysColor SetPixel * 4 69->79 76 4794f5-4794fa 70->76 77 479503-479508 70->77 71->65 73->69 74->69 78 47955e-479561 74->78 76->77 80 4794fc-479501 76->80 77->65 78->69 78->79 81 4795dc-4795e8 GetSysColor 79->81 82 4795ea 79->82 80->65 83 4795ee-479632 SetPixel * 4 81->83 82->83 84 479634-479640 GetSysColor 83->84 85 479642 83->85 86 479646-4796d2 SetPixel * 8 84->86 85->86 87 4796d4-4796fe InflateRect DrawFocusRect InflateRect 86->87 88 479700-479719 GetWindowTextA 86->88 87->88 89 47971f-479723 88->89 90 4797ae-4797ca call 478380 88->90 91 479725-47972e OffsetRect 89->91 92 479734-47973c 89->92 91->92 94 479746 92->94 95 47973e-479740 92->95 98 47974b-479784 SetTextColor SendMessageA SelectObject GetWindowLongA call 479040 94->98 95->94 97 479742-479744 95->97 97->98 100 479789-4797ac call 476c30 SelectObject 98->100 100->90
    APIs
    • GetClientRect.USER32(?,?), ref: 0047941E
    • FillRect.USER32(?,?,?), ref: 00479432
    • GetSysColorBrush.USER32(0000000F), ref: 0047943A
    • FrameRect.USER32(?,?,00000000), ref: 00479451
    • GetSysColor.USER32(0000000F), ref: 0047945B
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00479478
    • CreateSolidBrush.GDI32(00733C00), ref: 00479485
    • FrameRect.USER32(?,?,00000000), ref: 00479494
    • DeleteObject.GDI32(00000000), ref: 0047949D
    • InflateRect.USER32(?,000000FF,000000FF), ref: 004794A8
    • CreateSolidBrush.GDI32(00EAF4F5), ref: 004794BD
    • FillRect.USER32(?,?,00000000), ref: 004794CC
    • DeleteObject.GDI32(00000000), ref: 004794D3
    • InflateRect.USER32(?,000000FE,000000FE), ref: 00479533
    • GetSysColor.USER32(0000000F), ref: 00479584
    • SetPixel.GDI32(?,00000001,00000001,00000000), ref: 00479598
    • SetPixel.GDI32(?,00000001,00733BFE,00000000), ref: 004795AA
    • SetPixel.GDI32(?,?,00733BFE,00000000), ref: 004795C2
    • SetPixel.GDI32(?,00733BFE,00000001,00000000), ref: 004795D4
    • GetSysColor.USER32(0000000F), ref: 004795DE
    • SetPixel.GDI32(?,00000002,00000002,00733C00), ref: 004795F8
    • SetPixel.GDI32(?,00000002,00733C01,00733C00), ref: 00479608
    • SetPixel.GDI32(?,?,00733C01,00733C00), ref: 0047961C
    • SetPixel.GDI32(?,00733C01,00000002,00733C00), ref: 0047962C
    • GetSysColor.USER32(0000000F), ref: 00479636
    • SetPixel.GDI32(?,00000001,00000002,00733C00), ref: 00479650
    • SetPixel.GDI32(?,00000002,00000001,00733C00), ref: 0047965C
    • SetPixel.GDI32(?,00733C01,00000001,00733C00), ref: 0047966C
    • SetPixel.GDI32(?,00733BFE,00000002,00733C00), ref: 0047967E
    • SetPixel.GDI32(?,?,00733BFE,00733C00), ref: 00479694
    • SetPixel.GDI32(?,?,00733C01,00733C00), ref: 004796AA
    • SetPixel.GDI32(?,00000002,00733BFE,00733C00), ref: 004796BC
    • SetPixel.GDI32(?,00000001,00733C01,00733C00), ref: 004796CC
    • InflateRect.USER32(?,00000001,00000001), ref: 004796E3
    • DrawFocusRect.USER32(?,?), ref: 004796EF
    • InflateRect.USER32(?,000000FF,000000FF), ref: 004796FE
    • GetWindowTextA.USER32(?,?,00000100), ref: 00479711
    • OffsetRect.USER32(?,00000001,00000001), ref: 0047972E
    • SetTextColor.GDI32(?,0094A2A5), ref: 00479751
    • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00479761
    • SelectObject.GDI32(?,00000000), ref: 00479773
    • GetWindowLongA.USER32(?,000000F0), ref: 0047977D
    • SelectObject.GDI32(?,00000000), ref: 004797AC
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Pixel$Rect$Color$Inflate$Object$Brush$CreateDeleteFillFrameSelectSolidTextWindow$ClientDrawFocusLongMessageOffsetSend
    • String ID:
    • API String ID: 3464004264-0
    • Opcode ID: 0d43308a02b2e82aad2ed3dd2546cdbd88eee0d65237bce28e2a636991aa93ed
    • Instruction ID: 0a65b32dd5fb7d65735255953d9b4feed0785f0b01ed6e88c9e4f02048ad4c55
    • Opcode Fuzzy Hash: 0d43308a02b2e82aad2ed3dd2546cdbd88eee0d65237bce28e2a636991aa93ed
    • Instruction Fuzzy Hash: 981236B1508385AFD364CF19C889FABBBE9FBC8714F108A1EF58897290D7749841CB56

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 431 4797d0-479845 call 4782b0 GetClientRect FillRect 434 479847-479857 GetSysColor 431->434 435 479859 431->435 436 47985e-479872 GetWindowLongA 434->436 435->436 437 479874-479877 436->437 438 47988b-47988e 436->438 439 4798a4-4798ad 437->439 440 479879-479889 437->440 438->439 441 479890-4798a2 438->441 442 4798b1-4798bb 439->442 440->442 441->442 443 4798d5-4798e8 442->443 444 4798bd-4798d3 442->444 445 4798ec-479921 CreateSolidBrush FrameRect DeleteObject InflateRect 443->445 444->445 446 479923-479938 GetStockObject FillRect 445->446 447 47993a-47993c 445->447 448 47995f-479975 InflateRect 446->448 449 479942-479948 447->449 450 47993e-479940 447->450 452 479977-479979 448->452 453 47997f-479981 448->453 451 47994b-47995a call 4784b0 449->451 450->451 451->448 455 4799d7-4799df 452->455 456 47997b-47997d 452->456 457 479983-479985 453->457 458 4799ab-4799b9 453->458 460 4799e5-479a12 CreatePen SelectObject 455->460 461 479a79 455->461 456->453 456->455 462 479987-47998c 457->462 463 47998e-479990 457->463 459 4799be-4799d5 CreateSolidBrush FillRect DeleteObject 458->459 459->455 464 479a16-479a1c 460->464 465 479a7f-479a94 GetWindowTextA 461->465 462->459 466 479992-479997 463->466 467 479999-4799a9 463->467 468 479a21-479a40 MoveToEx 464->468 469 479a1e 464->469 470 479a9a-479a9e 465->470 471 479b28-479b44 call 478380 465->471 466->459 467->459 472 479a44-479a60 LineTo 468->472 473 479a42 468->473 469->468 475 479aa0-479aa8 GetSysColor 470->475 476 479aaa 470->476 472->464 478 479a62-479a77 SelectObject DeleteObject 472->478 473->472 477 479aad-479ad4 SetTextColor SendMessageA SelectObject call 479040 475->477 476->477 481 479ad9-479af8 call 476c30 SelectObject 477->481 478->465 481->471 484 479afa-479b22 call 479040 call 477210 DrawFocusRect 481->484 484->471
    APIs
      • Part of subcall function 004782B0: GetWindowRect.USER32(?,00000000), ref: 004782C0
      • Part of subcall function 004782B0: GetWindowDC.USER32(?,?,?), ref: 004782C9
      • Part of subcall function 004782B0: CreateCompatibleDC.GDI32(00000000), ref: 004782D3
      • Part of subcall function 004782B0: SetBkMode.GDI32(00000000,00000001), ref: 004782DF
      • Part of subcall function 004782B0: SelectObject.GDI32(?,00000000), ref: 00478329
      • Part of subcall function 004782B0: BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00478365
    • GetClientRect.USER32(00000000,?), ref: 00479807
    • FillRect.USER32(?,?,?), ref: 0047983B
    • GetSysColor.USER32(0000000F), ref: 00479849
    • GetWindowLongA.USER32(?,000000F0), ref: 00479863
    • CreateSolidBrush.GDI32(00845118), ref: 004798ED
    • FrameRect.USER32(?,?,00000000), ref: 004798FC
    • DeleteObject.GDI32(00000000), ref: 00479909
    • InflateRect.USER32(000000F0,000000FF,000000FF), ref: 0047991A
    • GetStockObject.GDI32(00000000), ref: 00479925
    • FillRect.USER32(?,000000F0,00000000), ref: 00479932
    • InflateRect.USER32(000000F0,000000FE,000000FE), ref: 00479968
    • CreateSolidBrush.GDI32(-00E7E7E6), ref: 004799BF
    • FillRect.USER32(?,?,00000000), ref: 004799CE
    • DeleteObject.GDI32(00000000), ref: 004799D5
    • CreatePen.GDI32(00000000,00000001,-0021A220), ref: 004799FA
    • SelectObject.GDI32(?,00000000), ref: 00479A02
    • MoveToEx.GDI32(?,?,00000002,00000000), ref: 00479A34
    • LineTo.GDI32(?,?,00000005), ref: 00479A55
    • SelectObject.GDI32(?,?), ref: 00479A6E
    • DeleteObject.GDI32(00000000), ref: 00479A71
    • GetWindowTextA.USER32(00000001,?,00000100), ref: 00479A8C
    • GetSysColor.USER32(00000011), ref: 00479AA2
    • SetTextColor.GDI32(?,?), ref: 00479AAF
    • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00479ABE
    • SelectObject.GDI32(?,00000000), ref: 00479AC6
      • Part of subcall function 00476C30: GetTextExtentPoint32A.GDI32(?,004EEAE0,?,?), ref: 00476CC3
    • SelectObject.GDI32(?,00000000), ref: 00479AF2
    • DrawFocusRect.USER32(?,?), ref: 00479B22
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ObjectRect$Select$CreateWindow$ColorDeleteFillText$BrushInflateSolid$ClientCompatibleDrawExtentFocusFrameLineLongMessageModeMovePoint32SendStock
    • String ID:
    • API String ID: 1573148217-0
    • Opcode ID: cf21932e35af7efec8d322b1c417f93303789ac446cc8c9f980ddc9f054a1fbd
    • Instruction ID: 036afe5a9b9211688522975ad6c4fc7ca7c1552a38b579f9aee58cb3b5083440
    • Opcode Fuzzy Hash: cf21932e35af7efec8d322b1c417f93303789ac446cc8c9f980ddc9f054a1fbd
    • Instruction Fuzzy Hash: 9BB19CB1504301AFD710DF64CC89EAB77E8EB85704F044A2EF95596351DB38EC45CBAA

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1383 4b7382-4b739e call 4bf1ac 1386 4b73a0-4b73b2 CallNextHookEx 1383->1386 1387 4b73b7-4b73d3 call 4bec24 1383->1387 1388 4b7574-4b7575 1386->1388 1391 4b73e7-4b73ee 1387->1391 1392 4b73d5-4b73d9 1387->1392 1395 4b743c-4b743e 1391->1395 1396 4b73f0-4b73fe GetClassLongA 1391->1396 1393 4b7548 1392->1393 1394 4b73df-4b73e1 1392->1394 1398 4b754b-4b7560 CallNextHookEx 1393->1398 1394->1391 1394->1393 1399 4b74ed-4b74fb GetWindowLongA 1395->1399 1400 4b7444-4b7467 call 4b70ef 1395->1400 1396->1393 1397 4b7404-4b740f 1396->1397 1402 4b7428-4b7436 lstrcmpiA 1397->1402 1403 4b7411-4b7425 GlobalGetAtomNameA 1397->1403 1404 4b756f-4b7573 1398->1404 1405 4b7562-4b756b UnhookWindowsHookEx 1398->1405 1399->1393 1401 4b74fd-4b750e GetPropA 1399->1401 1414 4b74ca-4b74dd call 4b71a1 SetWindowLongA 1400->1414 1415 4b7469-4b746d 1400->1415 1401->1393 1408 4b7510-4b7522 SetPropA GetPropA 1401->1408 1402->1393 1402->1395 1403->1402 1404->1388 1405->1404 1408->1393 1409 4b7524-4b7537 GlobalAddAtomA 1408->1409 1411 4b7539 1409->1411 1412 4b753e-4b7542 SetWindowLongA 1409->1412 1411->1412 1412->1393 1420 4b74df-4b74e2 1414->1420 1421 4b74e4-4b74eb 1414->1421 1415->1414 1417 4b746f-4b7477 1415->1417 1417->1414 1419 4b7479-4b747d 1417->1419 1419->1414 1422 4b747f-4b7494 call 4b6edf 1419->1422 1420->1421 1421->1398 1422->1414 1425 4b7496-4b74ba call 4b71a1 GetWindowLongA 1422->1425 1425->1421 1429 4b74bc-4b74c8 SetWindowLongA 1425->1429 1429->1420
    APIs
      • Part of subcall function 004BF1AC: TlsGetValue.KERNEL32(00533A2C,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000,?,004B2B99,00000000,00000000,00000000,00000000), ref: 004BF1EB
    • CallNextHookEx.USER32(?,00000003,?,?), ref: 004B73AC
    • GetClassLongA.USER32(?,000000E6), ref: 004B73F3
    • GlobalGetAtomNameA.KERNEL32(?,?,00000005), ref: 004B741F
    • lstrcmpiA.KERNEL32(?,ime), ref: 004B742E
    • GetWindowLongA.USER32(?,000000FC), ref: 004B74A1
    • SetWindowLongA.USER32(?,000000FC,00000000), ref: 004B74C2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Long$Window$AtomCallClassGlobalHookNameNextValuelstrcmpi
    • String ID: AfxOldWndProc423$ime
    • API String ID: 3731301195-104836986
    • Opcode ID: ee81e3665157fa4558f6ba5636a5f2fa78d4e1f2b96e66bc9660506799f428cc
    • Instruction ID: ba4b23ff377a09fc51956bf3ec3e04cc6fba849956f0b01beb78c865f94a0973
    • Opcode Fuzzy Hash: ee81e3665157fa4558f6ba5636a5f2fa78d4e1f2b96e66bc9660506799f428cc
    • Instruction Fuzzy Hash: 4251B231608615BBCB219F64DC48FEF7BB8BF44361F104626F815A7291D738E940CBA8

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1430 4b8fae-4b8fc9 call 4b9917 1433 4b8fcb-4b8fce 1430->1433 1434 4b8fd0-4b8fd4 1430->1434 1435 4b9008-4b901b GetWindowRect 1433->1435 1436 4b8fe1-4b8fe6 GetWindow 1434->1436 1437 4b8fd6-4b8fdf GetParent 1434->1437 1438 4b90ac-4b90d3 GetParent GetClientRect * 2 MapWindowPoints 1435->1438 1439 4b9021-4b9023 1435->1439 1440 4b8fec-4b8ff0 1436->1440 1437->1440 1443 4b90d9-4b9118 1438->1443 1441 4b903e-4b9047 1439->1441 1442 4b9025-4b9033 GetWindowLongA 1439->1442 1440->1435 1444 4b8ff2-4b9004 SendMessageA 1440->1444 1448 4b9049-4b9050 call 4a3405 1441->1448 1449 4b9083-4b90aa GetWindowRect call 4a356f call 4a35da CopyRect 1441->1449 1446 4b903c 1442->1446 1447 4b9035-4b903a 1442->1447 1450 4b911a-4b911d 1443->1450 1451 4b911f-4b9126 1443->1451 1444->1435 1445 4b9006 1444->1445 1445->1435 1446->1441 1447->1441 1447->1446 1461 4b9052 1448->1461 1462 4b9055-4b9081 call 4a356f call 4a35da CopyRect * 2 1448->1462 1449->1443 1454 4b9130-4b9133 1450->1454 1451->1454 1455 4b9128-4b912e 1451->1455 1458 4b913a-4b913f 1454->1458 1459 4b9135-4b9138 1454->1459 1455->1454 1463 4b914a-4b9157 call 4b9a30 1458->1463 1464 4b9141-4b9147 1458->1464 1459->1463 1461->1462 1462->1443 1468 4b915c-4b9160 1463->1468 1464->1463
    APIs
      • Part of subcall function 004B9917: GetWindowLongA.USER32(?,000000F0), ref: 004B9923
    • GetParent.USER32(?), ref: 004B8FD9
    • SendMessageA.USER32(00000000,0000036B,00000000,00000000), ref: 004B8FFC
    • GetWindowRect.USER32(?,?), ref: 004B9015
    • GetWindowLongA.USER32(00000000,000000F0), ref: 004B9028
    • CopyRect.USER32(?,?), ref: 004B9075
    • CopyRect.USER32(?,?), ref: 004B907F
    • GetWindowRect.USER32(00000000,?), ref: 004B9088
      • Part of subcall function 004A356F: MonitorFromWindow.USER32(?,?), ref: 004A3584
      • Part of subcall function 004A35DA: GetMonitorInfoA.USER32(?,?), ref: 004A35F1
    • CopyRect.USER32(?,?), ref: 004B90A4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: RectWindow$Copy$LongMonitor$FromInfoMessageParentSend
    • String ID: ($@
    • API String ID: 1450647913-1311469180
    • Opcode ID: 29c69ca4fc461ef26552fce18aeaad799c0142078290217224758bba322d8832
    • Instruction ID: 6b61da9f4a9475aa66ea50615522f7c95b9c55bdeb10e55200cbbd3193589d9e
    • Opcode Fuzzy Hash: 29c69ca4fc461ef26552fce18aeaad799c0142078290217224758bba322d8832
    • Instruction Fuzzy Hash: 46519371904619AFDB10DFA8CC85EEE7BB9AF48314F15411AFA01F3284DA34AD458B68

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1561 412260-412281 1562 412283-412285 1561->1562 1563 41228a-412290 1561->1563 1566 4127c9-4127db 1562->1566 1564 412292 1563->1564 1565 412294-41229d 1563->1565 1564->1565 1567 4122a3 1565->1567 1568 4127c7 1565->1568 1569 412461-41246a 1567->1569 1570 412443-41244e 1567->1570 1571 412385-4123c7 call 4bc36f call 411510 CreateSolidBrush call 4bc318 RedrawWindow 1567->1571 1572 412665-41266e 1567->1572 1573 4124c7-4124d0 1567->1573 1574 4122aa-4122ec call 411630 call 4b99ad SendMessageA 1567->1574 1575 41236a-412380 InvalidateRect 1567->1575 1576 4123cc-4123e9 call 410ef0 call 4120e0 1567->1576 1577 4125ec-4125ef 1567->1577 1578 4123ee-4123f9 1567->1578 1579 4122f1-4122fa 1567->1579 1580 4125b3-4125bc 1567->1580 1581 412494-41249d 1567->1581 1582 412539-41254d 1567->1582 1583 41241a-41243e SendMessageA 1567->1583 1584 41257a-412583 1567->1584 1568->1566 1594 412479 1569->1594 1595 41246c-41246e 1569->1595 1570->1568 1593 412454-41245c 1570->1593 1571->1568 1605 412670-4126ad call 4b7a75 call 4b56a7 1572->1605 1606 4126af-4126b9 1572->1606 1603 4124d2-4124d4 1573->1603 1604 4124df 1573->1604 1574->1568 1575->1568 1576->1568 1598 4125f1-4125fd 1577->1598 1599 4125ff-412605 1577->1599 1578->1568 1590 4123ff-41240a 1578->1590 1591 412309 1579->1591 1592 4122fc-4122fe 1579->1592 1596 4125cb 1580->1596 1597 4125be-4125c0 1580->1597 1600 4124ac 1581->1600 1601 41249f-4124a1 1581->1601 1582->1568 1587 412553-412575 SendMessageA InvalidateRect 1582->1587 1583->1568 1588 412592 1584->1588 1589 412585-412587 1584->1589 1587->1568 1617 412597-41259d 1588->1617 1612 412589-41258b 1589->1612 1613 41258d-412590 1589->1613 1590->1568 1614 412410-412415 1590->1614 1618 41230e-412313 call 411490 1591->1618 1615 412300-412302 1592->1615 1616 412304-412307 1592->1616 1593->1568 1623 41247e-412481 1594->1623 1619 412470-412472 1595->1619 1620 412474-412477 1595->1620 1624 4125d0-4125d6 1596->1624 1621 4125c2-4125c4 1597->1621 1622 4125c6-4125c9 1597->1622 1625 41260b-412613 1598->1625 1599->1625 1628 4124b1-4124b4 1600->1628 1626 4124a3-4124a5 1601->1626 1627 4124a7-4124aa 1601->1627 1630 4124d6-4124d8 1603->1630 1631 4124da-4124dd 1603->1631 1607 4124e4-4124eb 1604->1607 1611 4126bf-4126ed SendMessageA * 2 1605->1611 1606->1611 1632 4124fd-412506 1607->1632 1633 4124ed-4124fb 1607->1633 1611->1568 1612->1617 1613->1588 1613->1617 1614->1568 1615->1618 1616->1591 1616->1618 1617->1568 1635 4125a3-4125ae 1617->1635 1648 412318-412323 1618->1648 1619->1623 1620->1594 1620->1623 1621->1624 1622->1596 1622->1624 1623->1568 1642 412487-41248f 1623->1642 1624->1568 1637 4125dc-4125e7 1624->1637 1625->1568 1638 412619-41261c 1625->1638 1626->1628 1627->1600 1627->1628 1628->1568 1643 4124ba-4124c2 1628->1643 1630->1607 1631->1604 1631->1607 1644 412507-412534 SendMessageA * 2 InvalidateRect 1632->1644 1633->1644 1635->1568 1637->1568 1638->1568 1649 412622-412632 1638->1649 1642->1568 1643->1568 1644->1568 1648->1568 1651 412329-41232c 1648->1651 1652 412634 1649->1652 1653 412636-412638 1649->1653 1651->1568 1657 412332-412337 1651->1657 1652->1653 1658 41263a 1653->1658 1659 41263c-412660 SendMessageA 1653->1659 1660 412357-412365 call 4b997c 1657->1660 1661 412339-41233c 1657->1661 1658->1659 1659->1568 1660->1568 1661->1660 1662 41233e-412341 1661->1662 1662->1660 1664 412343-412352 call 4b997c 1662->1664 1664->1568
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7fa95f5c9634e95ace5587c858fa463133f43b910a6c7a0733d0a92a73764444
    • Instruction ID: 77ddc0c8141847474fc48481f2d9f00bb8efc886da69bfb7fe9a5323f81997b8
    • Opcode Fuzzy Hash: 7fa95f5c9634e95ace5587c858fa463133f43b910a6c7a0733d0a92a73764444
    • Instruction Fuzzy Hash: 4CD18174204B019FD724CF24CD80EABB7E9EB48718F14492EE566C7790D6B8EC91CB29

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1668 473bd0-473c05 call 4b53e8 1671 473c07-473c10 call 474c70 1668->1671 1672 473c12 1668->1672 1673 473c14-473c1e 1671->1673 1672->1673 1676 473c41 1673->1676 1677 473c20-473c36 call 475fa0 1673->1677 1679 473c43-473c55 1676->1679 1681 473c58-473c85 1677->1681 1682 473c38-473c3c 1677->1682 1683 473c87-473c89 1681->1683 1684 473c8b-473c8e 1681->1684 1682->1676 1685 473ca5-473caa 1683->1685 1686 473c97-473ca2 1684->1686 1687 473c90-473c95 1684->1687 1688 473cd4-473cd7 1685->1688 1689 473cac-473cc5 1685->1689 1686->1685 1687->1685 1692 473d0f-473d17 1688->1692 1693 473cd9-473cde 1688->1693 1690 473cc7 1689->1690 1691 473cca-473ccf 1689->1691 1690->1691 1691->1688 1696 473cd1 1691->1696 1694 473d3c-473d44 1692->1694 1695 473d19-473d24 1692->1695 1697 473ce5-473cea 1693->1697 1698 473ce0-473ce3 1693->1698 1701 473d46 1694->1701 1702 473d49-473d51 1694->1702 1699 473d26 1695->1699 1700 473d2c-473d34 1695->1700 1696->1688 1704 473cef-473cf4 1697->1704 1705 473cec 1697->1705 1703 473cfb-473d00 1698->1703 1699->1700 1700->1694 1706 473d36 1700->1706 1701->1702 1707 473d53-473d5e 1702->1707 1708 473d60-473d68 1702->1708 1710 473d05-473d0a 1703->1710 1711 473d02 1703->1711 1704->1703 1709 473cf6 1704->1709 1705->1704 1706->1694 1707->1708 1712 473d6d-473d75 1708->1712 1713 473d6a 1708->1713 1709->1703 1710->1692 1714 473d0c 1710->1714 1711->1710 1715 473d77 1712->1715 1716 473d7d-473d85 1712->1716 1713->1712 1714->1692 1715->1716 1717 473d87 1716->1717 1718 473d8a-473d92 1716->1718 1717->1718 1719 473d97-473dda call 4b70aa call 4b3af3 1718->1719 1720 473d94 1718->1720 1719->1676 1725 473de0-473e18 SendMessageA call 4763b0 1719->1725 1720->1719 1728 473e1e 1725->1728 1729 473e1a-473e1c 1725->1729 1730 473e21-473e34 call 476110 1728->1730 1729->1730 1733 473e36-473e42 1730->1733 1734 473e5a-473e64 1730->1734 1737 473e47-473e55 SendMessageA call 4b41e9 1733->1737 1738 473e44 1733->1738 1735 473e66-473e68 1734->1735 1736 473e6a 1734->1736 1740 473e70-473e83 call 476110 1735->1740 1736->1740 1737->1734 1738->1737 1743 473e85-473e87 1740->1743 1744 473ea0-473ea4 1740->1744 1745 473e8c-473e9b SendMessageA call 4b41e9 1743->1745 1746 473e89 1743->1746 1747 473eaa-473eb7 call 4b4559 1744->1747 1748 473f39-473f93 SendMessageA call 411510 SendMessageA call 411510 SendMessageA call 476090 1744->1748 1745->1744 1746->1745 1755 473ebc-473ec5 IsWindow 1747->1755 1756 473eb9 1747->1756 1765 473f95-473fa3 1748->1765 1766 473fe0 1748->1766 1755->1748 1757 473ec7-473ece 1755->1757 1756->1755 1759 473ed4 1757->1759 1760 473ed0-473ed2 1757->1760 1762 473ed7-473eea call 476110 1759->1762 1760->1762 1771 473f20-473f30 1762->1771 1772 473eec-473f09 call 411510 ImageList_SetBkColor 1762->1772 1768 473fa5-473fb0 LoadCursorA 1765->1768 1769 473fc9-473fd0 LoadCursorA 1765->1769 1770 473fe2 call 475640 1766->1770 1773 473fd2-473fde SendMessageA 1768->1773 1774 473fb2-473fc7 call 4bec24 LoadCursorA 1768->1774 1769->1773 1775 473fe7 1770->1775 1779 473f31-473f34 SendMessageA call 4b41e9 1771->1779 1785 473f0e-473f1e 1772->1785 1786 473f0b 1772->1786 1773->1766 1774->1769 1774->1773 1776 473fe9 call 475730 1775->1776 1780 473fee-473ff7 call 4758b0 1776->1780 1779->1748 1787 473ffc-473ffe 1780->1787 1785->1779 1786->1785 1787->1679
    APIs
    • SendMessageA.USER32(?,00001036,00000000,00000000), ref: 00473DF8
    • SendMessageA.USER32(?,00001003,00000000,00000124), ref: 00473E52
    • SendMessageA.USER32(?,00001003,00000002,0000012C), ref: 00473E98
    • ImageList_SetBkColor.COMCTL32(?,00000000), ref: 00473F01
    • SendMessageA.USER32(?,00001208,00000000,00000000), ref: 00473F31
    • SendMessageA.USER32(?,00001024,00000000,?), ref: 00473F48
    • IsWindow.USER32(00000000), ref: 00473EBD
      • Part of subcall function 00411510: GetSysColor.USER32(0000000F), ref: 0041151D
    • SendMessageA.USER32(?,00001026,00000000,00000000), ref: 00473F62
    • SendMessageA.USER32(?,00001001,00000000,00000000), ref: 00473F7C
    • LoadCursorA.USER32(00000000,00007F89), ref: 00473FAC
    • LoadCursorA.USER32(?,000007D8), ref: 00473FC3
    • LoadCursorA.USER32(00000000,00007F00), ref: 00473FD0
    • SendMessageA.USER32(?,0000103E,00000000,00000000), ref: 00473FDE
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$CursorLoad$Color$ImageList_Window
    • String ID:
    • API String ID: 1757432420-0
    • Opcode ID: 4df04aaedd92ae1719ef7d6db41138d8e19292aad1dec20fa9fe45c2dc02c879
    • Instruction ID: 9911d40a026578dece39b21b5812980d560856423b255e79c0ca6f52d3cbedb6
    • Opcode Fuzzy Hash: 4df04aaedd92ae1719ef7d6db41138d8e19292aad1dec20fa9fe45c2dc02c879
    • Instruction Fuzzy Hash: 7EC19F71700701AFE724DE75CC81FA7B3E8AB48745F00891DFA5AC7381EB68E9019B69

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1788 477a80-477ab8 call 4779e0 1791 477acd-477ad6 1788->1791 1792 477aba-477aca 1788->1792 1793 477b09-477b0c 1791->1793 1794 477ad8-477adc 1791->1794 1797 477b41-477b47 1793->1797 1798 477b0e-477b3e CallWindowProcA call 477960 1793->1798 1795 477ae2-477b06 CallWindowProcA 1794->1795 1796 477bce-477be5 call 477e10 1794->1796 1807 477be7-477bfa call 477d00 1796->1807 1808 477bfc-477c01 1796->1808 1801 477b76-477b79 1797->1801 1802 477b49-477b4d 1797->1802 1801->1796 1806 477b7b-477bc8 GetParent GetDC SendMessageA GetObjectA GetTextColor ReleaseDC 1801->1806 1802->1796 1805 477b4f-477b73 CallWindowProcA 1802->1805 1806->1796 1807->1808 1810 477c03-477c1a CallWindowProcA 1808->1810 1811 477c1d-477c22 1808->1811 1810->1811 1813 477c24-477c37 DefWindowProcA 1811->1813 1814 477c3a-477c3f 1811->1814 1813->1814 1815 477c81-477c86 1814->1815 1816 477c41-477c49 1814->1816 1817 477ca2-477ca7 1815->1817 1818 477c88-477c9f CallWindowProcA 1815->1818 1819 477c4b-477c4c 1816->1819 1820 477c78-477c79 call 47a520 1816->1820 1822 477cbf-477cc4 1817->1822 1823 477ca9-477cbc DefWindowProcA 1817->1823 1818->1817 1824 477c70-477c76 call 47ab90 1819->1824 1825 477c4e-477c5d 1819->1825 1827 477c7e 1820->1827 1828 477cc6-477cdb 1822->1828 1829 477cde-477cf1 1822->1829 1823->1822 1824->1827 1825->1827 1827->1815
    APIs
    • CallWindowProcA.USER32(?,?,?,?,?), ref: 00477AF0
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CallProcWindow
    • String ID:
    • API String ID: 2714655100-0
    • Opcode ID: fc08d72518839f9dee53def629055a8b4c42964459501e50a12e190218cf80af
    • Instruction ID: 808ec232c170b221e4090484f7489a0dcfd26d459f9ab10ff6861288341aafd1
    • Opcode Fuzzy Hash: fc08d72518839f9dee53def629055a8b4c42964459501e50a12e190218cf80af
    • Instruction Fuzzy Hash: EC813CB5A04609AFDB24CF59D985EBFB7B9FB88710F50852AF90593340C738AC50CBA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1951 477520-47754a GetClassNameA 1952 47754f-47755b lstrcmpiA 1951->1952 1953 47755d-477567 1952->1953 1954 477569-477577 lstrcmpiA 1952->1954 1953->1952 1953->1954 1955 47758b-477599 GetWindowLongA 1954->1955 1956 477579-477588 1954->1956 1957 47759f 1955->1957 1958 47770c-477719 1955->1958 1957->1958 1959 4775a6-4775a9 1957->1959 1960 477684-47769d 1957->1960 1961 4776c4-4776d3 1957->1961 1962 4775c4-4775d5 GetWindowTextLengthA 1957->1962 1963 4776a0-4776af 1957->1963 1964 47762d-47763c 1957->1964 1965 4776e8-4776f7 1957->1965 1966 4776d6-4776e5 1957->1966 1967 477616-47762a 1957->1967 1968 4776b2-4776c1 1957->1968 1969 47763f-47766c GetParent GetClassNameA 1957->1969 1970 4775ff-477613 1957->1970 1971 4776fa-477709 1957->1971 1959->1958 1972 4775af-4775b7 1959->1972 1973 4775d7-4775dd 1962->1973 1974 4775e3-4775fc 1962->1974 1969->1958 1977 477672-477681 1969->1977 1972->1958 1976 4775bd 1972->1976 1973->1958 1973->1974 1976->1958 1976->1962 1976->1964 1976->1967 1976->1970
    APIs
    • GetClassNameA.USER32(?,?,00000104), ref: 0047753C
    • lstrcmpiA.KERNEL32(?), ref: 00477557
    • lstrcmpiA.KERNEL32(?,ComboLBox), ref: 00477573
    • GetWindowLongA.USER32(?,000000F0), ref: 0047758E
    • GetWindowTextLengthA.USER32(?), ref: 004775CC
    • GetParent.USER32(?), ref: 00477647
    • GetClassNameA.USER32(00000000,?,00000104), ref: 00477658
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ClassNameWindowlstrcmpi$LengthLongParentText
    • String ID: (N$ComboLBox$SysIPAddress32$N
    • API String ID: 2554919364-3549150811
    • Opcode ID: c96fe09597cec5c51a4b4d61fadbb0bf7026d460b5b38a9686f3abbb7932c5cb
    • Instruction ID: d792f55912c5f8f7df202726247ff32c82dbe5794736e0fe01def3bd64adf23a
    • Opcode Fuzzy Hash: c96fe09597cec5c51a4b4d61fadbb0bf7026d460b5b38a9686f3abbb7932c5cb
    • Instruction Fuzzy Hash: 5841AEB778420457E224865EFCC1BEAB344E3E0731F884637EB58C5290D57FA59AC2AC

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1978 4bee45-4bee62 EnterCriticalSection 1979 4bee71-4bee76 1978->1979 1980 4bee64-4bee6b 1978->1980 1982 4bee78-4bee7b 1979->1982 1983 4bee93-4bee9c 1979->1983 1980->1979 1981 4bef2a-4bef2d 1980->1981 1986 4bef2f-4bef32 1981->1986 1987 4bef35-4bef56 LeaveCriticalSection 1981->1987 1988 4bee7e-4bee81 1982->1988 1984 4bee9e-4beeaf GlobalAlloc 1983->1984 1985 4beeb1-4beecd GlobalHandle GlobalUnlock GlobalReAlloc 1983->1985 1989 4beed3-4beedf 1984->1989 1985->1989 1986->1987 1990 4bee8b-4bee8d 1988->1990 1991 4bee83-4bee89 1988->1991 1992 4beefc-4bef29 GlobalLock call 4a7cf0 1989->1992 1993 4beee1-4beef7 GlobalHandle GlobalLock LeaveCriticalSection call 4b31c8 1989->1993 1990->1981 1990->1983 1991->1988 1991->1990 1992->1981 1993->1992
    APIs
    • EnterCriticalSection.KERNEL32(00533A48,00533A1C,00000000,?,00533A2C,00533A2C,004BF1E0,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000), ref: 004BEE54
    • GlobalAlloc.KERNELBASE(00002002,00000000,?,?,00533A2C,00533A2C,004BF1E0,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000), ref: 004BEEA9
    • GlobalHandle.KERNEL32(00572A58), ref: 004BEEB2
    • GlobalUnlock.KERNEL32(00000000,?,?,00533A2C,00533A2C,004BF1E0,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000), ref: 004BEEBB
    • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 004BEECD
    • GlobalHandle.KERNEL32(00572A58), ref: 004BEEE4
    • GlobalLock.KERNEL32(00000000,?,?,00533A2C,00533A2C,004BF1E0,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000), ref: 004BEEEB
    • LeaveCriticalSection.KERNEL32(P:J,?,?,00533A2C,00533A2C,004BF1E0,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000), ref: 004BEEF1
    • GlobalLock.KERNEL32(00000000,?,?,00533A2C,00533A2C,004BF1E0,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000), ref: 004BEF00
    • LeaveCriticalSection.KERNEL32(?), ref: 004BEF49
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
    • String ID: P:J
    • API String ID: 2667261700-542998869
    • Opcode ID: d0e017c7871ca3d4b4b03fa4039172c20388eca689ce59b73d24ea527c7be92a
    • Instruction ID: 22cace7ae43bdf9867063131f7ac2b8a65a70413bd0ae0626515185b9ccf9d3e
    • Opcode Fuzzy Hash: d0e017c7871ca3d4b4b03fa4039172c20388eca689ce59b73d24ea527c7be92a
    • Instruction Fuzzy Hash: 80319E75200709AFD7209F69DC89AABB7E9FF84301F004A2EF852C7661E775F9448B24

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1997 4b71a7-4b71de call 4a7c38 GetPropA 2000 4b7291-4b72a6 call 4b70aa * 2 call 4b6e08 1997->2000 2001 4b71e4-4b71e7 1997->2001 2020 4b72ab-4b72ad 2000->2020 2003 4b71ed-4b71f0 2001->2003 2004 4b7270-4b728f call 4b70aa call 4b6e69 2001->2004 2006 4b724c-4b726e SetWindowLongA RemovePropA GlobalFindAtomA GlobalDeleteAtom 2003->2006 2007 4b71f2-4b71f7 2003->2007 2004->2020 2010 4b72af-4b72c5 CallWindowProcA 2006->2010 2007->2010 2011 4b71fd-4b7233 call 4b70aa call 4b6d6c CallWindowProcA call 4b6d8f 2007->2011 2015 4b7238-4b7249 2010->2015 2011->2015 2020->2010 2020->2015
    APIs
    • __EH_prolog.LIBCMT ref: 004B71AC
    • GetPropA.USER32(?,AfxOldWndProc423), ref: 004B71C4
    • CallWindowProcA.USER32(?,?,00000110,?,00000000), ref: 004B7222
      • Part of subcall function 004B6D8F: GetWindowRect.USER32(?,?), ref: 004B6DB4
      • Part of subcall function 004B6D8F: GetWindow.USER32(?,00000004), ref: 004B6DD1
    • SetWindowLongA.USER32(?,000000FC,?), ref: 004B7252
    • RemovePropA.USER32(?,AfxOldWndProc423), ref: 004B725A
    • GlobalFindAtomA.KERNEL32(AfxOldWndProc423), ref: 004B7261
    • GlobalDeleteAtom.KERNEL32(00000000), ref: 004B7268
      • Part of subcall function 004B6D6C: GetWindowRect.USER32(?,?), ref: 004B6D78
    • CallWindowProcA.USER32(?,?,?,?,00000000), ref: 004B72BC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prologLongRemove
    • String ID: AfxOldWndProc423
    • API String ID: 2397448395-1060338832
    • Opcode ID: 782dcf9448ea780eeef35e0e99116e28ca3f5c289d6dbde2c5fe15811426e34c
    • Instruction ID: 59af03746e3f86a01ddc53a3fd2876e40d2ba2d8677f1de0c51634bd9a2a993c
    • Opcode Fuzzy Hash: 782dcf9448ea780eeef35e0e99116e28ca3f5c289d6dbde2c5fe15811426e34c
    • Instruction Fuzzy Hash: 90316C7290410AAFCF15AFA5DD49DFF7AB8EF85311F00012AF501A6250C7399A519BB9
    APIs
    • LHashValOfNameSys.OLEAUT32(00000001,?,?), ref: 0040FE09
    • VariantCopyInd.OLEAUT32(?,00000000), ref: 0041011E
    • SysAllocString.OLEAUT32(00000000), ref: 00410193
    • VariantCopyInd.OLEAUT32(?,00000000), ref: 0041029A
    • VariantChangeType.OLEAUT32(?,?,00000000,?), ref: 0041043A
    • VariantInit.OLEAUT32(?), ref: 00410471
    • VariantInit.OLEAUT32(?), ref: 004104B5
    • VariantClear.OLEAUT32(?), ref: 00410610
    • VariantClear.OLEAUT32(?), ref: 0041062B
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Variant$ClearCopyInit$AllocChangeHashNameStringType
    • String ID:
    • API String ID: 788266297-0
    • Opcode ID: 7160a28daf5edc08d3ac9d8d54643d559edffe8f254fc5c5f7a30a1b71b803c5
    • Instruction ID: 62ac150253534d04b7af0139cfcda0ca7848bdffebd9eaabe440c63cd221870d
    • Opcode Fuzzy Hash: 7160a28daf5edc08d3ac9d8d54643d559edffe8f254fc5c5f7a30a1b71b803c5
    • Instruction Fuzzy Hash: 3D52A274A00206CFCB24CF54C484AAEB7B5FF48314F24856EE855AB351D7B89DC6CB9A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2241 411da0-411dd3 call 4b53e8 2244 411de0 2241->2244 2245 411dd5-411dde call 413180 2241->2245 2246 411de2-411dec 2244->2246 2245->2246 2248 411e0d-411e1f 2246->2248 2249 411dee-411e02 call 4113a0 2246->2249 2253 411e22-411e4f 2249->2253 2254 411e04-411e08 2249->2254 2255 411e51 2253->2255 2256 411e57-411e5b 2253->2256 2254->2248 2255->2256 2257 411e97 2256->2257 2258 411e5d-411e69 2256->2258 2259 411e9d-411ea3 2257->2259 2260 411e70 2258->2260 2261 411e6b-411e6e 2258->2261 2262 411eb3-411eb7 2259->2262 2263 411ea5-411ea6 2259->2263 2264 411e76-411e77 2260->2264 2261->2260 2261->2264 2267 411ec1 2262->2267 2268 411eb9-411eba 2262->2268 2265 411eb0 2263->2265 2266 411ea8-411ea9 2263->2266 2269 411e79-411e7a 2264->2269 2270 411e8f-411e95 2264->2270 2265->2262 2266->2262 2271 411eab-411eae 2266->2271 2272 411ec7-411ece 2267->2272 2268->2272 2273 411ebc-411ebf 2268->2273 2274 411e87-411e8d 2269->2274 2275 411e7c-411e7d 2269->2275 2270->2259 2271->2262 2277 411ed0-411ed1 2272->2277 2278 411ed8 2272->2278 2273->2272 2274->2259 2275->2259 2276 411e7f-411e85 2275->2276 2276->2259 2279 411edb-411f30 call 411510 CreateSolidBrush call 4bc318 call 4b7606 2277->2279 2280 411ed3-411ed6 2277->2280 2278->2279 2286 411f35-411f38 2279->2286 2280->2279 2286->2248 2287 411f3e-411f4a call 4120e0 2286->2287 2290 411f62-411f7f SendMessageA 2287->2290 2291 411f4c-411f5d call 4b9a30 2287->2291 2293 411f81-411f91 SendMessageA 2290->2293 2294 411f93-411f98 2290->2294 2291->2290 2293->2294 2295 41207f-4120ca SendMessageA * 2 call 411490 2294->2295 2296 411f9e-411fa6 2294->2296 2296->2295 2297 411fac-411fb3 2296->2297 2299 411fb5-411fb8 2297->2299 2300 411fbf 2297->2300 2299->2300 2302 411fba-411fbd 2299->2302 2303 411fc4-411ffe call 4b94fb call 4b7606 2300->2303 2302->2300 2302->2303 2308 412000-412006 2303->2308 2309 412008-412032 2303->2309 2310 412079 2308->2310 2311 412034 2309->2311 2312 412036-412038 2309->2312 2310->2295 2311->2312 2313 41203a 2312->2313 2314 41203c-412067 SendMessageA 2312->2314 2313->2314 2315 412072-412074 call 414010 2314->2315 2316 412069-41206d call 4b9ac1 2314->2316 2315->2310 2316->2315
    APIs
    • CreateSolidBrush.GDI32(00000000), ref: 00411EE8
    • SendMessageA.USER32(?,000000C5,?,00000000), ref: 00411F79
    • SendMessageA.USER32(?,000000CC,?,00000000), ref: 00411F91
    • SendMessageA.USER32(?,00000465,00000000,?), ref: 0041205B
    • SendMessageA.USER32(?,000000B1,?,?), ref: 00412098
    • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 004120A7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$BrushCreateSolid
    • String ID: EDIT$msctls_updown32
    • API String ID: 943060551-1401569126
    • Opcode ID: d3cfeed82e77a9fc42afacfbcaaafe7a5748ee1258e78b2d7ef7a07441b522fd
    • Instruction ID: b1b9f216a52415fd64396a220c12ecf9d650ea71a5fc3f18dd298de8ba09abe3
    • Opcode Fuzzy Hash: d3cfeed82e77a9fc42afacfbcaaafe7a5748ee1258e78b2d7ef7a07441b522fd
    • Instruction Fuzzy Hash: 9A91BF70604B009FE724DB65CC81FABB7E5AB84744F10491EFB96C7390DA78E885CB59
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 783f223dad066a535b3a466fafc423b40826535a21c37a9e55d282c86cc65e8b
    • Instruction ID: dcc2288cfbb9e8ed9a20239555211a7b5096695819132c33464ffb427127db92
    • Opcode Fuzzy Hash: 783f223dad066a535b3a466fafc423b40826535a21c37a9e55d282c86cc65e8b
    • Instruction Fuzzy Hash: BCB1A8707047109FD724DF25E884B2BBBE6AB84304F91892EF59287390DA78E841CB5A
    APIs
      • Part of subcall function 00477520: GetClassNameA.USER32(?,?,00000104), ref: 0047753C
      • Part of subcall function 00477520: lstrcmpiA.KERNEL32(?), ref: 00477557
      • Part of subcall function 00477520: lstrcmpiA.KERNEL32(?,ComboLBox), ref: 00477573
    • GetWindowLongA.USER32(?,000000F0), ref: 004777B8
    • GetProcessHeap.KERNEL32(00000000,00000024,?,?,?), ref: 004777C4
    • HeapAlloc.KERNEL32(00000000,?,?,?), ref: 004777CB
    • GetFocus.USER32 ref: 004777F1
    • SetWindowLongA.USER32(?,000000FC,Function_00077A80), ref: 0047780B
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0047783D
    • RedrawWindow.USER32(?,00000000,00000000,00000705,?,?,?), ref: 0047792E
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$HeapLonglstrcmpi$AllocClassFocusMessageNameProcessRedrawSend
    • String ID:
    • API String ID: 409284982-0
    • Opcode ID: c659fabca853b11c70cd07d8e4b12b755cb20a2b8e09fd534af053c1772cd77b
    • Instruction ID: 3a8d8a1fee8517cc2ab1d3759b5b920076903efc274676b351dbd3b5faf8a22a
    • Opcode Fuzzy Hash: c659fabca853b11c70cd07d8e4b12b755cb20a2b8e09fd534af053c1772cd77b
    • Instruction Fuzzy Hash: 4641C3F06497019BF7309B15DD86BBB77E5EB41340F90C82FE39E866A1D778A8818709
    APIs
    • FreeLibrary.KERNEL32(?,?,00477450,00000000), ref: 00477495
    • GetCurrentThreadId.KERNEL32 ref: 004774B1
    • EnumThreadWindows.USER32(00000000,?,00477450), ref: 004774B8
    • UnhookWindowsHookEx.USER32(?), ref: 004774C4
    • GetCurrentThreadId.KERNEL32 ref: 004774E9
    • EnumThreadWindows.USER32(00000000,?,00477450), ref: 004774EC
    • GetCurrentThreadId.KERNEL32 ref: 004774F2
    • SetWindowsHookExA.USER32(00000004,00477A40,00000000,00000000), ref: 004774FE
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Thread$Windows$Current$EnumHook$FreeLibraryUnhook
    • String ID:
    • API String ID: 1464911712-0
    • Opcode ID: c3a7d774e75ca67f9d6e2bc1a8382c7473d04f1de78e91237ebe982b7ac9b88a
    • Instruction ID: 257ef70855ab8c1d9ee688d173f0cbd74eb04ddd2fb398ababcfcc6d83633b2a
    • Opcode Fuzzy Hash: c3a7d774e75ca67f9d6e2bc1a8382c7473d04f1de78e91237ebe982b7ac9b88a
    • Instruction Fuzzy Hash: C601F4B6704210ABD750AF64FD48FEF3B68A715752F408836F509D7290C674E880DBAC
    APIs
    • lstrlenA.KERNEL32(?), ref: 004C001E
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000001), ref: 004C0045
    • CLSIDFromString.OLE32(?,?,?,00000001), ref: 004C004F
    • lstrlenA.KERNEL32(?), ref: 004C0060
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000001), ref: 004C0087
    • CLSIDFromProgID.OLE32(?,?,?,00000001), ref: 004C0091
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ByteCharFromMultiWidelstrlen$ProgString
    • String ID:
    • API String ID: 2475774695-0
    • Opcode ID: ae2da2fa097947ab5c05421e007779f6d44bf9d9fe6e462c42b7614f318fe387
    • Instruction ID: ebc380c350641ba79926e38ae4d30981429f6d9e4afb7e425fb9272c6d953a72
    • Opcode Fuzzy Hash: ae2da2fa097947ab5c05421e007779f6d44bf9d9fe6e462c42b7614f318fe387
    • Instruction Fuzzy Hash: FD112537004605F7DB601B52EC09FAF7FA8FF823A1F210126F91986190D734A252CBAC
    APIs
    • CreateSolidBrush.GDI32(00000000), ref: 0041A98C
    • DestroyIcon.USER32(?,?,?,000000B0,00000000,00000000,?,?,00000000), ref: 0041AA2C
    • SendMessageA.USER32(?,000000F7,00000000,?), ref: 0041AAEB
    • SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 0041AB06
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$BrushCreateDestroyIconSolid
    • String ID: BUTTON
    • API String ID: 3996100863-3405671355
    • Opcode ID: 911a358f6e5e3bb3e03186a3ef9b75fe43274ff0aebd8bd64e2dbbed56f27e81
    • Instruction ID: eb91d2b4e7878bc900ec503130625ffe12125f05c3e06af5f4b404f57cdeb72d
    • Opcode Fuzzy Hash: 911a358f6e5e3bb3e03186a3ef9b75fe43274ff0aebd8bd64e2dbbed56f27e81
    • Instruction Fuzzy Hash: 3671BEB16007059FD724DF65C980FABB7E5BB84740F144A2EF58683380DB39B895CB6A
    APIs
    • GetSysColor.USER32(0000000F), ref: 0041774C
    • DestroyIcon.USER32(?,?,?,?,0000008C,00000000), ref: 004177AA
    • SendMessageA.USER32(?,000000F7,00000001,?), ref: 0041784C
    • SendMessageA.USER32(?,000000F7,00000000,?), ref: 0041787E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$ColorDestroyIcon
    • String ID: BUTTON
    • API String ID: 1480523805-3405671355
    • Opcode ID: 8158d8e4a17dde55cc5de4b1fa8259406a102fb537562fea4fdea15f0eb2636d
    • Instruction ID: 316a5b44d6c889942aae0531e666c3bdb8591c4f45b83eb2bb10ba04e2068c7c
    • Opcode Fuzzy Hash: 8158d8e4a17dde55cc5de4b1fa8259406a102fb537562fea4fdea15f0eb2636d
    • Instruction Fuzzy Hash: 39617EB5608B059BD324DF59C880BABB7B5FB44710F50891EE59683780DB39F884CB5A
    APIs
    • SendMessageA.USER32(?,00000080,00000001,?), ref: 004265F8
    • SendMessageA.USER32(?,00000080,00000000,?), ref: 0042660A
    • DestroyIcon.USER32(?), ref: 0042661D
    • DestroyIcon.USER32(?), ref: 0042662A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: DestroyIconMessageSend
    • String ID:
    • API String ID: 1880505497-0
    • Opcode ID: 0d5ac362fd2555d630d251c0572966c6e8cb563d2c710c63a53b086b5de2db90
    • Instruction ID: 05e0adb148c795bc3f70db763be739ae95e0cf500fb71262f6c06c996aef4997
    • Opcode Fuzzy Hash: 0d5ac362fd2555d630d251c0572966c6e8cb563d2c710c63a53b086b5de2db90
    • Instruction Fuzzy Hash: 55316D71704311AFE720DF65E880BABB3E8AFC4710F51882EF995C3344D678E8498B66
    APIs
    • SendMessageA.USER32(00000030,00000030,?,00000001), ref: 004763E1
    • SendMessageA.USER32(?,00000030,?,00000001), ref: 004763F9
    • GetStockObject.GDI32(00000011), ref: 00476403
    • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 00476423
      • Part of subcall function 00411530: CreateFontIndirectA.GDI32 ref: 00411579
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$CreateFontIndirectObjectStock
    • String ID:
    • API String ID: 1613733799-0
    • Opcode ID: f6b9597a83f71ec073ad9d48d7d5d5bc513c359b0ce14241a10cd108ca9a75e6
    • Instruction ID: 347297f7a0cfc0f92444361fcd27535d3b2b8e907c173fbb8a9326f1608c5585
    • Opcode Fuzzy Hash: f6b9597a83f71ec073ad9d48d7d5d5bc513c359b0ce14241a10cd108ca9a75e6
    • Instruction Fuzzy Hash: 96018032210720BBCB549B54EC85FDB73AAAB88750F05C459B6448B291C775E882CB94
    APIs
    • SetErrorMode.KERNELBASE(00000000,00000000,004BB6D5,00000000,00000000,00000000,00000000,?,00000000,?,004B2B99,00000000,00000000,00000000,00000000,004A3A50), ref: 004BFA24
    • SetErrorMode.KERNELBASE(00000000,?,00000000,?,004B2B99,00000000,00000000,00000000,00000000,004A3A50,00000000), ref: 004BFA2B
      • Part of subcall function 004BFA7E: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 004BFAAF
      • Part of subcall function 004BFA7E: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 004BFB50
      • Part of subcall function 004BFA7E: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 004BFB7D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
    • String ID: P:J
    • API String ID: 3389432936-542998869
    • Opcode ID: 5013b6073d89a573a7aa502b259cee2a219b131a6d0f01f8416884f30a0bafc7
    • Instruction ID: 59615a0df7754170442977aa6fa97323e9c65794a27d281fa84b24886195d4a2
    • Opcode Fuzzy Hash: 5013b6073d89a573a7aa502b259cee2a219b131a6d0f01f8416884f30a0bafc7
    • Instruction Fuzzy Hash: E9F037719142109FCB14EF65D444E897BE4AF88714F05889FB4888B3A2CB78E840CB6A
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 004BA43A
    • SetWindowsHookExA.USER32(000000FF,004BA77C,00000000,00000000), ref: 004BA44A
      • Part of subcall function 004BF241: __EH_prolog.LIBCMT ref: 004BF246
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CurrentH_prologHookThreadWindows
    • String ID: :S
    • API String ID: 2183259885-872041131
    • Opcode ID: b7b1e9731b76dad66005199b03d3367f438b83bc8fa760c0149f67912659f275
    • Instruction ID: 524d1b5b3f7091f85482734616bcd9ed2f3c8d595917385bd82ce3a10e96ffb2
    • Opcode Fuzzy Hash: b7b1e9731b76dad66005199b03d3367f438b83bc8fa760c0149f67912659f275
    • Instruction Fuzzy Hash: D0F0A7315006405FD7603B729C0EBDF3AE0AF44715F040A6EF1515A1E2CA6C9844C77F
    APIs
    • CreateIconFromResourceEx.USER32(00000000,?,00000001,00030000,?,?,00000000), ref: 004337EB
    • CreateIconFromResource.USER32(00000000,?,00000001,00030000), ref: 0043380B
    • DestroyIcon.USER32(?), ref: 0043383B
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Icon$CreateFromResource$Destroy
    • String ID:
    • API String ID: 4181819098-0
    • Opcode ID: ca83272bf22941085251e21fbfb545fe1497f073be2085ae8759393ae2542560
    • Instruction ID: c23e97ea943e7a5bb7f8fb97d355531a11eb6199795518b4ffa7c5856e43b6e9
    • Opcode Fuzzy Hash: ca83272bf22941085251e21fbfb545fe1497f073be2085ae8759393ae2542560
    • Instruction Fuzzy Hash: 6C61C3B1A00604AFDB24EF59C980AAEFBF5FF48711F50892EF55697340D738AA80CB55
    APIs
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 004226F9
    • IsWindow.USER32 ref: 00422727
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 004227F6
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessagePeek$Window
    • String ID:
    • API String ID: 1210580970-0
    • Opcode ID: c3ffe3552929256c8b877da439eeba5fe51c811a291dc137af15107340707615
    • Instruction ID: 492af7f3e8d23627a271b13aaad91611ff016a77f4fab16a4f07f8d5b0800b3b
    • Opcode Fuzzy Hash: c3ffe3552929256c8b877da439eeba5fe51c811a291dc137af15107340707615
    • Instruction Fuzzy Hash: 29319575704216BFD714DF24EA84BABB3A8FF84348F80022EE51597200D7B8ED54CBA9
    APIs
    • GetWindowLongA.USER32(?,?), ref: 004B6CF2
    • SetWindowLongA.USER32(?,?,?), ref: 004B6D11
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004B6D2B
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Long
    • String ID:
    • API String ID: 847901565-0
    • Opcode ID: f739043286b8f14f404a149eeea317cf8f3684498fcfd4fc16e45d006c00c491
    • Instruction ID: 54cd47236cbfeb595a8c5b8e4a26d40d01d2f9960ebddde7ed6cd7169d264c43
    • Opcode Fuzzy Hash: f739043286b8f14f404a149eeea317cf8f3684498fcfd4fc16e45d006c00c491
    • Instruction Fuzzy Hash: F4F03035210109BFDF088F60DC55CFE3B6AEB04351F444429F906C5160EB39A8A19B64
    APIs
      • Part of subcall function 00411510: GetSysColor.USER32(0000000F), ref: 0041151D
    • CreateSolidBrush.GDI32(00000000), ref: 00416DA8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: BrushColorCreateSolid
    • String ID: BUTTON
    • API String ID: 2798526982-3405671355
    • Opcode ID: b474020e32feabf3db543237a8904df547c4bf2533e024b67c9961c90e94e01e
    • Instruction ID: c125af5cc5c8062414b4afb9589d9c5ed64218fc37285cfb115c0059f003bacc
    • Opcode Fuzzy Hash: b474020e32feabf3db543237a8904df547c4bf2533e024b67c9961c90e94e01e
    • Instruction Fuzzy Hash: 453170B1604B009BD314DB59D841FABB7F8EF88B44F108A1EF58687790E739E845CB96
    APIs
    • SendMessageA.USER32(?,00008002,00000000,00000000), ref: 00423EDE
    • GetParent.USER32(00000000), ref: 00423EFA
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageParentSend
    • String ID:
    • API String ID: 928151917-0
    • Opcode ID: 139b2d2cfec798cf370823a12007dca6f7146195654a8f00bc3fbf56d2a08cf5
    • Instruction ID: 374c59d4b17c0799202e9f3b3fb2b41bdd65b88899b4c2dc58e82d57c6600a01
    • Opcode Fuzzy Hash: 139b2d2cfec798cf370823a12007dca6f7146195654a8f00bc3fbf56d2a08cf5
    • Instruction Fuzzy Hash: AB1151327012216BD7209F65A804B6BB7B8BF94756F428037F904D7301D73CED4986B9
    APIs
      • Part of subcall function 004B9917: GetWindowLongA.USER32(?,000000F0), ref: 004B9923
    • GetWindowRect.USER32(?,?), ref: 004B6DB4
    • GetWindow.USER32(?,00000004), ref: 004B6DD1
      • Part of subcall function 004B9AA6: IsWindowEnabled.USER32(?), ref: 004B9AB0
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$EnabledLongRect
    • String ID:
    • API String ID: 3170195891-0
    • Opcode ID: 6a4ea9cfe5a71900bd443b60435e94059bc08514f1ddf875aae00d03e6efbc7c
    • Instruction ID: 7af4c1786fdb3f6e17c8d574e1fef4805783a2ed36b9b93c4c0abda28057f735
    • Opcode Fuzzy Hash: 6a4ea9cfe5a71900bd443b60435e94059bc08514f1ddf875aae00d03e6efbc7c
    • Instruction Fuzzy Hash: 480178346006059BDF21AB31C806FEF77AAAF14314F41485AE9419B291DB3CEE41CBAC
    APIs
    • SendMessageA.USER32(?,0000100C,000000FF,00000002), ref: 004758E8
    • SendMessageA.USER32(?,0000100C,00000000,00000002), ref: 004758FD
      • Part of subcall function 004B3BE0: SendMessageA.USER32(?,0000102B,?,?), ref: 004B3C01
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 02d01e6d1548dbce2b29c760781cd251c038fde1c54831c78689247aa7b203a7
    • Instruction ID: a1c08bd6310306a612dab04ae7d50f2779ab74a4fef78de4e9c98e98babc2e8c
    • Opcode Fuzzy Hash: 02d01e6d1548dbce2b29c760781cd251c038fde1c54831c78689247aa7b203a7
    • Instruction Fuzzy Hash: 97F05BB234471177E530995A9C56F9BA39C9B84B61F008A1BB355EF2C1C5F5F900873C
    APIs
    • CreateThread.KERNELBASE(00000000,00000000,?,00000000,00000000,?), ref: 00476B6C
    • FindCloseChangeNotification.KERNELBASE(00000000,?,00000000,00000000,?), ref: 00476B94
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ChangeCloseCreateFindNotificationThread
    • String ID:
    • API String ID: 4060959955-0
    • Opcode ID: 163c7731a8730e8b6aeaecdb87a39967873d0df2eccfcdde4984c0f5e1b95208
    • Instruction ID: e4f6e0bc89d2c6a623cb978349024040a443ceac403f0f58c7b088ca8487f631
    • Opcode Fuzzy Hash: 163c7731a8730e8b6aeaecdb87a39967873d0df2eccfcdde4984c0f5e1b95208
    • Instruction Fuzzy Hash: 1BF06931704B119BD724CF28D880BABB3EAAF89711F01882EE45AC7280C7B0F8458B54
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,004A39CE,00000001), ref: 004A9139
      • Part of subcall function 004A8FE0: GetVersionExA.KERNEL32 ref: 004A8FFF
    • HeapDestroy.KERNEL32 ref: 004A9178
      • Part of subcall function 004ACA25: HeapAlloc.KERNEL32(00000000,00000140,004A9161,000003F8), ref: 004ACA32
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Heap$AllocCreateDestroyVersion
    • String ID:
    • API String ID: 2507506473-0
    • Opcode ID: 803620b1493c89dbe8fd5fd19cad40cacf86cdfc05bcd1c6ae0422a101aedc3a
    • Instruction ID: 58e4fa7e2d4a432bf0cb6b726ec1e156ff30ca38b9d7b2f7daffcbeb3d194f34
    • Opcode Fuzzy Hash: 803620b1493c89dbe8fd5fd19cad40cacf86cdfc05bcd1c6ae0422a101aedc3a
    • Instruction Fuzzy Hash: DEF065B1E583066AEF6157719C49B7A3994DBB6795F10482BF501C82B0EB688C81E509
    APIs
    • DefWindowProcA.USER32(?,?,?,?), ref: 004B796A
    • CallWindowProcA.USER32(?,?,?,?,?), ref: 004B797F
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ProcWindow$Call
    • String ID:
    • API String ID: 2316559721-0
    • Opcode ID: 0baa140d9e690ff9cd039b3150138eed1ede00856d4314b832f70ccfef115cad
    • Instruction ID: 84bf3739d90658b901df5818db11ae97c15d5be71b18f119a11077599c6f0e49
    • Opcode Fuzzy Hash: 0baa140d9e690ff9cd039b3150138eed1ede00856d4314b832f70ccfef115cad
    • Instruction Fuzzy Hash: C8F01536104208EFDF218F94DC08DDABBB9FF083A1B048429FA4986230D732E960AB54
    APIs
      • Part of subcall function 004BF1AC: TlsGetValue.KERNEL32(00533A2C,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000,?,004B2B99,00000000,00000000,00000000,00000000), ref: 004BF1EB
    • GetCurrentThreadId.KERNEL32 ref: 004B759A
    • SetWindowsHookExA.USER32(00000005,004B7382,00000000,00000000), ref: 004B75AA
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CurrentHookThreadValueWindows
    • String ID:
    • API String ID: 933525246-0
    • Opcode ID: 9f337f0a0a10d354d4fb413371973667d7cb539f57e55fce4657107d523fd28f
    • Instruction ID: 3842ae5f294e1c24c25a2ab28f9174b2db193b4bdadb54645aeec0a0c5d9e9c3
    • Opcode Fuzzy Hash: 9f337f0a0a10d354d4fb413371973667d7cb539f57e55fce4657107d523fd28f
    • Instruction Fuzzy Hash: 44E06D71604700AED7309F66AC05BAB76E4EBC0B12F504A3FE14996680D638A9458F7D
    APIs
    • MessageBoxA.USER32(00000000,00000000,004E121C), ref: 0040DF97
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Message
    • String ID:
    • API String ID: 2030045667-0
    • Opcode ID: 13eb4f6496eed27eaaa13f348869ef1cea93e0831467f58af7745beb97b687d9
    • Instruction ID: cdefdc7f40b9da73b0983d3f3af4e54f56ec0ddf5a354e980b44b4eb3929abc0
    • Opcode Fuzzy Hash: 13eb4f6496eed27eaaa13f348869ef1cea93e0831467f58af7745beb97b687d9
    • Instruction Fuzzy Hash: 3E41C6B5A003019FD724CA55C880A6B73E5EB99324F50883EF846D7350E77DEC89CB96
    APIs
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0041AF53
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: d77b80b31d6230efe6afd6612defda18ce87e438645cfc37b236e443d114f79f
    • Instruction ID: d74434adc169072959fb06c15b59540463a5052ccc34b856dbb2766aa90723d2
    • Opcode Fuzzy Hash: d77b80b31d6230efe6afd6612defda18ce87e438645cfc37b236e443d114f79f
    • Instruction Fuzzy Hash: 3E41ACB6215701CFC360CF28D480B8AB7E5BB99304F10886EE596CB790D376E892CB55
    APIs
    • LHashValOfNameSys.OLEAUT32(00000001,?,?), ref: 0040FE09
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: HashName
    • String ID:
    • API String ID: 1228541095-0
    • Opcode ID: d463438882d1ddc7e7dd2e65a067b002fc5a7d45096af94e543c40184cd8a221
    • Instruction ID: 0d14158c46f70d88fa25aa75c0d126c84dbf41a4492909a73adb9bfa2519e6f2
    • Opcode Fuzzy Hash: d463438882d1ddc7e7dd2e65a067b002fc5a7d45096af94e543c40184cd8a221
    • Instruction Fuzzy Hash: 13418DB1A002099FCB14DF95C884AEFB7B9FF88300F14416AE809EB351DB74AC85CB95
    APIs
    • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 004A545C
      • Part of subcall function 004AB7E4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB821
      • Part of subcall function 004AB7E4: EnterCriticalSection.KERNEL32(?,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB83C
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalSection$AllocateEnterHeapInitialize
    • String ID:
    • API String ID: 1616793339-0
    • Opcode ID: 087e5d2c42a1596c0fc9900d931337ac9e25a80f3d7b4a0077f39a6a2f1869cc
    • Instruction ID: 87a085b1fc08690f34a1f92e18f49faf0f7d508f6db4ffad739e89716806c220
    • Opcode Fuzzy Hash: 087e5d2c42a1596c0fc9900d931337ac9e25a80f3d7b4a0077f39a6a2f1869cc
    • Instruction Fuzzy Hash: C2213832A44A08ABCB10DF69DD42B9EB7B4EF26764F14411BF411EB2C1C7BC99818B5D
    APIs
    • DestroyIcon.USER32(?,?,?,00000000,00000400,?,?,?,?,004C1BA8,000000FF,0042657D,?,?,00000001), ref: 0042C851
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: DestroyIcon
    • String ID:
    • API String ID: 1234817797-0
    • Opcode ID: 288769db827adbeb185b24f30365d82b654c532ab73b93b9a0baec17c42d23ef
    • Instruction ID: af0c17d78dbfc4b1caa24f08de3222e5e57fd1951be43fb623a4d72fe74618a8
    • Opcode Fuzzy Hash: 288769db827adbeb185b24f30365d82b654c532ab73b93b9a0baec17c42d23ef
    • Instruction Fuzzy Hash: 6D2171B1500B109FC320EF1AC8C1A5BFBE4FB94721F548A2EF4A683790D7389444CB65
    APIs
    • GetPrivateProfileStringA.KERNEL32(?,?,?,?,00002800), ref: 0040E14E
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: PrivateProfileString
    • String ID:
    • API String ID: 1096422788-0
    • Opcode ID: 811eddbb30c5a3afdc9075c364f93e0be3e4d2dda71a1b3fd4954263e3205cd5
    • Instruction ID: 749c06c4ce40c2e7c2fe181fc0f50faff86e6b687cfc7481a7c9b8c0b817133b
    • Opcode Fuzzy Hash: 811eddbb30c5a3afdc9075c364f93e0be3e4d2dda71a1b3fd4954263e3205cd5
    • Instruction Fuzzy Hash: 8E21D6B51003009BD310EB26DC41DABB3D8EF94748F004D3EF95ADB252EB38E859879A
    APIs
    • __EH_prolog.LIBCMT ref: 004B6EE4
      • Part of subcall function 004BF1AC: TlsGetValue.KERNEL32(00533A2C,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000,?,004B2B99,00000000,00000000,00000000,00000000), ref: 004BF1EB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prologValue
    • String ID:
    • API String ID: 3700342317-0
    • Opcode ID: c8bc0e15e925f4a8241bede1c3112d15d6eda5c38626daec1c4d4ed96a2cbcb0
    • Instruction ID: caa6d6acd617a7d0f127dcfb45afb396b5cb633f98dfadc1dfbe8910953f3a31
    • Opcode Fuzzy Hash: c8bc0e15e925f4a8241bede1c3112d15d6eda5c38626daec1c4d4ed96a2cbcb0
    • Instruction Fuzzy Hash: 66216972A00209EFCF15DF54C881AEE7BB9FF44314F01406AF819AB241D779AE44CBA4
    APIs
    • CreateWindowExA.USER32(00000000,00000080,004491A1,?,?,?,?,?,?,?,?,?), ref: 004B76A4
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CreateWindow
    • String ID:
    • API String ID: 716092398-0
    • Opcode ID: 03e6440eaeeb199509578c2c617990f078ffb6a382f4bcc17f62967802785abc
    • Instruction ID: 9561726801ae14c21e42eb382ff20db8df423693a3992f93604be57ee33581f7
    • Opcode Fuzzy Hash: 03e6440eaeeb199509578c2c617990f078ffb6a382f4bcc17f62967802785abc
    • Instruction Fuzzy Hash: EE31AC75A00219AFCF01DFA8C844ADEBBF1BF4C314B00406AF908E7320D735AA509FA4
    APIs
    • __EH_prolog.LIBCMT ref: 004BB125
      • Part of subcall function 004BAE88: __EH_prolog.LIBCMT ref: 004BAE8D
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: 8a555d967e679d23c81b1fe13d08cd6131c939f55d3f19fd9ad7e495baf775f5
    • Instruction ID: 087f57bf1baf22394069d9899a93f8b5e01ed3a72817d9b44a07f4d7d73b1565
    • Opcode Fuzzy Hash: 8a555d967e679d23c81b1fe13d08cd6131c939f55d3f19fd9ad7e495baf775f5
    • Instruction Fuzzy Hash: CC11A275600700ABC730AF29C9A1AEBB7F4FF65398B10442EE45287641E7B8E901CBB4
    APIs
      • Part of subcall function 004B9917: GetWindowLongA.USER32(?,000000F0), ref: 004B9923
    • SendMessageA.USER32(?,0000036E,?,00000000), ref: 004B6E5C
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: LongMessageSendWindow
    • String ID:
    • API String ID: 3360111000-0
    • Opcode ID: 83198d916c6a35d0c43de2fdbf7d4192e573f927922860fb7576013934108ebd
    • Instruction ID: bda4a95b1bb6b269b9351b2a2186e05cae2a7fbac4f747cbdbd4e7ff470942a7
    • Opcode Fuzzy Hash: 83198d916c6a35d0c43de2fdbf7d4192e573f927922860fb7576013934108ebd
    • Instruction Fuzzy Hash: 2FF04F7A600209BFDF019F59C841AEEB7B9BF54754F10802BE901A7250DA78EE418BB4
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4e033b6cd87310490416f84af7851f9123eec91c9dc03d175df1759f8ad2ff0b
    • Instruction ID: 85fe130acf4e634c680c69593f91767ab39bf5bc6d85e726280ee1c736708ab6
    • Opcode Fuzzy Hash: 4e033b6cd87310490416f84af7851f9123eec91c9dc03d175df1759f8ad2ff0b
    • Instruction Fuzzy Hash: BFF03036004619FBCF126F959C00DDF3B29AF55361F008417FA0956291C73DD962EBB9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prolog
    • String ID:
    • API String ID: 3519838083-0
    • Opcode ID: fd8bb22a8afdf0dc9477bb22d6c0e430d453c0289d7ac90ee89b1bbb09c8a87c
    • Instruction ID: 7507b38ad3ae37bab5a20ba1b4a43e444cc602b97d7443249561e80033f82b3d
    • Opcode Fuzzy Hash: fd8bb22a8afdf0dc9477bb22d6c0e430d453c0289d7ac90ee89b1bbb09c8a87c
    • Instruction Fuzzy Hash: D8E01A75E01208DFCB50EFA8D5456AEBBF4FB44314F10847FE405E2201E3358A028BA1
    APIs
    • RtlAllocateHeap.NTDLL(00560000,00000000,?), ref: 0042B761
      • Part of subcall function 004230F0: wsprintfA.USER32 ref: 00423102
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: AllocateHeapwsprintf
    • String ID:
    • API String ID: 1352872168-0
    • Opcode ID: e5e118c0634272d56f7587d1957e2e577ae46a0dd74a383141485bcafa2ba3ee
    • Instruction ID: 77d654a66065db69b54b0964edaab829368ee9e4e10a7d5773f32138bb9b6b35
    • Opcode Fuzzy Hash: e5e118c0634272d56f7587d1957e2e577ae46a0dd74a383141485bcafa2ba3ee
    • Instruction Fuzzy Hash: 9CE046B9A00208EBDB00DFA4E941EAE77B8EB88340F008198FD084B240D675AE409B94
    APIs
    • RtlFreeHeap.NTDLL(00560000,00000000,00000000,00000000), ref: 0042B878
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: FreeHeap
    • String ID:
    • API String ID: 3298025750-0
    • Opcode ID: 5e2c172864a2cb61ddaa03fca8b4b9a041ed439119040ed25da919147944e109
    • Instruction ID: ef67971599a36a9a3accad31d29ca0967e19f72af6b88b18da5c670db0b2c8c3
    • Opcode Fuzzy Hash: 5e2c172864a2cb61ddaa03fca8b4b9a041ed439119040ed25da919147944e109
    • Instruction Fuzzy Hash: D9D01236700618ABD7149B99E949BAB37ACDB44345F808055FA0C4E290D774E840D7D4
    APIs
    • EnumChildWindows.USER32(?,00477A00,?), ref: 00477A22
      • Part of subcall function 00477960: SetWindowLongA.USER32(?,000000FC,?), ref: 004779A8
      • Part of subcall function 00477960: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004779B1
      • Part of subcall function 00477960: HeapFree.KERNEL32(00000000), ref: 004779B8
      • Part of subcall function 00477960: RedrawWindow.USER32(?,00000000,00000000,00000705), ref: 004779C8
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: HeapWindow$ChildEnumFreeLongProcessRedrawWindows
    • String ID:
    • API String ID: 4238677917-0
    • Opcode ID: b21097f4c699deb0436b9df5ca0526230ec66f7814a5d6b6baeb2d097bbbb4ef
    • Instruction ID: 805e16ef92b9b9c69d030d35f008d3d22db49ecdcfe6655224eaac6e26389b4e
    • Opcode Fuzzy Hash: b21097f4c699deb0436b9df5ca0526230ec66f7814a5d6b6baeb2d097bbbb4ef
    • Instruction Fuzzy Hash: 77D05B3210D25053A6516619AC44EDF9668AFD5760F91C81BF048A311046587941C2AE
    APIs
    • SendMessageA.USER32(?,0000102B,?,?), ref: 004B3C01
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 352ef132ea4a33855a1ba710403a2e7270056e948061ccac58cf9fa6a2d45422
    • Instruction ID: 5fe238f61dbe2c320cd5b58e19b6aebee02bf3aecbf9d235717b28e69544fb71
    • Opcode Fuzzy Hash: 352ef132ea4a33855a1ba710403a2e7270056e948061ccac58cf9fa6a2d45422
    • Instruction Fuzzy Hash: CFD0677590020EAFCB41DF99D845CDEBBB9EB18304F108426F915A6250D671E5928F90
    APIs
    • LoadStringA.USER32(?,?,?,?), ref: 004BAFA8
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: LoadString
    • String ID:
    • API String ID: 2948472770-0
    • Opcode ID: cd16f1834dc075d6a8a856c88b4b7b1ce4688052e160e6416edef6736f9bff1c
    • Instruction ID: 86e40c8ba187f353b7d7c42b04921981efcf53e0f161b6b67d08bff21263aa71
    • Opcode Fuzzy Hash: cd16f1834dc075d6a8a856c88b4b7b1ce4688052e160e6416edef6736f9bff1c
    • Instruction Fuzzy Hash: 31D05E724083619B8B01DF518804DCFBBB8BF54210B040C0EF48043112C32494948676
    APIs
    • SetWindowTextA.USER32(?,0042DEFA), ref: 004B99BB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: TextWindow
    • String ID:
    • API String ID: 530164218-0
    • Opcode ID: c34a9c882fdebdffcc154bce9206bf7e4e07ec9901ac9513bd04e6da37b8277c
    • Instruction ID: 13f0424e97ef03a9b53af824ef3f60a536b62fc91648fc37d68e909a6e1a880d
    • Opcode Fuzzy Hash: c34a9c882fdebdffcc154bce9206bf7e4e07ec9901ac9513bd04e6da37b8277c
    • Instruction Fuzzy Hash: 87D09271208200AFCB898F60D948E5ABBB2BF94704B248569E54A8A225D736DC52EB15
    APIs
    • ShowWindow.USER32(?,?,0041F36C,00000000), ref: 004B9A8D
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ShowWindow
    • String ID:
    • API String ID: 1268545403-0
    • Opcode ID: c5d4925c4251c131ce074510c0b9303c2ab49b5d16f46ac9d86a0086b6fa5ea8
    • Instruction ID: a173b3dfafe1adbcf0d0b9612ee85665d1b0aae690b2d46ad35cce2f14a4bc60
    • Opcode Fuzzy Hash: c5d4925c4251c131ce074510c0b9303c2ab49b5d16f46ac9d86a0086b6fa5ea8
    • Instruction Fuzzy Hash: EFD05230204200AFCB088F60C908E0ABBA2BFA8300B208468E10A8A120D732CC52EB09
    APIs
    • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0047181A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 94cf3b5aafee0eff6f46217b5cc4c25c3f7de682823e2f13ff51707bd4c6a359
    • Instruction ID: 678b9fd9482f9650a2dd17576fcd5e61aaaf3ce4be7da9f2a248a9f6862d42ef
    • Opcode Fuzzy Hash: 94cf3b5aafee0eff6f46217b5cc4c25c3f7de682823e2f13ff51707bd4c6a359
    • Instruction Fuzzy Hash: D0C08C70640300BBEDA4AB648C06F0A33A95B44718F018458B2096A1C2C5B4F0008A89
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • DPtoLP.GDI32 ref: 0043A85B
    • GetClientRect.USER32(?,?), ref: 0043A869
    • DPtoLP.GDI32(?,?,00000002), ref: 0043A881
    • IntersectRect.USER32(?,?,?), ref: 0043A920
    • LPtoDP.GDI32(?,?,00000002), ref: 0043A961
    • IntersectRect.USER32(?,?,?), ref: 0043A9BE
    • LPtoDP.GDI32(?,?,00000002), ref: 0043A9FF
    • CreateRectRgnIndirect.GDI32(?), ref: 0043AA2A
    • IntersectRect.USER32(?,?,?), ref: 0043AA5E
    • LPtoDP.GDI32(?,?,00000002), ref: 0043AA9F
    • CreateRectRgnIndirect.GDI32(?), ref: 0043AAC5
    • CreateRectRgnIndirect.GDI32(?), ref: 0043AAF4
    • GetCurrentObject.GDI32(?,00000006), ref: 0043AB10
    • GetCurrentObject.GDI32(?,00000001), ref: 0043AB29
    • GetCurrentObject.GDI32(?,00000002), ref: 0043AB42
      • Part of subcall function 004BBA48: SetBkMode.GDI32(?,?), ref: 004BBA61
      • Part of subcall function 004BBA48: SetBkMode.GDI32(?,?), ref: 004BBA6F
      • Part of subcall function 004B8837: GetScrollPos.USER32(00000000,?), ref: 004B8855
      • Part of subcall function 0043A370: CreateFontIndirectA.GDI32(00000000), ref: 0043A3C2
    • FillRgn.GDI32(?,?,?), ref: 0043AD22
    • IntersectRect.USER32(?,?,?), ref: 0043AE07
    • IsRectEmpty.USER32(?), ref: 0043AE12
    • LPtoDP.GDI32(?,?,00000002), ref: 0043AE2F
    • CreateRectRgnIndirect.GDI32(?), ref: 0043AE3A
    • CombineRgn.GDI32(?,?,?,00000004), ref: 0043AE6B
    • DPtoLP.GDI32(?,?,00000002), ref: 0043AE89
      • Part of subcall function 004BBB2F: SetMapMode.GDI32(?,?), ref: 004BBB48
      • Part of subcall function 004BBB2F: SetMapMode.GDI32(?,?), ref: 004BBB56
    • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0043AEC8
    • IntersectRect.USER32(?,?,?), ref: 0043AF5B
    • IsRectEmpty.USER32(?), ref: 0043AFA1
    • SelectObject.GDI32(?,?), ref: 0043AFDC
    • DPtoLP.GDI32(?,?,00000001), ref: 0043B068
    • LPtoDP.GDI32(?,?,00000001), ref: 0043B187
    • DPtoLP.GDI32(?,?,00000001), ref: 0043B1A5
      • Part of subcall function 004BBE5D: MoveToEx.GDI32(?,?,?,?), ref: 004BBE7F
      • Part of subcall function 004BBE5D: MoveToEx.GDI32(?,?,?,?), ref: 004BBE93
      • Part of subcall function 004BBEA9: MoveToEx.GDI32(?,?,?,00000000), ref: 004BBEC3
      • Part of subcall function 004BBEA9: LineTo.GDI32(?,?,?), ref: 004BBED4
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,00000000), ref: 004BB98E
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,?), ref: 004BB9A4
      • Part of subcall function 0043DA30: GetCurrentObject.GDI32(?), ref: 0043DAFB
      • Part of subcall function 0043DA30: LPtoDP.GDI32(?,00000000,00000001), ref: 0043DB48
    • IntersectRect.USER32(?,00000000,?), ref: 0043B2F2
    • IsRectEmpty.USER32(00000000), ref: 0043B2FD
    • PatBlt.GDI32(?,00000000,?,?,?,00F00021), ref: 0043B344
    • LPtoDP.GDI32(?,00000000,00000002), ref: 0043B359
    • CreateRectRgnIndirect.GDI32(00000000), ref: 0043B364
    • CombineRgn.GDI32(?,?,?,00000004), ref: 0043B395
    • LPtoDP.GDI32(?,?,00000001), ref: 0043B3C4
    • DPtoLP.GDI32(?,?,00000001), ref: 0043B3E2
    • wsprintfA.USER32 ref: 0043B480
    • SelectObject.GDI32(?,?), ref: 0043B4A8
    • IntersectRect.USER32(?,?,?), ref: 0043BA18
    • IsRectEmpty.USER32(?), ref: 0043BA23
    • LPtoDP.GDI32(?,?,00000002), ref: 0043BA40
    • CreateRectRgnIndirect.GDI32(?), ref: 0043BA4B
    • CombineRgn.GDI32(?,?,?,00000004), ref: 0043BA7C
      • Part of subcall function 0043D0F0: SetRectEmpty.USER32(?), ref: 0043D16A
      • Part of subcall function 0043D0F0: GetSysColor.USER32(0000000F), ref: 0043D29B
      • Part of subcall function 0043D0F0: IntersectRect.USER32(?,?,?), ref: 0043D2F3
    • GetSysColor.USER32(0000000F), ref: 0043AC06
      • Part of subcall function 004BC3D5: __EH_prolog.LIBCMT ref: 004BC3DA
      • Part of subcall function 004BC3D5: CreateSolidBrush.GDI32(?), ref: 004BC3F7
      • Part of subcall function 004BC385: __EH_prolog.LIBCMT ref: 004BC38A
      • Part of subcall function 004BC385: CreatePen.GDI32(?,?,?), ref: 004BC3AD
    • CreateRectRgnIndirect.GDI32(?), ref: 0043A986
      • Part of subcall function 0043BF40: CopyRect.USER32(?,00000000), ref: 0043BFB7
      • Part of subcall function 0043BF40: IsRectEmpty.USER32(?), ref: 0043BFC2
      • Part of subcall function 0043BF40: GetClientRect.USER32(00000000,?), ref: 0043C001
      • Part of subcall function 0043BF40: DPtoLP.GDI32(?,?,00000002), ref: 0043C013
      • Part of subcall function 0043BF40: LPtoDP.GDI32(?,?,00000002), ref: 0043C050
    • FillRect.USER32(?,?,?), ref: 0043BD79
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Create$IndirectIntersectObject$Empty$CurrentModeSelect$CombineH_prologMove$ClientColorFill$BeginBrushClipCopyFontLinePaintScrollSolidwsprintf
    • String ID: !K$0b)u$EK
    • API String ID: 3726329589-1513951853
    • Opcode ID: fbcc4a55516b34ff3ba297e91bcb38b57e048947fec19a7b96c52b87871001db
    • Instruction ID: 93cb47bc0c08f3ffcfc7ba512d51c864bdd8152a6d8880d703ee4fb8e8e6c3eb
    • Opcode Fuzzy Hash: fbcc4a55516b34ff3ba297e91bcb38b57e048947fec19a7b96c52b87871001db
    • Instruction Fuzzy Hash: AFD227712083859FD324DF65C895FAFB7E9EBC8704F00491EF68A83251DB74A905CBA6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: BGR$ ZYX$ baL$Gray color space not permitted on RGB PNG$PCS illuminant is not D50$RGB color space not permitted on grayscale PNG$YARG$caps$intent outside defined range$invalid ICC profile color space$invalid embedded Abstract ICC profile$invalid rendering intent$invalid signature$knil$lcmn$length does not match profile$psca$rncs$rtnm$rtrp$tag count too large$tsba$unexpected DeviceLink ICC profile class$unexpected ICC PCS encoding$unexpected NamedColor ICC profile class$unrecognized ICC profile class
    • API String ID: 0-319498373
    • Opcode ID: 70a91e9758681da49a43c10027eec337e30d008ed4f0dce50c33fcdea4f1a846
    • Instruction ID: 249f06e3968720c8c777c23974950c44659a7929e2f245b70c2d1fe7c7534faa
    • Opcode Fuzzy Hash: 70a91e9758681da49a43c10027eec337e30d008ed4f0dce50c33fcdea4f1a846
    • Instruction Fuzzy Hash: 71916CE3F0819027FB08DE2D9C92A777B95DBC9305F1D84AAF884DA306E519C50583A9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: wsprintf
    • String ID: `mP$`mP$`mP$`mP$`mP
    • API String ID: 2111968516-3884641827
    • Opcode ID: 65d769361f88b1751ec1b22e503a18c5f0b002f20c9c309699b920b07f8072e1
    • Instruction ID: 1811c3892e047497ca9c58e203a566edd2c4825e6fc76097daf1057d4133bd1f
    • Opcode Fuzzy Hash: 65d769361f88b1751ec1b22e503a18c5f0b002f20c9c309699b920b07f8072e1
    • Instruction Fuzzy Hash: 9A62E271704B219FC724DF25E880A6BB7E5AFC4314F54492EF88A97341EA38EC458B5A
    APIs
    • IsIconic.USER32(?), ref: 0042AF2C
    • IsZoomed.USER32(?), ref: 0042AF3A
    • LoadLibraryA.KERNEL32(User32.dll,00000003,00000009), ref: 0042AF64
    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042AF77
    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042AF85
    • FreeLibrary.KERNEL32(00000000), ref: 0042AFBB
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0042AFD1
    • IsWindow.USER32(?), ref: 0042AFFE
    • ShowWindow.USER32(?,00000005,?,?,?,?,00000004), ref: 0042B00B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: AddressLibraryProcWindow$FreeIconicInfoLoadParametersShowSystemZoomed
    • String ID: GetMonitorInfoA$H$MonitorFromWindow$User32.dll
    • API String ID: 447426925-661446951
    • Opcode ID: 2d1b60cfd7488bf0c756ed509778e8f72ab2516f17c72e8e73907c8e04e72521
    • Instruction ID: 3b96bc23e96c9b6df38971a90167570e32b049f9a3bc412aaa1557a30dc06eaa
    • Opcode Fuzzy Hash: 2d1b60cfd7488bf0c756ed509778e8f72ab2516f17c72e8e73907c8e04e72521
    • Instruction Fuzzy Hash: 48316D71300711AFD710AF619C49F2FB7A9AB84B45F40842DFE05A7290DBB8EC45876A
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00423AF5
    • IsWindow.USER32(00010456), ref: 00423B11
    • SendMessageA.USER32(00010456,000083E7,?,00000000), ref: 00423B2A
    • ExitProcess.KERNEL32 ref: 00423B3F
    • FreeLibrary.KERNEL32(?), ref: 00423C23
    • FreeLibrary.KERNEL32 ref: 00423C77
    • DestroyIcon.USER32(00000000), ref: 00423CC7
    • DestroyIcon.USER32(00000000), ref: 00423CDE
    • IsWindow.USER32(00010456), ref: 00423CF5
    • DestroyIcon.USER32(?,00000001,00000000,000000FF), ref: 00423DA4
    • WSACleanup.WS2_32 ref: 00423DEF
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: DestroyIcon$FreeLibraryWindow$CleanupCurrentExitMessageProcessSendThread
    • String ID:
    • API String ID: 3816745216-0
    • Opcode ID: 159844f1dac720bc624169fe19cc6f0c211cc7a5c7ccabc5fb61b676a7e749a6
    • Instruction ID: 445002f5a0222a1c3f1fbae1ad020b81704996e2ed6b84c142a0e29784c6d984
    • Opcode Fuzzy Hash: 159844f1dac720bc624169fe19cc6f0c211cc7a5c7ccabc5fb61b676a7e749a6
    • Instruction Fuzzy Hash: 9EB16A70310B119BD724DF25D8D5BABB7F5AF48305F80452EE5AA87291CB38BA81CB58
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e3a08876c2b9b44e7887080c10e4080855483ad5add3308eb5f31263f04c491b
    • Instruction ID: 0d507b852649c53f385b6e352dc519f0a32763d3a3e09febe39363cec4fe9fef
    • Opcode Fuzzy Hash: e3a08876c2b9b44e7887080c10e4080855483ad5add3308eb5f31263f04c491b
    • Instruction Fuzzy Hash: 5FC1E1767046288FD310EF29FC81A6BB3A5FB84314F90492FE446C7342DB3AE9558799
    APIs
    • __EH_prolog.LIBCMT ref: 004B678A
    • FindResourceA.KERNEL32(?,00000000,00000005), ref: 004B67C2
    • LoadResource.KERNEL32(?,00000000,?,?,?,00000000), ref: 004B67CA
      • Part of subcall function 004B75C4: UnhookWindowsHookEx.USER32(?), ref: 004B75E9
    • LockResource.KERNEL32(?,?,00000000,?,?,?,00000000), ref: 004B67D7
    • IsWindowEnabled.USER32(?), ref: 004B680A
    • EnableWindow.USER32(?,00000000), ref: 004B6818
    • EnableWindow.USER32(?,00000001), ref: 004B68A6
    • GetActiveWindow.USER32 ref: 004B68B1
    • SetActiveWindow.USER32(?,?,?,00000000,?,?,?,00000000), ref: 004B68BF
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Resource$ActiveEnable$EnabledFindH_prologHookLoadLockUnhookWindows
    • String ID:
    • API String ID: 401145483-0
    • Opcode ID: 0584601d35e366ad6fb91b4a5dd4ccdb21698dcab7a9fe8b9bcc9d40c7dfaaac
    • Instruction ID: a1766c88beabff59e3fc2b229e080a3dd575789a9bde7aa9a57986127cddbae0
    • Opcode Fuzzy Hash: 0584601d35e366ad6fb91b4a5dd4ccdb21698dcab7a9fe8b9bcc9d40c7dfaaac
    • Instruction Fuzzy Hash: D6419170900A14EFCF21AB65C849AEEBBB5FF84715F11052FE501A2291CB7D6D41CB7A
    APIs
    • GlobalAlloc.KERNEL32(00000042,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043FB57
    • GlobalLock.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043FB73
    • GlobalUnlock.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043FB95
    • OpenClipboard.USER32(00000000), ref: 0043FB9D
    • GlobalFree.KERNEL32(00000000), ref: 0043FBA9
    • EmptyClipboard.USER32 ref: 0043FBB1
    • SetClipboardData.USER32(0000C1BF,00000000), ref: 0043FBC3
    • CloseClipboard.USER32 ref: 0043FBC9
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ClipboardGlobal$AllocCloseDataEmptyFreeLockOpenUnlock
    • String ID:
    • API String ID: 453615576-0
    • Opcode ID: 500f3d2652b0ba9695825897ad39719639d22f2cd5bd01723494372afe895ebb
    • Instruction ID: 8e0b9596635a07aadb19695e02951a90d8035ebc571b692d1f8ca20d3e03bc2b
    • Opcode Fuzzy Hash: 500f3d2652b0ba9695825897ad39719639d22f2cd5bd01723494372afe895ebb
    • Instruction Fuzzy Hash: 9831B1B1204601AFC354EB65DC55F6FB7E9EB88710F405A3EF85283290DB78E844CB65
    APIs
    • __EH_prolog.LIBCMT ref: 004B6102
    • GetFullPathNameA.KERNEL32(?,00000104,?,?,?,?), ref: 004B6120
    • lstrcpynA.KERNEL32(?,?,00000104), ref: 004B612F
    • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004B6163
    • CharUpperA.USER32(?), ref: 004B6174
    • FindFirstFileA.KERNEL32(?,?), ref: 004B618A
    • FindClose.KERNEL32(00000000), ref: 004B6196
    • lstrcpyA.KERNEL32(?,?), ref: 004B61A6
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Find$CharCloseFileFirstFullH_prologInformationNamePathUpperVolumelstrcpylstrcpyn
    • String ID:
    • API String ID: 304730633-0
    • Opcode ID: 9597dcb96dffa1f58ccce05e7cc0e1d7a04bfdc1d94a792ebeda74713d3a3016
    • Instruction ID: e60f813052158d7ca69ed5ebd1adf93517982bc36dd39bf2dadd8c58c53b702e
    • Opcode Fuzzy Hash: 9597dcb96dffa1f58ccce05e7cc0e1d7a04bfdc1d94a792ebeda74713d3a3016
    • Instruction Fuzzy Hash: 1E219271901018BBCB209F69DC08EEFBFBCEF56365F004126F819E61A1D7789A45CBA4
    APIs
      • Part of subcall function 004B541C: InterlockedIncrement.KERNEL32(-000000F4), ref: 004B5431
    • FindFirstFileA.KERNEL32(?,?,*.*), ref: 004191CA
      • Part of subcall function 004B2CCF: __EH_prolog.LIBCMT ref: 004B2CD4
      • Part of subcall function 004B56A7: InterlockedDecrement.KERNEL32(-000000F4), ref: 004B56BB
    • SendMessageA.USER32 ref: 00419270
    • FindNextFileA.KERNEL32(?,00000010), ref: 0041927C
    • FindClose.KERNEL32(?), ref: 0041928F
    • SendMessageA.USER32(?,00001102,00000002,?), ref: 004192A1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Find$FileInterlockedMessageSend$CloseDecrementFirstH_prologIncrementNext
    • String ID: *.*
    • API String ID: 2486832813-438819550
    • Opcode ID: eedd4188243a541046b4bf212e4cac43af1761da1ec21d3d059e548ab988456c
    • Instruction ID: 34a19e38a63fb2996ec934935be1eca7cfa37b5498ef22509533e03f4d92d72c
    • Opcode Fuzzy Hash: eedd4188243a541046b4bf212e4cac43af1761da1ec21d3d059e548ab988456c
    • Instruction Fuzzy Hash: 1B41AE71104381ABC314DF61C851FDFB7E8AB94714F008E1EF99587290DBB9A944CB6A
    APIs
    • OpenClipboard.USER32(00000000), ref: 0043FC6D
    • GetClipboardData.USER32(0000C1BF), ref: 0043FC86
    • CloseClipboard.USER32 ref: 0043FC92
    • GlobalSize.KERNEL32(00000000), ref: 0043FCC8
    • GlobalLock.KERNEL32(00000000,00000000,?,?), ref: 0043FCD0
    • GlobalUnlock.KERNEL32(00000000), ref: 0043FCE8
    • CloseClipboard.USER32 ref: 0043FCEE
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Clipboard$Global$Close$DataLockOpenSizeUnlock
    • String ID:
    • API String ID: 2237123812-0
    • Opcode ID: d8260b99f7a14275097b7ce763479bec238f44d9139f4df764db48800f1227d6
    • Instruction ID: 52fb68c6d5033a041a3f23947bd0169baca736f664f3dc8cf9a46e4a82228011
    • Opcode Fuzzy Hash: d8260b99f7a14275097b7ce763479bec238f44d9139f4df764db48800f1227d6
    • Instruction Fuzzy Hash: C8218071700206ABD714AB65E848E7FB7E9EF88354F04153AF906C3250EB68ED4987A6
    APIs
    • GetWindowRect.USER32(?,00000000), ref: 004782C0
    • GetWindowDC.USER32(?,?,?), ref: 004782C9
    • CreateCompatibleDC.GDI32(00000000), ref: 004782D3
    • SetBkMode.GDI32(00000000,00000001), ref: 004782DF
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0047831B
    • SelectObject.GDI32(?,00000000), ref: 00478329
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00478365
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CompatibleCreateWindow$BitmapModeObjectRectSelect
    • String ID:
    • API String ID: 1095011300-0
    • Opcode ID: f29c095417e09e7d655d1415c1471688311580f9cce02f588acfc9c7570c7837
    • Instruction ID: d470da0d48a7d4c2a09e0a175b02f97f1e770cc860735c65a595178bd2e4b46e
    • Opcode Fuzzy Hash: f29c095417e09e7d655d1415c1471688311580f9cce02f588acfc9c7570c7837
    • Instruction Fuzzy Hash: C321C3B5600B01AFD364DF69D988F6BB7E9AB88700F10891DF59AC3650DB70F8848B65
    Strings
    • rgb color-map: too few entries, xrefs: 0045045C
    • bad data option (internal error), xrefs: 004509E8
    • rgb[gray] color-map: too few entries, xrefs: 004502CF
    • rgb[ga] color-map: too few entries, xrefs: 00450294
    • rgb+alpha color-map: too few entries, xrefs: 00450497
    • bad background index (internal error), xrefs: 00450ADF
    • color map overflow (BAD internal error), xrefs: 00450A39
    • rgb-alpha color-map: too few entries, xrefs: 00450552
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: bad background index (internal error)$bad data option (internal error)$color map overflow (BAD internal error)$rgb color-map: too few entries$rgb+alpha color-map: too few entries$rgb-alpha color-map: too few entries$rgb[ga] color-map: too few entries$rgb[gray] color-map: too few entries
    • API String ID: 0-1509944728
    • Opcode ID: 4c2ba1cb28bccefdf0d3c61e663d19a10ab3bc29bcab768b97416fa5fd1e78ef
    • Instruction ID: ff3167dbb4c6ffcf49cfe82a4b0b34ee482d06c1f2506dc9914ef6579f7b98c3
    • Opcode Fuzzy Hash: 4c2ba1cb28bccefdf0d3c61e663d19a10ab3bc29bcab768b97416fa5fd1e78ef
    • Instruction Fuzzy Hash: 1A02F276604341ABE314DB14C881BABB7E5EBD430AF14052EFC8497383D7B9E849C79A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: lost rgb to gray$lost/gained channels$unexpected 8-bit transformation$unexpected bit depth$unexpected compose$unknown interlace type
    • API String ID: 0-3614292578
    • Opcode ID: 09d48c41c3d255ea39b10c4da76ba86b44b305f10660295607ab9e60786cef5c
    • Instruction ID: 0a15706584a19976d7bad17d27c2a112f99c0f4a93ceda9ae692ccfe14b2d43d
    • Opcode Fuzzy Hash: 09d48c41c3d255ea39b10c4da76ba86b44b305f10660295607ab9e60786cef5c
    • Instruction Fuzzy Hash: EB12C4756083418BC714CF28C98066BB7E2BBD9305F44493FFD8997382D679E94ACB4A
    APIs
    • MonitorFromWindow.USER32(?,?), ref: 004A3584
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: FromMonitorWindow
    • String ID:
    • API String ID: 721739931-0
    • Opcode ID: fcd30337d0a215c29fefe8a128703d0ad9734691c91a11bd5abd4f9c85ce25d9
    • Instruction ID: 3b2b95dab2bdb948e075257727e1e53d10678d2de26842fe33f470f24f46ce28
    • Opcode Fuzzy Hash: fcd30337d0a215c29fefe8a128703d0ad9734691c91a11bd5abd4f9c85ce25d9
    • Instruction Fuzzy Hash: 2EF0A931A04108FBCF419F65CC04AAE7B78AF2538AB444022F805C1120FB38DB56EB59
    Strings
    • internal row logic error, xrefs: 0045A7C5
    • invalid user transform pixel depth, xrefs: 0045A9F9
    • internal row size calculation error, xrefs: 0045A7FB
    • internal row width error, xrefs: 0045A80D
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: internal row logic error$internal row size calculation error$internal row width error$invalid user transform pixel depth
    • API String ID: 0-64619857
    • Opcode ID: 93fcab6814bdb2948eed995694e4accf0823b30ad7b36e07260b590cf71b1c0c
    • Instruction ID: 6f4737c25a2c74ddced4599b40433f2a7c1bd8035474e96b9909254cc192b839
    • Opcode Fuzzy Hash: 93fcab6814bdb2948eed995694e4accf0823b30ad7b36e07260b590cf71b1c0c
    • Instruction Fuzzy Hash: 03F117326083554FCB25DE2895902BFBBD2ABC5302F584A6FDC8587303E6299C5EC797
    Strings
    • bad data option (internal error), xrefs: 004509E8
    • palette color-map: too few entries, xrefs: 00450830
    • bad background index (internal error), xrefs: 00450ADF
    • color map overflow (BAD internal error), xrefs: 00450A39
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: bad background index (internal error)$bad data option (internal error)$color map overflow (BAD internal error)$palette color-map: too few entries
    • API String ID: 0-3263629853
    • Opcode ID: 86eae95c9da0b0c069e5e457f4938dd8b9490e3f00d9433c880f44a31ecd848c
    • Instruction ID: 2d1afc5d96d2c6a907427ae6ca1e435f9039a88d5f702c10d0ef57d6afaa0776
    • Opcode Fuzzy Hash: 86eae95c9da0b0c069e5e457f4938dd8b9490e3f00d9433c880f44a31ecd848c
    • Instruction Fuzzy Hash: D28112B56083419FD318CF18C890AAFB7E5EFC8305F54452EF88587352D279EC49879A
    APIs
      • Part of subcall function 004AB7E4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB821
      • Part of subcall function 004AB7E4: EnterCriticalSection.KERNEL32(?,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB83C
      • Part of subcall function 004AB845: LeaveCriticalSection.KERNEL32(?,004A5442,00000009,004A542E,00000000,?,00000000,00000000,00000000), ref: 004AB852
    • GetTimeZoneInformation.KERNEL32(0000000C,?,?,?,0000000B,0000000B,?,004B0050,004AFE06,?,?,?,?,004A66AE,?,?), ref: 004B00AD
    • WideCharToMultiByte.KERNEL32(00000220,00534044,000000FF,0000003F,00000000,?,?,004B0050,004AFE06,?,?,?,?,004A66AE,?,?), ref: 004B0143
    • WideCharToMultiByte.KERNEL32(00000220,00534098,000000FF,0000003F,00000000,?,?,004B0050,004AFE06,?,?,?,?,004A66AE,?,?), ref: 004B017C
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalSection$ByteCharMultiWide$EnterInformationInitializeLeaveTimeZone
    • String ID:
    • API String ID: 3442286286-0
    • Opcode ID: 490ecdfb50ed44bdaab61e5e961ac4313cb7ba9b462d75374835130d0e47170c
    • Instruction ID: d9e9534ca06020cbd539bffd475c8d09950dcfbd219e99380fceb4d293b0f1cc
    • Opcode Fuzzy Hash: 490ecdfb50ed44bdaab61e5e961ac4313cb7ba9b462d75374835130d0e47170c
    • Instruction Fuzzy Hash: 3D614A715041009ED72DAF18AC49FAB3BE4E712350F14017FE158973A1C7789DAADB6E
    APIs
    • GetLocalTime.KERNEL32(?), ref: 004A65ED
    • GetSystemTime.KERNEL32(?), ref: 004A65F7
    • GetTimeZoneInformation.KERNEL32(?), ref: 004A664C
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Time$InformationLocalSystemZone
    • String ID:
    • API String ID: 2475273158-0
    • Opcode ID: 6d3f3e3b45322e28ba8a4a541fd8bf2733585bdcb6c592025d0e75440262e02e
    • Instruction ID: 2a6d7549a8b2e2e25737c8ffeb1f69cf3189407a8aff69c8238683348f43ab70
    • Opcode Fuzzy Hash: 6d3f3e3b45322e28ba8a4a541fd8bf2733585bdcb6c592025d0e75440262e02e
    • Instruction Fuzzy Hash: 9E219269800106A6CB20AF98D948BFF77B9AF26714F450512FD11E6290E73C8DC6D778
    APIs
    • GetKeyState.USER32(00000011), ref: 0042BA81
    • GetKeyState.USER32(00000010), ref: 0042BA96
    • GetKeyState.USER32(00000012), ref: 0042BAAB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: State
    • String ID:
    • API String ID: 1649606143-0
    • Opcode ID: dfaa7884f0083e7f690176dfe5db0578c0d94df7297fb697b7a8940d635abd9a
    • Instruction ID: c8ddd37e3bbc70eca8f352e932ee0810af7009d438b37227c4c9a988092d136c
    • Opcode Fuzzy Hash: dfaa7884f0083e7f690176dfe5db0578c0d94df7297fb697b7a8940d635abd9a
    • Instruction Fuzzy Hash: EC01AD1AF042B985EA2416A8B809BF677518B60B50FDA41B3C94C37291878D0CC623EA
    APIs
    • GetKeyState.USER32(00000010), ref: 004BA7FB
    • GetKeyState.USER32(00000011), ref: 004BA804
    • GetKeyState.USER32(00000012), ref: 004BA80D
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: State
    • String ID:
    • API String ID: 1649606143-0
    • Opcode ID: 70abb25f619d50cafaf9762464bfaed8922c58f838bf4bf8f0f0b724442c6644
    • Instruction ID: 134a6f676f1d9ec41be7c84025e3f22cfa7c97b98573b6ccdde1575a1d3fb563
    • Opcode Fuzzy Hash: 70abb25f619d50cafaf9762464bfaed8922c58f838bf4bf8f0f0b724442c6644
    • Instruction Fuzzy Hash: F1E09B39500259DDEF4072419908FDD76905F08B98F00C467E644AB592C6A898B397FF
    APIs
    • ioctlsocket.WS2_32(?,4004667F,?), ref: 00436A52
    • recvfrom.WS2_32(00000000,00000000,?,00000000,00000000,00000000), ref: 00436AA0
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ioctlsocketrecvfrom
    • String ID:
    • API String ID: 217199969-0
    • Opcode ID: 7b296f32f88cdcda1dc62dc014adb962d191d461af497f3d0d9030984bf6a875
    • Instruction ID: f67c06e8b2b9fec89436b371d80164bfc1e59f88705c1f0d321be9a28fc685a5
    • Opcode Fuzzy Hash: 7b296f32f88cdcda1dc62dc014adb962d191d461af497f3d0d9030984bf6a875
    • Instruction Fuzzy Hash: D6214F75104602ABD314EF24C945F6BB7E4AF88714F108A1EF49A972D0DB78EC85CB59
    Strings
    • bad encoding (internal error), xrefs: 00450EBD
    • color-map index out of range, xrefs: 00450D5F
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: bad encoding (internal error)$color-map index out of range
    • API String ID: 0-7351992
    • Opcode ID: 7b20135aac5d53f3d73256476e50e5f85ff7207c867be2ddabc5174590dc62ff
    • Instruction ID: ef58db386566e766dad7a438658d897a5dfbafd94fcc337cb23fb8fb3a845afc
    • Opcode Fuzzy Hash: 7b20135aac5d53f3d73256476e50e5f85ff7207c867be2ddabc5174590dc62ff
    • Instruction Fuzzy Hash: 0BF1E476A083028BC718DF29C89166AB3D1FBD8305F054A7EEC9AD7351D638E909CB95
    Strings
    • ICC profile tag outside profile, xrefs: 0044DC38
    • ICC profile tag start not a multiple of 4, xrefs: 0044DBE9
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: ICC profile tag outside profile$ICC profile tag start not a multiple of 4
    • API String ID: 0-2051163487
    • Opcode ID: 87e00c8406ee3634965cf02395cc7523bc3ed27874502ea390ce68deb0de7393
    • Instruction ID: c12398e3d30749d5d86f481eb45ba9724c6e158a9e8d541ac8714ac7863eb606
    • Opcode Fuzzy Hash: 87e00c8406ee3634965cf02395cc7523bc3ed27874502ea390ce68deb0de7393
    • Instruction Fuzzy Hash: 0A31F3B3B0879107E71CDA2D5CA06A7BBD3ABC8244F1DC96DE4DAC3301E864A505C758
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 48bb263fed986227b6ef32358c02b9e2a5a9a3e4e3f22f7e6d1ccb5e913cbae7
    • Instruction ID: 86a4c7486a4305aa0f071381030fa826bf66871eb63ec8360108bb2986abc4b4
    • Opcode Fuzzy Hash: 48bb263fed986227b6ef32358c02b9e2a5a9a3e4e3f22f7e6d1ccb5e913cbae7
    • Instruction Fuzzy Hash: 59926871604B418FE329CF29C4906ABFBE2EF99304F24892ED5DB87B51DA34B845CB45
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: 4N
    • API String ID: 0-311606650
    • Opcode ID: 13b6631d4630b45304af14c16c627782399e78e1bf22bca9fa2ca4491d655a13
    • Instruction ID: e7b5800396e07c62e6c325428ccbc7cfc95c901501a2a0a16587d347464a96e6
    • Opcode Fuzzy Hash: 13b6631d4630b45304af14c16c627782399e78e1bf22bca9fa2ca4491d655a13
    • Instruction Fuzzy Hash: 62C1DF71A097518FC718CF2DD59016AFBE2FB98310F198A6EE8DA93741C774A805CB89
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 001e5f98e01f343688f1f4a40c646c6cf60b39d2f685159afc147662c4238f6e
    • Instruction ID: f6c0c079e8c98f012e555f220d95af3e6443879f2fcc065cca0ccf04975757b5
    • Opcode Fuzzy Hash: 001e5f98e01f343688f1f4a40c646c6cf60b39d2f685159afc147662c4238f6e
    • Instruction Fuzzy Hash: FC52DA367487095BD308CE9ACC9159EF3D3ABC8314F498A3CE955C3346EEB8ED0A8655
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5c7d75d7a36f4031a79c0d25b6cfd7052b2668509a128308978e66474c96f5b3
    • Instruction ID: 25092846ddc8e3cf3d8e1674f92c15e4dbdd2c545c2f598152125546a5f88fe1
    • Opcode Fuzzy Hash: 5c7d75d7a36f4031a79c0d25b6cfd7052b2668509a128308978e66474c96f5b3
    • Instruction Fuzzy Hash: 7F1270B16047018FCB18CF19D99062BBBE6EFC9700F14896EE8898B345E774ED45CB96
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b7e733ad131aad04d9e20f7e731a6825663d974cbebbd864102e05df5db40461
    • Instruction ID: d47b49799f5ed1a916b8252dedfc4d8529c735e54c12b0ec473d9b28bcedce7f
    • Opcode Fuzzy Hash: b7e733ad131aad04d9e20f7e731a6825663d974cbebbd864102e05df5db40461
    • Instruction Fuzzy Hash: 201270B16047018FCB18CF19D99062BBBE6EFC9700F14896EE8898B345E774ED45CB96
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ff9e148aade188e509ef5b85ed7300b4d5bae1e0ae1d29337091a805405e9e4f
    • Instruction ID: 01b33a1aadab9cfe32c9f3c65ab850a28fc23e1fb2f5234f25916493f2ffc0f5
    • Opcode Fuzzy Hash: ff9e148aade188e509ef5b85ed7300b4d5bae1e0ae1d29337091a805405e9e4f
    • Instruction Fuzzy Hash: 72120AB4B087018FC708CF29D594A2ABBE1FB88314F14896EE49AC7751E734E945CF5A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 44700af83111c2bf6df53a807408527aed4aed6a86fa766c2ad534030a4dd467
    • Instruction ID: 7499ebde91076b7cf30a6ed1b261bddc40203703403537acf6004ef0345ae13b
    • Opcode Fuzzy Hash: 44700af83111c2bf6df53a807408527aed4aed6a86fa766c2ad534030a4dd467
    • Instruction Fuzzy Hash: 28E1E171E55249DFEB258E64C8717FE77B1BB14340FA8002BD401E72A1D77C9A82CB29
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f08657e54aea992d857d123e8f46ac34acce9810103a6cfba9da3bcbf38ac3d2
    • Instruction ID: e1d3752fb34ac42ed4ce8d5d269efccc8ff7543d75ec171aac29e4eedff01616
    • Opcode Fuzzy Hash: f08657e54aea992d857d123e8f46ac34acce9810103a6cfba9da3bcbf38ac3d2
    • Instruction Fuzzy Hash: C2C1242520E6824FDB198EAC94E92BBFFD1DB6A311B0881FED9D5CB323D525840EC355
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bd7d6e5bdf9180fc249a7cdffd82ac3d4432134ef2b1545fd9ebd85a9bab015f
    • Instruction ID: 9b8b36354c82df944d7667a1f9b425b76701fbc5e419c622126007be3dd6aa54
    • Opcode Fuzzy Hash: bd7d6e5bdf9180fc249a7cdffd82ac3d4432134ef2b1545fd9ebd85a9bab015f
    • Instruction Fuzzy Hash: 41D1B96150D6D28BD722CE2884A03A7FFD1AFA6305F188AEED8D44F347D269984DC357
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d4bfdb248b3fb90f8076a3fe4a1e75f7bd1b50aa5aafde52d762773f77742459
    • Instruction ID: d32a9ce76f5ac16744bcc32b58e1f3caa66a12d5c8b2782eccdc3c7c9486cc90
    • Opcode Fuzzy Hash: d4bfdb248b3fb90f8076a3fe4a1e75f7bd1b50aa5aafde52d762773f77742459
    • Instruction Fuzzy Hash: 10F1BD765082418FC309CF18D5989E27BE2FFA8714B1F42FAD44A9B363D7369841CB96
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f492b554109c666d3f01e677f6b3c0c4980e36121065eeb4fe684823ca5fc740
    • Instruction ID: b546d549841d3ee206db9806d99b2c416446500d0fb4bc99fadb91d1389518d5
    • Opcode Fuzzy Hash: f492b554109c666d3f01e677f6b3c0c4980e36121065eeb4fe684823ca5fc740
    • Instruction Fuzzy Hash: E5E1F7B5604A018FD334CF19D490A22FBF2EF89311B25C96ED89ACB762D735E846CB54
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: dcdb0e9a48f9cc5b8454a5ea312c92bd26660b050e477f45892fe8a81102f325
    • Instruction ID: 189e2a0af3454f957987072dc1bfc8f5acae826aecbdcbe8dde4a7e1589293cd
    • Opcode Fuzzy Hash: dcdb0e9a48f9cc5b8454a5ea312c92bd26660b050e477f45892fe8a81102f325
    • Instruction Fuzzy Hash: 06D1C4356087828FC725CF29C4902A7FBE1FF9A704F48856DE9D99B352D234D80ACB95
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b1d4b358ca929aae1a7670035e6ffff8e58438444434f69097c7261679edf30f
    • Instruction ID: f40e3da39cfa2b6fc5e6fd9949893bda8fd6dbeed5ed12750dd00c86ff3996d5
    • Opcode Fuzzy Hash: b1d4b358ca929aae1a7670035e6ffff8e58438444434f69097c7261679edf30f
    • Instruction Fuzzy Hash: 0DB17B2634A2828BDB195A3D90603F77BA1DB96312F5C54BEDDDAC7743E11E8A0EC305
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 030453e0bf82d2e98ab279b92e9b33a0ea4a5968e538ec9e799787ff2b968e1e
    • Instruction ID: f6b4f25ee2b88e56576dc97639cad8102a145668dbc34052ae3ab79a8cc397a6
    • Opcode Fuzzy Hash: 030453e0bf82d2e98ab279b92e9b33a0ea4a5968e538ec9e799787ff2b968e1e
    • Instruction Fuzzy Hash: F7D18B72A097468FC704CE18C49436BFBE1FBD8315F544A2EE89597791D338A90ECB86
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8a7c87ebfcfecd4733fd7e97fcaf75af45901bfd187d631f72a97af90fa00200
    • Instruction ID: e07882056c6f8a0a8f00ab860fdd6ec160321f97c8343737217e3fdbee852067
    • Opcode Fuzzy Hash: 8a7c87ebfcfecd4733fd7e97fcaf75af45901bfd187d631f72a97af90fa00200
    • Instruction Fuzzy Hash: 90C1FE31B086A48FD725CE48E4E13AFB7E2AF86740FD8895FE4C147352D6389845CB5A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 209fc5673e656db3213c2d2fbf9a8a4af23a33bfddf6ddf1f62eb543b428bd05
    • Instruction ID: 71294d33a5bec29dc899b2f41f127136d1e1e642dc2351f7e386130d003839e9
    • Opcode Fuzzy Hash: 209fc5673e656db3213c2d2fbf9a8a4af23a33bfddf6ddf1f62eb543b428bd05
    • Instruction Fuzzy Hash: 00C1C03520C7824BC72DDB2894A55FBBFE29FAA300B1DD5BDD88A8B393D9255409C750
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2417c1ce4e9e9b69ca172a5cfb6e8ea2df5b38e71710020941bb48b39ad2ce8e
    • Instruction ID: 79947136f6c47ca925560f53afd2dcbbcc819fb6ae759bb0d20169486e2bf3e3
    • Opcode Fuzzy Hash: 2417c1ce4e9e9b69ca172a5cfb6e8ea2df5b38e71710020941bb48b39ad2ce8e
    • Instruction Fuzzy Hash: 9CD18C752082518FC319CF18E9D88E27BE1BFA8740F0E42F9D98A8B323D7369945CB55
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
    • Instruction ID: 3801af7c5f6c5dcd1b59b771cc8546a2959237d446cd3294f618e3ed67faf9e2
    • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
    • Instruction Fuzzy Hash: 3EB18B7590020ADFDB15CF04C5D0AA9BBA1BF69318F24C1AED85A4B782C735FE46CB94
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cab88bb81d6f1a3f294bb195b69a7ed404116198194961875d31482ad394f9ff
    • Instruction ID: c081704d68ea1507edc3738d9e6e30aaf25844cd72d69a049e3ded5911d85175
    • Opcode Fuzzy Hash: cab88bb81d6f1a3f294bb195b69a7ed404116198194961875d31482ad394f9ff
    • Instruction Fuzzy Hash: 72A1F675A087418FC314CF29C49085AFBF2BFC8714F198A6DE99987325E770E945CB86
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4664e54bd8655df0b62760be2564d86677a0bae60cff444b8354291ceb51d8c8
    • Instruction ID: 425735577f7ae8863b7842a170fa4a962e1be06fe1cec519a874496c59ebde99
    • Opcode Fuzzy Hash: 4664e54bd8655df0b62760be2564d86677a0bae60cff444b8354291ceb51d8c8
    • Instruction Fuzzy Hash: 0C71D73550C6828AC711CF28C484666FFD2ABAA305F0CC6AECCC89F357D665E90DC792
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e09e427cc0f5c48326d696f622ddb13854d7e20a58c35d846649955e18978596
    • Instruction ID: 8ffb78a4382c42801452b25a323a3d3109ccba851ac42c0494cb44020652aa39
    • Opcode Fuzzy Hash: e09e427cc0f5c48326d696f622ddb13854d7e20a58c35d846649955e18978596
    • Instruction Fuzzy Hash: B971232020D7C24BC72A9B2888A42F6BFA1AF96302F5C95FED8D64F393C406650DC721
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c85e5f8c1b8543d5e31b2507d484f8634bc59b4117db2810bbc7b5cb86d4c726
    • Instruction ID: c33d551def23ccc1fd2a1ef49bf70edc5998146a630d1c23ba56b9f1561c9553
    • Opcode Fuzzy Hash: c85e5f8c1b8543d5e31b2507d484f8634bc59b4117db2810bbc7b5cb86d4c726
    • Instruction Fuzzy Hash: D481193954A7819FC711CF29C0D0466FBE2BF9E204F5C999DE9C50B317D231A919CB92
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 083e52cccdf5450e489e77c33d6860a22e01e3515010b0744dceb5592228e7a7
    • Instruction ID: 695d003fa8f9c596b4bbd100c4f6674f7c4eb50ff049aeed854a2df96480b311
    • Opcode Fuzzy Hash: 083e52cccdf5450e489e77c33d6860a22e01e3515010b0744dceb5592228e7a7
    • Instruction Fuzzy Hash: CA513631A083644FC315DF2D989016AFBD29FCA316F588A6ED8D9C7313E235E8098785
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4d4d2dea2c165661568dc7cef3cf9871e53b13df2d48047b3dc5f70df1b2c506
    • Instruction ID: 00dad51e363d434b0dee973ad96dd68088ad665d4f0b4c92eb065135b284d4c6
    • Opcode Fuzzy Hash: 4d4d2dea2c165661568dc7cef3cf9871e53b13df2d48047b3dc5f70df1b2c506
    • Instruction Fuzzy Hash: FA41343A3192834BC7289E3C84512B6FBA1AF9A301B5847BED8D5C7743D6299A0AC754
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a8c27889d51f487b201adba72a386df83b8ac4b76ef92a9fc20cd27d85f323ea
    • Instruction ID: 109e22c010c5b0bf7b8255c4465612544583fa791aca71b4e84936f2dc0cc86b
    • Opcode Fuzzy Hash: a8c27889d51f487b201adba72a386df83b8ac4b76ef92a9fc20cd27d85f323ea
    • Instruction Fuzzy Hash: 5251AC2920DBD14AC71A973854A95F7FFE29F6B302B4E90EEC8DA8B363D516410CC760
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2cd569e7163981d773c755b0d9c8571a49a4c4d70a2c301a50f699e530bd60ad
    • Instruction ID: 7c8f87e9a5c9336ed9a283bcbebb77d3dd1b68eccf10348b0ac2271c5d78e5a7
    • Opcode Fuzzy Hash: 2cd569e7163981d773c755b0d9c8571a49a4c4d70a2c301a50f699e530bd60ad
    • Instruction Fuzzy Hash: 4341C132700A510BC778CA2A98A01FBB793DBC6301F28C8BFC59E8B725E9355844CB85
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0b4f27dd10139f30faea009d98bf7d04ad43b169fe1efa635cf320682f8d45aa
    • Instruction ID: 3b4163a1df93306f16789d9e08b335229fe29319b66eef29c0edf652b8a843d0
    • Opcode Fuzzy Hash: 0b4f27dd10139f30faea009d98bf7d04ad43b169fe1efa635cf320682f8d45aa
    • Instruction Fuzzy Hash: 73312D3374958203F71DCA2F9CA12BAEAD34FC522872DD87E99C987757ECB9841A8104
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e7f56755fb1d45353d884b0032e82fd145e1b97ab046bd07626dad2e3ede3ed2
    • Instruction ID: c5488a6bb5d6af12d03688ec508865531f56d558858d35d892c1ec3432e11d6d
    • Opcode Fuzzy Hash: e7f56755fb1d45353d884b0032e82fd145e1b97ab046bd07626dad2e3ede3ed2
    • Instruction Fuzzy Hash: 9C3177267B609207D395CEBD9C80577B693A7CA306B6DC678D984C7A0EC43DD80B8258
    APIs
      • Part of subcall function 004782B0: GetWindowRect.USER32(?,00000000), ref: 004782C0
      • Part of subcall function 004782B0: GetWindowDC.USER32(?,?,?), ref: 004782C9
      • Part of subcall function 004782B0: CreateCompatibleDC.GDI32(00000000), ref: 004782D3
      • Part of subcall function 004782B0: SetBkMode.GDI32(00000000,00000001), ref: 004782DF
      • Part of subcall function 004782B0: SelectObject.GDI32(?,00000000), ref: 00478329
      • Part of subcall function 004782B0: BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00478365
    • GetClientRect.USER32(00000000,?), ref: 00479B83
    • FillRect.USER32(?,?,?), ref: 00479BB7
    • GetWindowLongA.USER32(?,000000F0), ref: 00479BC2
    • GetVersion.KERNEL32 ref: 00479C4F
    • GetSysColor.USER32 ref: 00479C6A
    • CreatePen.GDI32(00000000,00000001,00000000), ref: 00479C74
    • SelectObject.GDI32(?,00000000), ref: 00479C82
    • GetSysColor.USER32(0000000F), ref: 00479C91
    • CreateSolidBrush.GDI32 ref: 00479CA1
    • SelectObject.GDI32(?,00000000), ref: 00479CA9
    • Ellipse.GDI32(?,?,?,?,?), ref: 00479CCA
    • SelectObject.GDI32(?,00000000), ref: 00479CD2
    • DeleteObject.GDI32(00000000), ref: 00479CDB
    • SelectObject.GDI32(?,?), ref: 00479CE3
    • DeleteObject.GDI32(00000000), ref: 00479CE6
    • GetSysColor.USER32(0000000F), ref: 00479CF0
    • CreatePen.GDI32(00000000,00000001,00845521), ref: 00479D07
    • SelectObject.GDI32(?,00000000), ref: 00479D0F
    • Arc.GDI32(?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00479D3A
    • SelectObject.GDI32(?,?), ref: 00479D46
    • DeleteObject.GDI32(00000000), ref: 00479D49
    • InflateRect.USER32(?,000000FE,000000FE), ref: 00479D54
    • CreateEllipticRgnIndirect.GDI32(?), ref: 00479D5F
    • SelectClipRgn.GDI32(?,00000000), ref: 00479D6B
    • GetStockObject.GDI32(00000000), ref: 00479D7A
    • FillRect.USER32(?,?,00000000), ref: 00479D87
    • SelectClipRgn.GDI32(?,00000000), ref: 00479DB7
    • DeleteObject.GDI32(?), ref: 00479DC2
    • InflateRect.USER32(?,000000FE,000000FE), ref: 00479DCD
    • CreatePen.GDI32(00000000,00000001,00DEEFF7), ref: 00479DE7
    • SelectObject.GDI32(?,00000000), ref: 00479DEF
    • CreateSolidBrush.GDI32(00DEEFF7), ref: 00479DFA
    • SelectObject.GDI32(?,00000000), ref: 00479E02
    • Ellipse.GDI32(?,?,?,?,?), ref: 00479E1F
    • SelectObject.GDI32(?,?), ref: 00479E2B
    • DeleteObject.GDI32(00000000), ref: 00479E2E
    • SelectObject.GDI32(?,?), ref: 00479E36
    • DeleteObject.GDI32(00000000), ref: 00479E39
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00479E44
    • CreatePen.GDI32(00000000,00000001,-0094CB9B), ref: 00479E6D
    • SelectObject.GDI32(?,00000000), ref: 00479E75
    • Arc.GDI32(?,?,?,?,?,00000000,00000000,00000000,00000000), ref: 00479E9A
    • SelectObject.GDI32(?,?), ref: 00479EA6
    • DeleteObject.GDI32(00000000), ref: 00479EA9
    • CreateEllipticRgnIndirect.GDI32(?), ref: 00479EB0
    • SelectClipRgn.GDI32(?,00000000), ref: 00479EBC
    • SelectClipRgn.GDI32(?,00000000), ref: 00479EE1
    • DeleteObject.GDI32(?), ref: 00479EEC
    • GetWindowTextA.USER32(00000001,?,00000100), ref: 00479EFB
    • GetSysColor.USER32(00000011), ref: 00479F11
    • SetTextColor.GDI32(?,?), ref: 00479F1E
    • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00479F2D
    • SelectObject.GDI32(?,00000000), ref: 00479F35
      • Part of subcall function 00476C30: GetTextExtentPoint32A.GDI32(?,004EEAE0,?,?), ref: 00476CC3
    • SelectObject.GDI32(?,00000000), ref: 00479F61
    • DrawFocusRect.USER32(?,?), ref: 00479F91
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Object$Select$Create$DeleteRect$Color$ClipWindow$InflateText$BrushEllipseEllipticFillIndirectSolid$ClientCompatibleDrawExtentFocusLongMessageModePoint32SendStockVersion
    • String ID: N
    • API String ID: 1322314875-3948818596
    • Opcode ID: 8bea2fb6dc65c8ae00e31523f026ec98ecf04729c0ac43a790a241e00e06da80
    • Instruction ID: ef8a133b45522f8bf16b41b9e4001d5bdd003197e43d0ab4114199d162fd4932
    • Opcode Fuzzy Hash: 8bea2fb6dc65c8ae00e31523f026ec98ecf04729c0ac43a790a241e00e06da80
    • Instruction Fuzzy Hash: EED157B1108701AFD700DB65CC48FAFB7E8EF89704F044A1DF995C6290DB78E9458B6A
    APIs
    • GetDC.USER32(?), ref: 00447642
      • Part of subcall function 0042D040: EnumDisplaySettingsA.USER32(00000000,000000FF,?), ref: 0042D04F
    • SetStretchBltMode.GDI32(00000000,00000000), ref: 00447655
    • CreateCompatibleDC.GDI32(00000000), ref: 00447662
    • CreateCompatibleDC.GDI32(00000000), ref: 00447667
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004476B8
    • SelectObject.GDI32(00000000,00000000), ref: 004476CC
    • SelectObject.GDI32(?,?), ref: 004476F6
    • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 00447718
    • SelectObject.GDI32(?,?), ref: 00447728
    • SelectObject.GDI32(?,?), ref: 00447734
    • GetTickCount.KERNEL32 ref: 00447782
    • SelectObject.GDI32(?,?), ref: 004477BA
    • SelectObject.GDI32(00000000,00000000), ref: 004477D6
    • BitBlt.GDI32(?,?,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 004477FB
    • SelectObject.GDI32(00000000,?), ref: 00447807
    • DeleteObject.GDI32(00000000), ref: 0044780E
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00447852
    • SelectObject.GDI32(00000000,00000000), ref: 0044785E
    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,00000000,00CC0020), ref: 00447883
    • SelectObject.GDI32(00000000,?), ref: 0044788F
    • SelectObject.GDI32(00000000,?), ref: 00447897
    • CreateCompatibleDC.GDI32(00000000), ref: 004478AC
    • CreateCompatibleDC.GDI32(00000000), ref: 004478B5
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 004478CB
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 004478E3
    • SelectObject.GDI32(00000000,?), ref: 004478F3
    • SelectObject.GDI32(00000000,?), ref: 00447903
    • SetBkColor.GDI32(00000000,?), ref: 00447915
    • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 00447936
    • SetBkColor.GDI32(00000000,?), ref: 00447942
    • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00330008), ref: 0044795F
    • BitBlt.GDI32(?,?,00000000,?,?,00000000,00000000,00000000,008800C6), ref: 00447984
    • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,008800C6), ref: 004479A1
    • BitBlt.GDI32(?,?,00000000,?,?,00000000,00000000,00000000,00EE0086), ref: 004479C6
    • SelectObject.GDI32(00000000,?), ref: 004479D2
    • DeleteObject.GDI32(00000000), ref: 004479D9
    • SelectObject.GDI32(00000000,?), ref: 004479E5
    • DeleteObject.GDI32(00000000), ref: 004479EC
    • DeleteDC.GDI32(00000000), ref: 004479F9
    • DeleteDC.GDI32(00000000), ref: 004479FC
    • SelectObject.GDI32(00000000,?), ref: 00447A35
    • DeleteObject.GDI32(?), ref: 00447A3C
    • IsWindow.USER32(?), ref: 00447A46
    • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,?,?,00CC0020), ref: 00447AAA
    • BitBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00CC0020), ref: 00447AD4
    • SelectObject.GDI32(?,?), ref: 00447AE4
    • Sleep.KERNEL32(0000000A), ref: 00447B30
    • GetTickCount.KERNEL32 ref: 00447B36
    • DeleteObject.GDI32(00000000), ref: 00447B63
    • DeleteDC.GDI32(00000000), ref: 00447B70
    • DeleteDC.GDI32(?), ref: 00447B77
    • ReleaseDC.USER32(?,00000000), ref: 00447B7E
      • Part of subcall function 00447160: GetClientRect.USER32(?,?), ref: 00447187
      • Part of subcall function 00447160: __ftol.LIBCMT ref: 0044725E
      • Part of subcall function 00447160: __ftol.LIBCMT ref: 00447271
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Object$Select$Delete$Create$Compatible$Bitmap$ColorCountStretchTick__ftol$ClientDisplayEnumModeRectReleaseSettingsSleepWindow
    • String ID:
    • API String ID: 1975044605-0
    • Opcode ID: d84f70d83c37e78f8e3f5b639f4bda7b1ba309dc1bd617dc0568cb3fad6b7351
    • Instruction ID: 904a7e97ff7a3c566e83dcf5d929af1c4f7da2a9a9635feffefedd97aca6458f
    • Opcode Fuzzy Hash: d84f70d83c37e78f8e3f5b639f4bda7b1ba309dc1bd617dc0568cb3fad6b7351
    • Instruction Fuzzy Hash: 6C02E6B5604700AFE360DB65CC89F2BB7E9EB88B04F10491DF69697290DB74F8458B29
    APIs
    • GetSysColor.USER32(00000010), ref: 004555C8
      • Part of subcall function 004BE34D: SetBkColor.GDI32(?,?), ref: 004BE35C
      • Part of subcall function 004BE34D: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 004BE38E
    • GetSysColor.USER32(00000014), ref: 00455600
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00455632
    • GetSysColor.USER32(00000016), ref: 0045564B
    • GetSysColor.USER32(0000000F), ref: 0045565B
    • DrawEdge.USER32(?,?,00000002,0000000F), ref: 00455694
    • GetDeviceCaps.GDI32(?), ref: 0045589E
    • RealizePalette.GDI32(?), ref: 004558C1
    • GetSysColor.USER32(00000014), ref: 004558D9
    • GetSysColor.USER32(0000000F), ref: 004558EB
    • GetSysColor.USER32(0000000F), ref: 004555A1
      • Part of subcall function 004BE323: SetBkColor.GDI32(?,?), ref: 004BE32D
      • Part of subcall function 004BE323: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 004BE343
    • GetSysColor.USER32(0000000F), ref: 004556F8
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00455731
    • GetSysColor.USER32(00000016), ref: 00455746
    • GetSysColor.USER32(0000000F), ref: 00455752
    • InflateRect.USER32(?,?,?), ref: 00455793
    • GetSysColor.USER32(00000010), ref: 00455797
    • Rectangle.GDI32(?,?,?,?,?), ref: 004557DE
    • DrawEdge.USER32(?,?,00000002,0000000F), ref: 00455819
    • DrawEdge.USER32(?,?,00000002,0000000F), ref: 00455920
    • GetSysColor.USER32(00000010), ref: 0045597D
    • CreatePen.GDI32(00000000,00000001,00000000), ref: 00455984
    • InflateRect.USER32(?,?,?), ref: 004559C3
    • Rectangle.GDI32(?,?,?,?,?), ref: 004559E1
    • GetDeviceCaps.GDI32(?,00000026), ref: 00455A17
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Color$InflateRect$DrawEdge$CapsDeviceRectangleText$CreatePaletteRealize
    • String ID: !K
    • API String ID: 3119264602-3405271303
    • Opcode ID: 93716d44f2339dd8f1c4f9a210072c440c24b2ab0782b2448125af021eb1758c
    • Instruction ID: e5ee1e66f9e8c17a843f4f22261fe21603432c0af764afbbb2f4980b91139568
    • Opcode Fuzzy Hash: 93716d44f2339dd8f1c4f9a210072c440c24b2ab0782b2448125af021eb1758c
    • Instruction Fuzzy Hash: 2AF17A71204701AFD714DB65C894E7FB3E9FB88704F004A2EFA9687291DBB4E805CB66
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 05c2ff4a6c7c1fff5544f635a024a0296206676e4c86ffbb57b6e463d791ab02
    • Instruction ID: 9c3a3481c6fa8faacec73868fbb50a71b3e00e3caa1e712d2f79b15e3779e864
    • Opcode Fuzzy Hash: 05c2ff4a6c7c1fff5544f635a024a0296206676e4c86ffbb57b6e463d791ab02
    • Instruction Fuzzy Hash: 74D15EB2604605AFD704DFA8E8C4DABB7A9FB84365B10893EF105C7251D735E891CBA4
    APIs
    • CreateDIBitmap.GDI32(?,?,00000004,?,?,00000000), ref: 0043260C
    • CreateCompatibleDC.GDI32(?), ref: 0043261E
    • CreateCompatibleDC.GDI32(?), ref: 00432627
    • SelectObject.GDI32(00000000,?), ref: 00432636
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00432649
    • SelectObject.GDI32(?,00000000), ref: 00432659
    • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 00432679
    • SelectObject.GDI32(00000000,?), ref: 00432685
    • DeleteDC.GDI32(00000000), ref: 00432692
    • SelectObject.GDI32(?,?), ref: 0043269A
    • DeleteDC.GDI32(?), ref: 004326A1
    • DeleteObject.GDI32(?), ref: 004326A7
    • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 004326DD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CreateObject$Select$BitmapCompatibleDelete
    • String ID: $($(
    • API String ID: 1878064223-3669016180
    • Opcode ID: 3d4cf4b692dd603bbb77bd3456f3729282759677cd2476b57c23a635f0098308
    • Instruction ID: a51550c07a1bcd83a0c8f4dc731026e5c6112cbd66e96250cd3cf998e62ae352
    • Opcode Fuzzy Hash: 3d4cf4b692dd603bbb77bd3456f3729282759677cd2476b57c23a635f0098308
    • Instruction Fuzzy Hash: A4D155B5A047009FC724DF29D984A6BBBE9EFC8310F14892EF99687350D774E844CB66
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • IsRectEmpty.USER32(?), ref: 004165E5
    • GetCurrentObject.GDI32(?,00000002), ref: 0041662A
    • GetCurrentObject.GDI32(?,00000001), ref: 0041663D
    • GetClientRect.USER32 ref: 004166C2
    • CreatePen.GDI32(-00000003,00000000,?), ref: 004166DE
    • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 004167A2
      • Part of subcall function 004BC24A: __EH_prolog.LIBCMT ref: 004BC24F
      • Part of subcall function 004BC24A: EndPaint.USER32(?,?,?,?,00414203), ref: 004BC26C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CurrentH_prologObjectPaintRect$BeginClientClipCreateEmpty
    • String ID: !K$'K$gfff
    • API String ID: 3506841274-3458085062
    • Opcode ID: 1247271362fd2d7619618a3b5bced564e3bbc2a528a1b8cf8d9b409cebdfc743
    • Instruction ID: a65b6a9c75819ff3dfce3c70bdb4be9e8d0c32a213edcbb0bcc13aab1f12d056
    • Opcode Fuzzy Hash: 1247271362fd2d7619618a3b5bced564e3bbc2a528a1b8cf8d9b409cebdfc743
    • Instruction Fuzzy Hash: B7E19CB15083409FC314DF59C884EAFB7E9FB88714F514A1EF59587290DB38E849CBAA
    APIs
    • GetFocus.USER32 ref: 004228FF
    • GetWindowRect.USER32(?,?), ref: 00422956
    • GetParent.USER32(?), ref: 00422966
    • GetParent.USER32(?), ref: 00422999
    • GlobalSize.KERNEL32(00000000), ref: 004229E3
    • GlobalLock.KERNEL32(00000000,00000000), ref: 004229EB
    • IsWindow.USER32(?), ref: 00422A04
    • GetTopWindow.USER32(?), ref: 00422A41
    • GetWindow.USER32(00000000,00000002), ref: 00422A5A
    • SetParent.USER32(?,?), ref: 00422A86
    • SendMessageA.USER32(?,0000806F,00000000,00000000), ref: 00422AD1
    • SendMessageA.USER32(?,00008076,00000000,00000000), ref: 00422AE0
    • GetParent.USER32(?), ref: 00422AF3
    • SendMessageA.USER32(?,00008004,00000000,00000000), ref: 00422B0C
    • GetWindowLongA.USER32(?,000000F0), ref: 00422B14
    • SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 00422B44
    • SendMessageA.USER32(?,0000130C,00000000,00000000), ref: 00422B52
    • IsWindow.USER32(?), ref: 00422B9E
    • GetFocus.USER32 ref: 00422BA8
    • SetFocus.USER32(?,00000000), ref: 00422BC0
    • GlobalUnlock.KERNEL32(00000000), ref: 00422BCB
    • GlobalFree.KERNEL32(00000000), ref: 00422BD2
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$MessageSend$GlobalParent$Focus$FreeLockLongRectSizeUnlock
    • String ID:
    • API String ID: 300820980-0
    • Opcode ID: 59312e6593d847d3b6ca3a127827fd77bc5a1de3a36835e6a24a757019e3d284
    • Instruction ID: d2c02a062f5f0b462a6e902ae2f88f1f809bd864c630c0343e789db5b1507e84
    • Opcode Fuzzy Hash: 59312e6593d847d3b6ca3a127827fd77bc5a1de3a36835e6a24a757019e3d284
    • Instruction Fuzzy Hash: 86A148B1304700AFD724EF659D84F2BB7E9BF88700F504A1EF95197291DBB8E8418B69
    APIs
    • SetWindowRgn.USER32(?,00000000,00000001), ref: 00428101
    • GetWindowRect.USER32(?,?), ref: 0042812E
    • BeginPath.GDI32(?), ref: 004281B7
    • MulDiv.KERNEL32(7FFF0000,?,00007FFF), ref: 004281D0
    • MulDiv.KERNEL32(00000000,?,00007FFF), ref: 004281DF
    • MulDiv.KERNEL32(3FFF0000,?,00007FFF), ref: 00428207
    • MulDiv.KERNEL32(00000000,?,00007FFF), ref: 00428216
    • EndPath.GDI32(?), ref: 00428231
    • PathToRegion.GDI32(?), ref: 0042823C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Path$Window$BeginRectRegion
    • String ID: EK$gfff$gfff
    • API String ID: 3989698161-4290331459
    • Opcode ID: 92a34ad30450fb562635a85b0c8b23507e93b2a154ccbd2050e9c6a8b71e2d07
    • Instruction ID: 6405701b3ab51cd6c590f590cf4d215e40ac5df88a94fa5da49da94dbace2614
    • Opcode Fuzzy Hash: 92a34ad30450fb562635a85b0c8b23507e93b2a154ccbd2050e9c6a8b71e2d07
    • Instruction Fuzzy Hash: C481F3B1604741AFC318DF25DC85E6FB7E8FB94704F44892EF98683290DE38A845C766
    APIs
    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000022B8), ref: 00449D05
    • EnterCriticalSection.KERNEL32(?), ref: 00449D28
    • LeaveCriticalSection.KERNEL32(?), ref: 00449D36
    • waveOutUnprepareHeader.WINMM(?,?,00000020), ref: 00449D58
    • waveOutPrepareHeader.WINMM(?,?,00000020), ref: 00449DA1
    • waveOutWrite.WINMM(?,?,00000020), ref: 00449DAE
    • EnterCriticalSection.KERNEL32(?), ref: 00449DB8
    • LeaveCriticalSection.KERNEL32(?), ref: 00449DC6
    • EnterCriticalSection.KERNEL32(?), ref: 00449DF5
    • ReleaseSemaphore.KERNEL32(?,00000014,00000000), ref: 00449E13
    • LeaveCriticalSection.KERNEL32(?), ref: 00449E1A
    • waveOutPause.WINMM(?), ref: 00449E29
    • waveOutReset.WINMM(?), ref: 00449E33
    • waveOutUnprepareHeader.WINMM(?,00000000,00000020), ref: 00449E51
    • waveOutUnprepareHeader.WINMM(?,?,00000020), ref: 00449E76
    • EnterCriticalSection.KERNEL32(00507808), ref: 00449E8C
    • LeaveCriticalSection.KERNEL32(00507808), ref: 00449EE8
    • CloseHandle.KERNEL32(?), ref: 00449F16
    • CloseHandle.KERNEL32(?), ref: 00449F1C
    • CloseHandle.KERNEL32(?), ref: 00449F22
    • DeleteCriticalSection.KERNEL32(?), ref: 00449F28
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalSection$wave$EnterHeaderLeave$CloseHandleUnprepare$DeleteMultipleObjectsPausePrepareReleaseResetSemaphoreWaitWrite
    • String ID:
    • API String ID: 361331667-0
    • Opcode ID: 33e5f42266412e8aed80e3059d977fcc4490b3aa1e3b9a83dcde8ee0b6d5bb0b
    • Instruction ID: 3e78584cd100be71eac9d453100101527c098e7ff7c12d490ae73f8cb970e303
    • Opcode Fuzzy Hash: 33e5f42266412e8aed80e3059d977fcc4490b3aa1e3b9a83dcde8ee0b6d5bb0b
    • Instruction Fuzzy Hash: 8F719E756006199FEB54CF68DC88AAF77A8EF48304F14852AFD06DB290C738ED41DB98
    APIs
    • GetStockObject.GDI32(0000000F), ref: 00430244
    • GetObjectA.GDI32(?,00000018,?), ref: 00430257
    • SelectPalette.GDI32(?,00000000,00000000), ref: 004302B2
    • RealizePalette.GDI32(?), ref: 004302BC
    • GlobalAlloc.KERNEL32(00000002,00000028), ref: 004302C6
    • SelectPalette.GDI32(?,?,00000000), ref: 004302DC
    • GlobalLock.KERNEL32(00000000), ref: 004302E4
    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000000,00000000), ref: 00430313
    • GlobalUnlock.KERNEL32(00000000), ref: 00430369
    • GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 00430372
    • GlobalLock.KERNEL32(00000000), ref: 0043037F
    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000000,00000000), ref: 004303A2
    • SelectPalette.GDI32(?,?,00000000), ref: 004303B5
    • GlobalUnlock.KERNEL32(00000000), ref: 004303BC
    • GlobalFree.KERNEL32(00000000), ref: 004303C3
      • Part of subcall function 004BC0E2: __EH_prolog.LIBCMT ref: 004BC0E7
      • Part of subcall function 004BC0E2: ReleaseDC.USER32(?,00000000), ref: 004BC106
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Global$Palette$Select$AllocBitsLockObjectUnlock$FreeH_prologRealizeReleaseStock
    • String ID: (
    • API String ID: 3986717603-3887548279
    • Opcode ID: c2161b2f457c81154ca42fc2fba1a534a35e3b3657fc5c1ce66474b25a7d7ef5
    • Instruction ID: 147809fc6433be86f52ff5f09f725146cb8e3a35a52ad9e705796d73ff1e4213
    • Opcode Fuzzy Hash: c2161b2f457c81154ca42fc2fba1a534a35e3b3657fc5c1ce66474b25a7d7ef5
    • Instruction Fuzzy Hash: 1A6158725447509FC360DB54CC88F6FB7E8FB88B10F144A2DFA8597290DB78A845CBA6
    APIs
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00449A7B
    • CreateSemaphoreA.KERNEL32(00000000,00000014,00000014,00000000), ref: 00449A90
    • InitializeCriticalSection.KERNEL32(?), ref: 00449ABB
    • CreateThread.KERNEL32(00000000,00000000,00449CF0,?,00000004,?), ref: 00449AF0
    • EnterCriticalSection.KERNEL32(00507808), ref: 00449B02
    • LeaveCriticalSection.KERNEL32(00507808,-000000FC,00000000,00000000), ref: 00449CB5
    • ResumeThread.KERNEL32(?), ref: 00449CC3
    • ReleaseSemaphore.KERNEL32(?,00000014,00000000), ref: 00449CD5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CreateCriticalSection$SemaphoreThread$EnterEventInitializeLeaveReleaseResume
    • String ID: xP$ xP$ xP$ xP$ xP$RIFF$WAVE$data$fmt
    • API String ID: 1802393137-3042124615
    • Opcode ID: eedda10e25806d24670ca29a8b612efc06e53685d60957cd9f14d2637a0ff2bf
    • Instruction ID: bb1c09a64d356771dae48a14d155362068357635a71df923c187e4b64914615e
    • Opcode Fuzzy Hash: eedda10e25806d24670ca29a8b612efc06e53685d60957cd9f14d2637a0ff2bf
    • Instruction Fuzzy Hash: D7B1FDB1A043009BE714DF24DC85A2FB7E5FB88318F04862EF94697380E679ED05DB99
    APIs
      • Part of subcall function 004B7A75: GetWindowTextLengthA.USER32(?), ref: 004B7A82
      • Part of subcall function 004B7A75: GetWindowTextA.USER32(?,00000000,00000000), ref: 004B7A9A
    • __ftol.LIBCMT ref: 00446666
    • __ftol.LIBCMT ref: 004466BC
    • __ftol.LIBCMT ref: 00446712
    • __ftol.LIBCMT ref: 00446768
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00446789
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004467A3
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0044686B
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0044689D
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 004468BA
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004468DA
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004468F4
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0044690C
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0044692B
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 00446994
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004469F9
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 00446A3B
      • Part of subcall function 004B983D: GetDlgItem.USER32(?,?), ref: 004B984B
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 00446A67
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$__ftol$TextWindow$ItemLength
    • String ID:
    • API String ID: 2143175130-0
    • Opcode ID: 4f1559c98fcfb8eef726e8002ee5c29cab65a9634121de8822ab5e85c329b84e
    • Instruction ID: 0ee18c4da01dbe1cf487a23a9a6a07f23839b477813f6d4845e08513761deab8
    • Opcode Fuzzy Hash: 4f1559c98fcfb8eef726e8002ee5c29cab65a9634121de8822ab5e85c329b84e
    • Instruction Fuzzy Hash: 36D1E7B1544B02ABE320EB31CC42FAB73E4AF95744F11492EF19A972D0DB78E5418F1A
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 00452BF0: GetWindowExtEx.GDI32(?,?), ref: 00452C13
    • MulDiv.KERNEL32(?,00000064,?), ref: 0045375B
    • GetClientRect.USER32(?,?), ref: 004537E9
    • DPtoLP.GDI32(?,?,00000002), ref: 004537FE
    • OffsetRect.USER32 ref: 0045384D
    • Rectangle.GDI32(?,?,?,?,?), ref: 0045388B
    • FillRect.USER32(?,?,?), ref: 004538E3
    • FillRect.USER32(?,00000032,?), ref: 00453926
    • LPtoDP.GDI32(?,?,00000002), ref: 004539CF
    • IsRectEmpty.USER32(?), ref: 004539D6
    • CreateRectRgnIndirect.GDI32(?), ref: 00453A1A
      • Part of subcall function 004BBD99: SelectClipRgn.GDI32(?,00000000), ref: 004BBDBB
      • Part of subcall function 004BBD99: SelectClipRgn.GDI32(?,?), ref: 004BBDD1
    • LPtoDP.GDI32(?,?,00000001), ref: 00453A5A
    • DPtoLP.GDI32(?,?,00000001), ref: 00453A81
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$ClipFillSelect$BeginClientCreateEmptyH_prologIndirectOffsetPaintRectangleWindow
    • String ID: 0b)u$2
    • API String ID: 2521159323-3765794826
    • Opcode ID: f87c1c05112e221a85c0b6d52c792f7f9117600fb5e3608a4e27643e8b3d30c4
    • Instruction ID: 30437d56553cd64bb71ffad172cdd35520f55c78af5b4af0e42e63b58240ff6a
    • Opcode Fuzzy Hash: f87c1c05112e221a85c0b6d52c792f7f9117600fb5e3608a4e27643e8b3d30c4
    • Instruction Fuzzy Hash: 37E12AB16087409FD324DF69C881B6BB7E5BBC8704F408A2EF59A83351DB74E908CB56
    APIs
    • GetCapture.USER32 ref: 0043F1FE
    • SetCapture.USER32(?,?,?,?,?,?,?,?,?,004C2E88,000000FF,0043EA3D,?,?,?,?), ref: 0043F21B
      • Part of subcall function 004BC070: __EH_prolog.LIBCMT ref: 004BC075
      • Part of subcall function 004BC070: GetDC.USER32(?), ref: 004BC09E
      • Part of subcall function 00452BF0: GetWindowExtEx.GDI32(?,?), ref: 00452C13
      • Part of subcall function 004BBF9E: GetWindowExtEx.GDI32(?,?), ref: 004BBFAF
      • Part of subcall function 004BBF9E: GetViewportExtEx.GDI32(?,?), ref: 004BBFBC
      • Part of subcall function 004BBF9E: MulDiv.KERNEL32(?,00000000,00000000), ref: 004BBFE1
      • Part of subcall function 004BBF9E: MulDiv.KERNEL32(?,00000000,00000000), ref: 004BBFFC
      • Part of subcall function 004BBB2F: SetMapMode.GDI32(?,?), ref: 004BBB48
      • Part of subcall function 004BBB2F: SetMapMode.GDI32(?,?), ref: 004BBB56
      • Part of subcall function 004BBAA4: SetROP2.GDI32(?,?), ref: 004BBABD
      • Part of subcall function 004BBAA4: SetROP2.GDI32(?,?), ref: 004BBACB
      • Part of subcall function 004BBA48: SetBkMode.GDI32(?,?), ref: 004BBA61
      • Part of subcall function 004BBA48: SetBkMode.GDI32(?,?), ref: 004BBA6F
      • Part of subcall function 004BC385: __EH_prolog.LIBCMT ref: 004BC38A
      • Part of subcall function 004BC385: CreatePen.GDI32(?,?,?), ref: 004BC3AD
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,00000000), ref: 004BB98E
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,?), ref: 004BB9A4
    • GetCapture.USER32 ref: 0043F2E1
    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0043F300
    • DispatchMessageA.USER32(?), ref: 0043F341
    • DispatchMessageA.USER32(?), ref: 0043F35D
    • ScreenToClient.USER32(?,?), ref: 0043F3A4
    • GetCapture.USER32 ref: 0043F3CC
    • ReleaseCapture.USER32 ref: 0043F3F4
    • ReleaseCapture.USER32 ref: 0043F450
    • DPtoLP.GDI32 ref: 0043F494
    • InvalidateRect.USER32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,?,?), ref: 0043F51D
    • InvalidateRect.USER32(?,00000000,00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0043F5AB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Capture$Mode$Message$DispatchH_prologInvalidateObjectRectReleaseSelectWindow$ClientCreateScreenViewport
    • String ID: !K
    • API String ID: 453157188-3405271303
    • Opcode ID: a57f673c36a88599c5f8e2f9ed2e8854b08599362c3585c46e12c957c511031b
    • Instruction ID: bcf1c97d089bdb712bb4913abef6ffedbc960091fa58fc27bc77eb6d6cbe84f1
    • Opcode Fuzzy Hash: a57f673c36a88599c5f8e2f9ed2e8854b08599362c3585c46e12c957c511031b
    • Instruction Fuzzy Hash: CDB1A471504700ABD314EF65C885F6FB7E9BF88704F10192EF592832A1DB78E949CB6A
    APIs
    • GetModuleHandleA.KERNEL32(USER32,?,?,?,004A357A), ref: 004A3463
    • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 004A347B
    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 004A348C
    • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 004A349D
    • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 004A34AE
    • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 004A34BF
    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 004A34D0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: AddressProc$HandleModule
    • String ID: EnumDisplayMonitors$GetMonitorInfoA$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
    • API String ID: 667068680-2376520503
    • Opcode ID: f3a9ff96a37f3de8b4a616e3441982232046edf7c3fff0b90340b3d17e0873f9
    • Instruction ID: 30b5f126c5d87352768c57309e0dad0c6ef46ad529c19d2c84e0994c5a0106c6
    • Opcode Fuzzy Hash: f3a9ff96a37f3de8b4a616e3441982232046edf7c3fff0b90340b3d17e0873f9
    • Instruction Fuzzy Hash: 051193B1A01241EBC3119F25ACC5A2ABFE5B36D703370857FE004D2750E7B88789AF69
    APIs
    • CreateRectRgn.GDI32(?,?,?,?), ref: 004284FE
    • GetClientRect.USER32(?,?), ref: 00428599
    • CreateRectRgn.GDI32 ref: 0042860A
    • CombineRgn.GDI32(?,?,EK,00000004), ref: 0042863B
    • SetRect.USER32(?,00000000,?,?,?), ref: 00428692
    • IntersectRect.USER32(?,?,?), ref: 0042869F
    • IsRectEmpty.USER32(?), ref: 004286CA
    • __ftol.LIBCMT ref: 004287A8
    • __ftol.LIBCMT ref: 004287B5
    • CreateRectRgn.GDI32(00000000,?,00000000,00000000), ref: 0042880E
    • CombineRgn.GDI32(?,?,EK,00000004), ref: 0042883F
      • Part of subcall function 004329C0: SetStretchBltMode.GDI32(?,00000000), ref: 004329D4
      • Part of subcall function 004329C0: CreateCompatibleDC.GDI32(?), ref: 00432A59
      • Part of subcall function 004329C0: CreateCompatibleDC.GDI32(?), ref: 00432A71
      • Part of subcall function 004329C0: GetObjectA.GDI32(?,00000018,?), ref: 00432AB2
      • Part of subcall function 004329C0: CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 00432AC8
    • FillRgn.GDI32(?,?,00000000), ref: 004288BC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Create$CombineCompatible__ftol$BitmapClientEmptyFillIntersectModeObjectStretch
    • String ID: EK
    • API String ID: 3212946024-2789900426
    • Opcode ID: 71cb89fa28403f3d1a0a922b0e28999befb3fed09ed9abc265bf736848854e61
    • Instruction ID: 9eb4af10ac575a2f5df9ff98c071c6446094120c32b58c848425b238834204d7
    • Opcode Fuzzy Hash: 71cb89fa28403f3d1a0a922b0e28999befb3fed09ed9abc265bf736848854e61
    • Instruction Fuzzy Hash: BCD18CB1608340AFC314DF25C884E6FBBE9BBC8744F548A1EF88583251DB74E945CB66
    APIs
    • GetProfileStringA.KERNEL32(windows,device,,,,,?,000001F4), ref: 0043868F
    • GetProfileStringA.KERNEL32(devices,00000000,00507790,?,00001000), ref: 004386C3
    • GetProfileStringA.KERNEL32(devices,?,,,,,?,000000C8), ref: 0043874A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ProfileString
    • String ID: ,,,$device$devices$none$windows
    • API String ID: 1468043044-528626633
    • Opcode ID: 6b22dcacb758ea7e953d24d7bf1a5b1035d91cfea745d7aa41765b6c2e1c9332
    • Instruction ID: b29221ad40a32953ce25b98b083ee8b8259ad6b5dcde242ff8045bbe9ee14a03
    • Opcode Fuzzy Hash: 6b22dcacb758ea7e953d24d7bf1a5b1035d91cfea745d7aa41765b6c2e1c9332
    • Instruction Fuzzy Hash: 16B1B6741083819FD324EB65C881FDBB7D4AF99758F400A1EF89583391DB78A904CB6B
    APIs
      • Part of subcall function 004BF1AC: TlsGetValue.KERNEL32(00533A2C,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6,?,00000000,?,004B2B99,00000000,00000000,00000000,00000000), ref: 004BF1EB
    • RegisterClipboardFormatA.USER32(commdlg_LBSelChangedNotify), ref: 004B3814
    • RegisterClipboardFormatA.USER32(commdlg_ShareViolation), ref: 004B3820
    • RegisterClipboardFormatA.USER32(commdlg_FileNameOK), ref: 004B382C
    • RegisterClipboardFormatA.USER32(commdlg_ColorOK), ref: 004B3838
    • RegisterClipboardFormatA.USER32(commdlg_help), ref: 004B3844
    • RegisterClipboardFormatA.USER32(commdlg_SetRGBColor), ref: 004B3850
      • Part of subcall function 004B97D4: SetWindowLongA.USER32(?,000000FC,00000000), ref: 004B9803
    • SendMessageA.USER32(?,00000111,0000E146,00000000), ref: 004B3943
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ClipboardFormatRegister$LongMessageSendValueWindow
    • String ID: commdlg_ColorOK$commdlg_FileNameOK$commdlg_LBSelChangedNotify$commdlg_SetRGBColor$commdlg_ShareViolation$commdlg_help
    • API String ID: 3913284445-3888057576
    • Opcode ID: 95da53dff740d27ebd9d5cefe6eb6e14a8cce357d66334456292643dda814945
    • Instruction ID: a36e2ef493e0363750ed31323f170160233666201a66fd65d11094c641b030fb
    • Opcode Fuzzy Hash: 95da53dff740d27ebd9d5cefe6eb6e14a8cce357d66334456292643dda814945
    • Instruction Fuzzy Hash: 8541D670600204AFDF309F2ADC45BEE3BA1EB54751F10082BF80557360CB789A84DBBA
    APIs
      • Part of subcall function 0042D040: EnumDisplaySettingsA.USER32(00000000,000000FF,?), ref: 0042D04F
    • SetStretchBltMode.GDI32(?,00000000), ref: 004329D4
    • CreateCompatibleDC.GDI32(?), ref: 00432A59
    • CreateCompatibleDC.GDI32(?), ref: 00432A71
    • GetObjectA.GDI32(?,00000018,?), ref: 00432AB2
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 00432AC8
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00432B26
    • StretchBlt.GDI32(?,000000FF,?,?,?,?,00000000,00000000,?,?,00660046), ref: 00432B7F
    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,008800C6), ref: 00432BB9
    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 00432BF3
    • CreateCompatibleDC.GDI32(?), ref: 00432C6B
    • SelectObject.GDI32(00000000,?), ref: 00432C78
    • StretchBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?), ref: 00432CBB
    • SelectObject.GDI32(00000000,?), ref: 00432CC7
    • DeleteDC.GDI32(00000000), ref: 00432CCE
    • DrawIconEx.USER32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 00432D0D
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Stretch$Create$CompatibleObject$Select$BitmapDeleteDisplayDrawEnumIconModeSettings
    • String ID:
    • API String ID: 1298110373-0
    • Opcode ID: 17b0c42d6885cc72e4cd221ffc87179e9b5915fe35b2003db02d55f8efbe42b7
    • Instruction ID: 732cebb6d0bab4f53a8b00d8d06611bd5af29e7a4c4710a67fc940b8051f8478
    • Opcode Fuzzy Hash: 17b0c42d6885cc72e4cd221ffc87179e9b5915fe35b2003db02d55f8efbe42b7
    • Instruction Fuzzy Hash: 3EB14871204700AFD260DB65CD85F6BB3E9FB88714F208A1DF696D7290DB74ED018BA6
    APIs
    • CopyRect.USER32(?,?), ref: 00444E26
      • Part of subcall function 004BC3D5: __EH_prolog.LIBCMT ref: 004BC3DA
      • Part of subcall function 004BC3D5: CreateSolidBrush.GDI32(?), ref: 004BC3F7
    • FillRect.USER32(?,?,00000000), ref: 00444E64
    • GetSystemMetrics.USER32(0000002E), ref: 00444E8D
    • GetSystemMetrics.USER32(0000002D), ref: 00444E93
    • DrawFrameControl.USER32(?,?,00000003,?), ref: 00444F06
    • DrawEdge.USER32(?,?,0000000A,0000000F), ref: 00444F19
    • InflateRect.USER32(?,00FFFFFD,00000001), ref: 00444F34
    • GetSysColor.USER32(0000000F), ref: 00444F58
    • Rectangle.GDI32(?,?,?,?,?), ref: 00444FAB
    • OffsetRect.USER32(?,00000001,00000001), ref: 00445015
    • GetSysColor.USER32(00000014), ref: 0044501B
    • OffsetRect.USER32(?,000000FF,000000FF), ref: 00445043
    • GetSysColor.USER32(00000010), ref: 00445049
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00445092
    • DrawFocusRect.USER32(?,?), ref: 004450A1
      • Part of subcall function 004B7A75: GetWindowTextLengthA.USER32(?), ref: 004B7A82
      • Part of subcall function 004B7A75: GetWindowTextA.USER32(?,00000000,00000000), ref: 004B7A9A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$ColorDraw$InflateMetricsOffsetSystemTextWindow$BrushControlCopyCreateEdgeFillFocusFrameH_prologLengthRectangleSolid
    • String ID:
    • API String ID: 4239342997-0
    • Opcode ID: 2a82b4b0dd6d8da0b38fd82fe8fca3203fbb1b8793f3c3952bd8ea94fc558e82
    • Instruction ID: 49a72ab12fcdc2d6032405124e2a8871984b2192d030dbc5794af9c6aab693b0
    • Opcode Fuzzy Hash: 2a82b4b0dd6d8da0b38fd82fe8fca3203fbb1b8793f3c3952bd8ea94fc558e82
    • Instruction Fuzzy Hash: F0A17674208745AFD304DF64C888E6ABBE9FF88714F004A1DF59687390DBB4E945CBA6
    APIs
    • GetObjectA.GDI32(?,00000018,?), ref: 0043056D
    • MulDiv.KERNEL32(?,?,00000064), ref: 004305A2
    • MulDiv.KERNEL32(?,?,00000064), ref: 004305CD
    • GetDeviceCaps.GDI32 ref: 00430607
    • GetSystemPaletteEntries.GDI32(?,00000000,000000FF,00000004), ref: 00430641
    • CreatePalette.GDI32(00000000), ref: 0043064C
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 004306AC
    • CreateCompatibleDC.GDI32(?), ref: 004306DF
    • CreateCompatibleDC.GDI32(?), ref: 00430718
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 0043077B
    • GlobalFree.KERNEL32(00000000), ref: 00430843
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Create$Compatible$Palette$BitmapCapsDeviceEntriesFreeGlobalObjectStretchSystem
    • String ID: !K
    • API String ID: 3563226738-3405271303
    • Opcode ID: 53120f1a832a30ffad92112a31bb671031a1d68b3d91a20d06c8e6ffea0a48fd
    • Instruction ID: 9c2ae3ab6c4876c392fd83e610a567c39b90009df96435532e27a481fddcb61b
    • Opcode Fuzzy Hash: 53120f1a832a30ffad92112a31bb671031a1d68b3d91a20d06c8e6ffea0a48fd
    • Instruction Fuzzy Hash: EA919471508344ABC310EF65C895F6FB7E8FB99704F104A1EF69583281DB78E904CBAA
    APIs
    • CopyRect.USER32(?,00000000), ref: 0043BFB7
    • IsRectEmpty.USER32(?), ref: 0043BFC2
    • GetClientRect.USER32(00000000,?), ref: 0043C001
    • DPtoLP.GDI32(?,?,00000002), ref: 0043C013
    • LPtoDP.GDI32(?,?,00000002), ref: 0043C050
    • CreateRectRgnIndirect.GDI32(?), ref: 0043C068
    • OffsetRect.USER32(?,?,?), ref: 0043C08D
    • LPtoDP.GDI32(?,?,00000002), ref: 0043C09F
      • Part of subcall function 004BC385: __EH_prolog.LIBCMT ref: 004BC38A
      • Part of subcall function 004BC385: CreatePen.GDI32(?,?,?), ref: 004BC3AD
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,00000000), ref: 004BB98E
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,?), ref: 004BB9A4
      • Part of subcall function 004BB930: GetStockObject.GDI32(?), ref: 004BB939
      • Part of subcall function 004BB930: SelectObject.GDI32(00411F45,00000000), ref: 004BB953
      • Part of subcall function 004BB930: SelectObject.GDI32(00411F45,00000000), ref: 004BB95E
      • Part of subcall function 004BBAA4: SetROP2.GDI32(?,?), ref: 004BBABD
      • Part of subcall function 004BBAA4: SetROP2.GDI32(?,?), ref: 004BBACB
    • Rectangle.GDI32(?,?,?,?,?), ref: 0043C113
      • Part of subcall function 004BBD99: SelectClipRgn.GDI32(?,00000000), ref: 004BBDBB
      • Part of subcall function 004BBD99: SelectClipRgn.GDI32(?,?), ref: 004BBDD1
      • Part of subcall function 004BC36F: DeleteObject.GDI32(00000000), ref: 004BC37E
      • Part of subcall function 004BC0E2: __EH_prolog.LIBCMT ref: 004BC0E7
      • Part of subcall function 004BC0E2: ReleaseDC.USER32(?,00000000), ref: 004BC106
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ObjectSelect$Rect$ClipCreateH_prolog$ClientCopyDeleteEmptyIndirectOffsetRectangleReleaseStock
    • String ID: !K$0b)u$EK
    • API String ID: 2841338838-1513951853
    • Opcode ID: 7c6ada431c87cc00a7ae7a6f85f64cde59e9eeca772b42b998895c38f8f2f64b
    • Instruction ID: 828c3a915f7aaba58f62d396d373a780b7bf9e5d26f4f67b87ec60134fb92666
    • Opcode Fuzzy Hash: 7c6ada431c87cc00a7ae7a6f85f64cde59e9eeca772b42b998895c38f8f2f64b
    • Instruction Fuzzy Hash: B0614E711087409FC314DF65C885E6BBBE9EFC8718F408A1DF59693291DBB8E904CBA6
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5b5faa7d93065ba11cac7fbf1ee7a2e13608dd02f723b466a20a21c990ae3aa4
    • Instruction ID: 382fb46e6c28d9fd79ca8c9d3e576d165bd766c6498e1deaebbc00000fc0c9a5
    • Opcode Fuzzy Hash: 5b5faa7d93065ba11cac7fbf1ee7a2e13608dd02f723b466a20a21c990ae3aa4
    • Instruction Fuzzy Hash: 71E177723007059FC720DF68D884AABB3E9EBC8315F10892EF59AC7341D77AE8558B65
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Parent$ActiveChildEnabledFocusUpdateVisible
    • String ID:
    • API String ID: 983273251-0
    • Opcode ID: a98bd25438dae7c7289637e0a7e29b91b91060ecd9f11c43117a48ed3cdfb433
    • Instruction ID: 4bd4014e3c73fc5f249112eda3715d0a99f8b7d4bdc76d5eddf59be085bff686
    • Opcode Fuzzy Hash: a98bd25438dae7c7289637e0a7e29b91b91060ecd9f11c43117a48ed3cdfb433
    • Instruction Fuzzy Hash: D1519171B047559BCB249FA2E844A5FBBE8FB44340F80492FF94593210DB38EC45CB69
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • IsRectEmpty.USER32(?), ref: 004158E7
    • GetClientRect.USER32(?,?), ref: 004158FF
    • InflateRect.USER32(?,?,?), ref: 004159BD
    • IntersectRect.USER32(?,?,?), ref: 00415A27
    • CreateRectRgn.GDI32(?,?,?,?), ref: 00415A41
    • FillRgn.GDI32(?,?,?), ref: 00415C00
    • GetCurrentObject.GDI32(?,00000006), ref: 00415C7F
      • Part of subcall function 004BB930: GetStockObject.GDI32(?), ref: 004BB939
      • Part of subcall function 004BB930: SelectObject.GDI32(00411F45,00000000), ref: 004BB953
      • Part of subcall function 004BB930: SelectObject.GDI32(00411F45,00000000), ref: 004BB95E
    • OffsetRect.USER32(?,00000001,00000001), ref: 00415D5D
    • OffsetRect.USER32(?,00000002,00000002), ref: 00415DF1
    • OffsetRect.USER32(?,00000001,00000001), ref: 00415DA4
      • Part of subcall function 004BBB00: SetTextColor.GDI32(?,?), ref: 004BBB1A
      • Part of subcall function 004BBB00: SetTextColor.GDI32(?,?), ref: 004BBB28
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Object$Offset$ColorSelectText$BeginClientClipCreateCurrentEmptyFillH_prologInflateIntersectPaintStock
    • String ID: !K
    • API String ID: 4264835570-3405271303
    • Opcode ID: 8b245a1939de42c7aa72f9f126fa5c8d94ed7b5f4c23a817db494e2a15de2728
    • Instruction ID: 904a7627de542a74fc11a886b7f54d450d5eafdf0ffc547f762f46b88bb54919
    • Opcode Fuzzy Hash: 8b245a1939de42c7aa72f9f126fa5c8d94ed7b5f4c23a817db494e2a15de2728
    • Instruction Fuzzy Hash: 2A024771508780DFD324DF65C884AEBB7E9BFD8304F40491EF18687250EB78A985CB66
    APIs
    • GetClientRect.USER32(?,?), ref: 0041D11F
    • CreateCompatibleBitmap.GDI32 ref: 0041D17B
    • CreateCompatibleDC.GDI32(?), ref: 0041D1AB
    • CreateRectRgn.GDI32(00000000,00000000,00000001,?), ref: 0041D240
    • SetRect.USER32(?,00000000,00000000,00000001,?), ref: 0041D269
      • Part of subcall function 00415F50: __ftol.LIBCMT ref: 00416075
      • Part of subcall function 00415F50: __ftol.LIBCMT ref: 00416082
    • FillRgn.GDI32(?,?,?), ref: 0041D2E6
    • PatBlt.GDI32(?,00000000,00000000,00000001,?,00F00021), ref: 0041D359
      • Part of subcall function 00411510: GetSysColor.USER32(0000000F), ref: 0041151D
      • Part of subcall function 004BC3D5: __EH_prolog.LIBCMT ref: 004BC3DA
      • Part of subcall function 004BC3D5: CreateSolidBrush.GDI32(?), ref: 004BC3F7
    • GetObjectA.GDI32(?,00000018,?), ref: 0041D3D5
    • CreateCompatibleDC.GDI32(?), ref: 0041D413
    • BitBlt.GDI32(?,00000000,00000000,00000001,?,?,00000000,00000000,00CC0020), ref: 0041D472
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Create$CompatibleRect$__ftol$BitmapBrushClientColorFillH_prologObjectSolid
    • String ID: !K
    • API String ID: 2289681609-3405271303
    • Opcode ID: c74065bd95cfe5d0d26fc975a1b99916fa88e27c97b3205d1e506bc47ef562ba
    • Instruction ID: 59704fb123a603bed9161cc1daa8395750608d093278f096ef4a0b6251094e99
    • Opcode Fuzzy Hash: c74065bd95cfe5d0d26fc975a1b99916fa88e27c97b3205d1e506bc47ef562ba
    • Instruction Fuzzy Hash: 9BC19FB15083419FC314DB65C885FAFB7E8AF88708F04491EF59AC3251EB78E849CB66
    APIs
    • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00506D88,00000000), ref: 004237A4
    • LoadLibraryA.KERNEL32(?,?,00000000,?,?,?,004E4D0C,?,?,?,?,?,?,00000000,00506D88,00000000), ref: 004237E1
    • GetProcAddress.KERNEL32(00000000,DllRegisterServer), ref: 00423817
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,00000000,00506D88,00000000), ref: 00423822
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,00000000,00506D88,00000000), ref: 00423830
    • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 0042393D
    • RegisterTypeLib.OLEAUT32(00000000,00000000), ref: 00423972
    • CLSIDFromString.OLE32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00506D88,00000000), ref: 00423A37
    • UnRegisterTypeLib.OLEAUT32(?,00000000,00000000,00000000,00000001), ref: 00423A53
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Library$LoadType$FreeRegister$AddressFromProcString
    • String ID: DllRegisterServer$DllUnregisterServer
    • API String ID: 2476498075-2931954178
    • Opcode ID: 177d68d017236563fd0f777e579d060566dbd66532d4484f21da7a38e3932ed9
    • Instruction ID: afbe405f6b6ecd39ebb82d06c2cd25f9d949442d9d08c66c4377ac4b7f786dc1
    • Opcode Fuzzy Hash: 177d68d017236563fd0f777e579d060566dbd66532d4484f21da7a38e3932ed9
    • Instruction Fuzzy Hash: B0B1D7B0A00219ABDB10EFA4D845FEFB3B8EF44314F50451EF815AB281DB7CAA45CB65
    APIs
    • CompareStringW.KERNEL32(00000000,00000000,004D5C6C,00000001,004D5C6C,00000001,00000000,0246119C,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,004A40C2), ref: 004B13AE
    • CompareStringA.KERNEL32(00000000,00000000,004D5C68,00000001,004D5C68,00000001), ref: 004B13CB
    • CompareStringA.KERNEL32(00463596,00000000,00000000,00000000,004A40C2,00000000,00000000,0246119C,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,004A40C2), ref: 004B1429
    • GetCPInfo.KERNEL32(00000000,00000000,00000000,0246119C,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,004A40C2,00000000), ref: 004B147A
    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000), ref: 004B14F9
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,?,?), ref: 004B155A
    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,?,00000000,00000000), ref: 004B156D
    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 004B15B9
    • CompareStringW.KERNEL32(00463596,00000000,00000000,00000000,?,00000000,?,00000000), ref: 004B15D1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ByteCharCompareMultiStringWide$Info
    • String ID: h\M$l\M
    • API String ID: 1651298574-2397351120
    • Opcode ID: 670ca7ee67a206c59ac224fc19d67b659b74eb283972cff245e5551d59dd5f40
    • Instruction ID: 151ce1fa9c32d1bcf6b4b065a368749d2143a78b1a1549488385fae65898e8fc
    • Opcode Fuzzy Hash: 670ca7ee67a206c59ac224fc19d67b659b74eb283972cff245e5551d59dd5f40
    • Instruction Fuzzy Hash: 2B71C271900249AFCF218F91DCA1DEF7BB9EB05314F94412BF852A2270C7399951DBB9
    APIs
    • LCMapStringW.KERNEL32(00000000,00000100,004D5C6C,00000001,00000000,00000000,74DEE860,00537CE4,?,?,?,004A57ED,?,?,?,00000000), ref: 004AC726
    • LCMapStringA.KERNEL32(00000000,00000100,004D5C68,00000001,00000000,00000000,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AC742
    • LCMapStringA.KERNEL32(?,?,?,WJ,?,?,74DEE860,00537CE4,?,?,?,004A57ED,?,?,?,00000000), ref: 004AC78B
    • MultiByteToWideChar.KERNEL32(?,?,?,WJ,00000000,00000000,74DEE860,00537CE4,?,?,?,004A57ED,?,?,?,00000000), ref: 004AC7C3
    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AC81B
    • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AC831
    • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AC864
    • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AC8CC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: String$ByteCharMultiWide
    • String ID: WJ$|S
    • API String ID: 352835431-1774375694
    • Opcode ID: 5f5d2636e7075ce8abb222ea3ab2c2594fe1a7452655e910dc683c15d6369c1e
    • Instruction ID: 90349d7fb4d8ae5bd1ffdc894957fd0ed116e8bf31109b31cf4344b0c351c666
    • Opcode Fuzzy Hash: 5f5d2636e7075ce8abb222ea3ab2c2594fe1a7452655e910dc683c15d6369c1e
    • Instruction Fuzzy Hash: 5251AC71900209EFCF619F95CC85EEF7BB8FB6AB51F10412AF901A1260D33A9D50DB68
    APIs
    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,?), ref: 00419BC8
    • lstrcatA.KERNEL32(?,\shell\open\command,80000000,.htm,?,?,?,?), ref: 00419C07
    • lstrlenA.KERNEL32(?), ref: 00419C5C
    • lstrcatA.KERNEL32(00000000,004E4D20), ref: 00419CA5
    • lstrcatA.KERNEL32(00000000,?), ref: 00419CAD
    • WinExec.KERNEL32(?,?), ref: 00419CB5
      • Part of subcall function 004B56A7: InterlockedDecrement.KERNEL32(-000000F4), ref: 004B56BB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: lstrcat$DecrementExecExecuteInterlockedShelllstrlen
    • String ID: "%1"$.htm$\shell\open\command$mailto:$open
    • API String ID: 51986957-2182632014
    • Opcode ID: 158136ad879311c30589511cb8d6456e4ff847f5dbc4e1fe2d1503ec4994f3e0
    • Instruction ID: 2d80229a4ab24653fe7730edb8d81be5a4f4b721de138a97458bb43061ed783f
    • Opcode Fuzzy Hash: 158136ad879311c30589511cb8d6456e4ff847f5dbc4e1fe2d1503ec4994f3e0
    • Instruction Fuzzy Hash: D041E431244742ABC324EB65DC80FEBB3E4AB94750F104A1EF59593280E778AC45CBAA
    APIs
    • InflateRect.USER32(?,?,?), ref: 00431C26
      • Part of subcall function 00431950: SetRect.USER32(?,00000000,00000032,00000032,?), ref: 00431A39
      • Part of subcall function 00431950: OffsetRect.USER32(?,?,?), ref: 00431A46
      • Part of subcall function 00431950: IntersectRect.USER32(?,?,?), ref: 00431A62
      • Part of subcall function 00431950: IsRectEmpty.USER32(?), ref: 00431A6D
    • InflateRect.USER32(?,?,?), ref: 00431C99
    • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00431E9D
    • GetClipRgn.GDI32(?,00000000), ref: 00431EAC
    • CreatePolygonRgn.GDI32 ref: 00431F2A
    • SelectClipRgn.GDI32(?,?), ref: 0043200D
    • CreatePolygonRgn.GDI32(?,00000005,00000002), ref: 00432030
    • SelectClipRgn.GDI32(?,?), ref: 004320B1
    • DeleteObject.GDI32(?), ref: 004320C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$ClipCreate$InflatePolygonSelect$DeleteEmptyIntersectObjectOffset
    • String ID: gfff
    • API String ID: 1105800552-1553575800
    • Opcode ID: 9e7bb3d75ccc64f2470bd2f69dbdbe9fec954d8071b2a7f1fe9c0ab9e7372e01
    • Instruction ID: 4fffa796f9c627ac5700dcb07f384e49138b0eb9d169a75bfeef2a415bf30e8a
    • Opcode Fuzzy Hash: 9e7bb3d75ccc64f2470bd2f69dbdbe9fec954d8071b2a7f1fe9c0ab9e7372e01
    • Instruction Fuzzy Hash: ABF117746083419FD364CF19C980B6BBBE5BBC9704F108A2EF99987360E774A845CF56
    APIs
    • __EH_prolog.LIBCMT ref: 004B64A6
    • GetSystemMetrics.USER32(0000002A), ref: 004B6557
    • GlobalLock.KERNEL32(?,?,00000000,?,?), ref: 004B65E1
    • CreateDialogIndirectParamA.USER32(?,?,?,Function_000B62E9,00000000), ref: 004B6613
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CreateDialogGlobalH_prologIndirectLockMetricsParamSystem
    • String ID: Helv$MS Sans Serif$MS Shell Dlg
    • API String ID: 2364537584-2894235370
    • Opcode ID: f23e2d92ea716db406169ea03797faf8a809055094cde564b15bacaaa998ad31
    • Instruction ID: e64f00e1eb1cf934841bbb1f6185592c1a9089b7527c6f6ddcc8e5fb16b9c31a
    • Opcode Fuzzy Hash: f23e2d92ea716db406169ea03797faf8a809055094cde564b15bacaaa998ad31
    • Instruction Fuzzy Hash: B1618E31A0020AEFCF14EFA5D8859EEBBB1FF14305F21443FE505A2291DB789A51CB69
    APIs
    • GetTextExtentPoint32A.GDI32(?,?,?,00000090), ref: 0045509F
    • GetTextExtentPoint32A.GDI32(?,?,?,00000090), ref: 004550C4
    • GetWindowRect.USER32(?,?), ref: 0045514E
    • SetRect.USER32(00000080,?,?,?,?), ref: 00455183
    • SetRect.USER32(00000070,?,?,?,?), ref: 004551C8
    • SetRect.USER32(00000060,?,?,?,?), ref: 0045523B
    • GetSystemMetrics.USER32(00000001), ref: 00455266
    • GetSystemMetrics.USER32(00000000), ref: 0045526C
    • OffsetRect.USER32(00000080,00000000,00000000), ref: 00455284
    • OffsetRect.USER32(00000080,00000000,00000000), ref: 00455292
    • OffsetRect.USER32(00000080,00000000,00000000), ref: 004552A4
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Offset$ExtentMetricsPoint32SystemText$Window
    • String ID:
    • API String ID: 1551820068-0
    • Opcode ID: 235661f1b19a081a8e932bebb3957b2297ee016cb4944081ee03fd52c5313fb7
    • Instruction ID: f6187045d4614e6b0a9593fb52db526b7ae2e0ecd4f1cd690813b6edb028f6b0
    • Opcode Fuzzy Hash: 235661f1b19a081a8e932bebb3957b2297ee016cb4944081ee03fd52c5313fb7
    • Instruction Fuzzy Hash: 0C914670200B05AFD318CF29C995E6AF7E6FB88700F148A2DA95AC7755EB74FC098B54
    APIs
    • GetClientRect.USER32(?,?), ref: 0044731E
    • FillRect.USER32(?,?,00000000), ref: 0044737E
    • FillRect.USER32(?,?,00000000), ref: 004473EE
      • Part of subcall function 004BC3D5: __EH_prolog.LIBCMT ref: 004BC3DA
      • Part of subcall function 004BC3D5: CreateSolidBrush.GDI32(?), ref: 004BC3F7
    • FillRect.USER32(?,?,00000000), ref: 00447465
    • CreateCompatibleDC.GDI32(?), ref: 0044748D
    • SelectObject.GDI32(00000000,?), ref: 004474A3
    • SetStretchBltMode.GDI32(?,00000000), ref: 004474D5
    • StretchBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00447508
    • BitBlt.GDI32(?,00000000,?,?,?,00000000,00000000,00000000,00CC0020), ref: 00447533
    • SelectObject.GDI32(00000000,?), ref: 0044753F
    • DeleteDC.GDI32(00000000), ref: 0044754C
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Fill$CreateObjectSelectStretch$BrushClientCompatibleDeleteH_prologModeSolid
    • String ID:
    • API String ID: 1645634290-0
    • Opcode ID: 15f51d368038fe63d918547a1e2dae3c30bf06ab6a5ca4ee2b8a863a705ffeb6
    • Instruction ID: aaf3df16af4bceb0891c53b2c2d1c48900d0a4f08a455647602f8fb1322a5f6e
    • Opcode Fuzzy Hash: 15f51d368038fe63d918547a1e2dae3c30bf06ab6a5ca4ee2b8a863a705ffeb6
    • Instruction Fuzzy Hash: B7612DB5204701AFE724DF65C984F6BB7E9BF88704F00891EF95A87240DB34E906CB65
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Mode$ColorCurrentObject$FillPolyStretchText
    • String ID:
    • API String ID: 544274770-0
    • Opcode ID: 3ec680a315a8ec995a532adf4794f8715b9679bb4f6ea509aa0f5fc06d02ba39
    • Instruction ID: 1fed875718b3a3b370b126b64ca06eab5a774b4f978ca174bea6d8de44933f2d
    • Opcode Fuzzy Hash: 3ec680a315a8ec995a532adf4794f8715b9679bb4f6ea509aa0f5fc06d02ba39
    • Instruction Fuzzy Hash: 6D515FB1614B019BC764DB64C888FEBB3A5EF84305F154A1DE26B87260DF78F885CB58
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
    • GetClientRect.USER32(?,?), ref: 0044475D
    • CreateCompatibleBitmap.GDI32 ref: 00444792
    • CreateCompatibleDC.GDI32(?), ref: 004447C2
      • Part of subcall function 004BB919: SelectObject.GDI32(?,?), ref: 004BB921
    • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 004447FA
    • GetObjectA.GDI32(00000000,00000018,?), ref: 00444815
    • CreateCompatibleDC.GDI32(?), ref: 00444820
    • SelectObject.GDI32(00000000,00000000), ref: 00444830
    • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 00444853
    • SelectObject.GDI32(00000000,?), ref: 0044485F
    • DeleteDC.GDI32(00000000), ref: 00444862
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0044488B
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Object$CompatibleCreateSelect$BeginBitmapClientDeleteH_prologPaintRect
    • String ID:
    • API String ID: 1593221388-0
    • Opcode ID: 27bb66107624f5e38b3bf9d14ef1fca9daa0f40209f82169e2055ef77b337fc9
    • Instruction ID: 64047e55b7f3a68e5406390a2a883a2324bf637d19019594a46c0a125c13a844
    • Opcode Fuzzy Hash: 27bb66107624f5e38b3bf9d14ef1fca9daa0f40209f82169e2055ef77b337fc9
    • Instruction Fuzzy Hash: A3516E75608345AFD350DFA5DC89F6FBBE8EBC9704F04492DB58583281DBB8E8048B66
    APIs
    • GetWindowRect.USER32(00000000,?), ref: 0047A128
    • GetSysColor.USER32(0000000F), ref: 0047A15B
    • CreateSolidBrush.GDI32(00BD9E7B), ref: 0047A16B
    • FrameRect.USER32(?,?,00000000), ref: 0047A184
    • DeleteObject.GDI32(00000000), ref: 0047A187
    • InflateRect.USER32(?,000000FF,000000FF), ref: 0047A19C
    • GetSysColorBrush.USER32(?), ref: 0047A1AE
    • FrameRect.USER32(?,?,00000000), ref: 0047A1C1
    • InflateRect.USER32(?,000000FF,000000FF), ref: 0047A1CC
    • GetSystemMetrics.USER32(00000009), ref: 0047A1D0
    • FrameRect.USER32(00000001,?,00000000), ref: 0047A1EB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Frame$BrushColorInflate$CreateDeleteMetricsObjectSolidSystemWindow
    • String ID:
    • API String ID: 3415418889-0
    • Opcode ID: 9d0daf9d8f99e38c75343b7775a664ec9ff0a594c74acec8de176aae0421a4f9
    • Instruction ID: b72930e791edc3e34ccb8a0ad5a22d87b1d0dd13718b31e2cfd3c73c905d5aac
    • Opcode Fuzzy Hash: 9d0daf9d8f99e38c75343b7775a664ec9ff0a594c74acec8de176aae0421a4f9
    • Instruction Fuzzy Hash: 59414971108346AFC300DF29C884D6FB7E8FBC8714F048E1DF5A993294DA35E9498B6A
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • IsRectEmpty.USER32(?), ref: 0042C90D
    • GetSysColor.USER32(0000000F), ref: 0042C91E
      • Part of subcall function 004BC3D5: __EH_prolog.LIBCMT ref: 004BC3DA
      • Part of subcall function 004BC3D5: CreateSolidBrush.GDI32(?), ref: 004BC3F7
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,00000000), ref: 004BB98E
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,?), ref: 004BB9A4
    • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 0042C968
    • GetClientRect.USER32(?,?), ref: 0042C981
    • LoadBitmapA.USER32(?,?), ref: 0042C9B8
    • GetObjectA.GDI32(?,00000018,?), ref: 0042CA07
    • CreateCompatibleDC.GDI32(?), ref: 0042CA2D
    • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 0042CABF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Object$CreateH_prologRectSelect$BeginBitmapBrushClientClipColorCompatibleEmptyLoadPaintSolid
    • String ID: !K
    • API String ID: 1390316934-3405271303
    • Opcode ID: cdafde65befbecc551c122d9c89edde9f1177e238a3dd948595a4140757c14bd
    • Instruction ID: 94ac06ba339eba3dbe6a698271c9882734d29ce6361c41cbcd0f27d7939cdfc3
    • Opcode Fuzzy Hash: cdafde65befbecc551c122d9c89edde9f1177e238a3dd948595a4140757c14bd
    • Instruction Fuzzy Hash: 2A614D712083819FD314DB65C885FAFBBE9FBC4704F048A2DF59993281DB78A904CB66
    APIs
    • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,004A92E2,?,Microsoft Visual C++ Runtime Library,00012010,?,004D59DC,?,004D5A2C,?,?,?,Runtime Error!Program: ), ref: 004B0B42
    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004B0B5A
    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004B0B6B
    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004B0B78
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: AddressProc$LibraryLoad
    • String ID: ,ZM$GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
    • API String ID: 2238633743-2555032862
    • Opcode ID: 6eed69bef0bad6b841be6c2a964d9aed4f5a37d7e5fef71742537278c9196db4
    • Instruction ID: 2ccbe839c2fa37ab3b6937e8a611742b8f13f6e225a6f5eb8ba141c05254e460
    • Opcode Fuzzy Hash: 6eed69bef0bad6b841be6c2a964d9aed4f5a37d7e5fef71742537278c9196db4
    • Instruction Fuzzy Hash: 94014431704702AF87119FF5AC84E6B7EE8EBB4785305443BA605C2321EB78A849EF75
    APIs
    • VariantInit.OLEAUT32(?), ref: 0040E5BB
    • VariantInit.OLEAUT32(00000000), ref: 0040E5EA
    • VariantCopyInd.OLEAUT32(00000000), ref: 0040E5F2
    • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 0040E695
      • Part of subcall function 0042B750: RtlAllocateHeap.NTDLL(00560000,00000000,?), ref: 0042B761
    • VariantCopyInd.OLEAUT32(?), ref: 0040E875
    • VariantChangeType.OLEAUT32(00000000,?,00000000,?), ref: 0040E890
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Variant$CopyInit$AllocateArrayChangeElementHeapSafeType
    • String ID:
    • API String ID: 2026756349-0
    • Opcode ID: 669d2402d5bde8c958acd08ba2f69708c0a113abecd3ce215565b3cdb8d30735
    • Instruction ID: 4c3d88eb889cc562baf6b3401980fbab7f3039a8614402d07a4841e6bd4c7980
    • Opcode Fuzzy Hash: 669d2402d5bde8c958acd08ba2f69708c0a113abecd3ce215565b3cdb8d30735
    • Instruction Fuzzy Hash: EFD15DB56083418FC314DF16C841A6ABBE5FF88314F10893EF89997391D738E996CB96
    APIs
    • VariantInit.OLEAUT32(?), ref: 0040EE42
    • VariantClear.OLEAUT32 ref: 0040EEC5
    • SafeArrayPutElement.OLEAUT32 ref: 0040EF3F
    • VariantClear.OLEAUT32(?), ref: 0040EF4E
    • VariantCopyInd.OLEAUT32 ref: 0040EFD1
    • VariantChangeType.OLEAUT32(?,?,00000000,?), ref: 0040F125
    • VariantClear.OLEAUT32 ref: 0040F130
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Variant$Clear$ArrayChangeCopyElementInitSafeType
    • String ID:
    • API String ID: 2581279852-0
    • Opcode ID: 1df25a4d180b58888a2d93c15ac172467e19c65099eedf0c1f29e69003021224
    • Instruction ID: 197265d8b71e607d2f99ff2ab46e5803b058e1fc65e2d1018cf0c9797f484154
    • Opcode Fuzzy Hash: 1df25a4d180b58888a2d93c15ac172467e19c65099eedf0c1f29e69003021224
    • Instruction Fuzzy Hash: A2B1A175214702CBC724DF16D880A6BB7E4EF84304F14497FE8859B7A1E378E989CB5A
    APIs
    • CreateSolidBrush.GDI32(00FFFFFF), ref: 0042F46F
    • GetWindowRect.USER32(?), ref: 0042F499
    • GetStockObject.GDI32(00000005), ref: 0042F4C7
    • LoadCursorA.USER32(00000000,00007F00), ref: 0042F4D5
    • GetWindowRect.USER32(?,?), ref: 0042F543
    • GetWindowRect.USER32(?,?), ref: 0042F554
    • GetWindowRect.USER32(?,?), ref: 0042F569
    • GetSystemMetrics.USER32(00000001), ref: 0042F57F
    • GetWindowRect.USER32(?,?), ref: 0042F60A
    • OffsetRect.USER32(?,00000000,00000001), ref: 0042F624
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Window$BrushCreateCursorLoadMetricsObjectOffsetSolidStockSystem
    • String ID:
    • API String ID: 3805611468-0
    • Opcode ID: c9ee09039dc7919a31e0d2b105758830747773353c73bea17dbcbda1d1d460fb
    • Instruction ID: 11491c165a0a11f42c1d37cb1a52c36ad6bc6737e2c0e24a3634703799c92b5f
    • Opcode Fuzzy Hash: c9ee09039dc7919a31e0d2b105758830747773353c73bea17dbcbda1d1d460fb
    • Instruction Fuzzy Hash: 16A1CF70704701AFD714EF25C885F6FB7E6AB88704F90492EF6568B281DB78E8058B69
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • GetClientRect.USER32(?,?), ref: 0041CD1E
    • IntersectRect.USER32(?,?,?), ref: 0041CD36
    • IsRectEmpty.USER32(?), ref: 0041CD66
    • GetObjectA.GDI32(?,00000018,?), ref: 0041CD9D
    • CreateCompatibleDC.GDI32(?), ref: 0041CDC3
    • IntersectRect.USER32(?,?,?), ref: 0041CE18
    • IsRectEmpty.USER32(?), ref: 0041CE23
    • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 0041CE61
    • DPtoLP.GDI32(?,?,00000002), ref: 0041CEE6
    • IsWindow.USER32(?), ref: 0041CF48
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$EmptyIntersect$BeginClientClipCompatibleCreateH_prologObjectPaintWindow
    • String ID:
    • API String ID: 29348440-0
    • Opcode ID: 34b48d8772fe510f790f6b03fcd6702e25e8498187ed524edf49f3bc1ecf84e9
    • Instruction ID: 913801c98ceeba6dee9f5c41f137b95c8bce8becdca8ba93c2032f293785ac32
    • Opcode Fuzzy Hash: 34b48d8772fe510f790f6b03fcd6702e25e8498187ed524edf49f3bc1ecf84e9
    • Instruction Fuzzy Hash: 1E813CB55487419FC324DF65C884EABB7E9FBC8704F008E2EF59A83250D734A909CB66
    APIs
    • GetWindowRect.USER32(?,?), ref: 0042DBFD
    • GetWindowRect.USER32(?,?), ref: 0042DC0C
    • IntersectRect.USER32(?,?,?), ref: 0042DC65
    • EqualRect.USER32(?,?), ref: 0042DC95
    • GetWindowRect.USER32(?,?), ref: 0042DCB3
    • OffsetRect.USER32(?,?,?), ref: 0042DD2A
    • OffsetRect.USER32(?,?,00000000), ref: 0042DD44
    • OffsetRect.USER32(?,?,00000000), ref: 0042DD5C
    • OffsetRect.USER32(?,00000000,?), ref: 0042DD76
    • OffsetRect.USER32(?,00000000,?), ref: 0042DD8E
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Offset$Window$EqualIntersect
    • String ID:
    • API String ID: 2638238157-0
    • Opcode ID: 0a7e89b57e91288b4e1d50f7de616cc781b0a4589392cc6f684304c1e137a9e1
    • Instruction ID: e27cb0f653d2e8080e4fc0bd2d439da0d6a894986ac5eeb05247f14d5a355b73
    • Opcode Fuzzy Hash: 0a7e89b57e91288b4e1d50f7de616cc781b0a4589392cc6f684304c1e137a9e1
    • Instruction Fuzzy Hash: EE511AB16183029FC708CF29D98096FBBE9ABC8744F404A2EF986D3354DA74ED45CB56
    APIs
    • GetSystemMetrics.USER32(0000002E), ref: 004451B1
    • GetSystemMetrics.USER32(0000002D), ref: 004451B7
    • GetSystemMetrics.USER32(0000000A), ref: 004451BD
    • GetSystemMetrics.USER32(0000000A), ref: 004451C8
    • GetSystemMetrics.USER32(00000009), ref: 004451D6
    • GetSystemMetrics.USER32(00000009), ref: 004451E2
    • GetWindowRect.USER32(?,?), ref: 00445207
    • GetParent.USER32(?), ref: 0044520D
    • GetWindowRect.USER32(?,00000000), ref: 00445232
    • SetRect.USER32(?,?,00000000,?,?), ref: 00445264
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MetricsSystem$Rect$Window$Parent
    • String ID:
    • API String ID: 3457858938-0
    • Opcode ID: c0e0b2f9682405f3cf5977a6fd815351065c7e50e7b696fcebb585ed8130ad82
    • Instruction ID: 30fad2f9fca2dc95b394ad9c85671716486f9e281846a3aba7a90df1e55815c0
    • Opcode Fuzzy Hash: c0e0b2f9682405f3cf5977a6fd815351065c7e50e7b696fcebb585ed8130ad82
    • Instruction Fuzzy Hash: B1217471A047096FDB04DF68EC4596F77A9EBC4700F00492EB905D7285DBB4ED098BA6
    APIs
    • GetStringTypeW.KERNEL32(00000001,004D5C6C,00000001,?,74DEE860,00537CE4,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AFF27
    • GetStringTypeA.KERNEL32(00000000,00000001,004D5C68,00000001,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AFF41
    • GetStringTypeA.KERNEL32(?,?,?,?,WJ,74DEE860,00537CE4,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AFF75
    • MultiByteToWideChar.KERNEL32(?,|S,?,?,00000000,00000000,74DEE860,00537CE4,?,?,004A57ED,?,?,?,00000000,00000001), ref: 004AFFAD
    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,004A57ED,?), ref: 004B0003
    • GetStringTypeW.KERNEL32(?,?,00000000,WJ,?,?,?,?,?,?,004A57ED,?), ref: 004B0015
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: StringType$ByteCharMultiWide
    • String ID: WJ$|S
    • API String ID: 3852931651-1774375694
    • Opcode ID: ca4224bf40dbae586c1717791637f73d23849ea4e68882245576fdfe17dc1560
    • Instruction ID: 82e77a322c22e284782bad6f42f2ccfaec276272571b318e1f9a72d185b9ab9e
    • Opcode Fuzzy Hash: ca4224bf40dbae586c1717791637f73d23849ea4e68882245576fdfe17dc1560
    • Instruction Fuzzy Hash: ED418C72600249AFCF209F94DC85EEF7FB8EB1A750F10052BFA11D62A0C3389955DBA4
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 004A922B
    • GetStdHandle.KERNEL32(000000F4,004D59DC,00000000,00000000,00000000,?), ref: 004A9301
    • WriteFile.KERNEL32(00000000), ref: 004A9308
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: File$HandleModuleNameWrite
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $~O
    • API String ID: 3784150691-2062886391
    • Opcode ID: e2dc62992d48261115c0761d1507818c3cde71decec62f8fb8a5d003869e7737
    • Instruction ID: a018d2b816e916cd301b6246a66a72a144bb041c27c491b9963370b9387ab63a
    • Opcode Fuzzy Hash: e2dc62992d48261115c0761d1507818c3cde71decec62f8fb8a5d003869e7737
    • Instruction Fuzzy Hash: DA31D432A002186EDF20E660CC95FAE376CEF56304F5005ABF545D6251D678ED808B6D
    APIs
    • GetStockObject.GDI32(00000011), ref: 004BB59A
    • GetStockObject.GDI32(0000000D), ref: 004BB5A2
    • GetObjectA.GDI32(00000000,0000003C,?), ref: 004BB5AF
    • GetDC.USER32(00000000), ref: 004BB5BE
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004BB5D5
    • MulDiv.KERNEL32(?,00000048,00000000), ref: 004BB5E1
    • ReleaseDC.USER32(00000000,00000000), ref: 004BB5EC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Object$Stock$CapsDeviceRelease
    • String ID: System
    • API String ID: 46613423-3470857405
    • Opcode ID: 2aedcf10a7a12db3ba624b76bcdc709a774c92e60ebcf4985eb3c98f3fca9e97
    • Instruction ID: 86a83490b5d4bf0c406daa1b1e3e6d49ab94c085ecce652c1cf46716fad1adb2
    • Opcode Fuzzy Hash: 2aedcf10a7a12db3ba624b76bcdc709a774c92e60ebcf4985eb3c98f3fca9e97
    • Instruction Fuzzy Hash: A9118671A40618BBEB109BA5DC09FEE7B78EF04785F004026F605E6190DBB59D418BA9
    APIs
    • GetModuleHandleA.KERNEL32(COMCTL32.DLL,00000800,00000000,00000400,004B977E,?,00020000), ref: 004B948D
    • LoadLibraryA.KERNEL32(COMCTL32.DLL), ref: 004B9496
    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004B94AA
    • #17.COMCTL32 ref: 004B94C5
    • #17.COMCTL32 ref: 004B94E1
    • FreeLibrary.KERNEL32(00000000), ref: 004B94ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Library$AddressFreeHandleLoadModuleProc
    • String ID: COMCTL32.DLL$InitCommonControlsEx
    • API String ID: 1437655972-4218389149
    • Opcode ID: 6d218096af2711690e188c40d3fb2bc0e9c070ad22ce58b6fce439f83518cadb
    • Instruction ID: d411b55b3d2c419a676fcac492e53c89e01e9c6fa99bf41c22ffbf5d0d3a3928
    • Opcode Fuzzy Hash: 6d218096af2711690e188c40d3fb2bc0e9c070ad22ce58b6fce439f83518cadb
    • Instruction Fuzzy Hash: 78F0F436608A534B87216F75AC4896F72ACAF847623150836FA04E3310CB68EC46877E
    APIs
    • IsChild.USER32(?,?), ref: 00429218
    • GetParent.USER32(?), ref: 004292A9
    • IsWindow.USER32(?), ref: 004293DB
    • IsWindowVisible.USER32(?), ref: 004293ED
      • Part of subcall function 004B9AA6: IsWindowEnabled.USER32(?), ref: 004B9AB0
    • GetParent.USER32(?), ref: 0042943E
    • IsChild.USER32(?,?), ref: 0042945E
    • GetParent.USER32(?), ref: 00429607
    • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 00429624
    • IsWindow.USER32(?), ref: 0042967F
      • Part of subcall function 0041F660: IsChild.USER32(?,?), ref: 0041F6DD
      • Part of subcall function 0041F660: GetParent.USER32(?), ref: 0041F6F7
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ParentWindow$Child$EnabledMessageSendVisible
    • String ID:
    • API String ID: 2452671399-0
    • Opcode ID: 8418259a6152918583240118bd2c68a7342648d0147d58160aae0b2023d0eba1
    • Instruction ID: 7559f0c9cfa3384107e0d89d1c93367d577246900dad8105c6b01e8c0c2fb856
    • Opcode Fuzzy Hash: 8418259a6152918583240118bd2c68a7342648d0147d58160aae0b2023d0eba1
    • Instruction Fuzzy Hash: 0EE1A0716043619FC720DF25D880B6BB7E5BF85704F840A2EF98597281DB78EC45CB9A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2f7fe31fcb80df2e636eac4716612056e6118d374632d00ddecd54d4938640ed
    • Instruction ID: 65df4e681c00b6a59a7dce6ceca6de18777126d947af074f2dc0b08d781cb004
    • Opcode Fuzzy Hash: 2f7fe31fcb80df2e636eac4716612056e6118d374632d00ddecd54d4938640ed
    • Instruction Fuzzy Hash: 4181DEB23016019FD720DF68DCC5EABB3A9EB94354F00492EF142CB3A1D775E8868795
    APIs
    • GetCapture.USER32 ref: 0042D986
    • ClientToScreen.USER32(?,?), ref: 0042D9C3
    • OffsetRect.USER32(?,?,?), ref: 0042D9EC
    • GetParent.USER32(?), ref: 0042D9F2
      • Part of subcall function 004BBEDE: ScreenToClient.USER32(?,75C07310), ref: 004BBEF2
      • Part of subcall function 004BBEDE: ScreenToClient.USER32(?,75C07318), ref: 004BBEFB
    • GetClientRect.USER32(?,?), ref: 0042DA15
    • OffsetRect.USER32(?,?,00000000), ref: 0042DA33
    • OffsetRect.USER32(?,?,00000000), ref: 0042DA4B
    • OffsetRect.USER32(?,00000000,?), ref: 0042DA69
    • OffsetRect.USER32(?,00000000,?), ref: 0042DA89
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Offset$Client$Screen$CaptureParent
    • String ID:
    • API String ID: 838496554-0
    • Opcode ID: 83d6c97916629be404d3280f220b594ef0d562f80496ca39acdf60de4b64bc34
    • Instruction ID: 3deb47973fbd345fbe5d187ff4e6091b425a440051b772271b103e1fa6e50ee5
    • Opcode Fuzzy Hash: 83d6c97916629be404d3280f220b594ef0d562f80496ca39acdf60de4b64bc34
    • Instruction Fuzzy Hash: DC4108B5608302AFD718DF68D984D7FB7E9ABC8700F008A1EF586C3254DA74ED458A66
    APIs
    • InvalidateRect.USER32(?,?,00000001,?,?,?,?), ref: 0042B03A
    • GetTopWindow.USER32(?), ref: 0042B040
    • IsWindowVisible.USER32(00000000), ref: 0042B051
    • GetWindowLongA.USER32(00000000,000000EC), ref: 0042B062
    • GetClientRect.USER32(00000000,?), ref: 0042B0B5
    • IntersectRect.USER32(?,?,?), ref: 0042B0CA
    • IsRectEmpty.USER32(?), ref: 0042B0D5
    • InvalidateRect.USER32(00000000,00000000,00000000,?,?,?,?), ref: 0042B0E6
    • GetWindow.USER32(00000000,00000002), ref: 0042B0EB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Window$Invalidate$ClientEmptyIntersectLongVisible
    • String ID:
    • API String ID: 938479747-0
    • Opcode ID: 424ae410c1ca9d58923b4adc4198eac1af621c066620b1d50efafa4a0e7ff346
    • Instruction ID: f13fca7d5397b93ad1841cc5619648833404bcd6d01014f89d2961cf40d360e3
    • Opcode Fuzzy Hash: 424ae410c1ca9d58923b4adc4198eac1af621c066620b1d50efafa4a0e7ff346
    • Instruction Fuzzy Hash: 32219C71204712AF8311DF15DC84DAFB7ADFF88304B444A2EF95492240EB38E949CBA9
    APIs
    • lstrlenA.KERNEL32(?,?,?,0000000C,?,?,0042F799,?,-00000001,00000000,?,?,?,004E9C90), ref: 004B339E
    • GetFocus.USER32 ref: 004B33B9
      • Part of subcall function 004B75C4: UnhookWindowsHookEx.USER32(?), ref: 004B75E9
    • IsWindowEnabled.USER32(?), ref: 004B33E2
    • EnableWindow.USER32(?,00000000), ref: 004B33F4
    • GetOpenFileNameA.COMDLG32(?,?), ref: 004B341F
    • GetSaveFileNameA.COMDLG32(?,?), ref: 004B3426
    • EnableWindow.USER32(?,00000001), ref: 004B343D
    • IsWindow.USER32(?), ref: 004B3443
    • SetFocus.USER32(?), ref: 004B3451
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$EnableFileFocusName$EnabledHookOpenSaveUnhookWindowslstrlen
    • String ID:
    • API String ID: 3606897497-0
    • Opcode ID: 1486930976b5d75d51f2712a90ac71d806c2cd6e4ca930bb5a639db41b4c565d
    • Instruction ID: 1be2c2daf18d13ce2983d91aa20209a36780cdcfff03098651d310c8a1535cf5
    • Opcode Fuzzy Hash: 1486930976b5d75d51f2712a90ac71d806c2cd6e4ca930bb5a639db41b4c565d
    • Instruction Fuzzy Hash: 0D219271614700ABDB21AF72DC4AB9B7BE4EF40315F10442FF54282291DFB9E9408B79
    APIs
    • CreatePopupMenu.USER32 ref: 0042FEFE
    • AppendMenuA.USER32(?,?,00000000,?), ref: 00430061
    • AppendMenuA.USER32(?,00000000,00000000,?), ref: 00430099
    • ModifyMenuA.USER32(?,00000000,00000000,00000000,00000000), ref: 004300B7
    • AppendMenuA.USER32(?,?,00000000,?), ref: 00430115
    • ModifyMenuA.USER32(?,?,?,?,?), ref: 0043013A
    • AppendMenuA.USER32(?,?,?,?), ref: 00430182
    • ModifyMenuA.USER32(?,?,?,?,?), ref: 004301A7
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Menu$Append$Modify$CreatePopup
    • String ID:
    • API String ID: 3846898120-0
    • Opcode ID: e6c8505d716f1ff5f7f7affbd5282d32626a42eb096b86025cfcb906f224da4d
    • Instruction ID: 757d996f58d34256d47be627c9e26aae7fb92e73e24927edaca847016954dd30
    • Opcode Fuzzy Hash: e6c8505d716f1ff5f7f7affbd5282d32626a42eb096b86025cfcb906f224da4d
    • Instruction Fuzzy Hash: 6BD19A716047108BC718DF18E880B6BBBF4EF89714F554A2EF88993351D779AC44CB9A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: accept
    • String ID: %s:%d$P
    • API String ID: 3005279540-612342447
    • Opcode ID: 3e49574b3689d7ca508612359b8f1c464a09280fea31de3d9b60c14f315f94f7
    • Instruction ID: 777544c598e45d05aba81050201cf31a2d6d3bf437bef303b73a2a880cc5e9d2
    • Opcode Fuzzy Hash: 3e49574b3689d7ca508612359b8f1c464a09280fea31de3d9b60c14f315f94f7
    • Instruction Fuzzy Hash: 06319531104A01AFD720EB28DC88DBF73E8FFD4324F104A2DF591962D0EA74A8498B55
    APIs
    • GetMonitorInfoA.USER32(?,?), ref: 004A35F1
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004A3618
    • GetSystemMetrics.USER32(00000000), ref: 004A3630
    • GetSystemMetrics.USER32(00000001), ref: 004A3637
    • lstrcpyA.KERNEL32(?,DISPLAY), ref: 004A365B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: System$InfoMetrics$MonitorParameterslstrcpy
    • String ID: B$DISPLAY
    • API String ID: 1771318095-3316187204
    • Opcode ID: e893a564246cd39a0de1001ba1aad10594c1281c846c9e1c17d1f94ed368f13e
    • Instruction ID: 50937a8e7ab316641a279ca605b70065e0441d85ed625cd004fa96b61381a770
    • Opcode Fuzzy Hash: e893a564246cd39a0de1001ba1aad10594c1281c846c9e1c17d1f94ed368f13e
    • Instruction Fuzzy Hash: 22110A31500324BBCB259F18CC85E8B7FA8EF1A796B004063FD059A241E7B5D640CB99
    APIs
    • GetDeviceCaps.GDI32(?,00000058), ref: 00452A38
    • GetDeviceCaps.GDI32(?,0000005A), ref: 00452A41
    • GetDeviceCaps.GDI32(?,0000006E), ref: 00452A52
    • GetDeviceCaps.GDI32(?,0000006F), ref: 00452A6F
    • GetDeviceCaps.GDI32(?,00000070), ref: 00452A84
    • GetDeviceCaps.GDI32(?,00000071), ref: 00452A99
    • GetDeviceCaps.GDI32(?,00000008), ref: 00452AAE
    • GetDeviceCaps.GDI32(?,0000000A), ref: 00452AC3
      • Part of subcall function 00452800: __ftol.LIBCMT ref: 00452805
      • Part of subcall function 00452830: __ftol.LIBCMT ref: 00452835
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CapsDevice$__ftol
    • String ID:
    • API String ID: 1555043975-0
    • Opcode ID: d51170c5d0f78fce53cbcf42deafa4afe3f8fe9036eb654328c7bdb82543a980
    • Instruction ID: e9778c69354e15e53264451c1cfe858721ee83f519f940288a7f13e30d65847c
    • Opcode Fuzzy Hash: d51170c5d0f78fce53cbcf42deafa4afe3f8fe9036eb654328c7bdb82543a980
    • Instruction Fuzzy Hash: B0515870508700ABD300EF6ACD45A6FBBE4FFC9305F01495EFA8456291DBB1D924CB96
    APIs
    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,004A3A06), ref: 004A8B72
    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,004A3A06), ref: 004A8B86
    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,004A3A06), ref: 004A8BB2
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,004A3A06), ref: 004A8BEA
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,004A3A06), ref: 004A8C0C
    • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,004A3A06), ref: 004A8C25
    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,004A3A06), ref: 004A8C38
    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004A8C76
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
    • String ID:
    • API String ID: 1823725401-0
    • Opcode ID: e583baa982517e1b6b25be8c83ae0374f124e5f6d14b4b49c7b1061fc2385f03
    • Instruction ID: 4947e8a7fc3bc917e024257d981bb85f1917f8e5ce61f939a1e261663e1deb8a
    • Opcode Fuzzy Hash: e583baa982517e1b6b25be8c83ae0374f124e5f6d14b4b49c7b1061fc2385f03
    • Instruction Fuzzy Hash: 7C3106B29062596FE7207B745C8883FB69CF67B3A8B15053FF541C3300EE289C818A79
    APIs
    • GetWindowLongA.USER32(?,000000F0), ref: 0047ABA4
    • GetWindowLongA.USER32(?,000000EC), ref: 0047ABB2
    • SendMessageA.USER32(?,0000018B,00000000,00000000), ref: 0047ABCB
    • GetWindowRect.USER32(00000000,00000000), ref: 0047ABFE
    • GetStockObject.GDI32(00000006), ref: 0047AC46
    • SelectObject.GDI32(?,00000000), ref: 0047AC52
    • MoveToEx.GDI32(00000001,00030000,00000001,00000000), ref: 0047AC74
    • LineTo.GDI32(?,00030000,?), ref: 0047AC98
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$LongObject$LineMessageMoveRectSelectSendStock
    • String ID:
    • API String ID: 3454110192-0
    • Opcode ID: 8cdbd9e31dd649b0ed4446b420f88c1a2bf7cefbdf03b13768fb1e831a48dbff
    • Instruction ID: ad7f5218e1fccb12c358eba5884fb3282ee34526991b4b369c0129454b554b08
    • Opcode Fuzzy Hash: 8cdbd9e31dd649b0ed4446b420f88c1a2bf7cefbdf03b13768fb1e831a48dbff
    • Instruction Fuzzy Hash: C7313CB1504701AFD314DF19C888E5FB7E9EFC8714F108A1DF59993250DA74E845CB66
    APIs
    • ReleaseCapture.USER32 ref: 00444711
      • Part of subcall function 004B9AA6: IsWindowEnabled.USER32(?), ref: 004B9AB0
    • GetClientRect.USER32(?,?), ref: 00444667
    • PtInRect.USER32(?,?,?), ref: 0044467C
    • ClientToScreen.USER32(?,?), ref: 0044468D
    • WindowFromPoint.USER32(?,?), ref: 0044469D
    • ReleaseCapture.USER32 ref: 004446B7
    • GetCapture.USER32 ref: 004446D1
    • SetCapture.USER32(?), ref: 004446DC
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Capture$ClientRectReleaseWindow$EnabledFromPointScreen
    • String ID:
    • API String ID: 3076215760-0
    • Opcode ID: 133978739919b2aaefea6fd1f4bb6a79ba0918c1ffbe3394a75140d287ed9602
    • Instruction ID: 4aa72c3e20bcff7fb230108cad6db1660265d2b4a1f7181f6e26c386cdf7d163
    • Opcode Fuzzy Hash: 133978739919b2aaefea6fd1f4bb6a79ba0918c1ffbe3394a75140d287ed9602
    • Instruction Fuzzy Hash: D421D736200610ABE350EB29DC49FBF77E5EFD4709F04492EF94182351E739E9468BA9
    APIs
    • GlobalLock.KERNEL32(?), ref: 004B9ED2
    • lstrcmpA.KERNEL32(?,?), ref: 004B9EDE
    • OpenPrinterA.WINSPOOL.DRV(?,?,00000000), ref: 004B9EF0
    • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 004B9F13
    • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 004B9F1B
    • GlobalLock.KERNEL32(00000000), ref: 004B9F28
    • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 004B9F35
    • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 004B9F53
      • Part of subcall function 004BCD37: GlobalFlags.KERNEL32(?), ref: 004BCD41
      • Part of subcall function 004BCD37: GlobalUnlock.KERNEL32(?,?,?,?,00420400,?,?,?,?,?,?,?,?,0042B15D), ref: 004BCD58
      • Part of subcall function 004BCD37: GlobalFree.KERNEL32(?), ref: 004BCD63
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
    • String ID:
    • API String ID: 168474834-0
    • Opcode ID: f6d8cf1efdb9fdf85f22323cde9986c59811335ef374a29ec71a7952ff91ec95
    • Instruction ID: e049383cf6d6d961ee37cc84f818ba8ccb04dd2c5ac0feaf315b8e77590e76de
    • Opcode Fuzzy Hash: f6d8cf1efdb9fdf85f22323cde9986c59811335ef374a29ec71a7952ff91ec95
    • Instruction Fuzzy Hash: 20119171100104BADB21AB76CD4AEFFBABDEB96744F00041EF608D5112D6799D41D778
    APIs
    • GetClientRect.USER32(?,?), ref: 00419A2C
    • PtInRect.USER32(?,?,?), ref: 00419A41
    • ReleaseCapture.USER32 ref: 00419A51
    • InvalidateRect.USER32(?,00000000,00000000), ref: 00419A5F
    • GetCapture.USER32 ref: 00419A6F
    • SetCapture.USER32(?), ref: 00419A7A
    • InvalidateRect.USER32(?,00000000,00000000), ref: 00419A9B
    • SetCapture.USER32(?), ref: 00419AA5
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CaptureRect$Invalidate$ClientRelease
    • String ID:
    • API String ID: 3559558096-0
    • Opcode ID: d77eb6a67d23b6d9d959b4d99c000ad06aa9f2d2b90540898412d96949e4cb44
    • Instruction ID: f51490bacd05ac57d9cb8fab41c5a7891781daddd837e517cbcf653d5c34525b
    • Opcode Fuzzy Hash: d77eb6a67d23b6d9d959b4d99c000ad06aa9f2d2b90540898412d96949e4cb44
    • Instruction Fuzzy Hash: 7E115E76500B10AFD760AF64DC48FAF77A9BF98700F00892EF586C2254E734F8858B58
    APIs
    • IsWindow.USER32(?), ref: 0041F08D
    • GetParent.USER32(?), ref: 0041F09F
    • SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 0041F0C7
    • GetWindowRect.USER32(?,?), ref: 0041F151
    • InvalidateRect.USER32(?,?,00000001,?), ref: 0041F174
    • GetWindowRect.USER32(?,?), ref: 0041F33C
    • InvalidateRect.USER32(?,?,00000001,?), ref: 0041F35D
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Window$Invalidate$MessageParentSend
    • String ID:
    • API String ID: 236041146-0
    • Opcode ID: eaf8db60dd3a6ee9b1c282ab6a48f545c3370beec39871f6e4f2da594c7af23f
    • Instruction ID: c67b8d9d5762bf6b8896d644d7ae194680187bc33540ed425860121492e00772
    • Opcode Fuzzy Hash: eaf8db60dd3a6ee9b1c282ab6a48f545c3370beec39871f6e4f2da594c7af23f
    • Instruction Fuzzy Hash: 9D91E371600705ABC720EF21C850BAB73E5AF84318F04462EFD559B386E73CED868B99
    APIs
    • CreateFileA.KERNEL32(00000001,80000000,?,0000000C,00000001,00000080,00000000,?,?,00000000), ref: 004B087E
    • GetLastError.KERNEL32 ref: 004B088A
    • GetFileType.KERNEL32(00000000), ref: 004B089F
    • CloseHandle.KERNEL32(00000000), ref: 004B08AA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: File$CloseCreateErrorHandleLastType
    • String ID: @$H
    • API String ID: 1809617866-104103126
    • Opcode ID: 0c27e5598b52a86b106a956bcfb58180a5f837a268ef3b5daa13c155d7420e35
    • Instruction ID: a23d663b95a7a534156c462a83a327501d81fb29aff0f435121ca10d5bf9f4e9
    • Opcode Fuzzy Hash: 0c27e5598b52a86b106a956bcfb58180a5f837a268ef3b5daa13c155d7420e35
    • Instruction Fuzzy Hash: 61812B719043485AEF309F68C8447EFBB609F11366F24421BE951663D2CB7C9A45CBBA
    APIs
    • SetRect.USER32(?,00000000,00000032,00000032,?), ref: 00431A39
    • OffsetRect.USER32(?,?,?), ref: 00431A46
    • IntersectRect.USER32(?,?,?), ref: 00431A62
    • IsRectEmpty.USER32(?), ref: 00431A6D
    • OffsetRect.USER32(?,?,?), ref: 00431AAA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Offset$EmptyIntersect
    • String ID: 2
    • API String ID: 765610062-450215437
    • Opcode ID: 8c2446e5131103ce626d427625aad8c44b77e992318b4add76c940bb1b30c94f
    • Instruction ID: 2c113ad6e7ead338afe5af8a8f261d6817ff2e82de70b6108ad3573e63f7ddc8
    • Opcode Fuzzy Hash: 8c2446e5131103ce626d427625aad8c44b77e992318b4add76c940bb1b30c94f
    • Instruction Fuzzy Hash: 346102B56083419FD718CF29C884A6BFBE9BBC8344F149A2EF58987320D734E905CB56
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$ClientCreateEmptyFill
    • String ID: !K
    • API String ID: 97219908-3405271303
    • Opcode ID: 69fcf7e4e605821c9ea8410118b79727310b57abc0d04cb0a24966066e81643a
    • Instruction ID: 8941124b7693a4762f626db05d4847c1021cfa435e5d3696aaa2b9470cfdb88c
    • Opcode Fuzzy Hash: 69fcf7e4e605821c9ea8410118b79727310b57abc0d04cb0a24966066e81643a
    • Instruction Fuzzy Hash: 9B511AB1204601AFD714DF65C985FABB7E9FF88704F04891EB55AC3240EB78E845CBA6
    APIs
    • GetStartupInfoA.KERNEL32(?), ref: 004A8CE7
    • GetFileType.KERNEL32(?,?,00000000), ref: 004A8D92
    • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 004A8DF5
    • GetFileType.KERNEL32(00000000,?,00000000), ref: 004A8E03
    • SetHandleCount.KERNEL32 ref: 004A8E3A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: FileHandleType$CountInfoStartup
    • String ID: $}S
    • API String ID: 1710529072-2834706651
    • Opcode ID: 0ef9cfabff9d1b8d65fa48ef594c96fee29919f11c9c605fbd97c4a2fbd4c830
    • Instruction ID: 1818f9c57c069aec94b9a25082e471bbbc41ea7d1ddfb944a4502980ce2aef31
    • Opcode Fuzzy Hash: 0ef9cfabff9d1b8d65fa48ef594c96fee29919f11c9c605fbd97c4a2fbd4c830
    • Instruction Fuzzy Hash: BB5105B19046098FCB209B38C84466A7BE4FB37328F24466ED592CB3E1DB789846D759
    APIs
    • SendMessageA.USER32(?,0000019F,00000000,00000000), ref: 004BDDE6
    • GetParent.USER32(?), ref: 004BDDED
      • Part of subcall function 004B9917: GetWindowLongA.USER32(?,000000F0), ref: 004B9923
    • SendMessageA.USER32(?,00000187,00000000,00000000), ref: 004BDE40
    • SendMessageA.USER32(0000AC84,00000111,?,?), ref: 004BDE91
    • SendMessageA.USER32(?,00000185,00000000,00000000), ref: 004BDF1C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$LongParentWindow
    • String ID:
    • API String ID: 779260966-3916222277
    • Opcode ID: faf5ae17a0ee7b74cdc5da69e308a0056cb02dc0b9d47400af3eb0f86c6f60c6
    • Instruction ID: fab33b562f725931d9be6188d135970a43e67feddbd056cc5344fb74441d0238
    • Opcode Fuzzy Hash: faf5ae17a0ee7b74cdc5da69e308a0056cb02dc0b9d47400af3eb0f86c6f60c6
    • Instruction Fuzzy Hash: 3831B5B0A047196FCB247E368C80DBFB69DEB94748B10097FF542C6291EB69DC029678
    APIs
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0044640B
      • Part of subcall function 004B9AC1: EnableWindow.USER32(?,00000000), ref: 004B9ACF
      • Part of subcall function 004B983D: GetDlgItem.USER32(?,?), ref: 004B984B
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 00446445
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0044645C
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 004464AD
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 004464E7
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 00446514
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0044654A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$EnableItemWindow
    • String ID:
    • API String ID: 607626308-0
    • Opcode ID: a8061fbac1538f42fccafde6675c02c428d769b67f5671014e70ef8897632fec
    • Instruction ID: 009665d1b0c4a2b01b40d03580879a0360fb3f647d66bfdd3f9fd8a9c7206635
    • Opcode Fuzzy Hash: a8061fbac1538f42fccafde6675c02c428d769b67f5671014e70ef8897632fec
    • Instruction Fuzzy Hash: 9B3150713C074076EA34A6758C96FEB66659BC6F04F10491EB3169F2C2CD68AC41866D
    APIs
    • GetParent.USER32(?), ref: 004B92ED
    • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 004B9316
    • UpdateWindow.USER32(?), ref: 004B9332
    • SendMessageA.USER32(?,00000121,00000000,?), ref: 004B9358
    • SendMessageA.USER32(?,0000036A,00000000,00000001), ref: 004B9377
    • UpdateWindow.USER32(?), ref: 004B93BA
    • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 004B93ED
      • Part of subcall function 004B9917: GetWindowLongA.USER32(?,000000F0), ref: 004B9923
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Message$Window$PeekSendUpdate$LongParent
    • String ID:
    • API String ID: 2853195852-0
    • Opcode ID: 952840c02e657f2f82102cbdc89d0fe7d4680c2f9f3870c13ed6dfe908776186
    • Instruction ID: bb5d249e9f403ab83b4115a73872f911ad0a6210c5b246d0db72fe61ea1e80bc
    • Opcode Fuzzy Hash: 952840c02e657f2f82102cbdc89d0fe7d4680c2f9f3870c13ed6dfe908776186
    • Instruction Fuzzy Hash: 44418530504741ABD7209F268848F5FBAF5FFC9B04F14091EF94186291C779DD45CB6A
    APIs
    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 0040C877
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0040C88F
    • WaitForInputIdle.USER32(?,000003E8), ref: 0040C8A1
    • CloseHandle.KERNEL32(?), ref: 0040C8B2
    • CloseHandle.KERNEL32(?), ref: 0040C8B9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CloseHandleWait$CreateIdleInputObjectProcessSingle
    • String ID: D
    • API String ID: 2811420030-2746444292
    • Opcode ID: c2c81d0f25aab70210e4f0e266d7c2504c3625aaccd3905c1cbb0ebd956bde17
    • Instruction ID: 7ca699f29754fba2ea604a670feb2474f57e39d85275a44d0b7e831015fa3063
    • Opcode Fuzzy Hash: c2c81d0f25aab70210e4f0e266d7c2504c3625aaccd3905c1cbb0ebd956bde17
    • Instruction Fuzzy Hash: 07317E76A04300D7D720EB18C8C0A6B77E5EF94351F208A2EE542E7390D678E8858B5E
    APIs
      • Part of subcall function 004BF241: __EH_prolog.LIBCMT ref: 004BF246
      • Part of subcall function 004B9917: GetWindowLongA.USER32(?,000000F0), ref: 004B9923
    • SendMessageA.USER32(?,000001A1,00000000,00000000), ref: 004BDB5C
    • SendMessageA.USER32(?,0000018B,00000000,00000000), ref: 004BDB6B
    • SendMessageA.USER32(?,0000018E,00000000,00000000), ref: 004BDB84
    • SendMessageA.USER32(?,0000018E,00000000,00000000), ref: 004BDBAC
    • SendMessageA.USER32(?,0000018B,00000000,00000000), ref: 004BDBBB
    • SendMessageA.USER32(?,00000198,?,?), ref: 004BDBD1
    • PtInRect.USER32(?,000000FF,?), ref: 004BDBDD
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$H_prologLongRectWindow
    • String ID:
    • API String ID: 2846605207-0
    • Opcode ID: fa7f76a1db84bb738574497517f5feeaeaaea66bf0dbe19df2dfe056d27bcaba
    • Instruction ID: c2b5d93db0068effea12adebd76ddaa53891b83f67caf4c06c1f8481509ea2c1
    • Opcode Fuzzy Hash: fa7f76a1db84bb738574497517f5feeaeaaea66bf0dbe19df2dfe056d27bcaba
    • Instruction Fuzzy Hash: BF312B70A0020DFFDB10DF99CC81DAEBBB9EF44344B1184AAE511A72A1E775AE15DB14
    APIs
    • GetSysColor.USER32(0000000F), ref: 00478446
    • CreateSolidBrush.GDI32(00BD9E7B), ref: 00478452
    • FrameRect.USER32(?,?,00000000), ref: 00478465
    • DeleteObject.GDI32(00000000), ref: 0047846C
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00478477
    • GetSysColorBrush.USER32(0000000F), ref: 00478496
    • FrameRect.USER32(?,?,00000000), ref: 0047849F
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$BrushColorFrame$CreateDeleteInflateObjectSolid
    • String ID:
    • API String ID: 2412526408-0
    • Opcode ID: ef14cdf43ed5e50fb68d5e4efb9ecc1ab4d9774e25abeacedcccf9ffcc4aa138
    • Instruction ID: ab9f42329beb249587088b573e33fb15bfa07908d58d98fa892e3a357121b1dc
    • Opcode Fuzzy Hash: ef14cdf43ed5e50fb68d5e4efb9ecc1ab4d9774e25abeacedcccf9ffcc4aa138
    • Instruction Fuzzy Hash: E9012631208602AFC760DF58AC4CF6F776CEB45361F84813EF219D6390EE68A801C729
    APIs
    • SafeArrayCreate.OLEAUT32 ref: 0040EBAC
    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 0040EBD1
    • SafeArrayDestroy.OLEAUT32(00000000), ref: 0040EBDC
    • VariantCopyInd.OLEAUT32(?,?), ref: 0040EC35
    • SysAllocString.OLEAUT32(00000000), ref: 0040ED98
    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 0040EDD1
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ArraySafe$Data$AccessAllocCopyCreateDestroyStringUnaccessVariant
    • String ID:
    • API String ID: 3584657539-0
    • Opcode ID: 469126093d61e97a81fd5aec98f8423d00af9971a293844d9351725d379b3e0e
    • Instruction ID: 457002c0baecac92c63d140a824050e87b2556156648e0d826f476d514e02c2a
    • Opcode Fuzzy Hash: 469126093d61e97a81fd5aec98f8423d00af9971a293844d9351725d379b3e0e
    • Instruction Fuzzy Hash: 9391C1752082028BE714CF1AC890B2FB3B5EBD8310F554D3FE98697391D67DE8918B5A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$ChildFocusVisible
    • String ID:
    • API String ID: 372613587-0
    • Opcode ID: 58b4896cdd5995d7e9cca1631fb514dbb4b46178675706a73d5118149be540cd
    • Instruction ID: 3bb46c0c019d5ee4dc43f86c6d635359c9873b2f457e693a3993d3f2bb3cf3be
    • Opcode Fuzzy Hash: 58b4896cdd5995d7e9cca1631fb514dbb4b46178675706a73d5118149be540cd
    • Instruction Fuzzy Hash: 12517BB16007129FC720EF25D8809ABB7E9BF85358F45492EF88997341DB38EC45CB69
    APIs
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 0044592C
      • Part of subcall function 004B541C: InterlockedIncrement.KERNEL32(-000000F4), ref: 004B5431
    • OpenPrinterA.WINSPOOL.DRV(?,?,00000000), ref: 0044595D
    • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000), ref: 004459A5
    • DocumentPropertiesA.WINSPOOL.DRV(?,?,?,00000000,00000000,0000000E), ref: 00445A3B
    • ClosePrinter.WINSPOOL.DRV(?,?,?,?,00000000,00000000,0000000E), ref: 00445A70
      • Part of subcall function 004B56A7: InterlockedDecrement.KERNEL32(-000000F4), ref: 004B56BB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: DocumentInterlockedProperties$CloseDecrementIncrementMessageOpenPrinterPrinter.Send
    • String ID:
    • API String ID: 1978028495-0
    • Opcode ID: de2aebae79a515ab2c5aff3534e160604652588781e8801dbfbfa6804022e89c
    • Instruction ID: b2cc831858826f7417666b6c8ed89b2bb99ca7a8a29746bd86dbcd02ce203c12
    • Opcode Fuzzy Hash: de2aebae79a515ab2c5aff3534e160604652588781e8801dbfbfa6804022e89c
    • Instruction Fuzzy Hash: 574128B4104345ABDB24EF15C881FEB77A9EF98724F00460DF85987381D7789944C7AA
    APIs
    • GetTextExtentPoint32A.GDI32(?,004EEAE0,?,?), ref: 00476CC3
    • GetTextExtentPoint32A.GDI32(?,?,00000001), ref: 00476D64
    • DrawTextA.USER32(?,?,000000FF,?,00000000), ref: 00477097
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Text$ExtentPoint32$Draw
    • String ID: &$N
    • API String ID: 3694408696-485256433
    • Opcode ID: 0486b3cd3d0399e04b69c0d47978b78bf2ae4aa543f6642ac4ecd5d5f63d0127
    • Instruction ID: 7869d30e5944a7a6b8515896b29469ff5510b8c388bd30c1398e76a1ab854c39
    • Opcode Fuzzy Hash: 0486b3cd3d0399e04b69c0d47978b78bf2ae4aa543f6642ac4ecd5d5f63d0127
    • Instruction Fuzzy Hash: 3EE149B16187858FC314CF28C58069FFBE2BBC8704F198A2EF59997351D774E9058B8A
    APIs
    • CopyRect.USER32(?,00000000), ref: 0043C242
    • IsRectEmpty.USER32(?), ref: 0043C273
    • OffsetRect.USER32(?,00000000,?), ref: 0043C2C3
    • LPtoDP.GDI32(?,?,00000002), ref: 0043C2F8
    • GetClientRect.USER32(?,?), ref: 0043C307
    • IntersectRect.USER32(?,?,?), ref: 0043C31C
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$ClientCopyEmptyIntersectOffset
    • String ID:
    • API String ID: 1743551499-0
    • Opcode ID: aed8f6fde7f438b3353c566632b44445dc82a06157e3761aae996da68afa0b1d
    • Instruction ID: 22f3d7cb0effb84cb8804c4e0cada81c31f196796261cc261f722a3c625f4bda
    • Opcode Fuzzy Hash: aed8f6fde7f438b3353c566632b44445dc82a06157e3761aae996da68afa0b1d
    • Instruction Fuzzy Hash: 464107B66047019FC318DF69C880E6BB7E9BBC8710F048A2EF556C7251DB74E945CBA2
    APIs
      • Part of subcall function 004AB7E4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB821
      • Part of subcall function 004AB7E4: EnterCriticalSection.KERNEL32(?,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB83C
    • InitializeCriticalSection.KERNEL32(00000068,00000100,00000080,?,00000000,?,?,004B0848,?,?,00000000), ref: 004B1C90
    • EnterCriticalSection.KERNEL32(00000068,00000100,00000080,?,00000000,?,?,004B0848,?,?,00000000), ref: 004B1CA5
    • LeaveCriticalSection.KERNEL32(00000068,?,00000000,?,?,004B0848,?,?,00000000), ref: 004B1CB2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalSection$EnterInitialize$Leave
    • String ID: $ }S$ ~S
    • API String ID: 713024617-1253393030
    • Opcode ID: c544797646711d41ddec7929535169e0649c2c4954825b5529c7490062689a14
    • Instruction ID: 38e9127b970b11d59c3abb37c26b365257001e9b98214bc839e27e1624a41473
    • Opcode Fuzzy Hash: c544797646711d41ddec7929535169e0649c2c4954825b5529c7490062689a14
    • Instruction Fuzzy Hash: 4D310C725043048FD720DF24EC84B9A77E5FF55328F248A2FE5654B2E1D778E8488769
    APIs
      • Part of subcall function 00431780: CreateDIBitmap.GDI32(?,?,00000004,?,?,00000000), ref: 004317FB
    • CreateCompatibleDC.GDI32(?), ref: 0043186A
    • DeleteObject.GDI32(00000000), ref: 0043187F
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Create$BitmapCompatibleDeleteObject
    • String ID:
    • API String ID: 3709961035-0
    • Opcode ID: 396e0e0d9a11a242f18d84027b5e45084cf324bf4f72e5f578cc7937771447ea
    • Instruction ID: 29bfaf713b716fbbdc3c7ed079c851b56c5782feac62142c4a5e83aeca681059
    • Opcode Fuzzy Hash: 396e0e0d9a11a242f18d84027b5e45084cf324bf4f72e5f578cc7937771447ea
    • Instruction Fuzzy Hash: 5F318E762047409FC314EF69C985F5BB7E8FB88724F004A2EF55A83291CB78E805CB66
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: wsprintf
    • String ID: - $ - [$%d / %d]$?? / %d]
    • API String ID: 2111968516-3107364983
    • Opcode ID: 2ba831995889dd9aff683fde0d2c8f987887252d576c3012860a10a24fcc6d8d
    • Instruction ID: 0d7040e606e8a2cffd4b9b4874127133998b2c2c814495b14529e2d5022df1cd
    • Opcode Fuzzy Hash: 2ba831995889dd9aff683fde0d2c8f987887252d576c3012860a10a24fcc6d8d
    • Instruction Fuzzy Hash: 9D31A274604B40AFC314DB25DC81FABB7E4BF94714F408A1EF49A87390DB79A905CB66
    APIs
    • TlsGetValue.KERNEL32(00533A2C,00533A1C,00000000,?,00533A2C,?,004BF21C,00533A1C,00000000,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6), ref: 004BEFBF
    • EnterCriticalSection.KERNEL32(00533A48,00000010,?,00533A2C,?,004BF21C,00533A1C,00000000,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6), ref: 004BF00E
    • LeaveCriticalSection.KERNEL32(00533A48,00000000,?,00533A2C,?,004BF21C,00533A1C,00000000,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6), ref: 004BF021
    • LocalAlloc.KERNEL32(00000000,00000005,?,00533A2C,?,004BF21C,00533A1C,00000000,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6), ref: 004BF037
    • LocalReAlloc.KERNEL32(?,00000005,00000002,?,00533A2C,?,004BF21C,00533A1C,00000000,?,00000000,004BEC33,004BE528,004BEC4F,004BA417,004BB6B6), ref: 004BF049
    • TlsSetValue.KERNEL32(00533A2C,00000000), ref: 004BF085
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: AllocCriticalLocalSectionValue$EnterLeave
    • String ID:
    • API String ID: 4117633390-0
    • Opcode ID: 4d3eba33feaec29aee5d40678a26108eacc8405697bd00921dc6247d32a996bf
    • Instruction ID: 92a0cd6220d0d4a9e694bb790bf9693b586227fdc3f1d1f5dafc08111b857650
    • Opcode Fuzzy Hash: 4d3eba33feaec29aee5d40678a26108eacc8405697bd00921dc6247d32a996bf
    • Instruction Fuzzy Hash: 1E31AE71100605AFD724DF59C889EAAB7E8FB85364F00852AF45AC7251DB74F849CF64
    APIs
    • SendMessageA.USER32(?,00000409,00000001,00000000), ref: 00472B2B
    • SendMessageA.USER32(?,0000040E,00000000,00000000), ref: 00472B5A
    • SendMessageA.USER32(?,00000409,00000000,00000000), ref: 00472B6B
    • SendMessageA.USER32(?,00000404,?,?), ref: 00472B7C
    • SendMessageA.USER32(?,00000409,00000000,00000000), ref: 00472B8D
    • DestroyIcon.USER32(?,?,?,?,004712E2), ref: 00472BBA
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$DestroyIcon
    • String ID:
    • API String ID: 3419509030-0
    • Opcode ID: c52f5472a50b4925b92c4842f98516ba994e218b32a788ca3c17291e4baaab68
    • Instruction ID: ba18a8a4f7d1929d79e233a371a7c83a4bbf1beac126797da2ae919251595c0c
    • Opcode Fuzzy Hash: c52f5472a50b4925b92c4842f98516ba994e218b32a788ca3c17291e4baaab68
    • Instruction Fuzzy Hash: B121A4723007056FD620DE69CD80F57F3A9EB94710F11852AF749A7281D6B5FC468B64
    APIs
    • GetParent.USER32(?), ref: 004BD2EE
    • GetLastActivePopup.USER32(?), ref: 004BD2FD
    • IsWindowEnabled.USER32(?), ref: 004BD312
    • EnableWindow.USER32(?,00000000), ref: 004BD325
    • GetWindowLongA.USER32(?,000000F0), ref: 004BD337
    • GetParent.USER32(?), ref: 004BD345
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
    • String ID:
    • API String ID: 670545878-0
    • Opcode ID: f3a9097016e02ac5494f3052003c901162598e37acb6f9d342890d2149a1d90b
    • Instruction ID: b86ae8b64f0fe155085de90bc9fcda473f280652c2b4085ff842d5dc419c1471
    • Opcode Fuzzy Hash: f3a9097016e02ac5494f3052003c901162598e37acb6f9d342890d2149a1d90b
    • Instruction Fuzzy Hash: 2C11E332E016215B86311E6D5C44BABB7D85F51B61F0511E6EC00D3306FB2CDC0146BE
    APIs
    • GetCursorPos.USER32(?), ref: 0043EEF2
    • ScreenToClient.USER32(00000001,?), ref: 0043EF01
      • Part of subcall function 0043EF80: DPtoLP.GDI32(?,?,00000001), ref: 0043F097
    • LoadCursorA.USER32(00000000,00007F85), ref: 0043EF31
    • SetCursor.USER32(00000000), ref: 0043EF38
    • LoadCursorA.USER32(00000000,00007F84), ref: 0043EF57
    • SetCursor.USER32(00000000), ref: 0043EF5E
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Cursor$Load$ClientScreen
    • String ID:
    • API String ID: 789353160-0
    • Opcode ID: 1b170f9018537ad058644bd487736972e5486a73bb1ffc8b538ae3bf325c43e6
    • Instruction ID: ea2849d88d792aaa0d35af8d8a7d6a75a21941c20c36a5fe4cad62add75224e3
    • Opcode Fuzzy Hash: 1b170f9018537ad058644bd487736972e5486a73bb1ffc8b538ae3bf325c43e6
    • Instruction Fuzzy Hash: 9011E531518701BBD710EB64EC49F9F73A8AF94B51F004A2EF145862C4EA74E888C7BB
    APIs
    • SendMessageA.USER32(?,0000110A,00000002,?), ref: 004194EB
    • SendMessageA.USER32(?,00001101,00000000,00000000), ref: 004194FD
    • SendMessageA.USER32(?,0000110A,00000002,?), ref: 0041950B
    • SendMessageA.USER32(?,0000110A,00000001,?), ref: 0041951D
    • SendMessageA.USER32(?,00001101,00000000,00000000), ref: 0041952F
    • SendMessageA.USER32(?,0000110A,00000001,?), ref: 0041953D
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: f52dbfc568c56276dac48aef5294ab332d1535113dd64340874e4d1cc4971f10
    • Instruction ID: 8e35118f0eb240e582e437977803fc2938257979ebc8e2f040889bd09ef3903c
    • Opcode Fuzzy Hash: f52dbfc568c56276dac48aef5294ab332d1535113dd64340874e4d1cc4971f10
    • Instruction Fuzzy Hash: A80162B27403057AF535DA698CC2FE7A2ADAF98B51F008619F701AB1C0D5F5EC824A30
    APIs
    • GetWindowRect.USER32(?,?), ref: 00478396
    • BitBlt.GDI32(?,00000000,00000000,00CC0020,?,?,00000000,00000000,00CC0020), ref: 004783C7
    • SelectObject.GDI32(?,?), ref: 004783D9
    • DeleteObject.GDI32(?), ref: 004783EA
    • DeleteDC.GDI32(?), ref: 004783F4
    • ReleaseDC.USER32(?,?), ref: 00478401
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: DeleteObject$RectReleaseSelectWindow
    • String ID:
    • API String ID: 3522459120-0
    • Opcode ID: 14eead8600fc1d54beba044b01cfbfd0ede58d91e9eccb7939c39c28444d7de1
    • Instruction ID: 781d30baec58f04768397c9820635744da83600639385daf54be431c3e6dced7
    • Opcode Fuzzy Hash: 14eead8600fc1d54beba044b01cfbfd0ede58d91e9eccb7939c39c28444d7de1
    • Instruction Fuzzy Hash: F2113A75200B01AFD324DF28DC88F6BB3E9EF88B00F14891CB99693255CB30F8448B64
    APIs
    • GetFocus.USER32 ref: 004BCCC3
      • Part of subcall function 004BCB65: GetWindowLongA.USER32(00000000,000000F0), ref: 004BCB76
    • GetParent.USER32(00000000), ref: 004BCCEA
      • Part of subcall function 004BCB65: GetClassNameA.USER32(00000000,?,0000000A), ref: 004BCB91
      • Part of subcall function 004BCB65: lstrcmpiA.KERNEL32(?,combobox), ref: 004BCBA0
    • GetWindowLongA.USER32(?,000000F0), ref: 004BCD05
    • GetParent.USER32(?), ref: 004BCD13
    • GetDesktopWindow.USER32 ref: 004BCD17
    • SendMessageA.USER32(00000000,0000014F,00000000,00000000), ref: 004BCD2B
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$LongParent$ClassDesktopFocusMessageNameSendlstrcmpi
    • String ID:
    • API String ID: 2818563221-0
    • Opcode ID: 0e7e5b4da1d6441d15785818985191f05af058920723982fee61ea06313c7f71
    • Instruction ID: 166a18f047212b43b654690e16577eb967b4fdea1718a07fa43c9dd531b0e4af
    • Opcode Fuzzy Hash: 0e7e5b4da1d6441d15785818985191f05af058920723982fee61ea06313c7f71
    • Instruction Fuzzy Hash: 7BF0F435201A2272D63227689CC9FEFA95D5BC0B50F140536F815A63D8DB1CAC4140BC
    APIs
    • ClientToScreen.USER32(?,?), ref: 004BCBE9
    • GetWindow.USER32(?,00000005), ref: 004BCBFA
    • GetDlgCtrlID.USER32(00000000), ref: 004BCC03
    • GetWindowLongA.USER32(00000000,000000F0), ref: 004BCC12
    • GetWindowRect.USER32(00000000,?), ref: 004BCC24
    • PtInRect.USER32(?,?,?), ref: 004BCC34
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Rect$ClientCtrlLongScreen
    • String ID:
    • API String ID: 1315500227-0
    • Opcode ID: d2b7e060a09780d79ace6563eaa92f2edad093306e1888d018f4df81cee822c8
    • Instruction ID: 4650fe3161e10b8e624e5760fc2d8d91d2b1a56f39e4838c3e68433ea0ad86df
    • Opcode Fuzzy Hash: d2b7e060a09780d79ace6563eaa92f2edad093306e1888d018f4df81cee822c8
    • Instruction Fuzzy Hash: 6C01A731100429BBDB119F58DC88EEF7B3DEF54311F408131F915D5164E734E9528BA8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: <$`mP$`mP
    • API String ID: 0-2285921081
    • Opcode ID: 17162d83e4c3cced3a932387a750ff5497c267b5b0f01e13166db814e9de81e4
    • Instruction ID: 0b12832d44601a876062db357c05cffc139cd29a19d550668b7a8ee07dd38a80
    • Opcode Fuzzy Hash: 17162d83e4c3cced3a932387a750ff5497c267b5b0f01e13166db814e9de81e4
    • Instruction Fuzzy Hash: 5DB1B2B56083518FC724CF24D881A6BB7E1FFC5310F548A2EF59A97280DB38D949CB86
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • IsRectEmpty.USER32(?), ref: 00419D46
    • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 00419DCD
    • GetCurrentObject.GDI32(?,00000006), ref: 00419E5A
    • GetClientRect.USER32(?,?), ref: 00419ECC
      • Part of subcall function 004BC24A: __EH_prolog.LIBCMT ref: 004BC24F
      • Part of subcall function 004BC24A: EndPaint.USER32(?,?,?,?,00414203), ref: 004BC26C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prologPaintRect$BeginClientClipCurrentEmptyObject
    • String ID: !K
    • API String ID: 3717962522-3405271303
    • Opcode ID: e7b6fb4aaf6f0ac0f90b875ffbdaa26208e80bc5acb5ce22c57d5748fa7d81b2
    • Instruction ID: 0a1fe6af1754764c5a029e43df00309de83faabdd03b0775e9f4a373d6fa4a4f
    • Opcode Fuzzy Hash: e7b6fb4aaf6f0ac0f90b875ffbdaa26208e80bc5acb5ce22c57d5748fa7d81b2
    • Instruction Fuzzy Hash: 1C619B711083409FC324DB65C895FEBB7E8FF98714F40491EF58A83291DB78A949CB66
    APIs
    • SendMessageA.USER32(?,0000102B,?,?), ref: 0047165E
      • Part of subcall function 004B3C0B: SendMessageA.USER32(?,0000102E,?,?), ref: 004B3C2C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: 4=Q
    • API String ID: 3850602802-2863119746
    • Opcode ID: 56fb1cd82bc28453376bf88700e67b2b5977cc7c8b356425dc3a948649ce999d
    • Instruction ID: 79f6533c09ec75949094f3ab7d77e0450de4066d7130761945be43067d60211d
    • Opcode Fuzzy Hash: 56fb1cd82bc28453376bf88700e67b2b5977cc7c8b356425dc3a948649ce999d
    • Instruction Fuzzy Hash: CA51C531600701ABD724DF1ACC41BABB7E4EBC8760F04892EF94AD7290D274F9458B95
    APIs
    • wsprintfA.USER32 ref: 0044008F
    • CreateFontIndirectA.GDI32(00000028), ref: 004400F8
    • GetTextExtentPoint32A.GDI32(?,?,?,?), ref: 0044013F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CreateExtentFontIndirectPoint32Textwsprintf
    • String ID: !K$(
    • API String ID: 3175173087-3601426174
    • Opcode ID: 7239f9f3c85b927a1ee03d9d7c9dc6671c3b1f7390f75ad2d451ce38a1bbfb8b
    • Instruction ID: 8eee193e29bce46f534811b3e89b56cff38fc5e1d0c223d3358256633538a448
    • Opcode Fuzzy Hash: 7239f9f3c85b927a1ee03d9d7c9dc6671c3b1f7390f75ad2d451ce38a1bbfb8b
    • Instruction Fuzzy Hash: 9851A2712047458FD324DF28C888B6FB7E5FF88304F144A1EE59687381DBBAA945CB96
    APIs
    • IsWindow.USER32(00000000), ref: 00421314
    • GetParent.USER32(00000000), ref: 00421364
    • IsWindow.USER32(?), ref: 00421384
    • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000013), ref: 004213FF
      • Part of subcall function 004B9A7F: ShowWindow.USER32(?,?,0041F36C,00000000), ref: 004B9A8D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$ParentShow
    • String ID: `mP
    • API String ID: 2052805569-212751916
    • Opcode ID: 251c63f2f7020154319690223b0dd9026b32bee23396a810baee5ecdac38b504
    • Instruction ID: 9667bf97171157016da491a3bf1bd6cfe05264f4b40b846b3991564dde3b011a
    • Opcode Fuzzy Hash: 251c63f2f7020154319690223b0dd9026b32bee23396a810baee5ecdac38b504
    • Instruction Fuzzy Hash: 8E41DF31700321ABD720EE61AC80FAB7395AF64754F44053EFD099B381D778E805C7A9
    APIs
      • Part of subcall function 004AB7E4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB821
      • Part of subcall function 004AB7E4: EnterCriticalSection.KERNEL32(?,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB83C
    • GetCPInfo.KERNEL32(00000000,?,?,00000000,00000000,?,?,004A3A10), ref: 004A82DE
      • Part of subcall function 004AB845: LeaveCriticalSection.KERNEL32(?,004A5442,00000009,004A542E,00000000,?,00000000,00000000,00000000), ref: 004AB852
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalSection$EnterInfoInitializeLeave
    • String ID: 0~O$0~S$0~S$@}O
    • API String ID: 1866836854-2290326825
    • Opcode ID: ba9e2d7d2cd17c8b38edacea7fc1a4748ee8f8d3d772385f55526a1fae61bce8
    • Instruction ID: 64750d2dd4fce40c4e7f4d7ae8be86bdcd954814a54e0be51f507ce42616f2b1
    • Opcode Fuzzy Hash: ba9e2d7d2cd17c8b38edacea7fc1a4748ee8f8d3d772385f55526a1fae61bce8
    • Instruction Fuzzy Hash: 0A4169719082599FEB20DB74C88437A7BD1EB3B704F2444AFD6458B392DE7E4C499788
    APIs
    • GetVersionExA.KERNEL32 ref: 004A8FFF
    • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004A9034
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004A9094
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: EnvironmentFileModuleNameVariableVersion
    • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
    • API String ID: 1385375860-4131005785
    • Opcode ID: 3ce38b9261330ef832827222962ef8de3e471605105b92dc176d96e11da24a64
    • Instruction ID: 82d65cb3d4dc3bf9262858affe8259bac530441ef4a24a04aca57f8ff6d1d80a
    • Opcode Fuzzy Hash: 3ce38b9261330ef832827222962ef8de3e471605105b92dc176d96e11da24a64
    • Instruction Fuzzy Hash: 0C3168718092886DEB3596305C86BDF37A89B33384F2440EFD148D9242E73D8EC6CB1A
    APIs
    • SendMessageA.USER32(00000000,00000405,00000000,?), ref: 004B788B
    • GetWindowLongA.USER32(?,000000FC), ref: 004B789C
    • GetWindowLongA.USER32(?,000000FC), ref: 004B78AC
    • SetWindowLongA.USER32(?,000000FC,?), ref: 004B78C8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: LongWindow$MessageSend
    • String ID: (
    • API String ID: 2178440468-3887548279
    • Opcode ID: 0bb4f04ed05477ec76b2e9f509fce04a4ba82d1f89b8d551146d474e95258446
    • Instruction ID: e4406970075de76011f04a0bee87ae4fc42655e88152b7db355bf092eb18ce4f
    • Opcode Fuzzy Hash: 0bb4f04ed05477ec76b2e9f509fce04a4ba82d1f89b8d551146d474e95258446
    • Instruction Fuzzy Hash: E33190306047009FDB21BF69C888AAEBBF5BF88714F14453EE54197792DB38E814CB69
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 004BFAAF
      • Part of subcall function 004BFB9B: lstrlenA.KERNEL32(00000104,00000000,?,004BFADF), ref: 004BFBD2
    • lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 004BFB50
    • lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 004BFB7D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: FileModuleNamelstrcatlstrcpylstrlen
    • String ID: .HLP$.INI
    • API String ID: 2421895198-3011182340
    • Opcode ID: 341bb5cb38ac7e6a26d43214a997bce6e96f857faf09cf13153303f8e1127f3b
    • Instruction ID: 4a9d684f5fd0cb5c871585491720c512daeb07bbe3a200cde653ee6768a1c7f6
    • Opcode Fuzzy Hash: 341bb5cb38ac7e6a26d43214a997bce6e96f857faf09cf13153303f8e1127f3b
    • Instruction Fuzzy Hash: FE316071804718AFDB21EB71DC85BCAB7E8AF14304F1089BBA189D6152DA78A9C4CB24
    APIs
      • Part of subcall function 004BD2BB: GetParent.USER32(?), ref: 004BD2EE
      • Part of subcall function 004BD2BB: GetLastActivePopup.USER32(?), ref: 004BD2FD
      • Part of subcall function 004BD2BB: IsWindowEnabled.USER32(?), ref: 004BD312
      • Part of subcall function 004BD2BB: EnableWindow.USER32(?,00000000), ref: 004BD325
    • SendMessageA.USER32(?,00000376,00000000,00000000), ref: 004BD179
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,?,00000000), ref: 004BD1E7
    • MessageBoxA.USER32(00000000,?,?,00000000), ref: 004BD1F5
    • EnableWindow.USER32(00000000,00000001), ref: 004BD211
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$EnableMessage$ActiveEnabledFileLastModuleNameParentPopupSend
    • String ID: _\K
    • API String ID: 1958756768-1872837343
    • Opcode ID: b5dbe62dda5212d9fc905b0fa9d561abfbd5808fa7b716667f853eaf836f7168
    • Instruction ID: 77ede3c0bd7a32fa43d69f14e19181ed36ec3e63686559dfde82be4a06406c7d
    • Opcode Fuzzy Hash: b5dbe62dda5212d9fc905b0fa9d561abfbd5808fa7b716667f853eaf836f7168
    • Instruction Fuzzy Hash: 6621A872E00148AFDB209F98CCC1AEEB7B9EB44350F1445BAE615E7240E7759D81CB74
    APIs
    • GetMenuCheckMarkDimensions.USER32 ref: 004BF712
    • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 004BF7C1
    • LoadBitmapA.USER32(00000000,00007FE3), ref: 004BF7D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu
    • String ID: $\NM
    • API String ID: 2596413745-729966594
    • Opcode ID: 05dcbef5c3179e0345b117056622cabff96ee2320f048d4c8eb2a1b9cf93a2fb
    • Instruction ID: 59e075945337219c884b82ddb8f2f3d21129c4fe69ef817abd7a9fd5bbd45a09
    • Opcode Fuzzy Hash: 05dcbef5c3179e0345b117056622cabff96ee2320f048d4c8eb2a1b9cf93a2fb
    • Instruction Fuzzy Hash: DE212871E00214AFDB10CBB8CC89BAEBB78EB44714F0441A6E409EB382DA349A488B50
    APIs
    • GlobalLock.KERNEL32(?), ref: 00430470
    • GlobalSize.KERNEL32(?), ref: 00430493
    • GlobalSize.KERNEL32(?), ref: 004304C3
    • GlobalUnlock.KERNEL32(?,00000000,00000000), ref: 004304D3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Global$Size$LockUnlock
    • String ID: BM
    • API String ID: 2233901773-2348483157
    • Opcode ID: d66b48f41243cfb690ce08fd0b18b1f2680ef88a674324458656b270b05f0168
    • Instruction ID: 0fee707df617a02857eb9b92bf679195ee83e87a69dbc5805ecafeffbf313ea9
    • Opcode Fuzzy Hash: d66b48f41243cfb690ce08fd0b18b1f2680ef88a674324458656b270b05f0168
    • Instruction Fuzzy Hash: F1219876900758ABC710DF99D841BDEFBB8FF48720F10426EE819E3381D77959408BA9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: wsprintf$ClassInfo
    • String ID: Afx:%x:%x$Afx:%x:%x:%x:%x:%x
    • API String ID: 845911565-79760390
    • Opcode ID: 1d9abc0cbef3323cee0063210ba967de1fa3ec50303a9122c7f52e33d91c13cf
    • Instruction ID: 5a8bda74eddac4319e8b917c89036378cba28885143a35fd341493ecf00882c3
    • Opcode Fuzzy Hash: 1d9abc0cbef3323cee0063210ba967de1fa3ec50303a9122c7f52e33d91c13cf
    • Instruction Fuzzy Hash: CC21FC71904219AF8F10DFA9DC819EF7BB9EF59755B00442AF909A3201E3389A51CBB9
    APIs
    • Shell_NotifyIconA.SHELL32(00000001,?,?,00000058), ref: 00428079
    • DestroyIcon.USER32(?,?,?,00000058), ref: 00428086
    • Shell_NotifyIconA.SHELL32(?,?,00000000,00000058), ref: 004280B9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Icon$NotifyShell_$Destroy
    • String ID: X$d
    • API String ID: 944232879-651813629
    • Opcode ID: aebacc99b8a6e8670a6f3132dfcebdf61974304dbf8bab06d3d8149e6037cb19
    • Instruction ID: c9add3872167d449326b0048b63d5c0db05f8faa5ba618e1ba0542bcd4958608
    • Opcode Fuzzy Hash: aebacc99b8a6e8670a6f3132dfcebdf61974304dbf8bab06d3d8149e6037cb19
    • Instruction Fuzzy Hash: 57214A756097009FE350DF15D804B9BBBE5BFC4705F40891EB9C893350EBB9E9488BA6
    APIs
    • CopyRect.USER32(?), ref: 00431095
      • Part of subcall function 00431600: __ftol.LIBCMT ref: 004316EC
      • Part of subcall function 00431600: __ftol.LIBCMT ref: 00431723
      • Part of subcall function 00431600: __ftol.LIBCMT ref: 00431759
    • SetRect.USER32(?,00000000,00000000,?,?), ref: 004310AA
    • __ftol.LIBCMT ref: 004312F2
    • __ftol.LIBCMT ref: 004313BE
    • __ftol.LIBCMT ref: 00431472
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: __ftol$Rect$Copy
    • String ID:
    • API String ID: 775608801-0
    • Opcode ID: 554ef46dee40649727cd47bd6ac04fc6a231a4c0aaea5f163241093ca1ebefed
    • Instruction ID: a34098bb871d2b31c46375a67c61623455a04585fa6c5b3c623b7790ff0ca0b7
    • Opcode Fuzzy Hash: 554ef46dee40649727cd47bd6ac04fc6a231a4c0aaea5f163241093ca1ebefed
    • Instruction Fuzzy Hash: A7F17671608705AFC384CF19C9C0A5BB7E5EBC8754F842A2EF58AC7320E734E9468B56
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Client$Copy
    • String ID:
    • API String ID: 472922470-0
    • Opcode ID: d5afab9f692e68c7bd3c86d8e49954a6c115174ba91db457ad69c1dca7ae9d55
    • Instruction ID: f69a55d2ce978c2f678b35f87c8141e3e192bcf0dc8cacacfcf51607bbb68bc7
    • Opcode Fuzzy Hash: d5afab9f692e68c7bd3c86d8e49954a6c115174ba91db457ad69c1dca7ae9d55
    • Instruction Fuzzy Hash: F581B0712083419FC724EF69C8D1A6FB7E5BBC8704F10592EF19AD3241DB78A805CBA6
    APIs
    • GetClientRect.USER32(?,?), ref: 00475BC5
      • Part of subcall function 004B7A75: GetWindowTextLengthA.USER32(?), ref: 004B7A82
      • Part of subcall function 004B7A75: GetWindowTextA.USER32(?,00000000,00000000), ref: 004B7A9A
    • GetCurrentObject.GDI32(?,00000006), ref: 00475C35
    • OffsetRect.USER32(?,00000001,00000001), ref: 00475CFC
      • Part of subcall function 004B56A7: InterlockedDecrement.KERNEL32(-000000F4), ref: 004B56BB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: RectTextWindow$ClientCurrentDecrementInterlockedLengthObjectOffset
    • String ID:
    • API String ID: 2119403043-0
    • Opcode ID: da10d9db816834c0500ea994936025069d06d663b66bf77877cf9e6378e0dc6d
    • Instruction ID: 15aa0459b2de8aec65e73846d8b7bd9a90835fba4b9eb1e43e1b6ccf7179f047
    • Opcode Fuzzy Hash: da10d9db816834c0500ea994936025069d06d663b66bf77877cf9e6378e0dc6d
    • Instruction Fuzzy Hash: F88148756087409FC724DF14C884AAEB7E6BFC8710F508A1EF99A8B390D778E845CB56
    APIs
    • IsWindow.USER32(?), ref: 0042ACBC
    • SendMessageA.USER32(?,00008003,00000000,00000000), ref: 0042ACD3
    • GetWindowRect.USER32(?,00000000), ref: 0042AD25
    • GetClientRect.USER32(?,00000000), ref: 0042AD7D
    • GetWindowRect.USER32(?,00000000), ref: 0042ADA1
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: RectWindow$ClientMessageSend
    • String ID:
    • API String ID: 1071774122-0
    • Opcode ID: 1074c532e2cbb40930e7def52dcb82267d68013f67e68b158099857fc316eeab
    • Instruction ID: b175877cd8d5f53e6e39fae816addef2294752e244717da6544fc3f7438ae813
    • Opcode Fuzzy Hash: 1074c532e2cbb40930e7def52dcb82267d68013f67e68b158099857fc316eeab
    • Instruction Fuzzy Hash: 3861DF71604311AFC720DF25E884A6FB7E9EF88744F004A1EF98597381DA78ED45CB9A
    APIs
    • GetTextExtentPoint32A.GDI32(?,004E4CC4,?,?), ref: 00412181
    • GetSystemMetrics.USER32(0000002E), ref: 00412195
    • GetWindowRect.USER32(?,?), ref: 004121B5
    • GetStockObject.GDI32(00000011), ref: 00412202
    • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 00412211
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ExtentMessageMetricsObjectPoint32RectSendStockSystemTextWindow
    • String ID:
    • API String ID: 3316701254-0
    • Opcode ID: 734ea12736f167692fb2d7905bdd47e3585505b103b53df74cc513909989bbb0
    • Instruction ID: cc8a615c2ffcbff060aaea5db7e4097ae98e21ec7a2637f4b0c601bbaf62f671
    • Opcode Fuzzy Hash: 734ea12736f167692fb2d7905bdd47e3585505b103b53df74cc513909989bbb0
    • Instruction Fuzzy Hash: 55418E71244740BFD324DB65CD85FAB73A9AB88714F004A1EF65297280DBB8E941CB59
    APIs
    • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 00475746
    • ImageList_GetImageCount.COMCTL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00473FEE), ref: 004757CC
    • ImageList_GetImageCount.COMCTL32(?), ref: 004757F2
    • SendMessageA.USER32(?,00001006,00000000,?), ref: 00475837
    • SendMessageA.USER32(?,00001007,00000000,00000007), ref: 0047587A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Image$MessageSend$CountList_
    • String ID:
    • API String ID: 102003083-0
    • Opcode ID: cd277674f1f79063af1d1c3dbda630bc9c9a97d9d9275ed9fbea6b338a14196f
    • Instruction ID: bdc1252c9e347411d06e7ac3c9488ace6f5149bd203c49137cffd83252ffe0a0
    • Opcode Fuzzy Hash: cd277674f1f79063af1d1c3dbda630bc9c9a97d9d9275ed9fbea6b338a14196f
    • Instruction Fuzzy Hash: 3E4184755047419FC724DF19C880A9BBBE5FF88754F004A2EF899DB280D778E901CB9A
    APIs
    • IsWindow.USER32(?), ref: 00428DD0
    • WinHelpA.USER32(?,00000000,00000002,00000000), ref: 00428DEB
    • GetMenu.USER32(?), ref: 00428DFB
    • SetMenu.USER32(?,00000000), ref: 00428E08
    • DestroyMenu.USER32(00000000), ref: 00428E13
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Menu$DestroyHelpWindow
    • String ID:
    • API String ID: 427501538-0
    • Opcode ID: 9103028a13aa59560731decfd397974f3fc5d549530cb02644aedbd82f5dda9a
    • Instruction ID: 0f035d91a27b4fabdb434802f22261102efc4bd493fed0eb1e1248dbc33c803f
    • Opcode Fuzzy Hash: 9103028a13aa59560731decfd397974f3fc5d549530cb02644aedbd82f5dda9a
    • Instruction Fuzzy Hash: 3B310371600629ABC314AF66EC44E6FB7ACFF45308F81491EF94593241DB39B8448BA9
    APIs
    • midiStreamStop.WINMM(?,00000000,?,00000000,00434D2A,00000000,00506D88,0042B1F6,00506D88,?,00425DAF,00506D88,00423D66,00000001,00000000,000000FF), ref: 004351F5
    • midiOutReset.WINMM(?,?,00425DAF,00506D88,00423D66,00000001,00000000,000000FF), ref: 00435213
    • WaitForSingleObject.KERNEL32(?,000007D0,?,00425DAF,00506D88,00423D66,00000001,00000000,000000FF), ref: 00435236
    • midiStreamClose.WINMM(?,?,00425DAF,00506D88,00423D66,00000001,00000000,000000FF), ref: 00435273
    • midiStreamClose.WINMM(?,?,00425DAF,00506D88,00423D66,00000001,00000000,000000FF), ref: 004352A7
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: midi$Stream$Close$ObjectResetSingleStopWait
    • String ID:
    • API String ID: 3142198506-0
    • Opcode ID: b4747b54f625bec0209b13b6fa46a5786eb42e678772a998a881185714437e00
    • Instruction ID: db8de55214f7b6b0b6785d351009fe1658d7b66170f769ecf90532a10e107a19
    • Opcode Fuzzy Hash: b4747b54f625bec0209b13b6fa46a5786eb42e678772a998a881185714437e00
    • Instruction Fuzzy Hash: 403120B2700E418FCB209FA5D48495FB7E5BB98315B545A3FE146C6640C778E8458F98
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Menu$Destroy$AcceleratorTableWindow
    • String ID:
    • API String ID: 1240299919-0
    • Opcode ID: 1a1202755860d4e703cdcaab4b26325b13936e4e6da1767e4c9b8406de7901aa
    • Instruction ID: 4ee870262807074d0916d1ff3999c463ca9b836179a839c9cf7fbd788b6249b6
    • Opcode Fuzzy Hash: 1a1202755860d4e703cdcaab4b26325b13936e4e6da1767e4c9b8406de7901aa
    • Instruction Fuzzy Hash: FE31B3726006156FC720EF65DD44E6B77E9EF85348B02892DFC09C7202EA38F805CBA5
    APIs
    • IsChild.USER32(?,?), ref: 0042AA8C
      • Part of subcall function 0041F660: IsChild.USER32(?,?), ref: 0041F6DD
      • Part of subcall function 0041F660: GetParent.USER32(?), ref: 0041F6F7
    • GetCursorPos.USER32(?), ref: 0042AAA4
    • GetClientRect.USER32(?,?), ref: 0042AAB3
    • PtInRect.USER32(?,?,?), ref: 0042AAD4
    • SetCursor.USER32(?,?,00000000,?,?,?,?,0042A700), ref: 0042AB52
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ChildCursorRect$ClientParent
    • String ID:
    • API String ID: 1110532797-0
    • Opcode ID: dd4b857b67b84ad738077dee3228aaed68f25400cc2803eb281928b46f0e9fe1
    • Instruction ID: 8b6dc39930e5a0ced6e2aee6b3c086c86acedd6692d0cbc40d0f7adf9dc7b8de
    • Opcode Fuzzy Hash: dd4b857b67b84ad738077dee3228aaed68f25400cc2803eb281928b46f0e9fe1
    • Instruction Fuzzy Hash: 3121C831B006116FC720EA25DC45F9F77EAAF94B14F444A2EF905D3280E638F856C7AA
    APIs
    • __EH_prolog.LIBCMT ref: 004B3474
    • GetParent.USER32(?), ref: 004B34B1
    • SendMessageA.USER32(?,00000464,00000104,00000000), ref: 004B34D9
    • GetParent.USER32(?), ref: 004B3502
    • SendMessageA.USER32(?,00000465,00000104,00000000), ref: 004B351F
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageParentSend$H_prolog
    • String ID:
    • API String ID: 1056721960-0
    • Opcode ID: 30332130629a6019b495304aff13eb85c9306d8846f9cde215c644082e5ab93b
    • Instruction ID: eb357e1a5aa29b8130e6d7a55eb6f09bbffba2c029971ef590bde1c6e1f3741e
    • Opcode Fuzzy Hash: 30332130629a6019b495304aff13eb85c9306d8846f9cde215c644082e5ab93b
    • Instruction Fuzzy Hash: DC315270500619ABCB14EFA6CC55FEEB774FF54319F50462EE421A71E1DB38AA06CB28
    APIs
      • Part of subcall function 004BC124: __EH_prolog.LIBCMT ref: 004BC129
      • Part of subcall function 004BC124: GetWindowDC.USER32(?,?,?,00413521), ref: 004BC152
    • GetClientRect.USER32 ref: 00413532
    • GetWindowRect.USER32(?,?), ref: 00413541
      • Part of subcall function 004BBEDE: ScreenToClient.USER32(?,75C07310), ref: 004BBEF2
      • Part of subcall function 004BBEDE: ScreenToClient.USER32(?,75C07318), ref: 004BBEFB
    • OffsetRect.USER32(?,?,?), ref: 0041356C
      • Part of subcall function 004BBE1B: ExcludeClipRect.GDI32(?,?,?,?,?,75C0A5C0,?,?,0041357C,?), ref: 004BBE40
      • Part of subcall function 004BBE1B: ExcludeClipRect.GDI32(?,?,?,?,?,75C0A5C0,?,?,0041357C,?), ref: 004BBE55
    • OffsetRect.USER32(?,?,?), ref: 0041358F
    • FillRect.USER32(?,?,?), ref: 004135AA
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$Client$ClipExcludeOffsetScreenWindow$FillH_prolog
    • String ID:
    • API String ID: 2829754061-0
    • Opcode ID: 1aa5676be91313ab76d1287ff977a92033373e30b2c5ed3e396b4ae147a61c64
    • Instruction ID: 6b57ed543329a0b0fb3e46cf97ec793837c14f3a043e8284cf969ef4b7d99b78
    • Opcode Fuzzy Hash: 1aa5676be91313ab76d1287ff977a92033373e30b2c5ed3e396b4ae147a61c64
    • Instruction Fuzzy Hash: 39317175208701AFD714DF24C845EABB7E9EB88714F008A1EF496C7290DB78E945CB66
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Variant$ClearCopyInit
    • String ID:
    • API String ID: 1785138364-0
    • Opcode ID: 3b60fa9ce435c478363064584c731489168faad978cca61d110cbd39081d79ca
    • Instruction ID: eaef6a68b86a488d02f695768ce68024dedf599d2d8cb2edc95fd3e2ca707be9
    • Opcode Fuzzy Hash: 3b60fa9ce435c478363064584c731489168faad978cca61d110cbd39081d79ca
    • Instruction Fuzzy Hash: AA21C23A9046509FD3249B15D844B9FB7E8FB88B20F14453EF80593790C73CE889CB9A
    APIs
      • Part of subcall function 004B9917: GetWindowLongA.USER32(?,000000F0), ref: 004B9923
    • GetParent.USER32(?), ref: 00475944
    • GetClientRect.USER32(?,?), ref: 0047595D
    • InvalidateRect.USER32(?,?,00000001,?,?), ref: 004759AC
    • UpdateWindow.USER32(?), ref: 004759B2
    • InvalidateRect.USER32(?,00000000,00000000), ref: 004759D1
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Rect$InvalidateWindow$ClientLongParentUpdate
    • String ID:
    • API String ID: 529115757-0
    • Opcode ID: 2086ae7d6cdbb342519ed6d151f614fa753441b87be06555740fa7737cb4efdf
    • Instruction ID: 3fe938c3521b69bba30ddfaa06d0bbe573920943c06a43078d68b815023583f6
    • Opcode Fuzzy Hash: 2086ae7d6cdbb342519ed6d151f614fa753441b87be06555740fa7737cb4efdf
    • Instruction Fuzzy Hash: 54218EB5604301AFCB24DF21C881D6BB7E9EFC8314F10892EF98997350D678E80ACB65
    APIs
      • Part of subcall function 004B3F08: SendMessageA.USER32(?,0000110C,00000000,00000040), ref: 004B3F29
    • SendMessageA.USER32(?,0000110A,00000004,?), ref: 00419475
    • SendMessageA.USER32(?,0000110A,00000004,00000000), ref: 00419495
    • SendMessageA.USER32(?,00001101,00000000,00000000), ref: 004194A7
    • SendMessageA.USER32(?,0000110A,00000004,00000000), ref: 004194B5
    • SendMessageA.USER32(?,00001101,00000000,00000000), ref: 004194C7
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: fa5b21dec330ce19405ea19cdca0b320e46f9c5084bffc1218c457d49af308d7
    • Instruction ID: e61b541cfd3743305adb883e76e09d30ed8a21c896b2a8a4b1cb76b7b0736680
    • Opcode Fuzzy Hash: fa5b21dec330ce19405ea19cdca0b320e46f9c5084bffc1218c457d49af308d7
    • Instruction Fuzzy Hash: 630167B27407053AE634DE664CD1FA792AD9F98B56F00451EF702D72C4CAE8EC468678
    APIs
    • __EH_prolog.LIBCMT ref: 004B7C4F
    • GetClassInfoA.USER32(?,?,?), ref: 004B7C6A
    • RegisterClassA.USER32(?), ref: 004B7C75
    • lstrcatA.KERNEL32(00000034,?,00000001), ref: 004B7CAC
    • lstrcatA.KERNEL32(00000034,?), ref: 004B7CBA
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Classlstrcat$H_prologInfoRegister
    • String ID:
    • API String ID: 106226465-0
    • Opcode ID: f2c0fcf837c4aa4573f35f37b2f30dfed92e5b8b8a83f613e4dc362ca97cc20d
    • Instruction ID: 6d030322753ea00f9cdee06e96ef006cb86de793f40bad395c9334db410aef1b
    • Opcode Fuzzy Hash: f2c0fcf837c4aa4573f35f37b2f30dfed92e5b8b8a83f613e4dc362ca97cc20d
    • Instruction Fuzzy Hash: 1111E136504244BEDB10AF758C01AEE7FB8EF55714F00446FF805A7252C378A644CBB9
    APIs
    • GetLastError.KERNEL32(00000103,7FFFFFFF,004A5E02,004A7737,00000000,?,?,00000000,00000001), ref: 004A8EAE
    • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 004A8EBC
    • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 004A8F08
      • Part of subcall function 004A61F6: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004A62EC
    • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 004A8EE0
    • GetCurrentThreadId.KERNEL32 ref: 004A8EF1
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ErrorLastValue$AllocCurrentHeapThread
    • String ID:
    • API String ID: 2020098873-0
    • Opcode ID: 8d757476d02b74c2c58975bc1128f9060f433b362df01043e27203e65e428be6
    • Instruction ID: e8538e3a87473e58c4c6c7939ada5b112c7000a71d860cf573b400c450def5a0
    • Opcode Fuzzy Hash: 8d757476d02b74c2c58975bc1128f9060f433b362df01043e27203e65e428be6
    • Instruction Fuzzy Hash: F7F0F6355007129FD3202B30BC09A6F3A60DB527B2B10017EF981D62E1DF689C81879C
    APIs
    • GetCurrentObject.GDI32(?), ref: 0043DAFB
    • LPtoDP.GDI32(?,00000000,00000001), ref: 0043DB48
    • DPtoLP.GDI32(?,00000000,00000001), ref: 0043DB6B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CurrentObject
    • String ID: !K
    • API String ID: 844725943-3405271303
    • Opcode ID: f00f9c500a6190b8ee08a206c22d011b8981b7f36dfb2946cb2a71a1ae1bcc0a
    • Instruction ID: 2ad57e29ca33d791c95661d818cfb4e01e382bcae06b8fad9b1c9d780474970e
    • Opcode Fuzzy Hash: f00f9c500a6190b8ee08a206c22d011b8981b7f36dfb2946cb2a71a1ae1bcc0a
    • Instruction Fuzzy Hash: DCA1AD716083049BC718DF55D491A6FB7E9AFC8708F04691EF98683350CBB8ED04CBAA
    APIs
    • SendMessageA.USER32(00000000,00000401,?,00513D34), ref: 0047128A
    • SendMessageA.USER32(00000000,00000410,?,00513D34), ref: 004712AA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: 4=Q
    • API String ID: 3850602802-2863119746
    • Opcode ID: d0640ce81e792f2ae05edaf14108fcd6f7d63b63a271ec425847055e5e696083
    • Instruction ID: d02d9e57f2c811fc1918eadd3990b4e68d267675990f31607b1b01893f025837
    • Opcode Fuzzy Hash: d0640ce81e792f2ae05edaf14108fcd6f7d63b63a271ec425847055e5e696083
    • Instruction Fuzzy Hash: 76513A76A002019BD700DF29EC409AB77E6EBD4324F14853AED4CD7352D63AE94687D6
    APIs
    • GlobalLock.KERNEL32 ref: 004BB480
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020), ref: 004BB4D3
    • GlobalUnlock.KERNEL32(?), ref: 004BB56A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Global$ByteCharLockMultiUnlockWide
    • String ID: @
    • API String ID: 231414890-2766056989
    • Opcode ID: 9c9130e508bf8d53c0489424e09a6d507ce78bcb25fa8061870df10d9d28dcc5
    • Instruction ID: 33847f747efeb79834f3e656aeb54072441c939e331dd3b43b541cdfe3774935
    • Opcode Fuzzy Hash: 9c9130e508bf8d53c0489424e09a6d507ce78bcb25fa8061870df10d9d28dcc5
    • Instruction Fuzzy Hash: 4241F971800219EFCB10DF54C8819EEBBB8FF40354F14816AE8159B255D378A946CBE8
    APIs
      • Part of subcall function 00430530: GetObjectA.GDI32(?,00000018,?), ref: 0043056D
      • Part of subcall function 00430530: GetDeviceCaps.GDI32 ref: 00430607
      • Part of subcall function 00430530: GetSystemPaletteEntries.GDI32(?,00000000,000000FF,00000004), ref: 00430641
      • Part of subcall function 00430530: CreatePalette.GDI32(00000000), ref: 0043064C
    • GlobalAlloc.KERNEL32(00000002,?), ref: 004309DA
    • GlobalLock.KERNEL32(00000000), ref: 004309F5
    • GlobalUnlock.KERNEL32(00000000), ref: 00430A0E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Global$Palette$AllocCapsCreateDeviceEntriesLockObjectSystemUnlock
    • String ID: !K
    • API String ID: 1348334340-3405271303
    • Opcode ID: 5f9ce073571883819aed2fff0be33d75dc7fb4d162be5a573432168d5507b5af
    • Instruction ID: 396684f551febe174cad246fa71ec4422f717a7c6f7679e72be61d51108931fa
    • Opcode Fuzzy Hash: 5f9ce073571883819aed2fff0be33d75dc7fb4d162be5a573432168d5507b5af
    • Instruction Fuzzy Hash: 3F31CE755083448BC314EF18D894B6FFBE4BBD8714F400A2EF88183241DB78A948CBA6
    APIs
      • Part of subcall function 004B31FA: __EH_prolog.LIBCMT ref: 004B31FF
      • Part of subcall function 004B31FA: lstrcpynA.KERNEL32(?,?,00000104), ref: 004B32EC
      • Part of subcall function 004B3394: lstrlenA.KERNEL32(?,?,?,0000000C,?,?,0042F799,?,-00000001,00000000,?,?,?,004E9C90), ref: 004B339E
      • Part of subcall function 004B3394: GetFocus.USER32 ref: 004B33B9
      • Part of subcall function 004B3394: IsWindowEnabled.USER32(?), ref: 004B33E2
      • Part of subcall function 004B3394: EnableWindow.USER32(?,00000000), ref: 004B33F4
      • Part of subcall function 004B3394: GetOpenFileNameA.COMDLG32(?,?), ref: 004B341F
      • Part of subcall function 004B3394: EnableWindow.USER32(?,00000001), ref: 004B343D
      • Part of subcall function 004B3394: IsWindow.USER32(?), ref: 004B3443
      • Part of subcall function 004B3394: SetFocus.USER32(?), ref: 004B3451
      • Part of subcall function 004B346F: __EH_prolog.LIBCMT ref: 004B3474
      • Part of subcall function 004B346F: GetParent.USER32(?), ref: 004B34B1
      • Part of subcall function 004B346F: SendMessageA.USER32(?,00000464,00000104,00000000), ref: 004B34D9
      • Part of subcall function 004B346F: GetParent.USER32(?), ref: 004B3502
      • Part of subcall function 004B346F: SendMessageA.USER32(?,00000465,00000104,00000000), ref: 004B351F
      • Part of subcall function 004B99AD: SetWindowTextA.USER32(?,0042DEFA), ref: 004B99BB
      • Part of subcall function 004B56A7: InterlockedDecrement.KERNEL32(-000000F4), ref: 004B56BB
    • SendMessageA.USER32(?,000000B1,00000000,000000FF), ref: 00445B7D
    • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 00445B8C
      • Part of subcall function 004B9AE8: SetFocus.USER32(?,00422B93), ref: 004B9AF2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$MessageSend$Focus$EnableH_prologParent$DecrementEnabledFileInterlockedNameOpenTextlstrcpynlstrlen
    • String ID: out.prn$prn
    • API String ID: 4074345921-3109735852
    • Opcode ID: cbfe4f27e890598508b25791f6938c95b064ce35b6f9e057c8f9a8c785899e0d
    • Instruction ID: 688a9b11ccccdcc0930663070a8d3b28761791c4f2fc512f80c6ea8ab98f6259
    • Opcode Fuzzy Hash: cbfe4f27e890598508b25791f6938c95b064ce35b6f9e057c8f9a8c785899e0d
    • Instruction Fuzzy Hash: 3521A131144780ABD334EB19CC46FDBB7E4AB84B14F104A1EB5A9522D2CBBC6505CBA6
    APIs
    • GetClassInfoA.USER32(?,WTWindow,00000000), ref: 00426A48
    • LoadCursorA.USER32(00000000,00007F00), ref: 00426A59
    • GetStockObject.GDI32(00000005), ref: 00426A63
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ClassCursorInfoLoadObjectStock
    • String ID: WTWindow
    • API String ID: 1762135420-3503404378
    • Opcode ID: b36549d0d914d4df452a0b481b35e8bcdc0d8a9b0a6b38d4e4ffffdea2b9fbc2
    • Instruction ID: df60b3a56a819b3155a9abba5a4746dc57c8597be2b171ca0c0a4320af396673
    • Opcode Fuzzy Hash: b36549d0d914d4df452a0b481b35e8bcdc0d8a9b0a6b38d4e4ffffdea2b9fbc2
    • Instruction Fuzzy Hash: CE118271909750AFC700DF269C8495FFBE8FF88355F81482EF98997211D73899448B5A
    APIs
    • InterlockedIncrement.KERNEL32(00537CE4), ref: 004A6C03
    • InterlockedDecrement.KERNEL32(00537CE4), ref: 004A6C18
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Interlocked$DecrementIncrement
    • String ID: |S
    • API String ID: 2172605799-2514068008
    • Opcode ID: 8a70864a73938998adad891790ed32f4dccdd5f5b8bc9795c3001d6a77fd2c91
    • Instruction ID: 1a735c3f61f0754bfcbc474c0658fe3c822514ed036d7865dc30eee238a31331
    • Opcode Fuzzy Hash: 8a70864a73938998adad891790ed32f4dccdd5f5b8bc9795c3001d6a77fd2c91
    • Instruction Fuzzy Hash: 38F046721052059FD324EB55ACCD98FA398FFF2326F29043FF540C6290CBA89C819959
    APIs
    • InterlockedIncrement.KERNEL32(00537CE4), ref: 004A57C2
    • InterlockedDecrement.KERNEL32(00537CE4), ref: 004A57D7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Interlocked$DecrementIncrement
    • String ID: |S
    • API String ID: 2172605799-2514068008
    • Opcode ID: 3833986c2497696eb47bcf04576a3d8aa21d921e65336cf0b05038d7e5a6cb79
    • Instruction ID: 7c5001207371c21b9c6378b6654a44ad5754beb2ff09263aadb10ad9a93deb21
    • Opcode Fuzzy Hash: 3833986c2497696eb47bcf04576a3d8aa21d921e65336cf0b05038d7e5a6cb79
    • Instruction Fuzzy Hash: 20F0C272105A159FE320BB55ADC598FA394FBA2315F20043FF10096251DB6CAD81996A
    APIs
    • GetCursorPos.USER32(?), ref: 00471C99
    • ScreenToClient.USER32(?,?), ref: 00471CB4
    • PostMessageA.USER32(?,00000401,00000000,00000000), ref: 00471CF9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ClientCursorMessagePostScreen
    • String ID: @
    • API String ID: 4019823077-2766056989
    • Opcode ID: 5e15fc34aa9c20d755934cb0e2410045239b2fd4cacf9539c2fd4b9fc22eb0c6
    • Instruction ID: 51a6f68cf32ed041a02604745ba58382935058382f18bbd992528c8d27f6cbf0
    • Opcode Fuzzy Hash: 5e15fc34aa9c20d755934cb0e2410045239b2fd4cacf9539c2fd4b9fc22eb0c6
    • Instruction Fuzzy Hash: D6F0D171A04301BFCA20DF68D848E9FB7BCEB84701F00C91DF84993250D734E9088BAA
    APIs
    • InterlockedIncrement.KERNEL32(00537CE4), ref: 004B1B43
    • InterlockedDecrement.KERNEL32(00537CE4), ref: 004B1B5A
      • Part of subcall function 004AB7E4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB821
      • Part of subcall function 004AB7E4: EnterCriticalSection.KERNEL32(?,?,?,004A62AC,00000009,00000000,00000000,00000001,004A8ED1,00000001,00000074,?,?,00000000,00000001), ref: 004AB83C
    • InterlockedDecrement.KERNEL32(00537CE4), ref: 004B1B86
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Interlocked$CriticalDecrementSection$EnterIncrementInitialize
    • String ID: |S
    • API String ID: 2038102319-2514068008
    • Opcode ID: 2091d326f8b50c0ac2e50dcabf86118c8d4652221fae681f170345c0594d58b7
    • Instruction ID: ff05cf0ebb860d2a52cf396324d937b19cd8a59325e12bb95fc61d905c1573c8
    • Opcode Fuzzy Hash: 2091d326f8b50c0ac2e50dcabf86118c8d4652221fae681f170345c0594d58b7
    • Instruction Fuzzy Hash: 8FF0593210510CBFEB102B55AC50CDE775CEFA5335F10403FF504091619BB4694289A8
    APIs
    • GetWindowLongA.USER32(00000000,000000F0), ref: 004BCB76
    • GetClassNameA.USER32(00000000,?,0000000A), ref: 004BCB91
    • lstrcmpiA.KERNEL32(?,combobox), ref: 004BCBA0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ClassLongNameWindowlstrcmpi
    • String ID: combobox
    • API String ID: 2054663530-2240613097
    • Opcode ID: 86a8c73e6d7f539274fd16b3e3f783f24d05f70ed43ddc3741f9381549f579d6
    • Instruction ID: b1babafd2da8ef9f6266ba2816aa1bf52e2367203af4d3a6207e1a2bdbf15b34
    • Opcode Fuzzy Hash: 86a8c73e6d7f539274fd16b3e3f783f24d05f70ed43ddc3741f9381549f579d6
    • Instruction Fuzzy Hash: 9DE06531954508BBCF119F70EC8AE9D3B68EB00355F544232B412D51E0DA34F586CB69
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 405a44dfda4e045c6e36d223e8c9f04ad4585a5ea2610da8f04587c1cbb83fdc
    • Instruction ID: 97f92e14b0e8778e656e20f0f0fb3da6dc214c92f93dbfde683dc1069e70820b
    • Opcode Fuzzy Hash: 405a44dfda4e045c6e36d223e8c9f04ad4585a5ea2610da8f04587c1cbb83fdc
    • Instruction Fuzzy Hash: 0C91FBB1C01118AEDF21AB69DC41ADF7ABCEB66764F29012BF814B6291D73D8D40C76C
    APIs
    • HeapAlloc.KERNEL32(00000000,00002020,004F8590,004F8590,?,?,004ADA38,00000000,00000010,00000000,00000009,00000009,?,004A5421,00000010,00000000), ref: 004AD58D
    • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,004ADA38,00000000,00000010,00000000,00000009,00000009,?,004A5421,00000010,00000000), ref: 004AD5B1
    • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,004ADA38,00000000,00000010,00000000,00000009,00000009,?,004A5421,00000010,00000000), ref: 004AD5CB
    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,004ADA38,00000000,00000010,00000000,00000009,00000009,?,004A5421,00000010,00000000,?), ref: 004AD68C
    • HeapFree.KERNEL32(00000000,00000000,?,?,004ADA38,00000000,00000010,00000000,00000009,00000009,?,004A5421,00000010,00000000,?,00000000), ref: 004AD6A3
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: AllocVirtual$FreeHeap
    • String ID:
    • API String ID: 714016831-0
    • Opcode ID: 6a8b2745da4aa8dd9de9ca4e30a4848a1b55bcf2de7d4a9afb5c3f8c6b32f367
    • Instruction ID: c3a009725ef91750e703fb04ade65f11fe4a9277f723fb6918dedd84692fca19
    • Opcode Fuzzy Hash: 6a8b2745da4aa8dd9de9ca4e30a4848a1b55bcf2de7d4a9afb5c3f8c6b32f367
    • Instruction Fuzzy Hash: 3431E2B0900705AFD7308F24DC45B36B7E0EB6A754F10453EE65A9BBA0EB78A854CB4C
    APIs
    • VariantInit.OLEAUT32(?), ref: 0040F84A
    • VariantCopyInd.OLEAUT32(?), ref: 0040F85B
    • VariantChangeType.OLEAUT32(?,?,00000000,00000005), ref: 0040F997
    • VariantClear.OLEAUT32(?), ref: 0040FBFB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Variant$ChangeClearCopyInitType
    • String ID:
    • API String ID: 365082162-0
    • Opcode ID: 8408c71ecdf33fc3118385fa9a4b5d91f7e657fa7df750a546c7cd961cfbab59
    • Instruction ID: c07016446ca865a637681ae2b8f1fde98d5612610197dd2dd5fda1fe77f329c8
    • Opcode Fuzzy Hash: 8408c71ecdf33fc3118385fa9a4b5d91f7e657fa7df750a546c7cd961cfbab59
    • Instruction Fuzzy Hash: BE915F746082029FD324DF58C490B6BB7B5AB89700F24447EE981A7791D239EC8ADF5B
    APIs
    • midiStreamOpen.WINMM(?,?,00000001,00436150,?,00030000,?,?,?,00000000), ref: 00435B4B
    • midiStreamProperty.WINMM ref: 00435C32
    • midiOutPrepareHeader.WINMM(?,?,00000040,00000001,00000000,?,?,?,00000000), ref: 00435D80
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: midi$Stream$HeaderOpenPrepareProperty
    • String ID:
    • API String ID: 2061886437-0
    • Opcode ID: 8b7b85342de1dabec75364b769756ba1552f42c49b123c194cf084c127b36374
    • Instruction ID: d01c14acd0f672ca75da158ccbd975eb8435906a11bf3e26fb9c8898987ec084
    • Opcode Fuzzy Hash: 8b7b85342de1dabec75364b769756ba1552f42c49b123c194cf084c127b36374
    • Instruction Fuzzy Hash: DFA18E716006068FD724DF28D890BAAB7F6FB88304F51892EE686C7750EB35F919CB44
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cc9d2e125089e230be03272b3e26224c044ada6b0437df94fe704591abb048d6
    • Instruction ID: d078e81d687e5aaea821d16534621559cfe33d00fac3d1699afe0b63b12df700
    • Opcode Fuzzy Hash: cc9d2e125089e230be03272b3e26224c044ada6b0437df94fe704591abb048d6
    • Instruction Fuzzy Hash: 33514EB25083419FC310EF69C981A6BF7E8FB89714F404A2EF19583340DB79E908CB66
    APIs
    • ReadFile.KERNEL32(000001D0,000001D0,00000000,000001D0,00000000,00000000,00000000,00000000), ref: 004AF09A
    • GetLastError.KERNEL32 ref: 004AF0A4
    • ReadFile.KERNEL32(?,?,00000001,000001D0,00000000), ref: 004AF16A
    • GetLastError.KERNEL32 ref: 004AF174
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ErrorFileLastRead
    • String ID:
    • API String ID: 1948546556-0
    • Opcode ID: 217c50c73d27b03c23b24fe4d50b0e26439745803c4ed4e0c17887d051e542db
    • Instruction ID: 9051600db17ac01be7b76268cd8ef22b873f8455af3d93596beedf8eef159953
    • Opcode Fuzzy Hash: 217c50c73d27b03c23b24fe4d50b0e26439745803c4ed4e0c17887d051e542db
    • Instruction Fuzzy Hash: F151A534504385DFDF218FD8C884BAA7BB0AF27304F5444ABE8618B351D7789D4ACB59
    APIs
    • GetClientRect.USER32(?,?), ref: 00433C42
    • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 00433C9A
    • __ftol.LIBCMT ref: 00433D85
    • __ftol.LIBCMT ref: 00433D92
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,00000000), ref: 004BB98E
      • Part of subcall function 004BB96C: SelectObject.GDI32(00411F45,?), ref: 004BB9A4
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ObjectSelect__ftol$ClientRect
    • String ID:
    • API String ID: 2514210182-0
    • Opcode ID: fddbf0cc31342cf47f7d835f1b79900d44014be4a5afd66448eda3c3dd135a92
    • Instruction ID: 097d24e383bdad0b99357f8dfa4c28ccbb0f37c62f03c2bc9efbb22c6fe3636e
    • Opcode Fuzzy Hash: fddbf0cc31342cf47f7d835f1b79900d44014be4a5afd66448eda3c3dd135a92
    • Instruction Fuzzy Hash: F551BDB1A083029FC714CF29C88096BBBE5FBC8701F148A2EF98593291D774DD498B96
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: DeleteObject$Release
    • String ID:
    • API String ID: 2600533906-0
    • Opcode ID: c55c0856ef87892f386ae3ced23adde7f19b553838a4b643ea0ea362308e5485
    • Instruction ID: f914c7d525b1ff10cbe0d7d9cb15ce9dfafd3668eb77c4375656ab90c7be240c
    • Opcode Fuzzy Hash: c55c0856ef87892f386ae3ced23adde7f19b553838a4b643ea0ea362308e5485
    • Instruction Fuzzy Hash: 58517EB1A042009FEB14DF28C8C0B9A7BE5BF54300F08857AEC49CF306DB359946CB65
    APIs
      • Part of subcall function 004B9AA6: IsWindowEnabled.USER32(?), ref: 004B9AB0
    • IsWindowVisible.USER32(?), ref: 00412F8A
      • Part of subcall function 004B7A75: GetWindowTextLengthA.USER32(?), ref: 004B7A82
      • Part of subcall function 004B7A75: GetWindowTextA.USER32(?,00000000,00000000), ref: 004B7A9A
      • Part of subcall function 004B4047: SendMessageA.USER32(?,00000466,00000000,00000000), ref: 004B4053
    • wsprintfA.USER32 ref: 00413024
    • SendMessageA.USER32(?,000000B1,00000000,000000FF), ref: 00413050
    • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 0041305F
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$MessageSend$Text$EnabledLengthVisiblewsprintf
    • String ID:
    • API String ID: 1914814478-0
    • Opcode ID: 1ff5672b7a5c05030ea8dca174fd9403b9661dbfa8a1bea374175be8ddb13f66
    • Instruction ID: bcffb39bb1fd5fb4ac62587c8d97f8fdc02a1aff517936c729ea4ca29bdd41bf
    • Opcode Fuzzy Hash: 1ff5672b7a5c05030ea8dca174fd9403b9661dbfa8a1bea374175be8ddb13f66
    • Instruction Fuzzy Hash: 19515771608741AFD324DF14C981B9BB7F5BBC8B14F10891EE59A8B780CB79E801CB96
    APIs
    • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,?,?), ref: 004AEEF7
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 724fb606fbfcbda066a490f264ae99ac4bf5b5800e92bd926dc5038df420ab48
    • Instruction ID: e6e720f1790f549de3a6c365f544dccaa12b738b03f8796c1abc9f86f07dfcc0
    • Opcode Fuzzy Hash: 724fb606fbfcbda066a490f264ae99ac4bf5b5800e92bd926dc5038df420ab48
    • Instruction Fuzzy Hash: 3851D37190024CEFCB11DF6AC984A9EBBB5FF62340F1081AAF9259B251D734DA41CB69
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ecc77b8319e5e9f2d5083a412c68961ed71832e676dd6e071b265070187c87f1
    • Instruction ID: 38ef5d86a5bb55aca8c03c3717dda62d424f249f670af4266f476476d1ed14e8
    • Opcode Fuzzy Hash: ecc77b8319e5e9f2d5083a412c68961ed71832e676dd6e071b265070187c87f1
    • Instruction Fuzzy Hash: 3C316C763147019FE720DF29E881BAB73E5EB84714F014D2EF542DB281D675E8828BA9
    APIs
    • IsWindow.USER32(?), ref: 0043F994
    • SendMessageA.USER32(?,000000B1,?,000000FF), ref: 0043F9ED
    • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 0043F9FC
    • SendMessageA.USER32(?,000000C2,00000000,?), ref: 0043FA2A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$Window
    • String ID:
    • API String ID: 2326795674-0
    • Opcode ID: 1a34b4f1918982f5afb8e296f3d23751fce46679d27de4c6fdf80ee631b96422
    • Instruction ID: 6f547b9dc02c59687ef8c7c416d0a96bd5cd55170f45adfde745bb635eb58306
    • Opcode Fuzzy Hash: 1a34b4f1918982f5afb8e296f3d23751fce46679d27de4c6fdf80ee631b96422
    • Instruction Fuzzy Hash: 3541B3726487419FD320DB59D840B6BF7E4EB98720F448A2EF4A5973D1C378D409CBA6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID: ]"G
    • API String ID: 0-3559913186
    • Opcode ID: 1362c6a4babbfb5b1be9d9b8e8be7288574cdd6d4d451afc7a822328402f9561
    • Instruction ID: 540b65ed9232267abbde1a3907145175255cec7d49206df7e0a00cb5a59574ba
    • Opcode Fuzzy Hash: 1362c6a4babbfb5b1be9d9b8e8be7288574cdd6d4d451afc7a822328402f9561
    • Instruction Fuzzy Hash: 5431D2723006059BCF18DF59E880ABAB39AEB50715B45C46FE90ACB205DB75D800DBA8
    APIs
    • CreateSolidBrush.GDI32(?), ref: 00453D6A
    • SendMessageA.USER32(?,00000030,00000000,00000000), ref: 00453DAE
    • SendMessageA.USER32(?,000000B1,?,000000FF), ref: 00453DE4
    • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 00453DF3
      • Part of subcall function 004B99AD: SetWindowTextA.USER32(?,0042DEFA), ref: 004B99BB
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$BrushCreateSolidTextWindow
    • String ID:
    • API String ID: 3501373727-0
    • Opcode ID: 90c8b331a8517e585e3a0c19096cf093a7df751af5bea5285153f9d250ab5be3
    • Instruction ID: 332e826a61122815453a21c3ca5adc445db046fe95c89b4b26d42a32998ae84b
    • Opcode Fuzzy Hash: 90c8b331a8517e585e3a0c19096cf093a7df751af5bea5285153f9d250ab5be3
    • Instruction Fuzzy Hash: 533148B46047009FC354DF19C881B2AF7F5EB88B10F508A1EF99587391CB78E904CB59
    APIs
    • IsWindow.USER32(?), ref: 00473085
    • SendMessageA.USER32(?,00000419,?,00000000), ref: 004730BC
    • SendMessageA.USER32(?,00000433,?,?), ref: 00473122
    • ClientToScreen.USER32(?,?), ref: 0047314E
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$ClientScreenWindow
    • String ID:
    • API String ID: 4074774880-0
    • Opcode ID: 7f149c26f12a1b4515179127850cc9698cc65ebbb711e446af87daace6f65720
    • Instruction ID: 3349bd06dc56a8c2f41b7190f0abe4633ac89b0b4fa40f142dc8975ab2c78949
    • Opcode Fuzzy Hash: 7f149c26f12a1b4515179127850cc9698cc65ebbb711e446af87daace6f65720
    • Instruction Fuzzy Hash: 02313CB1608301AFD324CF29D881A9FB7E4EB88794F40892EF95987340D774E9058B6A
    APIs
    • lstrcpynA.KERNEL32(004B9C94,?,00000104,?,?,?,?,?,?,?,004B9C82,?), ref: 004B9CC2
    • GetFileTime.KERNEL32(00000000,004B9C82,?,?,?,?,?,?,?,?,?,004B9C82,?), ref: 004B9CE3
    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,004B9C82,?), ref: 004B9CF2
    • GetFileAttributesA.KERNEL32(?,?,?,?,?,?,?,?,004B9C82,?), ref: 004B9D13
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: File$AttributesSizeTimelstrcpyn
    • String ID:
    • API String ID: 1499663573-0
    • Opcode ID: fc6b607fd979dd69a754143c57fec174864a418bc03e6f700f66080cf18dbd88
    • Instruction ID: 7e74ca12534bedb04af2f30cff0b43b5b386ed202d35761296958509e348da30
    • Opcode Fuzzy Hash: fc6b607fd979dd69a754143c57fec174864a418bc03e6f700f66080cf18dbd88
    • Instruction Fuzzy Hash: CE318E72500605AFD720DFA1C885EEBBBFCEB14310F104A2AE656D7290D774A984CBA4
    APIs
    • GetMessagePos.USER32 ref: 0041D068
    • ScreenToClient.USER32(?,?), ref: 0041D08A
    • ChildWindowFromPointEx.USER32(?,?,?,00000005), ref: 0041D0A0
    • GetFocus.USER32 ref: 0041D0AB
      • Part of subcall function 004B9AE8: SetFocus.USER32(?,00422B93), ref: 004B9AF2
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Focus$ChildClientFromMessagePointScreenWindow
    • String ID:
    • API String ID: 3117237277-0
    • Opcode ID: 07a676e86ad80c02e0a471a78678d71f2d63b7e378f0a37fde66402e9aafe534
    • Instruction ID: d40b407776c3bb5f4fe6862fdb83afdab694d0bd1db678f0dba43f59d89cffca
    • Opcode Fuzzy Hash: 07a676e86ad80c02e0a471a78678d71f2d63b7e378f0a37fde66402e9aafe534
    • Instruction Fuzzy Hash: F121A5717006026FD624AB24DC41FAFB7A9AF84308F04852EF94587285DB78F982C7A9
    APIs
    • GetVersion.KERNEL32 ref: 004A3996
      • Part of subcall function 004A9128: HeapCreate.KERNELBASE(00000000,00001000,00000000,004A39CE,00000001), ref: 004A9139
      • Part of subcall function 004A9128: HeapDestroy.KERNEL32 ref: 004A9178
    • GetCommandLineA.KERNEL32 ref: 004A39F6
    • GetStartupInfoA.KERNEL32(?), ref: 004A3A21
    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004A3A44
      • Part of subcall function 004A3A9D: ExitProcess.KERNEL32 ref: 004A3ABA
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
    • String ID:
    • API String ID: 2057626494-0
    • Opcode ID: 873566874d538816f43008a165908b583b5bcc52dd2c84707f29c5ec44d396c5
    • Instruction ID: 8ce6b002e4a447fa27dfc0a84d7836fbe34ed5b73d7f7fa40a59ae8cd6bfb1e2
    • Opcode Fuzzy Hash: 873566874d538816f43008a165908b583b5bcc52dd2c84707f29c5ec44d396c5
    • Instruction Fuzzy Hash: A921B6B1940755AFD708AFA6DC09A6E7BACEF26704F10052FF4019A391DF7C4940DB98
    APIs
    • GetSystemMetrics.USER32(0000002D), ref: 004545B9
    • SystemParametersInfoA.USER32 ref: 00454613
    • CreateFontIndirectA.GDI32(?), ref: 00454621
    • CreatePalette.GDI32(00000300), ref: 00454679
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CreateSystem$FontIndirectInfoMetricsPaletteParameters
    • String ID:
    • API String ID: 934993634-0
    • Opcode ID: 828a7b85a37e210ea3a2f33f72521aa708873629572f7f5f4fa7d3b0e2349af9
    • Instruction ID: d3084bc69a949a50aa64d40f7fd161f6f89270a3f4325afa6f685461921fb7f9
    • Opcode Fuzzy Hash: 828a7b85a37e210ea3a2f33f72521aa708873629572f7f5f4fa7d3b0e2349af9
    • Instruction Fuzzy Hash: B1318E75404B408FD320CF25C888A9BFBF5FF95308F80896EE59A8B651DB75A448CB65
    APIs
    • StartPage.GDI32(?), ref: 0041D935
    • EndPage.GDI32(?), ref: 0041D95B
      • Part of subcall function 0042B8E0: wsprintfA.USER32 ref: 0042B8EF
      • Part of subcall function 004B99AD: SetWindowTextA.USER32(?,0042DEFA), ref: 004B99BB
    • UpdateWindow.USER32(?), ref: 0041D9AA
    • EndPage.GDI32(?), ref: 0041D9C2
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Page$Window$StartTextUpdatewsprintf
    • String ID:
    • API String ID: 104827578-0
    • Opcode ID: eed53501be4d68b368ec47ca1d1dc50780c9e4301c32fd66cd11f8b42f115f32
    • Instruction ID: 589aeea76b4e0705a9f5892d0182a9c08713dd0031085f68fb13875f061bb2f6
    • Opcode Fuzzy Hash: eed53501be4d68b368ec47ca1d1dc50780c9e4301c32fd66cd11f8b42f115f32
    • Instruction Fuzzy Hash: 442141B1A11F009FC3249B3ADC88ADBB7E4EFC5705F54482EE49FC7210E634A4458B59
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Parent$RectWindow
    • String ID:
    • API String ID: 2276825053-0
    • Opcode ID: 95642da11e4ec409d9d24c8069c19d9106f07a0ebaf50f5aa27224c4d4ffb8f1
    • Instruction ID: 2eed01020eeb1f16c14b6d57897540545103c0d550a254f477e00191a82f36b9
    • Opcode Fuzzy Hash: 95642da11e4ec409d9d24c8069c19d9106f07a0ebaf50f5aa27224c4d4ffb8f1
    • Instruction Fuzzy Hash: F911AFB1204705AFD724EF65D885EABB7EDEBC8300F004A1EB94583345EA79EC468774
    APIs
      • Part of subcall function 00475AC0: GetTopWindow.USER32(75C11AC0), ref: 00475ACD
      • Part of subcall function 00475AC0: IsWindowVisible.USER32(00000000), ref: 00475AE2
      • Part of subcall function 00475AC0: GetTopWindow.USER32(00000000), ref: 00475AED
      • Part of subcall function 00475AC0: GetWindow.USER32(00000000,00000002), ref: 00475B08
    • GetWindowRect.USER32(?,?), ref: 00475A48
    • IntersectRect.USER32(?,?,?), ref: 00475A55
    • IsRectEmpty.USER32(?), ref: 00475A60
      • Part of subcall function 004BBEDE: ScreenToClient.USER32(?,75C07310), ref: 004BBEF2
      • Part of subcall function 004BBEDE: ScreenToClient.USER32(?,75C07318), ref: 004BBEFB
    • RedrawWindow.USER32(?,00000705,00000000,00000705,?,?,?,?,?,75C11AC0,?,004C4278,000000FF,004759C6,?,?), ref: 00475A89
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Rect$ClientScreen$EmptyIntersectRedrawVisible
    • String ID:
    • API String ID: 1303225554-0
    • Opcode ID: fb4b542858f37d75578bba7463082fc062c2fc1a79a539c8c388faa7a79491c8
    • Instruction ID: 1cb0ea64bf5466e5123a5a01818131be20faa865bd55d67f4d7ed95bb730a88c
    • Opcode Fuzzy Hash: fb4b542858f37d75578bba7463082fc062c2fc1a79a539c8c388faa7a79491c8
    • Instruction Fuzzy Hash: 5B21B371108B05ABC300DF54D885EAFB3E9FFC8714F404E1EF14557290E778A9498BA6
    APIs
    • SendMessageA.USER32(?,00000030,?,00000001), ref: 0047636D
    • SendMessageA.USER32(?,00000030,?,00000001), ref: 00476386
    • GetStockObject.GDI32(00000011), ref: 00476391
    • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 004763A4
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$ObjectStock
    • String ID:
    • API String ID: 1309931672-0
    • Opcode ID: 27ef1c9809e9f9f80e9ecf746651091ac62edb461fbf664de10e256ed5a04283
    • Instruction ID: 83fd498339ad49a3b5336a20ab12fb62284434035e39fb51bb26532d75c4520d
    • Opcode Fuzzy Hash: 27ef1c9809e9f9f80e9ecf746651091ac62edb461fbf664de10e256ed5a04283
    • Instruction Fuzzy Hash: 99118E32300711ABC754DF55E854FAFB3AAAF88B50F05841EFA189B280C774EC41CBA5
    APIs
    • SendMessageA.USER32(?,00000030,?,00000001), ref: 004116AD
    • SendMessageA.USER32(?,00000030,?,00000001), ref: 004116C6
    • GetStockObject.GDI32(00000011), ref: 004116D1
    • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 004116E4
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$ObjectStock
    • String ID:
    • API String ID: 1309931672-0
    • Opcode ID: dbd76d84e3fb6e371384bd99609535f451aee5728b8c5fbb1e41b5a990710c0c
    • Instruction ID: c584a19feae8caa4d2fbb9d7d1892e30dfcb7993c816eca09a157f92ba6765af
    • Opcode Fuzzy Hash: dbd76d84e3fb6e371384bd99609535f451aee5728b8c5fbb1e41b5a990710c0c
    • Instruction Fuzzy Hash: 13116032300710ABCA54DF59E844F9BB3AAAF88B10F05841AF6059B291C775FC81CBA5
    APIs
    • ImageList_GetIcon.COMCTL32(?,?,00000000,00000000,?,?,00472DCD,00000000,?,?,?,?,004712E2), ref: 00472BFB
    • SendMessageA.USER32(?,0000040F,00000000,00000000), ref: 00472C16
    • DestroyIcon.USER32(00000000,?,?,?,004712E2), ref: 00472C25
    • DestroyIcon.USER32(?,?,?,?,004712E2), ref: 00472C5D
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Icon$Destroy$ImageList_MessageSend
    • String ID:
    • API String ID: 1019128568-0
    • Opcode ID: 940da4e25818543b9752e71a49b9738ef702b8449227d6609815b70e30645d30
    • Instruction ID: 0c1a492bfdf0fd186808ccbacd1e3363ef03f1e3f4310df547ee2a23f501205f
    • Opcode Fuzzy Hash: 940da4e25818543b9752e71a49b9738ef702b8449227d6609815b70e30645d30
    • Instruction Fuzzy Hash: 9B118F31300A12AFD7299F65D984F9FB7A9FF64740F00852EE55AD7200D7B4E84487A9
    APIs
    • GetTopWindow.USER32(?), ref: 0041F82D
      • Part of subcall function 0041F660: IsChild.USER32(?,?), ref: 0041F6DD
      • Part of subcall function 0041F660: GetParent.USER32(?), ref: 0041F6F7
    • SendMessageA.USER32(00000000,000000F0,00000000,00000000), ref: 0041F886
    • SendMessageA.USER32(00000000,000000F1,00000000,00000000), ref: 0041F896
    • GetWindow.USER32(00000000,00000002), ref: 0041F89B
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSendWindow$ChildParent
    • String ID:
    • API String ID: 1043810220-0
    • Opcode ID: fbc2123e0d96337199ae89bc6ce24a995754b50033166662c3fb1ad31498f8ca
    • Instruction ID: eb986038dec96e91c8eb99dcd19fea324c5517a910c9452105ed604e9b57cdf0
    • Opcode Fuzzy Hash: fbc2123e0d96337199ae89bc6ce24a995754b50033166662c3fb1ad31498f8ca
    • Instruction Fuzzy Hash: 1201D831381B13B6E231A6299C46FAF725C9F41B50F100132F704AB2D0DF68FC86816C
    APIs
    • GetParent.USER32(?), ref: 00444BBB
    • SendMessageA.USER32(?,000083EB,?,00000000), ref: 00444BE5
    • SendMessageA.USER32(?,000083EC,?,00000000), ref: 00444BF9
    • SendMessageA.USER32(?,000083E9,?,00000000), ref: 00444C1C
      • Part of subcall function 004B99D4: GetDlgCtrlID.USER32(?), ref: 004B99DE
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent
    • String ID:
    • API String ID: 1383977212-0
    • Opcode ID: 9d67598affa84f1974182ada1ead0d8344d136920b7071fb87880868efbf2840
    • Instruction ID: 04de4db42cde287b3f245e7281852d002a06c6a52febaa3d5c067599c9c174df
    • Opcode Fuzzy Hash: 9d67598affa84f1974182ada1ead0d8344d136920b7071fb87880868efbf2840
    • Instruction Fuzzy Hash: A6014FB2200A187BE650A76A8CC5E6FB3ADABC4B05B04851EF64187381CE69EC424778
    APIs
    • CloseHandle.KERNEL32(00000000,00000100,.K,004AE86B,.K,.K,00000100,00000000,004B092E,00000000), ref: 004AE8CD
    • GetLastError.KERNEL32 ref: 004AE8D7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CloseErrorHandleLast
    • String ID: .K$.K
    • API String ID: 918212764-663606781
    • Opcode ID: 9b7233ef9dc89d5d9b7b0b7723698eca9ea7247c0f9b8e995ae4816cc7585dd6
    • Instruction ID: 5eaf4b67f42ddee1b52249e0f868142718485f7bb125e16fc0aa5d38b2cc0582
    • Opcode Fuzzy Hash: 9b7233ef9dc89d5d9b7b0b7723698eca9ea7247c0f9b8e995ae4816cc7585dd6
    • Instruction Fuzzy Hash: FB01F23350561055CB70323B6C49AAF22285F93B74F65051FF825872E1DF1CD88250AD
    APIs
    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 004B5D90
    • GetCurrentProcess.KERNEL32(?,00000000), ref: 004B5D96
    • DuplicateHandle.KERNEL32(00000000), ref: 004B5D99
    • GetLastError.KERNEL32(00000000), ref: 004B5DB3
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CurrentProcess$DuplicateErrorHandleLast
    • String ID:
    • API String ID: 3907606552-0
    • Opcode ID: b5cf61755c4a9be336184cd5dad5e61aa188e557e1b739d738f786eb299cf5ba
    • Instruction ID: 1a6e3a3744e795e6ed6b636ee01d6f399091fcf1b6f7b8ea9e9083b261b018f4
    • Opcode Fuzzy Hash: b5cf61755c4a9be336184cd5dad5e61aa188e557e1b739d738f786eb299cf5ba
    • Instruction Fuzzy Hash: 9A018431700700ABEB50ABA9CC49F9ABBEDDF84750F144126F905CB291EAA4ED408B78
    APIs
    • WindowFromPoint.USER32(?,?), ref: 004B445D
    • GetParent.USER32(00000000), ref: 004B446A
    • ScreenToClient.USER32(00000000,?), ref: 004B448B
    • IsWindowEnabled.USER32(00000000), ref: 004B44A4
      • Part of subcall function 004BCB65: GetWindowLongA.USER32(00000000,000000F0), ref: 004BCB76
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$ClientEnabledFromLongParentPointScreen
    • String ID:
    • API String ID: 2204725058-0
    • Opcode ID: 8580a51de6d55d4a441fc80c504a6dec27439c6a11f6c7d3a72e9722db5e65fd
    • Instruction ID: 1f7bdae28dab305d360205145f13ea31954c50778c6c50480c19b7249f00734e
    • Opcode Fuzzy Hash: 8580a51de6d55d4a441fc80c504a6dec27439c6a11f6c7d3a72e9722db5e65fd
    • Instruction Fuzzy Hash: 0C01BC36600900BB87129B58DC48EAFBBBAEF85741B14402AF901D7311EB38ED51977D
    APIs
    • SetWindowLongA.USER32(?,000000FC,?), ref: 004779A8
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004779B1
    • HeapFree.KERNEL32(00000000), ref: 004779B8
    • RedrawWindow.USER32(?,00000000,00000000,00000705), ref: 004779C8
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: HeapWindow$FreeLongProcessRedraw
    • String ID:
    • API String ID: 660112752-0
    • Opcode ID: 40efdb257ea8e123a8f99d099717e4bc1db92f2a60eca0c815b5bb9697546de2
    • Instruction ID: ec1dd31e464e2832a08094ca73febed34770d41032bc4a8fdfa5ac8b21b8219d
    • Opcode Fuzzy Hash: 40efdb257ea8e123a8f99d099717e4bc1db92f2a60eca0c815b5bb9697546de2
    • Instruction Fuzzy Hash: CC012DF3609B10ABD3208B64DC84E5BB364B7C4751F518626FB49D7340D734EC008B98
    APIs
    • GetDlgItem.USER32(?,?), ref: 004B871C
    • GetTopWindow.USER32(00000000), ref: 004B872F
    • GetTopWindow.USER32(?), ref: 004B875F
    • GetWindow.USER32(00000000,00000002), ref: 004B877A
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Item
    • String ID:
    • API String ID: 369458955-0
    • Opcode ID: 8a32d054f5e920c69c41b42258b2b957983ac1071edd2215c5a80c8f81393ceb
    • Instruction ID: 57e9e7ef7e6194651ae1d2c3cfc0d4e672d37763deac4f1e23bed629c8139d55
    • Opcode Fuzzy Hash: 8a32d054f5e920c69c41b42258b2b957983ac1071edd2215c5a80c8f81393ceb
    • Instruction Fuzzy Hash: 82018F3210161AAB8B622B668C04EDF3A5C9F4075CF25412AFD0095210EF79C951D6BD
    APIs
    • GetTopWindow.USER32(?), ref: 004B8798
    • SendMessageA.USER32(00000000,?,?,?), ref: 004B87CE
    • GetTopWindow.USER32(00000000), ref: 004B87DB
    • GetWindow.USER32(00000000,00000002), ref: 004B87F9
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$MessageSend
    • String ID:
    • API String ID: 1496643700-0
    • Opcode ID: 123128ce87065a593dcaf03f0ec77d178b87a7274c84dec1fd7c01657b50980e
    • Instruction ID: c300d533f26741f17420f5b952dcb65a8f1c1ebd3dcaad63b265ce95b3539102
    • Opcode Fuzzy Hash: 123128ce87065a593dcaf03f0ec77d178b87a7274c84dec1fd7c01657b50980e
    • Instruction Fuzzy Hash: 4D01D73200161AFBCF526F95DC04EDF3B2AAF44358F15401AFA1055161CF3AC961EBB9
    APIs
    • RegSetValueExA.ADVAPI32(00000000,?,00000000,00000004,?,00000004,?,?), ref: 004BD513
    • RegCloseKey.ADVAPI32(00000000,?,?), ref: 004BD51C
    • wsprintfA.USER32 ref: 004BD538
    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 004BD551
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ClosePrivateProfileStringValueWritewsprintf
    • String ID:
    • API String ID: 1902064621-0
    • Opcode ID: 55338c1f309a404401d9c868272ab9f4f6ca6d0702989e1d39e43ca5fec2223b
    • Instruction ID: 1bb7cfc17142b4de0cdb17ad078f0deddb9ad7ff137177b98d816c062740a4c6
    • Opcode Fuzzy Hash: 55338c1f309a404401d9c868272ab9f4f6ca6d0702989e1d39e43ca5fec2223b
    • Instruction Fuzzy Hash: 05016232400615BBCB225F68DC09FEF3BA9BF08718F044426BA15D6161E774D554DB98
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: wsprintf
    • String ID: %d.%d$gfff
    • API String ID: 2111968516-3773932281
    • Opcode ID: a0951475fac3eef7aa27ba027a1680770343b585676463262a6b0c3f060366b4
    • Instruction ID: 8dbeea4c0d68c72181f02f367585d9ac8bdff7c54cb3bf98bb05fef1018f65c1
    • Opcode Fuzzy Hash: a0951475fac3eef7aa27ba027a1680770343b585676463262a6b0c3f060366b4
    • Instruction Fuzzy Hash: 84F0506170031167C75CA51F7C15F1B6B9AEBDA711F05843FF444CB394D530DC1142AA
    APIs
    • InterlockedExchange.KERNEL32(005341E0,00000001), ref: 004B29B3
    • InitializeCriticalSection.KERNEL32(005341C8,?,?,?,004B294A), ref: 004B29BE
    • EnterCriticalSection.KERNEL32(005341C8,?,?,?,004B294A), ref: 004B29FD
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalSection$EnterExchangeInitializeInterlocked
    • String ID:
    • API String ID: 3643093385-0
    • Opcode ID: c1013772b75b280e31b405a7d4c4c9768158f4cb4d27ac40711c6df3e91c5e92
    • Instruction ID: d7d8fddfbb58993ccb920f5fe0a0fd7d9c47a6d98cf8cdbf4669ba2f08fedf5a
    • Opcode Fuzzy Hash: c1013772b75b280e31b405a7d4c4c9768158f4cb4d27ac40711c6df3e91c5e92
    • Instruction Fuzzy Hash: 40F0A4B9344A109AC6A19750BE85EAB3B94F374791F100627F505C2260D3F86DC5EF3D
    APIs
    • GetObjectA.GDI32(00000000,0000000C,?), ref: 004B8EB7
    • SetBkColor.GDI32(00000000,00000000), ref: 004B8EC3
    • GetSysColor.USER32(00000008), ref: 004B8ED3
    • SetTextColor.GDI32(00000000,?), ref: 004B8EDD
      • Part of subcall function 004BCB65: GetWindowLongA.USER32(00000000,000000F0), ref: 004BCB76
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Color$LongObjectTextWindow
    • String ID:
    • API String ID: 2871169696-0
    • Opcode ID: 3139a7fd2ad4dceaa2347f9c3c533d2e73abe20ec168ef87189cbdda9fa89e0e
    • Instruction ID: 8950ddbe38399221bcffca5b7d1f4ab30e48d40c442e42a7e49eb3153586aa36
    • Opcode Fuzzy Hash: 3139a7fd2ad4dceaa2347f9c3c533d2e73abe20ec168ef87189cbdda9fa89e0e
    • Instruction Fuzzy Hash: 00014B32100209ABDFA19F64DC49BEF3B69EB00356F14492AF901D42E0CB74D892DBA9
    APIs
    • GetWindowExtEx.GDI32(?,?), ref: 004BC018
    • GetViewportExtEx.GDI32(?,?), ref: 004BC025
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 004BC04A
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 004BC065
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ViewportWindow
    • String ID:
    • API String ID: 1589084482-0
    • Opcode ID: b014b24f38ff7a93ecb1a6675a016cc68c9b0b121fb33181b62c2e904dcb1295
    • Instruction ID: 99597ec6858bca825da82a90112dc4b01508fc0b354a8e4b9392ad0cc8edb3cc
    • Opcode Fuzzy Hash: b014b24f38ff7a93ecb1a6675a016cc68c9b0b121fb33181b62c2e904dcb1295
    • Instruction Fuzzy Hash: B3F069B2800118BFEB106B62DC06CAEBBBDFF50390711442EF85192030EB716D509B58
    APIs
    • GetTopWindow.USER32(75C11AC0), ref: 00475ACD
    • IsWindowVisible.USER32(00000000), ref: 00475AE2
    • GetTopWindow.USER32(00000000), ref: 00475AED
    • GetWindow.USER32(00000000,00000002), ref: 00475B08
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Window$Visible
    • String ID:
    • API String ID: 3657826678-0
    • Opcode ID: c165b26a8ce818d573ede95b1deb55b93f88f3000a9308c5c029522818f50df3
    • Instruction ID: bdbf759779b86bce7922318a878fd6474e9ef00210502f79ff5bb5fb13a3c698
    • Opcode Fuzzy Hash: c165b26a8ce818d573ede95b1deb55b93f88f3000a9308c5c029522818f50df3
    • Instruction Fuzzy Hash: 0DF02732602E21738222666A6C85DEFB39C5F85750B454136F90CEB201DA58FC0182FD
    APIs
    • GetClientRect.USER32(?), ref: 0044452F
    • PtInRect.USER32(?,?,?), ref: 00444544
      • Part of subcall function 004B9AA6: IsWindowEnabled.USER32(?), ref: 004B9AB0
      • Part of subcall function 00444960: UpdateWindow.USER32(00000002), ref: 0044497D
    • GetCapture.USER32 ref: 0044456C
    • SetCapture.USER32(00000002), ref: 00444577
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CaptureRectWindow$ClientEnabledUpdate
    • String ID:
    • API String ID: 2789096292-0
    • Opcode ID: ddc21f8543bd3c381111100056528f05d561ae8c79d24bec9b9edc6ab3ea986c
    • Instruction ID: a4369c4ca2475948a4acdeebe74a15eb988f1ff9e01dcaaeea87b42edcf37acb
    • Opcode Fuzzy Hash: ddc21f8543bd3c381111100056528f05d561ae8c79d24bec9b9edc6ab3ea986c
    • Instruction Fuzzy Hash: 26F04F71204A10BBEB60AB25DC45E6F73ADBF98700B44491EF541D2258DF79E9018BA9
    APIs
    • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,00000000,00000000), ref: 00419ADA
    • RegQueryValueA.ADVAPI32 ref: 00419AFE
    • lstrcpyA.KERNEL32(?,00000000), ref: 00419B11
    • RegCloseKey.ADVAPI32(?), ref: 00419B1C
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CloseOpenQueryValuelstrcpy
    • String ID:
    • API String ID: 534897748-0
    • Opcode ID: f26c431da274902331ba5722c92b3d105d21dfe255d7cf8212bcf338492f7356
    • Instruction ID: cae5afd43b227076c4cccce386348624075d6ac9f4522ef4bb6cf6289d6c7d78
    • Opcode Fuzzy Hash: f26c431da274902331ba5722c92b3d105d21dfe255d7cf8212bcf338492f7356
    • Instruction Fuzzy Hash: 14F03C79104301BFD324DB10D898EAFBBA8FBC4754F00891DB98882250D670E884CBE2
    APIs
    • lstrlenA.KERNEL32(?), ref: 004BCC5C
    • GetWindowTextA.USER32(?,?,00000100), ref: 004BCC78
    • lstrcmpA.KERNEL32(?,?), ref: 004BCC8C
    • SetWindowTextA.USER32(?,?), ref: 004BCC9C
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: TextWindow$lstrcmplstrlen
    • String ID:
    • API String ID: 330964273-0
    • Opcode ID: 565b0ff28dcdeeb86a9215bfa862aabf4e9c7133901a3d7ce3ddc58aa23914d0
    • Instruction ID: 0f5bc465835f0355f183f68376a5543f3c675079c0935ff069fd38d6049a7afd
    • Opcode Fuzzy Hash: 565b0ff28dcdeeb86a9215bfa862aabf4e9c7133901a3d7ce3ddc58aa23914d0
    • Instruction Fuzzy Hash: 85F0FE75500118ABCF626F24EC48EDE7FB9EB28391F408061F84DD5160D77499958B98
    APIs
    • __startOneArgErrorHandling.LIBCMT ref: 004A3BD2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ErrorHandling__start
    • String ID: pow
    • API String ID: 3213639722-2276729525
    • Opcode ID: 6d1be0206977d2c42d8614ab2518edec5b2aa33d7dd1a6e70778b07cca543eeb
    • Instruction ID: 614ee805c0e1c64d293bd913ac8d11bf53f3a3a24f8751d287ab96853bc21904
    • Opcode Fuzzy Hash: 6d1be0206977d2c42d8614ab2518edec5b2aa33d7dd1a6e70778b07cca543eeb
    • Instruction Fuzzy Hash: 73513621A0960186DB117F18C80137B6BD49B73721F3089ABF086463A9FB3D8ED5A65E
    APIs
    • CopyRect.USER32(?,00000000), ref: 0043FEA0
    • IsRectEmpty.USER32(?), ref: 0043FEAB
      • Part of subcall function 0043CF80: CreateFontIndirectA.GDI32(?), ref: 0043D0AC
      • Part of subcall function 00453CE0: CreateSolidBrush.GDI32(?), ref: 00453D6A
      • Part of subcall function 00453CE0: SendMessageA.USER32(?,00000030,00000000,00000000), ref: 00453DAE
      • Part of subcall function 00453CE0: SendMessageA.USER32(?,000000B1,?,000000FF), ref: 00453DE4
      • Part of subcall function 00453CE0: SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 00453DF3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$CreateRect$BrushCopyEmptyFontIndirectSolid
    • String ID: !K
    • API String ID: 4199050670-3405271303
    • Opcode ID: eb58d2718eaac08f05511b29d8e8ee82875bdca20831a136a1d3094341cd86e5
    • Instruction ID: 5ca30e49bc85f3bca1d3ef77891c1026384728387acde730741feae2fffa1aa2
    • Opcode Fuzzy Hash: eb58d2718eaac08f05511b29d8e8ee82875bdca20831a136a1d3094341cd86e5
    • Instruction Fuzzy Hash: 2261A2716087419FD314DB25C841B6BB7E9BBDD708F00592EF58683281EBB8E809CB66
    APIs
      • Part of subcall function 00423AD0: GetCurrentThreadId.KERNEL32 ref: 00423AF5
      • Part of subcall function 00423AD0: IsWindow.USER32(00010456), ref: 00423B11
      • Part of subcall function 00423AD0: SendMessageA.USER32(00010456,000083E7,?,00000000), ref: 00423B2A
      • Part of subcall function 00423AD0: ExitProcess.KERNEL32 ref: 00423B3F
    • DeleteCriticalSection.KERNEL32(00507808,?,?,?,?,?,?,?,?,0042B15D), ref: 0042010A
      • Part of subcall function 004B7738: __EH_prolog.LIBCMT ref: 004B773D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalCurrentDeleteExitH_prologMessageProcessSectionSendThreadWindow
    • String ID: !$#
    • API String ID: 2888814780-2504090897
    • Opcode ID: a22c422921cdf1853287caaad1a964932c92eef3efbcd746aa91fcf200c8a74e
    • Instruction ID: aa5f54ece0ac9a33689aa275f60b1d36a90cc6a28a814d8cca718daa0efd33f2
    • Opcode Fuzzy Hash: a22c422921cdf1853287caaad1a964932c92eef3efbcd746aa91fcf200c8a74e
    • Instruction Fuzzy Hash: F79191740087818AE351EF78C4957DABFD4AFA1348F54084EE4D947393DBB96288CBB6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID: 0-3916222277
    • Opcode ID: 52f70e4b1c05a1fb3fdf4dfc1a22a1016693d85ebb7ce87a1f44f5471c152465
    • Instruction ID: 4075c9dc3c7b7b578a62e081b5fea093ed2ab50dd9026256392c36802d27a733
    • Opcode Fuzzy Hash: 52f70e4b1c05a1fb3fdf4dfc1a22a1016693d85ebb7ce87a1f44f5471c152465
    • Instruction Fuzzy Hash: F6519175204342AFD314DF19C891BAFB7A4FF99358F10462EF94283291D739E885CB9A
    APIs
    • SendMessageA.USER32(?,00000401,00000000,?), ref: 0041862A
    • SendMessageA.USER32(?,00000402,?,00000000), ref: 00418657
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: msctls_progress32
    • API String ID: 3850602802-3107856198
    • Opcode ID: 9b96d6d13537effcbf76e5970cde5fe9a472c42bc957588b32b76c6ac0c049cb
    • Instruction ID: bba825777818e37f9b2e4a631336126a07e4cd79b151d142f264410a64fd0a32
    • Opcode Fuzzy Hash: 9b96d6d13537effcbf76e5970cde5fe9a472c42bc957588b32b76c6ac0c049cb
    • Instruction Fuzzy Hash: 3D413E71704B019BD318CA19CD91B6BB3E6EB88B04F14892EF646C7780DA79EC418B55
    APIs
    • GetCPInfo.KERNEL32(?,00000000), ref: 004A84F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Info
    • String ID: $
    • API String ID: 1807457897-3032137957
    • Opcode ID: f5619b743ba16e76016e267963a2028237f57d758cc7283c77ba6b4b2a004643
    • Instruction ID: 145e4368d98f0300aaf23344c92dc6d757a95b316a8dbac81b93e26f8b45cad4
    • Opcode Fuzzy Hash: f5619b743ba16e76016e267963a2028237f57d758cc7283c77ba6b4b2a004643
    • Instruction Fuzzy Hash: D8419C3180825C6FEB259724CC89BFB3FADEB3B700F0414EAD545C7252CA694E08DB66
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID: 0-3916222277
    • Opcode ID: fe1f0954ef2e07c4cb42a1b27fa0231a082b0df5d7fa51894ea3a6601d41936b
    • Instruction ID: 0761f2057cda869b57eeb76ad42b8489528ecaa485b09d8cfcb2d66bf59a0dc6
    • Opcode Fuzzy Hash: fe1f0954ef2e07c4cb42a1b27fa0231a082b0df5d7fa51894ea3a6601d41936b
    • Instruction Fuzzy Hash: 8E417D71108341AFD354DF24C854BABB7A4FB98724F008A2EF49687290DB78E945CF9A
    APIs
      • Part of subcall function 004B0658: SetFilePointer.KERNEL32(00000000,?,00000000,00000000,00000000,?,004AEE7D,?,00000000,00000002,00000001,?,?), ref: 004B0682
      • Part of subcall function 004B0658: GetLastError.KERNEL32 ref: 004B068F
    • SetEndOfFile.KERNEL32(00000000,?,?,?,00000100,?,?,?,004B095A,00000000,?), ref: 004B21BA
    • GetLastError.KERNEL32(?,?,?,00000100,?,?,?,004B095A,00000000,?), ref: 004B21D8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ErrorFileLast$Pointer
    • String ID: ZK
    • API String ID: 1697706070-2930135333
    • Opcode ID: 6ee6e68608b756f9d9eb7d3604567cc743414df891c10b107c46bf0a751d936d
    • Instruction ID: 023cf47c6d7ebcc903c64dd6405c8847236af536fc23da2293f3e43e92337e97
    • Opcode Fuzzy Hash: 6ee6e68608b756f9d9eb7d3604567cc743414df891c10b107c46bf0a751d936d
    • Instruction Fuzzy Hash: DF3109725001147BCF213F6DCD05BCE3B65AF11364F014137FA189A2A1DA79CD5197B8
    APIs
    • GetStockObject.GDI32(00000005), ref: 0041A220
    • LoadCursorA.USER32(00000000,00007F00), ref: 0041A22E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CursorLoadObjectStock
    • String ID: _EL_Timer
    • API String ID: 3794545487-970978732
    • Opcode ID: e540b94b0b71b5e6d023e64fedc04ac6c83104314ca2d3ba70a67ece4b3c82dd
    • Instruction ID: 9cf81fc25a8b263a97143532a07da9f7e6f8d3051ccb479a3c9da809900ca6d9
    • Opcode Fuzzy Hash: e540b94b0b71b5e6d023e64fedc04ac6c83104314ca2d3ba70a67ece4b3c82dd
    • Instruction Fuzzy Hash: 3A317AB1658B10AFD354DB58CC41F6BB7E4EB88B50F104A1EFA5687380D679A840CB96
    APIs
    • GetStockObject.GDI32(00000005), ref: 00414A61
    • LoadCursorA.USER32(00000000,00007F00), ref: 00414A6F
      • Part of subcall function 0042C750: GetClassInfoA.USER32(?,?,00000000), ref: 0042C768
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: ClassCursorInfoLoadObjectStock
    • String ID: _EL_Label
    • API String ID: 1762135420-1571322718
    • Opcode ID: 5bb2ad3c5eb2a1a9c1ba41fdd19cfc4499a01463db662fbf1258736675b1db57
    • Instruction ID: bb24d4fe0337837411ef20cdfdce07aee1989f76f1a24c60c31ce2e34d22fbad
    • Opcode Fuzzy Hash: 5bb2ad3c5eb2a1a9c1ba41fdd19cfc4499a01463db662fbf1258736675b1db57
    • Instruction Fuzzy Hash: 753180B1608740AFD314DB58CC41F6BB7E9EBC8B44F104A1EF65A87390D775A840CBA6
    APIs
    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00471769
    • SendMessageA.USER32(?,00001007,00000000,0000001F), ref: 004717EF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: 4=Q
    • API String ID: 3850602802-2863119746
    • Opcode ID: 978919987b221f7cd9165ce4159f062bf6820f68401806f6d3d8d91e0bc29a3e
    • Instruction ID: 4bd2ccdabd76339a407b3c5e0ec50a61175d5eb53773b505f92b62f5f420513a
    • Opcode Fuzzy Hash: 978919987b221f7cd9165ce4159f062bf6820f68401806f6d3d8d91e0bc29a3e
    • Instruction Fuzzy Hash: D2317A703057018FD328CF2AC980B57B3E9AF88704F00892EE599D7790E778F8058B5A
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • IsRectEmpty.USER32(?), ref: 0041E3BA
      • Part of subcall function 004BC3D5: __EH_prolog.LIBCMT ref: 004BC3DA
      • Part of subcall function 004BC3D5: CreateSolidBrush.GDI32(?), ref: 004BC3F7
    • FillRect.USER32(?,?,00000000), ref: 0041E3E7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prologRect$BeginBrushClipCreateEmptyFillPaintSolid
    • String ID: !K
    • API String ID: 3827101677-3405271303
    • Opcode ID: 6bf64853c19500f915336bd556246aa986dbfb7c4853aa062142c5ba4a7b45a9
    • Instruction ID: 094f5b8802c280430d10874cc996d7a39e695f61d4be9431ce8e88cdabccee5a
    • Opcode Fuzzy Hash: 6bf64853c19500f915336bd556246aa986dbfb7c4853aa062142c5ba4a7b45a9
    • Instruction Fuzzy Hash: C331B0351087409FD314EB25C885FABB7E8BF88704F50891EF9A583291DB7CD909CB66
    APIs
    • LoadCursorA.USER32(?,00000408), ref: 0042CD23
    • LoadCursorA.USER32(00000000,00000002), ref: 0042CD52
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CursorLoad
    • String ID: `WN
    • API String ID: 3238433803-3540563254
    • Opcode ID: fcadf86ec453d631e53eb5e856b93ea1bbbfe17f55aacd36c08c9142cb725ab9
    • Instruction ID: be01c11ae982f37eccc216bca7d986e9c756889b26d90936dbaca1658c825f0c
    • Opcode Fuzzy Hash: fcadf86ec453d631e53eb5e856b93ea1bbbfe17f55aacd36c08c9142cb725ab9
    • Instruction Fuzzy Hash: EC116A3BF1063087CA30662EBCC059F5B15EBD5376B95093BEA19DB341D328EC0182A9
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • IsRectEmpty.USER32(?), ref: 004141A4
      • Part of subcall function 00411510: GetSysColor.USER32(0000000F), ref: 0041151D
      • Part of subcall function 004BC3D5: __EH_prolog.LIBCMT ref: 004BC3DA
      • Part of subcall function 004BC3D5: CreateSolidBrush.GDI32(?), ref: 004BC3F7
    • FillRect.USER32(?,?,00000000), ref: 004141D6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prologRect$BeginBrushClipColorCreateEmptyFillPaintSolid
    • String ID: !K
    • API String ID: 534515830-3405271303
    • Opcode ID: f8a5f14fc883e57c435fdb8d6d21aed98cb2b85539edfb210743b23830a2c6c6
    • Instruction ID: c50bb90846091720d8996782c007d2dbfc8f25144d0a63d239ec7b23fdfd8c11
    • Opcode Fuzzy Hash: f8a5f14fc883e57c435fdb8d6d21aed98cb2b85539edfb210743b23830a2c6c6
    • Instruction Fuzzy Hash: 5D21B371604B409FD324DF64C880B9BB7E8BB88704F14491EF5A6C3290DB3CE444CB66
    APIs
      • Part of subcall function 004BC1D8: __EH_prolog.LIBCMT ref: 004BC1DD
      • Part of subcall function 004BC1D8: BeginPaint.USER32(?,?,?,?,00414189), ref: 004BC206
      • Part of subcall function 004BBD89: GetClipBox.GDI32(?,?), ref: 004BBD90
    • IsRectEmpty.USER32(?), ref: 0041DEDD
      • Part of subcall function 00411510: GetSysColor.USER32(0000000F), ref: 0041151D
      • Part of subcall function 004BC3D5: __EH_prolog.LIBCMT ref: 004BC3DA
      • Part of subcall function 004BC3D5: CreateSolidBrush.GDI32(?), ref: 004BC3F7
    • FillRect.USER32(?,?,00000000), ref: 0041DF10
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prologRect$BeginBrushClipColorCreateEmptyFillPaintSolid
    • String ID: !K
    • API String ID: 534515830-3405271303
    • Opcode ID: d10cc01c4768692b84a836518711f9c0665cb5b9cb680c53eb262762e818072b
    • Instruction ID: d3cb11100dd0ace3d29e2fe2d7bb41c3b21d80e012725788e0a8556c92c0ac2b
    • Opcode Fuzzy Hash: d10cc01c4768692b84a836518711f9c0665cb5b9cb680c53eb262762e818072b
    • Instruction Fuzzy Hash: AC11C2B5408341AFC300EF65C885F9BBBE4BB84708F108A1DF496832A1EB38D148CB66
    APIs
      • Part of subcall function 004B3F84: SendMessageA.USER32(00001111,00001111,00000000,?), ref: 004B3FA4
    • SendMessageA.USER32(?,0000110B,00000009,00000000), ref: 00471934
    • IsWindow.USER32(?), ref: 0047193B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: MessageSend$Window
    • String ID: F
    • API String ID: 2326795674-1304234792
    • Opcode ID: 6c1d61ee08511c0768dc03e32f159275afde6fbab87142245f7c767d17f82972
    • Instruction ID: ebecfea81f93519afd0c8c5d1bcd5d918eeb730993ec61683a00531ef5efade0
    • Opcode Fuzzy Hash: 6c1d61ee08511c0768dc03e32f159275afde6fbab87142245f7c767d17f82972
    • Instruction Fuzzy Hash: E60152B1108300AFE354DF19C894F6FB7F9AFC8B04F04491DF58997290D7B4A9458B96
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: H_prolog
    • String ID: 09S$p9S
    • API String ID: 3519838083-4002301087
    • Opcode ID: d98bfb0758bfb9605f410283387019ed834621bf77ceb8ca16275b4890d90335
    • Instruction ID: 9a8ebb72261e5020d102edbb96c6a16f0dcfc0d462faebb47e3f4fe7056f64e0
    • Opcode Fuzzy Hash: d98bfb0758bfb9605f410283387019ed834621bf77ceb8ca16275b4890d90335
    • Instruction Fuzzy Hash: ED018471A05210DFCB349F98C6087EAB7E0AB44711F15026FE456977E1CBBCAD40CAAA
    APIs
    • SendMessageA.USER32(?,0000100C,000000FF,00000001), ref: 00475316
    • PostMessageA.USER32(?,00000401,00000000,00000000), ref: 0047532C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Message$PostSend
    • String ID:
    • API String ID: 2264170824-3916222277
    • Opcode ID: 4a2acede1f02b972368f543e31ec70e902ad57438776fc05366ae1175e35fb66
    • Instruction ID: ad21b36583d69675f69583d2f0b1280566a37a72f1d6c7d0311cfbbb53149bcc
    • Opcode Fuzzy Hash: 4a2acede1f02b972368f543e31ec70e902ad57438776fc05366ae1175e35fb66
    • Instruction Fuzzy Hash: 4EE04831244B11ABE6345B258C45F9F73A96B14750F00CA1EB555DA2E0C6F5E8818B68
    APIs
    • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00471C43
    • PostMessageA.USER32(?,00000401,00000000,00000000), ref: 00471C59
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: Message$PostSend
    • String ID:
    • API String ID: 2264170824-3916222277
    • Opcode ID: 0f288e8033af5d4e1c764a64200bf1a8730b4349b67f7cab9f3dd8389c2c00d2
    • Instruction ID: 16bb4f7c4288139a0ba4627263af5aadf71ace5476c8866c28feb3ae67c3da2f
    • Opcode Fuzzy Hash: 0f288e8033af5d4e1c764a64200bf1a8730b4349b67f7cab9f3dd8389c2c00d2
    • Instruction Fuzzy Hash: E6E04831740701BFE638AB659C45F9B72AF6B14701F10C91EF246E62D1C6F4E8408768
    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 004BF117
    • LeaveCriticalSection.KERNEL32(?,?), ref: 004BF127
    • LocalFree.KERNEL32(?), ref: 004BF130
    • TlsSetValue.KERNEL32(?,00000000), ref: 004BF146
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalSection$EnterFreeLeaveLocalValue
    • String ID:
    • API String ID: 2949335588-0
    • Opcode ID: 45f9777ee6324497e982a87fcc2105ef59c909e0123d7c366f91aacc3830a9de
    • Instruction ID: 5dca740819604beb7ecad0ec15c1b4a248cfd03b5fbb938f61ea0b3dc0288558
    • Opcode Fuzzy Hash: 45f9777ee6324497e982a87fcc2105ef59c909e0123d7c366f91aacc3830a9de
    • Instruction Fuzzy Hash: CE218931200200EFD7209F58CC84FAA77A4FF80705F10847AE9068B2A2C7B9FC84CB64
    APIs
    • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,004ACE92,00000000,00000000,00000000,004A53C3,00000000,00000000,?,00000000,00000000,00000000), ref: 004AD0F2
    • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,004ACE92,00000000,00000000,00000000,004A53C3,00000000,00000000,?,00000000,00000000,00000000), ref: 004AD126
    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 004AD140
    • HeapFree.KERNEL32(00000000,?), ref: 004AD157
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: AllocHeap$FreeVirtual
    • String ID:
    • API String ID: 3499195154-0
    • Opcode ID: ea4d9ddfcee35be3cd01ad4b5a5911cf4596073997e46267321fdb62b3cbe641
    • Instruction ID: ca1038dea857308b4774172b59078ba8a43023a0f47d58afa04b95413a5f021f
    • Opcode Fuzzy Hash: ea4d9ddfcee35be3cd01ad4b5a5911cf4596073997e46267321fdb62b3cbe641
    • Instruction Fuzzy Hash: 21118CB0A0460A9FC7318F18EC45D267BF1FBAA7607515A2AF562C76B0C770AC49EF14
    APIs
    • EnterCriticalSection.KERNEL32(00533BA0,?,00000000,?,?,004BF262,00000010,?,00000000,?,?,?,004BEC49,004BECAC,004BE528,004BEC4F), ref: 004BFED2
    • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,004BF262,00000010,?,00000000,?,?,?,004BEC49,004BECAC,004BE528,004BEC4F), ref: 004BFEE4
    • LeaveCriticalSection.KERNEL32(00533BA0,?,00000000,?,?,004BF262,00000010,?,00000000,?,?,?,004BEC49,004BECAC,004BE528,004BEC4F), ref: 004BFEED
    • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,004BF262,00000010,?,00000000,?,?,?,004BEC49,004BECAC,004BE528,004BEC4F,004BA417), ref: 004BFEFF
      • Part of subcall function 004BFE04: GetVersion.KERNEL32(?,004BFEA7,?,004BF262,00000010,?,00000000,?,?,?,004BEC49,004BECAC,004BE528,004BEC4F,004BA417,004BB6B6), ref: 004BFE17
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalSection$Enter$InitializeLeaveVersion
    • String ID:
    • API String ID: 1193629340-0
    • Opcode ID: ca5d864003c370cb75af0a8f81bf025ad4d8dae02377c4f0752ff9a88e41eb55
    • Instruction ID: cfe7a9c13677556438ff0fb35f17a9f8df4e7d92288df88243c64746bb06d7df
    • Opcode Fuzzy Hash: ca5d864003c370cb75af0a8f81bf025ad4d8dae02377c4f0752ff9a88e41eb55
    • Instruction Fuzzy Hash: 9EF03C7100120AEFD750EFA4FC949A6F3ACFB20316B000437E60592232D738F69DDAA8
    APIs
    • InitializeCriticalSection.KERNEL32(?,004A8E4B,?,004A39E0), ref: 004AB7C8
    • InitializeCriticalSection.KERNEL32(?,004A8E4B,?,004A39E0), ref: 004AB7D0
    • InitializeCriticalSection.KERNEL32(?,004A8E4B,?,004A39E0), ref: 004AB7D8
    • InitializeCriticalSection.KERNEL32(?,004A8E4B,?,004A39E0), ref: 004AB7E0
    Memory Dump Source
    • Source File: 00000000.00000002.2892997982.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2892974190.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893089437.00000000004C5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893119171.00000000004E1000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893140853.00000000004E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893156785.00000000004E5000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893177184.00000000004EE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893197707.00000000004EF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893218216.00000000004F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.00000000004FA000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000506000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000532000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893238218.0000000000537000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2893327611.000000000053A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uCLkYbZQoA.jbxd
    Similarity
    • API ID: CriticalInitializeSection
    • String ID:
    • API String ID: 32694325-0
    • Opcode ID: e58d8a4a8d46058ce0cef70d8c5028b5cce2a68f705a8dbdbd9fe4a03012bf72
    • Instruction ID: 632426aebf6f5e1e08d8b945314849d125fe98e4afb3530d9b0912cfaed84aa3
    • Opcode Fuzzy Hash: e58d8a4a8d46058ce0cef70d8c5028b5cce2a68f705a8dbdbd9fe4a03012bf72
    • Instruction Fuzzy Hash: 2AC002318018369ACA912B55FD058AA3F65EF0526070201F7A104590708E213C70DFDC