Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.FileRepMalware.29184.31872.exe

Overview

General Information

Sample name:SecuriteInfo.com.FileRepMalware.29184.31872.exe
Analysis ID:1483370
MD5:d19a5ac8132e4040179f12eb9366d3b3
SHA1:62f90ee5a169215995ac39ee1e9dd18791f9dffa
SHA256:2ddec5cb7c8ac3965bf411207a223a485cb5811bc3d730237a956223860635f6
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
Clears Internet Explorer cache and cookies (likely to cover tracks)
Machine Learning detection for sample
PE file has nameless sections
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.FileRepMalware.29184.31872.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe" MD5: D19A5AC8132E4040179F12EB9366D3B3)
    • rundll32.exe (PID: 5224 cmdline: RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255 MD5: 889B99C52A60DD49227C5E485A016679)
      • iexplore.exe (PID: 2312 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -ResetDestinationList MD5: 6F0F06D6AB125A99E43335427066A4A1)
      • rundll32.exe (PID: 2108 cmdline: C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:255 WinX:0 WinY:0 IEFrame:00000000 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched
Timestamp:2024-07-27T04:31:23.076093+0200
SID:2830033
Source Port:49730
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-27T04:31:41.391435+0200
SID:2022930
Source Port:443
Destination Port:49733
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-27T04:32:19.529625+0200
SID:2022930
Source Port:443
Destination Port:49741
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeAvira: detected
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeReversingLabs: Detection: 55%
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeVirustotal: Detection: 47%Perma Link
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 8.219.190.98:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /front/login HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Cache-Control: no-cacheHost: www.lofter.comConnection: Keep-AliveCookie: firstentry=%2Fpost.do%3FloftBlogName%3Ddnfex%26loftPostUrl%3D30905118_1c5d041cf%26|; usertrack=CpiybmakXAUoDtEokeuTAg==
Source: global trafficHTTP traffic detected: GET /front/login HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Cache-Control: no-cacheHost: www.lofter.comConnection: Keep-AliveCookie: firstentry=%2Fpost.do%3FloftBlogName%3Ddnfex%26loftPostUrl%3D30905118_1c5d041cf%26|; usertrack=CpiybmakXAUoDtEokeuTAg==
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: testHost: www.baidu.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /post/30905118_1c5d041cf HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Host: dnfex.lofter.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /post/30905118_1c5d041cf HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Host: dnfex.lofter.comCache-Control: no-cacheCookie: NTESwebSI=555D89F6DBF1B139F08292EEBEF779E9.lofter-webapp-web-old-docker-lftpro-3-3nhsm-6bbi5-5456f799hjpwk-8080; firstentry=%2Fpost.do%3FloftBlogName%3Ddnfex%26loftPostUrl%3D30905118_1c5d041cf%26|; usertrack=CpiybmakXAUoDtEokeuTAg==
Source: rundll32.exe, 00000004.00000002.2249096373.0000000000BD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: URLhttp://www.facebook.com/ equals www.facebook.com (Facebook)
Source: rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: URLhttp://www.twitter.com/ equals www.twitter.com (Twitter)
Source: rundll32.exe, 00000004.00000003.1979816164.0000000000C90000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2249462772.0000000000C91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: URLhttp://www.youtube.com/ equals www.youtube.com (Youtube)
Source: rundll32.exe, 00000004.00000002.2249096373.0000000000BD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.twitter.com/ equals www.twitter.com (Twitter)
Source: rundll32.exe, 00000004.00000003.1979816164.0000000000C90000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2249462772.0000000000C91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.youtube.com/ equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: www.baidu.com
Source: global trafficDNS traffic detected: DNS query: dnfex.lofter.com
Source: global trafficDNS traffic detected: DNS query: www.lofter.com
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273016192.0000000002495000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dnfex.lofter.com/post/30905118_1c5d041cf
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000984000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000984000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dnfex.lofter.com/post/30905118_1c5d041cfU
Source: rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.amazon.com/
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.baidu.com
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000984000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000984000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.baidu.com/
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000984000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000984000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.baidu.com/G
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.baidu.comtest
Source: rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/
Source: rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.live.com/
Source: rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.nytimes.com/
Source: rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.reddit.com/
Source: rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.twitter.com/
Source: rundll32.exe, 00000008.00000002.1973694444.0000000002EDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.wikipedia.com/
Source: rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.youtube.com/
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922772979.00000000009F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922772979.00000000009F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.n
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.net/1
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.net/1667220634500/core-js-stable.3.6.5.mini.js
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.net/1671501343058/sha256.min.js
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.net/1689134055346/captcha.js
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1891147884.00000000009B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.net/webpack/lofter-client-account/src/applications/login/pc.361cf238fde1df7564a
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1891147884.00000000009F7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922772979.00000000009F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.net/webpack/lofter-client-account/src/applications/login/pc.c340e0032e06ca157c9
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lofter.lf127.net/webpack/lofter-dll/dll_606a63b015f6fa133c2a.js
Source: rundll32.exe, 00000004.00000002.2250655736.00000000076E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
Source: rundll32.exe, 00000004.00000002.2250655736.00000000076E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2
Source: rundll32.exe, 00000004.00000003.1979816164.0000000000C97000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2249462772.0000000000C97000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1978441881.0000000000C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033?4
Source: rundll32.exe, 00000004.00000003.1979816164.0000000000C97000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2249462772.0000000000C97000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1978441881.0000000000C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033h#Rk
Source: rundll32.exe, 00000004.00000002.2249375292.0000000000C7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1979479317.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srfG
Source: rundll32.exe, 00000004.00000003.1979258413.00000000076E5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2250655736.00000000076E5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2250627891.00000000076D2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1979258413.00000000076D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1891147884.00000000009F7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922772979.00000000009F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s6.music.126.net/puzzle/puzzle
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273016192.0000000002495000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://shop366821780.taobao.com
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1891147884.00000000009B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://urswebzj.nosdn.127.net/webzj_cdn101/message.js
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271091743.0000000000997000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922785209.0000000000997000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000997000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.lofter.com/
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000971000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.lofter.com/front/login
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000971000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.lofter.com/front/loginL
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000971000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.lofter.com/front/loginV
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownHTTPS traffic detected: 8.219.190.98:443 -> 192.168.2.4:49732 version: TLS 1.2

System Summary

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess created: C:\Windows\SysWOW64\rundll32.exe RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:255 WinX:0 WinY:0 IEFrame:00000000
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess created: C:\Windows\SysWOW64\rundll32.exe RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:255 WinX:0 WinY:0 IEFrame:00000000Jump to behavior
Source: bass.dll.0.drStatic PE information: section name:
Source: bass.dll.0.drStatic PE information: section name:
Source: bass.dll.0.drStatic PE information: section name:
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10007A30 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10007A30
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000DA90 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000DA90
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1001C800 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1001C800
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10006096 GetSystemMenu,GetMenuState,SendMessageA,NtdllDefWindowProc_A,IsIconic,IsZoomed,GetWindowRect,0_2_10006096
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100098B0 GetPropA,NtdllDefWindowProc_A,KillTimer,IsWindowVisible,IsIconic,SetTimer,0_2_100098B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100048E0 NtdllDefWindowProc_A,0_2_100048E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1001D8E0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,0_2_1001D8E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10005910 EnableWindow,NtdllDefWindowProc_A,0_2_10005910
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10005940 GetCursorPos,GetWindowRect,PtInRect,PtInRect,PtInRect,PtInRect,PtInRect,KillTimer,NtdllDefWindowProc_A,0_2_10005940
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10006239 SendMessageA,SendMessageA,IsZoomed,SendMessageA,NtdllDefWindowProc_A,0_2_10006239
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100062B0 IsWindowEnabled,SendMessageA,NtdllDefWindowProc_A,0_2_100062B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10012AD0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10012AD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10008310 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,0_2_10008310
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000D330 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000D330
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1001D330 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1001D330
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10009340 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,CallWindowProcA,GetCursorPos,GetWindowRect,PtInRect,CallWindowProcA,0_2_10009340
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10006350 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10006350
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10021387 NtdllDefWindowProc_A,0_2_10021387
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10020B84 NtdllDefWindowProc_A,0_2_10020B84
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000CBC0 GetPropA,NtdllDefWindowProc_A,0_2_1000CBC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10004BD0 NtdllDefWindowProc_A,0_2_10004BD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000C3F0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,CallWindowProcA,GetCursorPos,GetWindowRect,PtInRect,CallWindowProcA,0_2_1000C3F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10012BF0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10012BF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000E454 NtdllDefWindowProc_A,0_2_1000E454
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10008CB0 GetPropA,NtdllDefWindowProc_A,0_2_10008CB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100214C4 NtdllDefWindowProc_A,0_2_100214C4
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10004510 NtdllDefWindowProc_A,0_2_10004510
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10008D40 GetPropA,RemovePropA,CallWindowProcA,NtdllDefWindowProc_A,0_2_10008D40
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000FD50 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000FD50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1001FD50 GetPropA,GetPropA,NtdllDefWindowProc_A,FindWindowExA,GetPropA,GetWindowRect,0_2_1001FD50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10006574 NtdllDefWindowProc_A,0_2_10006574
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10013DA0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10013DA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10011630 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,CallWindowProcA,0_2_10011630
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10002E40 NtdllDefWindowProc_A,0_2_10002E40
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1001FEA0 GetPropA,NtdllDefWindowProc_A,InvalidateRect,CallWindowProcA,0_2_1001FEA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10014EB4 NtdllDefWindowProc_A,0_2_10014EB4
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10008710 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,GetParent,0_2_10008710
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000F750 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000F750
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10014790 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10014790
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1001E7F0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1001E7F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100175400_2_10017540
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100039700_2_10003970
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100022500_2_10002250
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10028B990_2_10028B99
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10017BA00_2_10017BA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100293A10_2_100293A1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000EDA00_2_1000EDA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1000B6E00_2_1000B6E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: String function: 100260E2 appears 34 times
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.FileRepMalware.29184.31872.exe
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2271924208.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSkinH_EL.dll vs SecuriteInfo.com.FileRepMalware.29184.31872.exe
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSkinH_EL.dll vs SecuriteInfo.com.FileRepMalware.29184.31872.exe
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeStatic PE information: Section: LBXX ZLIB complexity 0.9996162551245066
Source: bass.dll.0.drStatic PE information: Section: ZLIB complexity 0.999292652027027
Source: classification engineClassification label: mal76.evad.winEXE@7/8@3/2
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_1001B8F0 GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,FreeLibrary,0_2_1001B8F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\9HSAQO53.htmJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeFile created: C:\Users\user\AppData\Local\Temp\bass.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess created: C:\Windows\SysWOW64\rundll32.exe RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeReversingLabs: Detection: 55%
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeVirustotal: Detection: 47%
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess created: C:\Windows\SysWOW64\rundll32.exe RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -ResetDestinationList
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:255 WinX:0 WinY:0 IEFrame:00000000
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess created: C:\Windows\SysWOW64\rundll32.exe RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -ResetDestinationListJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:255 WinX:0 WinY:0 IEFrame:00000000Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: avifil32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: dciman32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile written: C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\AC\INetHistory\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeWindow detected: Number of UI elements: 14
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeStatic file information: File size 1700864 > 1048576
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeStatic PE information: Raw size of LBXX is bigger than: 0x100000 < 0x19ba00

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeUnpacked PE file: 0.2.SecuriteInfo.com.FileRepMalware.29184.31872.exe.400000.0.unpack LBXX:EW;LBXX:EW;.rsrc:W; vs LBXX:ER;LBXX:ER;.rsrc:W;
Source: initial sampleStatic PE information: section where entry point is pointing to: LBXX
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeStatic PE information: section name: LBXX
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeStatic PE information: section name: LBXX
Source: bass.dll.0.drStatic PE information: section name:
Source: bass.dll.0.drStatic PE information: section name:
Source: bass.dll.0.drStatic PE information: section name:
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_0040A175 push es; ret 0_2_0040A1C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_0040AC02 push es; ret 0_2_0040AC00
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_00402CA7 push es; ret 0_2_00402CB1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_004056A9 push es; ret 0_2_004056A8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_00401F89 push es; ret 0_2_00401F12
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10026100 push eax; ret 0_2_1002612E
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100209F7 pushfd ; mov dword ptr [esp], edx0_2_100209F9
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exeStatic PE information: section name: LBXX entropy: 7.999859282550719
Source: bass.dll.0.drStatic PE information: section name: entropy: 7.987642099223517
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeFile created: C:\Users\user\AppData\Local\Temp\bass.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10021800 IsZoomed,SendMessageA,IsIconic,SendMessageA,SendMessageA,GetSystemMenu,GetMenuState,SendMessageA,SendMessageA,KillTimer,GetMenuItemID,SendMessageA,CallWindowProcA,0_2_10021800
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10023070 IsWindowVisible,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,IsRectEmpty,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsZoomed,IsRectEmpty,0_2_10023070
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10023070 IsWindowVisible,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,IsRectEmpty,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsZoomed,IsRectEmpty,0_2_10023070
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10006096 GetSystemMenu,GetMenuState,SendMessageA,NtdllDefWindowProc_A,IsIconic,IsZoomed,GetWindowRect,0_2_10006096
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_100098B0 GetPropA,NtdllDefWindowProc_A,KillTimer,IsWindowVisible,IsIconic,SetTimer,0_2_100098B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10004E30 IsWindowVisible,GetWindowRect,CreateCompatibleDC,SelectObject,SelectObject,SetBkMode,SelectObject,SetTextColor,DrawIconEx,GetWindowTextA,DrawTextA,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,SelectObject,DeleteDC,CreateCompatibleDC,SelectObject,DeleteObject,0_2_10004E30
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\bass.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeAPI coverage: 5.1 %
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6720Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
Source: rundll32.exe, 00000008.00000002.1973694444.0000000002EDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllW
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272469279.000000000091E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
Source: SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271091743.0000000000997000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922785209.0000000000997000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000997000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: rundll32.exe, 00000004.00000003.1979816164.0000000000CA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1978441881.0000000000CA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllvvC8
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -ResetDestinationListJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exeCode function: 0_2_10019250 6F984BC0,GetVersion,0_2_10019250
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
Obfuscated Files or Information
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Rundll32
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.FileRepMalware.29184.31872.exe55%ReversingLabsWin32.Trojan.Generic
SecuriteInfo.com.FileRepMalware.29184.31872.exe48%VirustotalBrowse
SecuriteInfo.com.FileRepMalware.29184.31872.exe100%AviraTR/Agent.fabix
SecuriteInfo.com.FileRepMalware.29184.31872.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\bass.dll1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\bass.dll0%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLink
www.wshifen.com0%VirustotalBrowse
lofter-oversea-sg.ntes53.netease.com0%VirustotalBrowse
dnfex.lofter.com0%VirustotalBrowse
www.lofter.com0%VirustotalBrowse
www.baidu.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://www.youtube.com/0%URL Reputationsafe
http://www.baidu.com1%VirustotalBrowse
http://www.nytimes.com/0%VirustotalBrowse
https://lofter.lf127.0%Avira URL Cloudsafe
http://www.baidu.comtest0%Avira URL Cloudsafe
http://www.baidu.com0%Avira URL Cloudsafe
http://www.nytimes.com/0%Avira URL Cloudsafe
http://www.baidu.com/G0%Avira URL Cloudsafe
https://lofter.lf127.net/1667220634500/core-js-stable.3.6.5.mini.js0%Avira URL Cloudsafe
https://www.lofter.com/front/loginV0%Avira URL Cloudsafe
https://www.lofter.com/front/loginL0%Avira URL Cloudsafe
http://www.baidu.com/G0%VirustotalBrowse
https://lofter.lf127.net/1689134055346/captcha.js0%Avira URL Cloudsafe
http://www.amazon.com/0%Avira URL Cloudsafe
https://s6.music.126.net/puzzle/puzzle0%Avira URL Cloudsafe
https://www.lofter.com/front/loginV0%VirustotalBrowse
https://lofter.lf127.net/webpack/lofter-client-account/src/applications/login/pc.361cf238fde1df7564a0%Avira URL Cloudsafe
https://lofter.lf127.net/1689134055346/captcha.js0%VirustotalBrowse
http://www.twitter.com/0%Avira URL Cloudsafe
https://lofter.lf127.net/1671501343058/sha256.min.js0%Avira URL Cloudsafe
https://lofter.lf127.net/webpack/lofter-client-account/src/applications/login/pc.361cf238fde1df7564a0%VirustotalBrowse
https://shop366821780.taobao.com0%Avira URL Cloudsafe
http://www.amazon.com/0%VirustotalBrowse
http://www.twitter.com/0%VirustotalBrowse
https://s6.music.126.net/puzzle/puzzle0%VirustotalBrowse
https://www.lofter.com/front/login0%Avira URL Cloudsafe
https://shop366821780.taobao.com0%VirustotalBrowse
https://lofter.lf127.net/1667220634500/core-js-stable.3.6.5.mini.js0%VirustotalBrowse
https://urswebzj.nosdn.127.net/webzj_cdn101/message.js0%Avira URL Cloudsafe
https://lofter.lf127.n0%Avira URL Cloudsafe
https://lofter.lf127.net/1671501343058/sha256.min.js0%VirustotalBrowse
https://www.lofter.com/front/login0%VirustotalBrowse
http://www.baidu.com/0%Avira URL Cloudsafe
http://dnfex.lofter.com/post/30905118_1c5d041cfU0%Avira URL Cloudsafe
https://urswebzj.nosdn.127.net/webzj_cdn101/message.js0%VirustotalBrowse
http://www.wikipedia.com/0%Avira URL Cloudsafe
https://www.lofter.com/0%Avira URL Cloudsafe
http://www.baidu.com/1%VirustotalBrowse
http://www.live.com/0%Avira URL Cloudsafe
http://www.reddit.com/0%Avira URL Cloudsafe
https://lofter.lf127.net/10%Avira URL Cloudsafe
https://lofter.lf127.net/webpack/lofter-dll/dll_606a63b015f6fa133c2a.js0%Avira URL Cloudsafe
http://www.wikipedia.com/0%VirustotalBrowse
http://www.live.com/0%VirustotalBrowse
http://www.reddit.com/0%VirustotalBrowse
http://dnfex.lofter.com/post/30905118_1c5d041cf0%Avira URL Cloudsafe
https://lofter.lf127.net/webpack/lofter-client-account/src/applications/login/pc.c340e0032e06ca157c90%Avira URL Cloudsafe
https://lofter.lf127.net/webpack/lofter-dll/dll_606a63b015f6fa133c2a.js0%VirustotalBrowse
https://lofter.lf127.net/10%VirustotalBrowse
http://www.google.com/0%Avira URL Cloudsafe
https://lofter.lf127.net/webpack/lofter-client-account/src/applications/login/pc.c340e0032e06ca157c90%VirustotalBrowse
http://dnfex.lofter.com/post/30905118_1c5d041cf0%VirustotalBrowse
http://www.google.com/0%VirustotalBrowse
https://www.lofter.com/0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
www.wshifen.com
103.235.47.188
truefalseunknown
lofter-oversea-sg.ntes53.netease.com
8.219.190.98
truefalseunknown
dnfex.lofter.com
unknown
unknownfalseunknown
www.baidu.com
unknown
unknownfalseunknown
www.lofter.com
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
https://www.lofter.com/front/loginfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.baidu.com/false
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://dnfex.lofter.com/post/30905118_1c5d041cffalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://lofter.lf127.SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922772979.00000000009F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.baidu.comSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.baidu.com/GSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000984000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000984000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.baidu.comtestSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.nytimes.com/rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lofter.lf127.net/1667220634500/core-js-stable.3.6.5.mini.jsSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.lofter.com/front/loginVSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000971000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.lofter.com/front/loginLSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000971000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000971000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://lofter.lf127.net/1689134055346/captcha.jsSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.amazon.com/rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://s6.music.126.net/puzzle/puzzleSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1891147884.00000000009F7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922772979.00000000009F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lofter.lf127.net/webpack/lofter-client-account/src/applications/login/pc.361cf238fde1df7564aSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1891147884.00000000009B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.twitter.com/rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lofter.lf127.net/1671501343058/sha256.min.jsSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://shop366821780.taobao.comSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273016192.0000000002495000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://urswebzj.nosdn.127.net/webzj_cdn101/message.jsSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1891147884.00000000009B3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lofter.lf127.nSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922772979.00000000009F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://dnfex.lofter.com/post/30905118_1c5d041cfUSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.0000000000984000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000984000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.youtube.com/rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.wikipedia.com/rundll32.exe, 00000008.00000002.1973694444.0000000002EDB000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.lofter.com/SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271091743.0000000000997000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922785209.0000000000997000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.0000000000997000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.live.com/rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.reddit.com/rundll32.exe, 00000008.00000002.1973694444.0000000002ED1000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lofter.lf127.net/1SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lofter.lf127.net/webpack/lofter-dll/dll_606a63b015f6fa133c2a.jsSecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://lofter.lf127.net/webpack/lofter-client-account/src/applications/login/pc.c340e0032e06ca157c9SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271387003.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1891147884.00000000009F7000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.1922772979.00000000009F6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000003.2271046263.00000000009FB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2272720309.00000000009B4000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.29184.31872.exe, 00000000.00000002.2273135399.00000000026A8000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.google.com/rundll32.exe, 00000004.00000003.1978441881.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
8.219.190.98
lofter-oversea-sg.ntes53.netease.comSingapore
45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
103.235.47.188
www.wshifen.comHong Kong
55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1483370
Start date and time:2024-07-27 04:30:31 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 41s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.FileRepMalware.29184.31872.exe
Detection:MAL
Classification:mal76.evad.winEXE@7/8@3/2
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
8.219.190.98zPmKNeJBku.exeGet hashmaliciousUnknownBrowse
  • testsec.lofter.com/post/1deb43d5_12b22be2f
Wk8eTHnajw.elfGet hashmaliciousUnknownBrowse
  • sunken-forest.lofter.com/
103.235.47.188chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
  • www.baidu.com/
LisectAVT_2403002A_489.exeGet hashmaliciousUnknownBrowse
  • www.baidu.com/
d48c236503a4d2e54e23d9ebc9aa48e86300fd24955c871a7b8792656c47fb6a.exeGet hashmaliciousBdaejecBrowse
  • www.baidu.com/
7Y18r(100).exeGet hashmaliciousUnknownBrowse
  • www.baidu.com/
7Y18r(100).exeGet hashmaliciousUnknownBrowse
  • www.baidu.com/
Yiwaiwai Build Version.exeGet hashmaliciousUnknownBrowse
  • www.baidu.com/
Yiwaiwai Build Version.exeGet hashmaliciousUnknownBrowse
  • www.baidu.com/
6o63snaetO.exeGet hashmaliciousUnknownBrowse
  • www.baidu.com/
http://metamask-zhwallet.org/Get hashmaliciousUnknownBrowse
  • www.baidu.com/img/flexible/logo/plus_logo_web_2.png
ViKing-R2.exeGet hashmaliciousUnknownBrowse
  • www.baidu.com/
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
lofter-oversea-sg.ntes53.netease.comzPmKNeJBku.exeGet hashmaliciousUnknownBrowse
  • 8.219.190.98
Wk8eTHnajw.elfGet hashmaliciousUnknownBrowse
  • 8.219.190.98
SecuriteInfo.com.Trojan.DownLoader21.31174.24545.29097.exeGet hashmaliciousUnknownBrowse
  • 13.228.17.149
SecuriteInfo.com.Trojan.DownLoader21.31174.24545.29097.exeGet hashmaliciousUnknownBrowse
  • 13.228.17.149
5B5dkJ7vjc.exeGet hashmaliciousUnknownBrowse
  • 13.228.17.149
5B5dkJ7vjc.exeGet hashmaliciousUnknownBrowse
  • 13.228.17.149
www.wshifen.comhttp://cognitoforms.com/Renato4/ManagementHasAddedYouToAWholeTeamGet hashmaliciousHTMLPhisherBrowse
  • 103.235.46.96
7Y18r(213).exeGet hashmaliciousNitolBrowse
  • 103.235.47.188
chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
  • 103.235.46.96
chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
  • 103.235.47.188
LisectAVT_2403002A_440.exeGet hashmaliciousXRedBrowse
  • 103.235.46.96
LisectAVT_2403002A_489.exeGet hashmaliciousUnknownBrowse
  • 103.235.47.188
LisectAVT_2403002B_263.exeGet hashmaliciousUnknownBrowse
  • 103.235.47.188
LisectAVT_2403002B_263.exeGet hashmaliciousUnknownBrowse
  • 103.235.46.96
LisectAVT_2403002B_397.exeGet hashmaliciousUnknownBrowse
  • 103.235.47.188
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCbeacon14.exeGet hashmaliciousCobaltStrikeBrowse
  • 47.243.165.127
chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
  • 47.88.198.68
chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
  • 47.254.187.184
http://gtm-cn-3mp3qqvk502.steamproxy.cc/Get hashmaliciousUnknownBrowse
  • 8.217.145.66
Jeffrey.laws Replay VM (01m27sec).docxGet hashmaliciousHTMLPhisherBrowse
  • 47.246.131.28
LisectAVT_2403002B_174.exeGet hashmaliciousPureLog StealerBrowse
  • 8.217.38.238
LisectAVT_2403002B_232.exeGet hashmaliciousUnknownBrowse
  • 8.217.173.140
LisectAVT_2403002B_232.exeGet hashmaliciousUnknownBrowse
  • 8.217.173.140
LisectAVT_2403002B_348.exeGet hashmaliciousUnknownBrowse
  • 47.52.240.120
BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdhttp://cognitoforms.com/Renato4/ManagementHasAddedYouToAWholeTeamGet hashmaliciousHTMLPhisherBrowse
  • 103.235.46.96
7Y18r(213).exeGet hashmaliciousNitolBrowse
  • 103.235.47.188
chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
  • 103.235.46.96
chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
  • 103.235.47.188
LisectAVT_2403002A_440.exeGet hashmaliciousXRedBrowse
  • 103.235.46.96
LisectAVT_2403002A_489.exeGet hashmaliciousUnknownBrowse
  • 103.235.47.188
LisectAVT_2403002B_263.exeGet hashmaliciousUnknownBrowse
  • 103.235.47.188
LisectAVT_2403002B_263.exeGet hashmaliciousUnknownBrowse
  • 103.235.46.96
LisectAVT_2403002B_463.exeGet hashmaliciousBdaejecBrowse
  • 103.235.47.188
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
37f463bf4616ecd445d4a1937da06e19PO Tournefortian2453525525235235623425523235.exeGet hashmaliciousFormBook, GuLoaderBrowse
  • 8.219.190.98
setup.exeGet hashmaliciousAmadeyBrowse
  • 8.219.190.98
setup.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
  • 8.219.190.98
file.exeGet hashmaliciousVidarBrowse
  • 8.219.190.98
1lKbb2hF7fYToopfpmEvlyRN.exeGet hashmaliciousLummaC, VidarBrowse
  • 8.219.190.98
file.exeGet hashmaliciousVidarBrowse
  • 8.219.190.98
Monetary_Funding_Sheet_2024.jsGet hashmaliciousWSHRATBrowse
  • 8.219.190.98
IRqsWvBBMc.exeGet hashmaliciousAmadey, VidarBrowse
  • 8.219.190.98
88z6JBPo00.exeGet hashmaliciousUnknownBrowse
  • 8.219.190.98
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\bass.dllLisectAVT_2403002B_195.exeGet hashmaliciousUnknownBrowse
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:data
    Category:dropped
    Size (bytes):49120
    Entropy (8bit):0.0017331682157558962
    Encrypted:false
    SSDEEP:3:Ztt:T
    MD5:0392ADA071EB68355BED625D8F9695F3
    SHA1:777253141235B6C6AC92E17E297A1482E82252CC
    SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
    SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:data
    Category:dropped
    Size (bytes):123016
    Entropy (8bit):0.012208204075748083
    Encrypted:false
    SSDEEP:3:jiPtc15kltlM/tc/tc/tc/tfwsXW/tZ/tZ/tc/tc/tc/tc/tmnElt:ePtc15k1vwsHElt
    MD5:9A3CDF68FEB9CE1C684B4760324F112D
    SHA1:83450CAA653A446D66F0021D54B16804F0FFA751
    SHA-256:5CE4619F0E2790F2A613A3A04122B5AB6A44026752FCD1A32BD2798398999D0B
    SHA-512:A17BE5940B4F3EB4FD04B9BAC7C37733A274EDAAF30D2787EE2D7EF5845D56266210FF08F8114E50B777A7E4C6D8D9C835BD3E3C6F49F8E6AD431A602D1BD915
    Malicious:false
    Reputation:low
    Preview:0.rJ..6M.h.3....................................................@.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:data
    Category:dropped
    Size (bytes):49120
    Entropy (8bit):0.0017331682157558962
    Encrypted:false
    SSDEEP:3:Ztt:T
    MD5:0392ADA071EB68355BED625D8F9695F3
    SHA1:777253141235B6C6AC92E17E297A1482E82252CC
    SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
    SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:data
    Category:dropped
    Size (bytes):123016
    Entropy (8bit):0.012208204075748083
    Encrypted:false
    SSDEEP:3:jiPtc15kltlM/tc/tc/tc/tfwsXW/tZ/tZ/tc/tc/tc/tc/tnB/kllt:ePtc15k1vwsws/t
    MD5:35C437EA3B28F9B95A9D3C1CE39C5304
    SHA1:B70B13D5D958E46D4522BA707C56441898419FAB
    SHA-256:2BD3E2A9747DDD6E5113633FEA6B90100D709C8FD1B5EFFE7DBEC174055B5948
    SHA-512:CB59A76EE3ABACFAF8BA4D13A7DE21CD5F538AF44A7EF78923BCA32816A9AC9480914125311ED8A3002A9312FF973DB3FBA9BEC3499C94BD3D2E4BB323CD4849
    Malicious:false
    Reputation:low
    Preview:0.rJ..6M.h.3....................................................@.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:Windows desktop.ini
    Category:dropped
    Size (bytes):130
    Entropy (8bit):4.973139661169433
    Encrypted:false
    SSDEEP:3:0NdQDjotjIAXJ28jqGiEI7fOLyovZeLhzUzYcB:0NwoyAXJ28CEI7QyyZeNUzxB
    MD5:941682911C20B2DABECB20476F91C98A
    SHA1:0B0BECF019CB15E75CDFA23BF0D4CB976F109BAA
    SHA-256:3FEF99E07B0455F88A5BB59E83329D0BFCEBE078D907985D0ABF70BE26B9B89A
    SHA-512:A12F5CAF5FD39CF2AE600E4378B9296D07787A83AE76BC410B89182A2F8E3202C4CA80D811D548193DFF439541DE9447F9FA141EBFD771E7AB7A6053CB4AF2B3
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:[.ShellClassInfo]..ConfirmFileOp=0..CLSID={FF393560-C2A7-11CF-BFF4-444553540000}..UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}..
    Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):99896
    Entropy (8bit):7.951877694974373
    Encrypted:false
    SSDEEP:3072:p24KYnxDl1SlpejXNEFJUFew/UWjKoamC3uDz6iksXQl4B8:k4NnRl4leG7iUVmC3w6uB8
    MD5:DF054025C9E845B33B27A99AF750F9B9
    SHA1:CB2A9DC07DADA8E2D96D10BAEE878131AEFF0D14
    SHA-256:DFA29CF9A2CBCD8B1DCF7FB7A72764FF2B05E47B056E2A80190338492E0AD0A4
    SHA-512:F1DE2207A6EA3BB455FF763BB86404E57A78D0E1D229A0158E41C53507B7B63BE926142EE39FAE62B6408ACB8E5A350CE0F5BEAF1823C7D09A4BDE88622E4F36
    Malicious:false
    Antivirus:
    • Antivirus: Virustotal, Detection: 1%, Browse
    • Antivirus: ReversingLabs, Detection: 0%
    Joe Sandbox View:
    • Filename: LisectAVT_2403002B_195.exe, Detection: malicious, Browse
    Preview:MZ......................@...................................D.... ..PE..L......L...........!................6 .......0...............................0.......................................#..L....!..........8............................................................................................................................r..................`....rsrc...........8...................@..@......... ..........................@................ ......................`.......................................l...........j...f.!.PRj.....j..S.ERROR!.Corrupt Data!... ..f.`P....h.L..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X.........X.............L......Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..{.........../.......w...................\...@...0..........................)S..........
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:data
    Category:dropped
    Size (bytes):3476
    Entropy (8bit):3.2650800052440707
    Encrypted:false
    SSDEEP:48:s5ddidOlgfvw2GPb9GrIofASFi5NdidOlgfvw2GPU683GrIodz1:7v7q9SoWv7X3Sn
    MD5:AEB07EB31C84ED42E15B9266EBE4B2BA
    SHA1:44B9E1AECA4B04CC3E25D55C63C2E1C5FEED65EF
    SHA-256:493AE1B682CFFA981E640D8DC65005D168F6BB34FD2913FE9A8BD6222CEA11E2
    SHA-512:9501B0A48841B74811666B0C383C342FE311A41AE6209D5878EAD35898A07E264628939035C0B003735DC573A3B83312A341A9883493971E3882660FD76D479A
    Malicious:false
    Preview:...................................FL..................F.@.. ......"0....H^#.....b."0...............................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....l.1.....(Um...INTERN~1..T......O.I.X............................K...I.n.t.e.r.n.e.t. .E.x.p.l.o.r.e.r.....f.2....(U.. .iexplore.exe..J......(U...X......:...........|.........qO+.i.e.x.p.l.o.r.e...e.x.e.......d...............-.......c............)C......C:\Program Files (x86)\Internet Explorer\iexplore.exe....-.p.r.i.v.a.t.e...C.:.\.W.i.n.d.o.w.s.\.S.Y.S.T.E.M.3.2.\.I.E.F.R.A.M.E...d.l.l.........%SystemRoot%\SYSTEM32\IEFRAME.dll...................................................................................................................................................................................................................................%.S.y.s.t.e.m.R.o.o.t.%.\.S
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:data
    Category:dropped
    Size (bytes):3476
    Entropy (8bit):3.2650800052440707
    Encrypted:false
    SSDEEP:48:s5ddidOlgfvw2GPb9GrIofASFi5NdidOlgfvw2GPU683GrIodz1:7v7q9SoWv7X3Sn
    MD5:AEB07EB31C84ED42E15B9266EBE4B2BA
    SHA1:44B9E1AECA4B04CC3E25D55C63C2E1C5FEED65EF
    SHA-256:493AE1B682CFFA981E640D8DC65005D168F6BB34FD2913FE9A8BD6222CEA11E2
    SHA-512:9501B0A48841B74811666B0C383C342FE311A41AE6209D5878EAD35898A07E264628939035C0B003735DC573A3B83312A341A9883493971E3882660FD76D479A
    Malicious:false
    Preview:...................................FL..................F.@.. ......"0....H^#.....b."0...............................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....l.1.....(Um...INTERN~1..T......O.I.X............................K...I.n.t.e.r.n.e.t. .E.x.p.l.o.r.e.r.....f.2....(U.. .iexplore.exe..J......(U...X......:...........|.........qO+.i.e.x.p.l.o.r.e...e.x.e.......d...............-.......c............)C......C:\Program Files (x86)\Internet Explorer\iexplore.exe....-.p.r.i.v.a.t.e...C.:.\.W.i.n.d.o.w.s.\.S.Y.S.T.E.M.3.2.\.I.E.F.R.A.M.E...d.l.l.........%SystemRoot%\SYSTEM32\IEFRAME.dll...................................................................................................................................................................................................................................%.S.y.s.t.e.m.R.o.o.t.%.\.S
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.997158854131944
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.70%
    • Win32 EXE Yoda's Crypter (26571/9) 0.26%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.FileRepMalware.29184.31872.exe
    File size:1'700'864 bytes
    MD5:d19a5ac8132e4040179f12eb9366d3b3
    SHA1:62f90ee5a169215995ac39ee1e9dd18791f9dffa
    SHA256:2ddec5cb7c8ac3965bf411207a223a485cb5811bc3d730237a956223860635f6
    SHA512:4dcadc3946054145fd788e8fa5a79f6a3ae62892d8609df63704f3e6a06805e74be1e2832b5601cb0b6f01c3753a5b3ab57e223cd3e0bbf7aac1a8997df3d53b
    SSDEEP:49152:69NL07qyX3Va5ISHsparMOJBl7qh85F76mWRF:6bL07DXupHspCMOJLqh85F7C
    TLSH:7E7533E7450EBBD5C485B3B71427D12904A7CB0768FDCBB66C8017FA9B786839692F20
    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........I..I(..I(..I(..&7..@(..&7..O(..24..O(...7..e(...4..e(..+7..i(..I(...*... ..J(.......(......2(...7..<(...7..y(..I(...(......H(.
    Icon Hash:4f1f4b67333b4d0f
    Entrypoint:0x72bdb0
    Entrypoint Section:LBXX
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x5D15A624 [Fri Jun 28 05:31:16 2019 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:68000949fc03f16d9a9e66caf9016dda
    Instruction
    pushad
    mov esi, 00591000h
    lea edi, dword ptr [esi-00190000h]
    add word ptr [edi+0032ECF0h], 0003h
    push edi
    mov ebp, esp
    lea ebx, dword ptr [esp-00003E80h]
    xor eax, eax
    push eax
    cmp esp, ebx
    jne 00007FC6A46D642Dh
    inc esi
    inc esi
    push ebx
    push 00329DFCh
    push edi
    add ebx, 04h
    push ebx
    push 0019AD9Fh
    push esi
    add ebx, 04h
    push ebx
    push eax
    mov dword ptr [ebx], 00020003h
    nop
    nop
    nop
    nop
    push ebp
    push edi
    push esi
    push ebx
    sub esp, 7Ch
    mov edx, dword ptr [esp+00000090h]
    mov dword ptr [esp+74h], 00000000h
    mov byte ptr [esp+73h], 00000000h
    mov ebp, dword ptr [esp+0000009Ch]
    lea eax, dword ptr [edx+04h]
    mov dword ptr [esp+78h], eax
    mov eax, 00000001h
    movzx ecx, byte ptr [edx+02h]
    mov ebx, eax
    shl ebx, cl
    mov ecx, ebx
    dec ecx
    mov dword ptr [esp+6Ch], ecx
    movzx ecx, byte ptr [edx+01h]
    shl eax, cl
    dec eax
    mov dword ptr [esp+68h], eax
    mov eax, dword ptr [esp+000000A8h]
    movzx esi, byte ptr [edx]
    mov dword ptr [ebp+00h], 00000000h
    mov dword ptr [esp+60h], 00000000h
    mov dword ptr [eax], 00000000h
    mov eax, 00000300h
    mov dword ptr [esp+64h], esi
    mov dword ptr [esp+5Ch], 00000001h
    mov dword ptr [esp+58h], 00000001h
    Programming Language:
    • [ C ] VS98 (6.0) SP6 build 8804
    • [C++] VS98 (6.0) SP6 build 8804
    • [C++] VS98 (6.0) build 8168
    • [ C ] VS98 (6.0) build 8168
    • [EXP] VC++ 6.0 SP5 build 8804
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x33019c0x3a0.rsrc
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x32d0000x319c.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x33053c0xc.rsrc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    LBXX0x10000x1900000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    LBXX0x1910000x19c0000x19ba005619331f6ba397779d5dab72d385d9c0False0.9996162551245066ARC archive data, packed7.999859282550719IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x32d0000x40000x3600922cf1c026aefa660a793abff1b275f8False0.48618344907407407data5.115567673036046IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountryZLIB Complexity
    TEXTINCLUDE0x32173c0xbdataChineseChina1.8181818181818181
    TEXTINCLUDE0x3217480x16dataChineseChina1.4090909090909092
    TEXTINCLUDE0x3217600x151dataChineseChina1.032640949554896
    WAVE0x3218b40x1448dataChineseChina1.0021186440677967
    RT_CURSOR0x322cfc0x134dataChineseChina1.0357142857142858
    RT_CURSOR0x322e300x134dataChineseChina1.0357142857142858
    RT_CURSOR0x322f640x134dataChineseChina1.0357142857142858
    RT_CURSOR0x3230980xb4dataChineseChina1.0611111111111111
    RT_CURSOR0x32314c0x134dataChineseChina1.0357142857142858
    RT_CURSOR0x3232800x134OpenPGP Public KeyChineseChina1.0357142857142858
    RT_BITMAP0x3233b40x16cdataChineseChina1.0302197802197801
    RT_ICON0x3235200x2e8dataChineseChina1.0147849462365592
    RT_ICON0x3238080x128dataChineseChina1.037162162162162
    RT_ICON0x32d7400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.5092323651452282
    RT_ICON0x325ed80x10a8data1.002579737335835
    RT_ICON0x326f800x988data1.0045081967213114
    RT_ICON0x3279080x468data1.0097517730496455
    RT_DIALOG0x327d700xeadataChineseChina1.047008547008547
    RT_DIALOG0x327e5c0xb2dataChineseChina1.0617977528089888
    RT_DIALOG0x327f100xe2dataChineseChina1.0486725663716814
    RT_GROUP_CURSOR0x327ff40x14dataChineseChina1.45
    RT_GROUP_CURSOR0x3280080x14PGP Secret Sub-key -ChineseChina1.45
    RT_GROUP_CURSOR0x32801c0x14dataChineseChina1.45
    RT_GROUP_CURSOR0x3280300x14dataChineseChina1.45
    RT_GROUP_CURSOR0x3280440x22dataChineseChina1.2647058823529411
    RT_GROUP_ICON0x32fcec0x3edata0.8548387096774194
    RT_VERSION0x32fd300x294OpenPGP Secret KeyChineseChina0.553030303030303
    RT_MANIFEST0x32ffc80x1d2XML 1.0 document, ASCII text, with very long lines (466), with no line terminators0.5879828326180258
    DLLImport
    KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
    ADVAPI32.dllRegCloseKey
    AVIFIL32.dllAVIStreamInfoA
    COMCTL32.dll
    comdlg32.dllChooseFontA
    GDI32.dllPie
    MSVFW32.dllDrawDibDraw
    ole32.dllOleInitialize
    OLEAUT32.dllUnRegisterTypeLib
    RASAPI32.dllRasHangUpA
    SHELL32.dllShellExecuteA
    USER32.dllGetDC
    WININET.dllInternetOpenA
    WINMM.dllPlaySoundA
    WINSPOOL.DRVOpenPrinterA
    WS2_32.dllntohl
    Language of compilation systemCountry where language is spokenMap
    ChineseChina
    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
    2024-07-27T04:31:23.076093+0200TCP2830033ETPRO MALWARE Win32/Agent.xxxyeb Connectivity Check4973080192.168.2.4103.235.47.188
    2024-07-27T04:31:41.391435+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973313.85.23.86192.168.2.4
    2024-07-27T04:32:19.529625+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974113.85.23.86192.168.2.4
    TimestampSource PortDest PortSource IPDest IP
    Jul 27, 2024 04:31:22.183218002 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:22.188380003 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:22.188581944 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:22.188615084 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:22.193597078 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076025963 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076047897 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076065063 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076080084 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076092958 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.076097012 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076113939 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076131105 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076131105 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.076131105 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.076143026 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.076147079 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076155901 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.076165915 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076173067 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.076178074 CEST8049730103.235.47.188192.168.2.4
    Jul 27, 2024 04:31:23.076194048 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.076220036 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.076236963 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.082950115 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.082950115 CEST4973080192.168.2.4103.235.47.188
    Jul 27, 2024 04:31:23.679235935 CEST4973180192.168.2.48.219.190.98
    Jul 27, 2024 04:31:23.684199095 CEST80497318.219.190.98192.168.2.4
    Jul 27, 2024 04:31:23.684298038 CEST4973180192.168.2.48.219.190.98
    Jul 27, 2024 04:31:23.684395075 CEST4973180192.168.2.48.219.190.98
    Jul 27, 2024 04:31:23.690187931 CEST80497318.219.190.98192.168.2.4
    Jul 27, 2024 04:31:33.770092964 CEST80497318.219.190.98192.168.2.4
    Jul 27, 2024 04:31:33.770195007 CEST4973180192.168.2.48.219.190.98
    Jul 27, 2024 04:31:34.412455082 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:34.412570000 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:34.412659883 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:34.428731918 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:34.428800106 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:38.767411947 CEST80497318.219.190.98192.168.2.4
    Jul 27, 2024 04:31:38.767575979 CEST4973180192.168.2.48.219.190.98
    Jul 27, 2024 04:31:44.765938997 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:44.766117096 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:44.822834015 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:44.822859049 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:44.823267937 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:44.823329926 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:44.827433109 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:44.872499943 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.330010891 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.330046892 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.330189943 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.330189943 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.330213070 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.330260038 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.403888941 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.403950930 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.432811975 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.432866096 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.509589911 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.509653091 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.509675026 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.509691000 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.509793043 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.509808064 CEST443497328.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.509816885 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.509851933 CEST49732443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.522773027 CEST4973180192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.523159027 CEST4973980192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.527625084 CEST80497318.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.528073072 CEST80497398.219.190.98192.168.2.4
    Jul 27, 2024 04:31:45.528148890 CEST4973980192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.528268099 CEST4973980192.168.2.48.219.190.98
    Jul 27, 2024 04:31:45.533014059 CEST80497398.219.190.98192.168.2.4
    Jul 27, 2024 04:31:46.598176003 CEST80497398.219.190.98192.168.2.4
    Jul 27, 2024 04:31:46.598371983 CEST4973980192.168.2.48.219.190.98
    Jul 27, 2024 04:31:46.600795984 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:46.600831032 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:46.600883961 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:46.601494074 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:46.601506948 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:47.921116114 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:47.921184063 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:47.921892881 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:47.921899080 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:47.922076941 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:47.922080994 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.420511961 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.420562983 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.420608997 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:48.420625925 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.420663118 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:48.420675993 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:48.482567072 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.482651949 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:48.523983002 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.524059057 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:48.581906080 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.581995010 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:48.586986065 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.587059975 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:48.587162018 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:48.587250948 CEST443497408.219.190.98192.168.2.4
    Jul 27, 2024 04:31:48.587311983 CEST49740443192.168.2.48.219.190.98
    Jul 27, 2024 04:31:51.597609997 CEST80497398.219.190.98192.168.2.4
    Jul 27, 2024 04:31:51.597685099 CEST4973980192.168.2.48.219.190.98
    Jul 27, 2024 04:32:23.762406111 CEST4973980192.168.2.48.219.190.98
    TimestampSource PortDest PortSource IPDest IP
    Jul 27, 2024 04:31:22.170291901 CEST5715953192.168.2.41.1.1.1
    Jul 27, 2024 04:31:22.177504063 CEST53571591.1.1.1192.168.2.4
    Jul 27, 2024 04:31:23.094688892 CEST6483853192.168.2.41.1.1.1
    Jul 27, 2024 04:31:23.677730083 CEST53648381.1.1.1192.168.2.4
    Jul 27, 2024 04:31:33.774159908 CEST5627353192.168.2.41.1.1.1
    Jul 27, 2024 04:31:34.411564112 CEST53562731.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jul 27, 2024 04:31:22.170291901 CEST192.168.2.41.1.1.10xe736Standard query (0)www.baidu.comA (IP address)IN (0x0001)false
    Jul 27, 2024 04:31:23.094688892 CEST192.168.2.41.1.1.10x36e8Standard query (0)dnfex.lofter.comA (IP address)IN (0x0001)false
    Jul 27, 2024 04:31:33.774159908 CEST192.168.2.41.1.1.10x3b16Standard query (0)www.lofter.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jul 27, 2024 04:31:22.177504063 CEST1.1.1.1192.168.2.40xe736No error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
    Jul 27, 2024 04:31:22.177504063 CEST1.1.1.1192.168.2.40xe736No error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
    Jul 27, 2024 04:31:22.177504063 CEST1.1.1.1192.168.2.40xe736No error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
    Jul 27, 2024 04:31:22.177504063 CEST1.1.1.1192.168.2.40xe736No error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
    Jul 27, 2024 04:31:23.677730083 CEST1.1.1.1192.168.2.40x36e8No error (0)dnfex.lofter.comwww.lofter.comCNAME (Canonical name)IN (0x0001)false
    Jul 27, 2024 04:31:23.677730083 CEST1.1.1.1192.168.2.40x36e8No error (0)www.lofter.comoversea.lofter.comCNAME (Canonical name)IN (0x0001)false
    Jul 27, 2024 04:31:23.677730083 CEST1.1.1.1192.168.2.40x36e8No error (0)oversea.lofter.comlofter-oversea-sg.ntes53.netease.comCNAME (Canonical name)IN (0x0001)false
    Jul 27, 2024 04:31:23.677730083 CEST1.1.1.1192.168.2.40x36e8No error (0)lofter-oversea-sg.ntes53.netease.com8.219.190.98A (IP address)IN (0x0001)false
    Jul 27, 2024 04:31:34.411564112 CEST1.1.1.1192.168.2.40x3b16No error (0)www.lofter.comoversea.lofter.comCNAME (Canonical name)IN (0x0001)false
    Jul 27, 2024 04:31:34.411564112 CEST1.1.1.1192.168.2.40x3b16No error (0)oversea.lofter.comlofter-oversea-sg.ntes53.netease.comCNAME (Canonical name)IN (0x0001)false
    Jul 27, 2024 04:31:34.411564112 CEST1.1.1.1192.168.2.40x3b16No error (0)lofter-oversea-sg.ntes53.netease.com8.219.190.98A (IP address)IN (0x0001)false
    • www.lofter.com
    • www.baidu.com
    • dnfex.lofter.com
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.449730103.235.47.188806576C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe
    TimestampBytes transferredDirectionData
    Jul 27, 2024 04:31:22.188615084 CEST82OUTGET / HTTP/1.1
    User-Agent: test
    Host: www.baidu.com
    Cache-Control: no-cache
    Jul 27, 2024 04:31:23.076025963 CEST1236INHTTP/1.1 200 OK
    Accept-Ranges: bytes
    Cache-Control: no-cache
    Connection: keep-alive
    Content-Length: 9508
    Content-Type: text/html
    Date: Sat, 27 Jul 2024 02:31:22 GMT
    P3p: CP=" OTI DSP COR IVA OUR IND COM "
    P3p: CP=" OTI DSP COR IVA OUR IND COM "
    Pragma: no-cache
    Server: BWS/1.1
    Set-Cookie: BAIDUID=C23B7DD70AB134036987E4B31BD32186:FG=1; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
    Set-Cookie: BIDUPSID=C23B7DD70AB134036987E4B31BD32186; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
    Set-Cookie: PSTM=1722047482; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
    Set-Cookie: BAIDUID=C23B7DD70AB13403261B67D8C2E6181F:FG=1; max-age=31536000; expires=Sun, 27-Jul-25 02:31:22 GMT; domain=.baidu.com; path=/; version=1; comment=bd
    Traceid: 172204748239037972587768649787334563338
    Vary: Accept-Encoding
    X-Ua-Compatible: IE=Edge,chrome=1
    X-Xss-Protection: 1;mode=block
    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 61 6c 77 61 79 73 22 20 6e 61 6d 65 3d 22 72 65 66 65 72 72 65 72 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 e5 85 a8 e7 90 83 e9 a2 86 e5 85 88 e7 9a 84 e4 b8
    Data Ascii: <!DOCTYPE html><html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><meta content="always" name="referrer"><meta name="description" content="
    Jul 27, 2024 04:31:23.076047897 CEST1236INData Raw: ad e6 96 87 e6 90 9c e7 b4 a2 e5 bc 95 e6 93 8e e3 80 81 e8 87 b4 e5 8a 9b e4 ba 8e e8 ae a9 e7 bd 91 e6 b0 91 e6 9b b4 e4 be bf e6 8d b7 e5 9c b0 e8 8e b7 e5 8f 96 e4 bf a1 e6 81 af ef bc 8c e6 89 be e5 88 b0 e6 89 80 e6 b1 82 e3 80 82 e7 99 be
    Data Ascii: "><link rel="shortcut icon" href="//www.baidu.com/favicon.ico" type="image/x-
    Jul 27, 2024 04:31:23.076065063 CEST448INData Raw: 31 30 30 25 7d 23 6c 68 7b 6d 61 72 67 69 6e 3a 31 36 70 78 20 30 20 35 70 78 3b 77 6f 72 64 2d 73 70 61 63 69 6e 67 3a 33 70 78 7d 2e 63 2d 66 6f 6e 74 2d 6e 6f 72 6d 61 6c 7b 66 6f 6e 74 3a 31 33 70 78 2f 32 33 70 78 20 41 72 69 61 6c 2c 73 61
    Data Ascii: 100%}#lh{margin:16px 0 5px;word-spacing:3px}.c-font-normal{font:13px/23px Arial,sans-serif}.c-color-t{color:#222}.c-btn,.c-btn:visited{color:#333!important}.c-btn{display:inline-block;overflow:hidden;font-family:inherit;font-weight:400;text-al
    Jul 27, 2024 04:31:23.076080084 CEST1236INData Raw: 23 33 31 35 65 66 62 3b 63 6f 6c 6f 72 3a 23 66 66 66 21 69 6d 70 6f 72 74 61 6e 74 7d 61 2e 63 2d 62 74 6e 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 7d 2e 63 2d 62 74 6e 2d 6d 69 6e 69 7b 68 65 69 67 68 74 3a 32 34 70 78 3b
    Data Ascii: #315efb;color:#fff!important}a.c-btn{text-decoration:none}.c-btn-mini{height:24px;width:48px;line-height:24px}.c-btn-primary,.c-btn-primary:visited{color:#fff!important}.c-btn-primary{background-color:#4e6ef2}.c-btn-primary:hover{background-co
    Jul 27, 2024 04:31:23.076097012 CEST1236INData Raw: 61 70 70 65 72 20 23 6b 77 7b 77 69 64 74 68 3a 35 31 32 70 78 3b 68 65 69 67 68 74 3a 31 36 70 78 3b 70 61 64 64 69 6e 67 3a 31 32 70 78 20 31 36 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 36 70 78 3b 6d 61 72 67 69 6e 3a 30 3b 76 65 72 74 69 63
    Data Ascii: apper #kw{width:512px;height:16px;padding:12px 16px;font-size:16px;margin:0;vertical-align:top;outline:0;box-shadow:none;border-radius:10px 0 0 10px;border:2px solid #c4c7ce;background:#fff;color:#222;overflow:hidden;box-sizing:content-box}#he
    Jul 27, 2024 04:31:23.076113939 CEST1236INData Raw: 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 72 69 67 68 74 3a 30 3b 74 6f 70 3a 30 3b 7a 2d 69 6e 64 65 78 3a 31 30 30 3b 68 65 69 67 68 74 3a 36 30 70 78 3b 70 61 64 64 69 6e 67 2d 72 69 67 68 74 3a 32 34 70 78 7d 2e 73 2d 74 6f 70 2d 72
    Data Ascii: osition:absolute;right:0;top:0;z-index:100;height:60px;padding-right:24px}.s-top-right .s-top-right-text{margin-left:32px;margin-top:19px;display:inline-block;position:relative;vertical-align:top;cursor:pointer}.s-top-right .s-top-right-text:h
    Jul 27, 2024 04:31:23.076131105 CEST1236INData Raw: 20 68 72 65 66 3d 22 2f 2f 6d 61 70 2e 62 61 69 64 75 2e 63 6f 6d 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 20 63 6c 61 73 73 3d 22 6d 6e 61 76 20 63 2d 66 6f 6e 74 2d 6e 6f 72 6d 61 6c 20 63 2d 63 6f 6c 6f 72 2d 74 22 3e e5 9c b0 e5
    Data Ascii: href="//map.baidu.com/" target="_blank" class="mnav c-font-normal c-color-t"></a><a href="//live.baidu.com/" target="_blank" class="mnav c-font-normal c-color-t"></a><a href="//haokan.baidu.com/?sfrom=baidu-top" target="_blank" cl
    Jul 27, 2024 04:31:23.076147079 CEST1236INData Raw: 22 3e 3c 61 72 65 61 20 73 74 79 6c 65 3d 22 6f 75 74 6c 69 6e 65 3a 30 22 20 68 69 64 65 66 6f 63 75 73 3d 22 74 72 75 65 22 20 73 68 61 70 65 3d 22 72 65 63 74 22 20 63 6f 6f 72 64 73 3d 22 30 2c 30 2c 32 37 30 2c 31 32 39 22 20 68 72 65 66 3d
    Data Ascii: "><area style="outline:0" hidefocus="true" shape="rect" coords="0,0,270,129" href="//www.baidu.com/s?wd=%E7%99%BE%E5%BA%A6%E7%83%AD%E6%90%9C&amp;sa=ire_dl_gh_logo_texing&amp;rsv_dl=igh_logo_pcs" target="_blank" title="
    Jul 27, 2024 04:31:23.076165915 CEST1236INData Raw: 20 76 61 6c 75 65 3d 22 63 6e 22 3e 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 72 73 76 5f 65 6e 74 65 72 22 20 76 61 6c 75 65 3d 22 31 22 3e 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22
    Data Ascii: value="cn"> <input type="hidden" name="rsv_enter" value="1"> <input type="hidden" name="rsv_dl" value="ib"></form></div></div></div><div id="bottom_layer" class="s-bottom-layer s-isindex-wrap"><div class="s-bottom-layer-content"><p class="lh"
    Jul 27, 2024 04:31:23.076178074 CEST162INData Raw: 2f 64 69 76 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 76 61 72 20 64 61 74 65 3d 6e 65 77 20 44 61 74 65 2c 79 65 61 72 3d 64 61 74 65 2e 67 65 74 46 75 6c 6c 59 65 61 72 28 29 3b 64 6f 63 75
    Data Ascii: /div><script type="text/javascript">var date=new Date,year=date.getFullYear();document.getElementById("year").innerText=""+year+" Baidu "</script></body></html>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.4497318.219.190.98806576C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe
    TimestampBytes transferredDirectionData
    Jul 27, 2024 04:31:23.684395075 CEST167OUTGET /post/30905118_1c5d041cf HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Host: dnfex.lofter.com
    Cache-Control: no-cache
    Jul 27, 2024 04:31:33.770092964 CEST682INHTTP/1.1 302 Found
    Server: nginx
    Date: Sat, 27 Jul 2024 02:31:33 GMT
    Content-Type: text/html;charset=UTF-8
    Content-Length: 0
    Connection: keep-alive
    Set-Cookie: NTESwebSI=555D89F6DBF1B139F08292EEBEF779E9.lofter-webapp-web-old-docker-lftpro-3-3nhsm-6bbi5-5456f799hjpwk-8080; Path=/; HttpOnly
    Set-Cookie: firstentry=%2Fpost.do%3FloftBlogName%3Ddnfex%26loftPostUrl%3D30905118_1c5d041cf%26|; Domain=.lofter.com; Expires=Sun, 28-Jul-2024 02:31:33 GMT; Path=/
    Location: https://www.lofter.com/front/login
    Set-Cookie: usertrack=CpiybmakXAUoDtEokeuTAg==; expires=Sun, 27-Jul-25 02:31:33 GMT; domain=lofter.com; path=/
    P3P: policyref="/w3c/p3p.xml", CP="CUR ADM OUR NOR STA NID"


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.4497398.219.190.98806576C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe
    TimestampBytes transferredDirectionData
    Jul 27, 2024 04:31:45.528268099 CEST409OUTGET /post/30905118_1c5d041cf HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Host: dnfex.lofter.com
    Cache-Control: no-cache
    Cookie: NTESwebSI=555D89F6DBF1B139F08292EEBEF779E9.lofter-webapp-web-old-docker-lftpro-3-3nhsm-6bbi5-5456f799hjpwk-8080; firstentry=%2Fpost.do%3FloftBlogName%3Ddnfex%26loftPostUrl%3D30905118_1c5d041cf%26|; usertrack=CpiybmakXAUoDtEokeuTAg==
    Jul 27, 2024 04:31:46.598176003 CEST202INHTTP/1.1 302 Found
    Server: nginx
    Date: Sat, 27 Jul 2024 02:31:46 GMT
    Content-Type: text/html;charset=UTF-8
    Content-Length: 0
    Connection: keep-alive
    Location: https://www.lofter.com/front/login


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.4497328.219.190.984436576C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe
    TimestampBytes transferredDirectionData
    2024-07-27 02:31:44 UTC306OUTGET /front/login HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Cache-Control: no-cache
    Host: www.lofter.com
    Connection: Keep-Alive
    Cookie: firstentry=%2Fpost.do%3FloftBlogName%3Ddnfex%26loftPostUrl%3D30905118_1c5d041cf%26|; usertrack=CpiybmakXAUoDtEokeuTAg==
    2024-07-27 02:31:45 UTC198INHTTP/1.1 200 OK
    Server: nginx
    Date: Sat, 27 Jul 2024 02:31:45 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 9433
    Connection: close
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    2024-07-27 02:31:45 UTC1311INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 7a 68 22 20 63 6c 61 73 73 3d 22 6c 6f 66 74 65 72 2d 70 61 67 65 22 20 64 61 74 61 2d 72 65 61 63 74 72 6f 6f 74 3d 22 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 65 6e 64 65 72 65 72 22 20 63 6f 6e 74 65 6e 74 3d 22 77 65 62 6b 69 74 22 2f 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65
    Data Ascii: <!DOCTYPE html><html lang="zh" class="lofter-page" data-reactroot=""><head><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"/><meta name="renderer" content="webkit"/><meta http-equiv="content-type" content="text/html;charset=utf-8"/><meta name
    2024-07-27 02:31:45 UTC1448INData Raw: 70 75 7a 7a 6c 65 2f 70 75 7a 7a 6c 65 40 30 30 32 43 31 45 22 20 2b 20 28 77 69 6e 64 6f 77 2e 65 6e 76 20 3d 3d 3d 20 27 70 72 6f 64 27 20 3f 20 27 27 20 3a 20 27 2d 27 20 2b 20 28 77 69 6e 64 6f 77 2e 65 6e 76 20 7c 7c 20 27 74 65 73 74 27 29 29 20 2b 20 22 2e 6a 73 22 2c 75 2e 70 61 72 65 6e 74 4e 6f 64 65 2e 69 6e 73 65 72 74 42 65 66 6f 72 65 28 69 2c 75 29 7d 28 77 69 6e 64 6f 77 2c 64 6f 63 75 6d 65 6e 74 2c 77 69 6e 64 6f 77 2e 50 72 6f 6d 69 73 65 2c 22 70 75 7a 7a 6c 65 22 2c 22 73 63 72 69 70 74 22 29 3b 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 64 69 76 20 69 64 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 22 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 69 64 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 22 20 73 74 79 6c 65 3d 22 64
    Data Ascii: puzzle/puzzle@002C1E" + (window.env === 'prod' ? '' : '-' + (window.env || 'test')) + ".js",u.parentNode.insertBefore(i,u)}(window,document,window.Promise,"puzzle","script");</script></head><body><div id="application"></div><div id="page-default" style="d
    2024-07-27 02:31:45 UTC1448INData Raw: 73 65 63 74 69 6f 6e 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 2d 6c 6f 61 64 69 6e 67 2d 6d 61 73 6b 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 2d 6c 6f 61 64 69 6e 67 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 2d 6c 6f 61 64 69 6e 67 22 3e 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 2d 69 63 6f 6e 2d 61 6e 69 6d 61 74 69 6f 6e 22 20 77 69 64 74 68 3d 22 36 34 22 20 68 65 69 67 68 74 3d 22 36 34 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 36 34 20 36 34 22 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 3c 63 69 72 63 6c 65 20 63 78
    Data Ascii: section class="page-default-loading-mask"><div class="page-default-loading-box"><div class="page-default-loading"><svg class="page-default-icon-animation" width="64" height="64" viewBox="0 0 64 64" fill="none" xmlns="http://www.w3.org/2000/svg"><circle cx
    2024-07-27 02:31:45 UTC1448INData Raw: 32 38 2e 35 38 37 20 33 35 2e 32 38 38 35 20 32 39 2e 34 39 32 34 20 33 36 2e 33 39 35 34 20 33 30 2e 37 31 36 20 33 36 2e 37 30 31 37 43 33 31 2e 30 36 32 37 20 33 36 2e 37 38 37 35 20 33 31 2e 33 39 37 31 20 33 36 2e 35 32 32 20 33 31 2e 33 39 37 31 20 33 36 2e 31 36 32 36 56 32 31 2e 38 36 33 56 32 31 2e 37 36 34 39 43 33 31 2e 33 38 39 20 31 39 2e 38 36 31 36 20 33 31 2e 31 30 33 35 20 31 38 2e 35 36 32 37 20 33 30 2e 34 35 39 31 20 31 37 2e 33 34 39 37 43 33 30 2e 31 30 34 32 20 31 36 2e 36 38 33 39 20 32 39 2e 36 35 31 35 20 31 36 2e 30 39 35 37 20 32 39 2e 31 31 33 31 20 31 35 2e 35 38 39 33 43 32 38 2e 36 38 38 39 20 31 35 2e 31 39 33 31 20 32 38 2e 32 31 35 38 20 31 34 2e 38 35 34 31 20 32 37 2e 36 39 33 38 20 31 34 2e 35 37 36 33 43 32 37 2e 30
    Data Ascii: 28.587 35.2885 29.4924 36.3954 30.716 36.7017C31.0627 36.7875 31.3971 36.522 31.3971 36.1626V21.863V21.7649C31.389 19.8616 31.1035 18.5627 30.4591 17.3497C30.1042 16.6839 29.6515 16.0957 29.1131 15.5893C28.6889 15.1931 28.2158 14.8541 27.6938 14.5763C27.0
    2024-07-27 02:31:45 UTC3778INData Raw: 31 20 34 33 2e 32 39 38 31 43 34 34 2e 30 33 32 37 20 34 32 2e 37 37 35 33 20 34 33 2e 36 39 34 32 20 34 32 2e 33 30 31 35 20 34 33 2e 32 39 38 35 20 34 31 2e 38 37 36 37 43 34 32 2e 37 39 36 39 20 34 31 2e 33 33 37 36 20 34 32 2e 32 30 35 35 20 34 30 2e 38 38 34 32 20 34 31 2e 35 34 30 37 20 34 30 2e 35 32 38 39 43 34 30 2e 33 32 39 33 20 33 39 2e 38 37 39 34 20 33 39 2e 30 33 32 33 20 33 39 2e 35 39 37 36 20 33 37 2e 31 33 31 37 20 33 39 2e 35 38 39 34 48 33 37 2e 30 33 33 38 48 33 31 2e 34 38 32 38 48 33 30 2e 32 31 30 33 48 33 30 2e 31 31 36 35 43 32 39 2e 36 34 33 33 20 33 39 2e 35 38 35 34 20 32 39 2e 32 32 37 33 20 33 39 2e 35 36 34 39 20 32 38 2e 38 36 34 33 20 33 39 2e 35 32 43 32 38 2e 31 38 33 32 20 33 39 2e 34 34 32 34 20 32 37 2e 36 37 33 34
    Data Ascii: 1 43.2981C44.0327 42.7753 43.6942 42.3015 43.2985 41.8767C42.7969 41.3376 42.2055 40.8842 41.5407 40.5289C40.3293 39.8794 39.0323 39.5976 37.1317 39.5894H37.0338H31.4828H30.2103H30.1165C29.6433 39.5854 29.2273 39.5649 28.8643 39.52C28.1832 39.4424 27.6734


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.4497408.219.190.984436576C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe
    TimestampBytes transferredDirectionData
    2024-07-27 02:31:47 UTC306OUTGET /front/login HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Cache-Control: no-cache
    Host: www.lofter.com
    Connection: Keep-Alive
    Cookie: firstentry=%2Fpost.do%3FloftBlogName%3Ddnfex%26loftPostUrl%3D30905118_1c5d041cf%26|; usertrack=CpiybmakXAUoDtEokeuTAg==
    2024-07-27 02:31:48 UTC198INHTTP/1.1 200 OK
    Server: nginx
    Date: Sat, 27 Jul 2024 02:31:48 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 9433
    Connection: close
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    2024-07-27 02:31:48 UTC2721INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 7a 68 22 20 63 6c 61 73 73 3d 22 6c 6f 66 74 65 72 2d 70 61 67 65 22 20 64 61 74 61 2d 72 65 61 63 74 72 6f 6f 74 3d 22 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 65 6e 64 65 72 65 72 22 20 63 6f 6e 74 65 6e 74 3d 22 77 65 62 6b 69 74 22 2f 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65
    Data Ascii: <!DOCTYPE html><html lang="zh" class="lofter-page" data-reactroot=""><head><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"/><meta name="renderer" content="webkit"/><meta http-equiv="content-type" content="text/html;charset=utf-8"/><meta name
    2024-07-27 02:31:48 UTC1448INData Raw: 20 20 7d 0a 7d 2c 20 34 30 30 30 29 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 73 63 72 69 70 74 3e 3c 73 65 63 74 69 6f 6e 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 2d 6c 6f 61 64 69 6e 67 2d 6d 61 73 6b 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 2d 6c 6f 61 64 69 6e 67 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 2d 6c 6f 61 64 69 6e 67 22 3e 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 64 65 66 61 75 6c 74 2d 69 63 6f 6e 2d 61 6e 69 6d 61 74 69 6f 6e 22 20 77 69 64 74 68 3d 22 36 34 22 20 68 65 69 67 68 74 3d 22 36 34 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 36 34 20 36 34 22 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 78 6d 6c 6e 73 3d 22
    Data Ascii: }}, 4000); </script><section class="page-default-loading-mask"><div class="page-default-loading-box"><div class="page-default-loading"><svg class="page-default-icon-animation" width="64" height="64" viewBox="0 0 64 64" fill="none" xmlns="
    2024-07-27 02:31:48 UTC1448INData Raw: 32 38 2e 35 38 37 20 32 30 2e 33 34 33 36 20 32 38 2e 35 38 37 20 32 31 2e 38 36 37 31 56 33 33 2e 39 36 39 33 43 32 38 2e 35 38 37 20 33 35 2e 32 38 38 35 20 32 39 2e 34 39 32 34 20 33 36 2e 33 39 35 34 20 33 30 2e 37 31 36 20 33 36 2e 37 30 31 37 43 33 31 2e 30 36 32 37 20 33 36 2e 37 38 37 35 20 33 31 2e 33 39 37 31 20 33 36 2e 35 32 32 20 33 31 2e 33 39 37 31 20 33 36 2e 31 36 32 36 56 32 31 2e 38 36 33 56 32 31 2e 37 36 34 39 43 33 31 2e 33 38 39 20 31 39 2e 38 36 31 36 20 33 31 2e 31 30 33 35 20 31 38 2e 35 36 32 37 20 33 30 2e 34 35 39 31 20 31 37 2e 33 34 39 37 43 33 30 2e 31 30 34 32 20 31 36 2e 36 38 33 39 20 32 39 2e 36 35 31 35 20 31 36 2e 30 39 35 37 20 32 39 2e 31 31 33 31 20 31 35 2e 35 38 39 33 43 32 38 2e 36 38 38 39 20 31 35 2e 31 39 33
    Data Ascii: 28.587 20.3436 28.587 21.8671V33.9693C28.587 35.2885 29.4924 36.3954 30.716 36.7017C31.0627 36.7875 31.3971 36.522 31.3971 36.1626V21.863V21.7649C31.389 19.8616 31.1035 18.5627 30.4591 17.3497C30.1042 16.6839 29.6515 16.0957 29.1131 15.5893C28.6889 15.193
    2024-07-27 02:31:48 UTC1448INData Raw: 34 43 34 34 2e 37 35 38 37 20 34 34 2e 32 32 31 32 20 34 34 2e 36 36 30 38 20 34 33 2e 39 35 39 38 20 34 34 2e 33 31 20 34 33 2e 32 39 38 31 43 34 34 2e 30 33 32 37 20 34 32 2e 37 37 35 33 20 34 33 2e 36 39 34 32 20 34 32 2e 33 30 31 35 20 34 33 2e 32 39 38 35 20 34 31 2e 38 37 36 37 43 34 32 2e 37 39 36 39 20 34 31 2e 33 33 37 36 20 34 32 2e 32 30 35 35 20 34 30 2e 38 38 34 32 20 34 31 2e 35 34 30 37 20 34 30 2e 35 32 38 39 43 34 30 2e 33 32 39 33 20 33 39 2e 38 37 39 34 20 33 39 2e 30 33 32 33 20 33 39 2e 35 39 37 36 20 33 37 2e 31 33 31 37 20 33 39 2e 35 38 39 34 48 33 37 2e 30 33 33 38 48 33 31 2e 34 38 32 38 48 33 30 2e 32 31 30 33 48 33 30 2e 31 31 36 35 43 32 39 2e 36 34 33 33 20 33 39 2e 35 38 35 34 20 32 39 2e 32 32 37 33 20 33 39 2e 35 36 34 39
    Data Ascii: 4C44.7587 44.2212 44.6608 43.9598 44.31 43.2981C44.0327 42.7753 43.6942 42.3015 43.2985 41.8767C42.7969 41.3376 42.2055 40.8842 41.5407 40.5289C40.3293 39.8794 39.0323 39.5976 37.1317 39.5894H37.0338H31.4828H30.2103H30.1165C29.6433 39.5854 29.2273 39.5649
    2024-07-27 02:31:48 UTC2368INData Raw: 65 72 2e 63 6f 6d 22 7d 7d 2c 7b 22 69 6d 61 67 65 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 6c 6f 66 74 65 72 2e 6c 66 31 32 37 2e 6e 65 74 5c 2f 31 36 31 31 38 30 32 36 39 33 32 32 39 5c 2f 78 69 7a 68 61 6e 67 32 2e 6a 70 67 3f 69 6d 61 67 65 56 69 65 77 26 74 79 70 65 3d 6a 70 67 26 71 75 61 6c 69 74 79 3d 37 30 26 73 74 72 69 70 6d 65 74 61 3d 30 26 74 68 75 6d 62 6e 61 69 6c 3d 34 30 30 30 78 34 30 30 30 22 2c 22 61 75 74 68 6f 72 22 3a 7b 22 6e 61 6d 65 22 3a 22 e3 80 8a e6 83 9c 20 e5 bc b5 e3 80 8b 22 2c 22 6c 69 6e 6b 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 78 69 69 7a 68 61 6e 67 2e 6c 6f 66 74 65 72 2e 63 6f 6d 22 7d 7d 2c 7b 22 69 6d 61 67 65 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 6c 6f 66 74 65 72 2e 6c 66 31 32 37 2e 6e 65 74 5c 2f 31 36 31 31
    Data Ascii: er.com"}},{"image":"https:\/\/lofter.lf127.net\/1611802693229\/xizhang2.jpg?imageView&type=jpg&quality=70&stripmeta=0&thumbnail=4000x4000","author":{"name":" ","link":"https:\/\/xiizhang.lofter.com"}},{"image":"https:\/\/lofter.lf127.net\/1611


    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:22:31:21
    Start date:26/07/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.29184.31872.exe"
    Imagebase:0x400000
    File size:1'700'864 bytes
    MD5 hash:D19A5AC8132E4040179F12EB9366D3B3
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:22:31:50
    Start date:26/07/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255
    Imagebase:0xd40000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:22:31:51
    Start date:26/07/2024
    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    Wow64 process (32bit):true
    Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -ResetDestinationList
    Imagebase:0x980000
    File size:828'368 bytes
    MD5 hash:6F0F06D6AB125A99E43335427066A4A1
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:8
    Start time:22:31:52
    Start date:26/07/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:255 WinX:0 WinY:0 IEFrame:00000000
    Imagebase:0xd40000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:3.9%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:12.9%
      Total number of Nodes:1978
      Total number of Limit Nodes:57
      execution_graph 16099 1000a880 16100 1000a890 GetPropA 16099->16100 16101 1000a8a2 16099->16101 16100->16101 16102 10006940 16107 100069f0 16102->16107 16105 100069a5 16106 1000696b CreateDIBSection 16106->16105 16108 1000694b 16107->16108 16109 100069fd DeleteObject 16107->16109 16108->16105 16108->16106 16109->16108 16110 1000a460 GetPropA 16111 1000a486 16110->16111 16118 1000a47f 16110->16118 16112 1000a60e 16113 1000a630 16112->16113 16114 1000a616 IsWindowVisible 16112->16114 16114->16113 16115 1000a625 16114->16115 16119 10015840 IsWindowVisible 16115->16119 16117 1000a608 ShowScrollBar 16117->16112 16118->16111 16118->16112 16118->16117 16120 10015bb3 16119->16120 16121 1001586e 16119->16121 16120->16113 16121->16120 16132 10015630 16121->16132 16124 100158f5 SelectObject PatBlt 16125 10015935 16124->16125 16125->16120 16140 1000fbf0 CreateCompatibleDC CreateCompatibleBitmap SelectObject 16125->16140 16128 1000b6e0 17 API calls 16131 100159da 16128->16131 16129 10015b69 BitBlt 16145 1000fc70 SelectObject DeleteDC DeleteObject 16129->16145 16131->16128 16131->16129 16133 10015645 16132->16133 16139 1001570e 16132->16139 16134 10015668 6 API calls 16133->16134 16133->16139 16135 100156f1 16134->16135 16136 100156dc 16134->16136 16138 100169c0 14 API calls 16135->16138 16135->16139 16146 100169c0 16136->16146 16138->16139 16139->16124 16139->16125 16141 1000fc60 SelectObject PatBlt 16140->16141 16142 1000fc32 CreateRectRgn GetClipRgn 16140->16142 16141->16131 16143 1000fc59 DeleteObject 16142->16143 16144 1000fc4f SelectClipRgn 16142->16144 16143->16141 16144->16143 16145->16125 16148 100169eb 16146->16148 16147 10016a97 IsWindowEnabled 16155 10016acc 16147->16155 16148->16147 16148->16155 16149 10016c06 16150 10016c10 SetRect MulDiv OffsetRect 16149->16150 16151 10016cd3 MulDiv 16149->16151 16152 10016c5e 16150->16152 16153 10016cf2 MulDiv 16151->16153 16154 10016cec 16151->16154 16156 10016c7f OffsetRect 16152->16156 16157 10016c81 IsRectEmpty 16152->16157 16153->16154 16160 10016d08 MulDiv 16154->16160 16165 10016c93 EqualRect 16154->16165 16155->16149 16158 10016d71 16155->16158 16156->16157 16157->16165 16159 10016dbf SetRectEmpty 16158->16159 16161 10016d93 SetRect 16158->16161 16159->16165 16160->16165 16161->16165 16163 10016e07 16166 10016e2f SetRectEmpty 16163->16166 16167 10016e36 16163->16167 16164 10016df7 EqualRect 16164->16163 16165->16163 16165->16164 16166->16167 16167->16135 16168 1001c400 16171 1001c450 GetPropA 16168->16171 16172 1001c485 GetPropA 16171->16172 16173 1001c46b RemovePropA SendMessageA 16171->16173 16174 1001c491 IsWindowVisible 16172->16174 16175 1001c40b EnumChildWindows 16172->16175 16173->16172 16174->16175 16177 1001c4b9 InvalidateRect SetWindowPos 16174->16177 16177->16175 16178 10014f80 16179 10014f92 16178->16179 16180 1001503f 16178->16180 16183 100150ee 16179->16183 16184 10015123 CallWindowProcA 16179->16184 16188 100150ab 16179->16188 16192 10014fe7 16179->16192 16193 10015106 16179->16193 16194 10014fb6 16179->16194 16195 10014fcb 16179->16195 16196 1001502a 16179->16196 16197 10014ffc CallWindowProcA 16179->16197 16198 1001507f 16179->16198 16181 100150c1 16180->16181 16182 10015046 16180->16182 16185 100150c8 16181->16185 16186 1001511c 16181->16186 16187 10015048 16182->16187 16182->16188 16298 10016060 16183->16298 16185->16193 16199 100150ca 16185->16199 16186->16184 16190 10015140 16186->16190 16187->16183 16187->16184 16187->16198 16207 10015095 16187->16207 16208 10015069 16187->16208 16285 10015be0 16188->16285 16326 10015390 IsWindowVisible 16190->16326 16230 100154e0 16192->16230 16233 10015400 16193->16233 16240 10016220 16194->16240 16249 10012460 16195->16249 16258 10012100 CallWindowProcA 16196->16258 16212 100155d0 55 API calls 16197->16212 16265 100157b0 16198->16265 16199->16183 16206 100150d4 16199->16206 16200 10015102 16202 100150bd 16206->16184 16217 100150d9 16206->16217 16277 10012370 CallWindowProcA 16207->16277 16260 100162f0 16208->16260 16223 10015023 16212->16223 16215 10014fc7 16292 10014ef0 16217->16292 16219 10014ff8 16220 10015091 16222 10015118 16226 1001507b 16227 100150a7 16228 10014fe3 16229 100150ea 16231 100155a8 CallWindowProcA 16230->16231 16232 100154fb 16230->16232 16231->16219 16232->16231 16234 10015433 16233->16234 16235 1001540a 16233->16235 16238 100154b3 SetWindowPos 16234->16238 16239 10015499 CallWindowProcA 16234->16239 16236 10015415 CallWindowProcA 16235->16236 16237 100154cc 16235->16237 16236->16222 16237->16222 16238->16237 16239->16238 16241 10016237 16240->16241 16242 1001623e GetWindowRect 16240->16242 16241->16242 16243 100162a9 CallWindowProcA 16241->16243 16244 1001626d PtInRect 16242->16244 16245 1001628c 16242->16245 16248 100162c7 16243->16248 16244->16245 16247 1001627d 16244->16247 16245->16243 16246 10016296 PtInRect 16245->16246 16246->16243 16246->16248 16247->16215 16248->16215 16250 10012484 16249->16250 16251 1001246a SendMessageA 16249->16251 16252 100155d0 IsWindowVisible 16250->16252 16251->16250 16253 100155e1 16252->16253 16254 100155e5 16252->16254 16253->16228 16255 10015840 53 API calls 16254->16255 16256 10015605 16255->16256 16257 1001560f SendMessageA 16256->16257 16257->16228 16259 10012127 16258->16259 16261 1001632b CallWindowProcA 16260->16261 16262 100162fd CallWindowProcA 16260->16262 16261->16226 16263 100155d0 55 API calls 16262->16263 16264 10016324 16263->16264 16264->16226 16266 100157bd 16265->16266 16267 1001581f CallWindowProcA 16266->16267 16330 10015f60 16266->16330 16267->16220 16269 100157d4 16270 10015800 16269->16270 16271 100157d8 16269->16271 16270->16267 16274 10015840 53 API calls 16270->16274 16272 10015840 53 API calls 16271->16272 16273 100157ed 16272->16273 16340 100124d0 SetTimer 16273->16340 16274->16267 16276 100157fe 16276->16267 16278 1001239b 16277->16278 16279 100123ae GetPropA 16277->16279 16278->16227 16280 10012405 SetBkMode IsWindowEnabled 16279->16280 16281 100123be 16279->16281 16283 10012428 SetTextColor 16280->16283 16281->16280 16282 100123c5 SetBkColor SetTextColor 16281->16282 16282->16227 16283->16227 16286 10015bf4 KillTimer KillTimer KillTimer 16285->16286 16287 10015bed 16285->16287 16289 10015f60 6 API calls 16286->16289 16287->16286 16288 10015c49 CallWindowProcA 16287->16288 16288->16202 16290 10015c23 16289->16290 16291 10015840 53 API calls 16290->16291 16291->16288 16293 10014f53 CallWindowProcA 16292->16293 16294 10014efd GetParent GetClassLongA 16292->16294 16293->16229 16294->16293 16295 10014f17 16294->16295 16296 10014f25 SendMessageA 16295->16296 16297 10014f3c SendMessageA 16295->16297 16296->16229 16297->16229 16299 10016071 16298->16299 16300 1001609d 16298->16300 16299->16300 16301 10016078 CallWindowProcA 16299->16301 16302 100160d0 16300->16302 16303 100160ab CallWindowProcA 16300->16303 16301->16200 16304 10015840 53 API calls 16302->16304 16303->16200 16305 100160e5 16304->16305 16306 10016159 GetCapture 16305->16306 16307 100160ea 16305->16307 16309 10016174 16306->16309 16310 1001616a 16306->16310 16342 100124d0 SetTimer 16307->16342 16312 10016183 GetMessageA 16309->16312 16313 1001617c SetCapture 16309->16313 16310->16312 16311 100160fb 16314 10016132 SendMessageA 16311->16314 16315 10016105 GetParent SendMessageA 16311->16315 16316 100161ef 16312->16316 16320 1001619a 16312->16320 16313->16312 16314->16200 16315->16200 16317 10016202 ReleaseCapture 16316->16317 16318 10016208 16316->16318 16317->16318 16318->16200 16319 100161a0 GetCapture 16319->16316 16319->16320 16320->16319 16321 100161f1 16320->16321 16322 100161b7 DispatchMessageA 16320->16322 16343 10016760 16320->16343 16359 10016650 KillTimer KillTimer KillTimer 16321->16359 16323 100161de GetMessageA 16322->16323 16323->16316 16323->16319 16373 10009c60 16326->16373 16341 10016440 GetCursorPos GetWindowRect 16330->16341 16332 10015f73 16333 10015f9c PtInRect 16332->16333 16334 10015fb6 16332->16334 16333->16332 16335 10015fc4 PtInRect 16333->16335 16334->16269 16336 10015ff0 16335->16336 16337 10016008 PtInRect 16335->16337 16336->16269 16338 10016034 PtInRect 16337->16338 16339 1001601c 16337->16339 16338->16269 16339->16269 16340->16276 16341->16332 16342->16311 16372 10016440 GetCursorPos GetWindowRect 16343->16372 16345 10016791 16347 10016924 16345->16347 16349 1001682c OffsetRect 16345->16349 16346 10015840 53 API calls 16348 10016975 16346->16348 16347->16346 16348->16323 16350 10016858 16349->16350 16351 1001684c OffsetRect 16349->16351 16352 10016873 16350->16352 16353 10016864 OffsetRect 16350->16353 16351->16350 16354 100168ab MulDiv 16352->16354 16355 100168bf 16352->16355 16353->16352 16354->16355 16355->16347 16356 100168dd GetParent 16355->16356 16357 100168ff 16355->16357 16358 10016918 SendMessageA 16356->16358 16357->16358 16358->16347 16360 1001670d 16359->16360 16361 10016689 16359->16361 16364 10015f60 6 API calls 16360->16364 16362 10016693 GetParent SendMessageA GetParent SendMessageA 16361->16362 16363 100166d7 SendMessageA SendMessageA 16361->16363 16362->16360 16363->16360 16365 1001671e 16364->16365 16366 10016722 16365->16366 16367 1001673a 16365->16367 16368 10015840 53 API calls 16366->16368 16369 10015840 53 API calls 16367->16369 16370 10016737 16368->16370 16371 1001674f 16369->16371 16370->16316 16371->16316 16372->16345 16374 10012140 SetPropA 16375 1001216a 16374->16375 16376 10017540 16377 1001756c 16376->16377 16378 100175a7 16376->16378 16377->16378 16379 100175e3 ??2@YAPAXI 16377->16379 16380 100175ff 16379->16380 16381 10017621 16380->16381 16382 10017606 ??3@YAXPAX 16380->16382 16383 10017694 ??3@YAXPAX 16381->16383 16384 100176af 16381->16384 16386 10017700 16381->16386 16382->16378 16385 100176e5 ??3@YAXPAX 16384->16385 16384->16386 16399 10006b30 16386->16399 16388 10017a12 16389 10017a1a ??3@YAXPAX 16388->16389 16390 10017acc ??3@YAXPAX SelectObject 16388->16390 16391 10017b04 CreateCompatibleBitmap SelectObject BitBlt SelectObject 16390->16391 16392 10017af6 DeleteObject 16390->16392 16407 10018e00 16391->16407 16392->16391 16396 10017b69 16437 100191c0 16396->16437 16400 100069f0 DeleteObject 16399->16400 16401 10006b3b 16400->16401 16402 10006bed 16401->16402 16403 10006b7a CreateDIBSection 16401->16403 16402->16388 16404 10006b94 16403->16404 16405 10006bc4 16404->16405 16406 100069f0 DeleteObject 16404->16406 16405->16388 16406->16402 16408 10018e33 16407->16408 16409 10018e29 DeleteObject 16407->16409 16410 10018e4a 16408->16410 16411 10018e3d DeleteObject 16408->16411 16409->16408 16441 10006940 16410->16441 16411->16410 16414 10018f0f CreateSolidBrush 16415 10018f29 16414->16415 16446 10006920 16415->16446 16416 10018ede 16416->16414 16419 10018f1e CreatePatternBrush 16416->16419 16419->16415 16420 10018f60 16421 10018f7d 16420->16421 16422 10018f90 DeleteObject 16421->16422 16423 10018fb9 16421->16423 16424 10018fa6 DeleteObject 16421->16424 16422->16421 16425 10018fc0 DeleteObject 16423->16425 16426 10018fc6 16423->16426 16424->16421 16425->16426 16427 10018fd3 16426->16427 16428 10018fcd DeleteObject 16426->16428 16429 10018ff8 CreateFontIndirectA CreateFontIndirectA 16427->16429 16430 10019046 SystemParametersInfoA CreateFontIndirectA CreateFontIndirectA SystemParametersInfoA 16427->16430 16428->16427 16429->16427 16431 100190b1 CreateFontIndirectA CreateFontIndirectA 16430->16431 16432 100190d4 16430->16432 16431->16432 16433 100190f3 CreateFontIndirectA CreateFontIndirectA 16432->16433 16434 1001911b 16432->16434 16433->16434 16435 10019122 CreateFontIndirectA CreateFontIndirectA 16434->16435 16436 1001914d 16434->16436 16435->16436 16436->16396 16439 100191d2 16437->16439 16438 10017b75 16439->16438 16449 10008030 16439->16449 16442 100069f0 DeleteObject 16441->16442 16443 1000694b 16442->16443 16444 100069a5 SelectObject BitBlt SelectObject 16443->16444 16445 1000696b CreateDIBSection 16443->16445 16444->16416 16445->16444 16447 10006934 16446->16447 16448 1000692d DeleteObject 16446->16448 16447->16420 16448->16447 16450 10008053 16449->16450 16451 10008039 SelectObject DeleteDC 16449->16451 16452 10008068 16450->16452 16453 1000805a DeleteObject 16450->16453 16451->16450 16452->16439 16453->16452 16454 1001c3e0 GetCurrentThreadId EnumThreadWindows 16455 10020a2e 16458 10019482 16455->16458 16459 10019488 16458->16459 16464 100031a0 LoadCursorA RegisterClassExA 16459->16464 16461 10019496 16462 100194b6 16461->16462 16463 1001949e GetCurrentThreadId SetWindowsHookExA 16461->16463 16463->16462 16464->16461 16465 1000da90 GetPropA 16466 1000dac3 16465->16466 16467 1000daa8 NtdllDefWindowProc_A 16465->16467 16468 1000db4b 16466->16468 16469 1000dacf 16466->16469 16470 1000db90 16468->16470 16472 1000dbb9 CallWindowProcA 16468->16472 16475 1000dba5 16468->16475 16476 1000db68 16468->16476 16477 1000db7c 16468->16477 16469->16470 16471 1000dad5 16469->16471 16529 1000ddb0 16470->16529 16473 1000db2b 16471->16473 16474 1000dadd 16471->16474 16473->16472 16480 1000db37 16473->16480 16481 1000db17 16474->16481 16482 1000dadf 16474->16482 16533 1000ddf0 16475->16533 16520 1000dd30 16476->16520 16525 1000dd70 16477->16525 16519 1000dcd0 TrackMouseEvent CallWindowProcA 16480->16519 16492 10012100 CallWindowProcA 16481->16492 16488 1000db03 16482->16488 16489 1000dae4 16482->16489 16485 1000dba0 16486 1000dbb4 16515 1000dc90 16488->16515 16489->16472 16495 1000daed 16489->16495 16490 1000db77 16491 1000db8b 16493 1000db26 16492->16493 16494 1000db46 16500 10012180 GetClientRect 16495->16500 16499 1000dafe 16501 100121b4 SelectObject PatBlt SelectObject 16500->16501 16502 10012207 16500->16502 16501->16499 16503 1000fbf0 7 API calls 16502->16503 16504 10012221 BitBlt CallWindowProcA 16503->16504 16537 1000fca0 SetMapMode SetWindowOrgEx SetWindowExtEx SetViewportOrgEx SetViewportExtEx 16504->16537 16506 10012273 16507 1000fbf0 7 API calls 16506->16507 16508 10012289 SelectObject PatBlt 16507->16508 16538 1000b4c0 16508->16538 16510 100122f6 BitBlt 16545 1000fc70 SelectObject DeleteDC DeleteObject 16510->16545 16512 10012326 16546 1000fc70 SelectObject DeleteDC DeleteObject 16512->16546 16514 10012337 16514->16499 16516 1000dca4 16515->16516 16547 1000def0 16516->16547 16519->16494 16567 1000de30 GetCursorPos GetWindowRect SendMessageA 16520->16567 16522 1000dd38 16523 1000dd4e CallWindowProcA 16522->16523 16524 1000def0 43 API calls 16522->16524 16523->16490 16524->16523 16526 1000dd7a 16525->16526 16527 1000dd8d CallWindowProcA 16525->16527 16528 1000def0 43 API calls 16526->16528 16527->16491 16528->16527 16530 1000ddc7 CallWindowProcA 16529->16530 16531 1000ddbd 16529->16531 16530->16485 16532 1000def0 43 API calls 16531->16532 16532->16530 16534 1000de07 CallWindowProcA 16533->16534 16535 1000ddfd 16533->16535 16534->16486 16536 1000def0 43 API calls 16535->16536 16536->16534 16537->16506 16540 1000b4c8 16538->16540 16539 1000b5dc 16539->16510 16540->16539 16541 1000b542 CreateCompatibleDC CreateCompatibleBitmap SelectObject 16540->16541 16542 1000b515 746D1530 16540->16542 16543 100271c4 16541->16543 16542->16510 16544 1000b5a1 746D1530 DeleteObject DeleteDC 16543->16544 16544->16510 16545->16512 16546->16514 16566 10009b70 16547->16566 16568 1000ded1 16567->16568 16569 1000de8e 16567->16569 16568->16522 16569->16568 16570 1000de94 SendMessageA SendMessageA PtInRect 16569->16570 16570->16569 16571 1000dedc 16570->16571 16571->16522 16572 10007a30 GetPropA 16573 10007a65 16572->16573 16574 10007a49 NtdllDefWindowProc_A 16572->16574 16575 10007a75 16573->16575 16578 10007b14 16573->16578 16576 10007a7b 16575->16576 16577 10007afd 16575->16577 16579 10007b8d CallWindowProcA 16576->16579 16589 10007ae6 16576->16589 16590 10007aad 16576->16590 16591 10007acf 16576->16591 16598 10007a96 16576->16598 16619 1000dcd0 TrackMouseEvent CallWindowProcA 16577->16619 16578->16579 16582 10007b30 16578->16582 16583 10007b76 16578->16583 16584 10007b47 16578->16584 16585 10007b5e 16578->16585 16581 10007baf 16579->16581 16620 100078e0 16582->16620 16608 10007960 16583->16608 16623 100078a0 16584->16623 16605 10007920 16585->16605 16588 10007b0e 16596 10012100 CallWindowProcA 16589->16596 16611 10012350 16590->16611 16614 100079a0 CallWindowProcA 16591->16614 16595 10007b70 16603 10007af7 16596->16603 16597 10007b87 16600 10007b41 16601 10007b58 16606 10007937 CallWindowProcA 16605->16606 16607 1000792d 16605->16607 16606->16595 16607->16606 16609 10007977 CallWindowProcA 16608->16609 16610 1000796d 16608->16610 16609->16597 16610->16609 16626 1000ae20 7 API calls 16611->16626 16613 10007abe 16615 10007a18 16614->16615 16616 100079ca 16614->16616 16616->16615 16644 10019730 16616->16644 16618 10007a0d InvalidateRect 16618->16615 16619->16588 16621 100078eb 16620->16621 16622 100078fc CallWindowProcA 16620->16622 16621->16622 16622->16600 16624 100078b6 CallWindowProcA 16623->16624 16625 100078aa 16623->16625 16624->16601 16625->16624 16627 1000aeeb 16626->16627 16628 1000ae9b 16626->16628 16627->16613 16630 1000af00 EqualRect 16628->16630 16631 1000b0b1 16630->16631 16632 1000af18 IsRectEmpty 16630->16632 16631->16627 16633 1000af84 16632->16633 16634 1000af2f 6 API calls 16632->16634 16635 1000afbd 16633->16635 16636 1000af8d CreatePen 16633->16636 16634->16633 16638 1000afc2 CreatePen 16635->16638 16639 1000afef 16635->16639 16637 1000b040 7 API calls 16636->16637 16642 1000b0a1 DeleteObject DeleteObject 16637->16642 16643 1000b099 SelectClipRgn 16637->16643 16638->16637 16640 1000b000 CreatePen 16639->16640 16641 1000b021 CreatePen 16639->16641 16640->16637 16641->16637 16642->16631 16643->16642 16645 1001975d 16644->16645 16647 10019f7d 16645->16647 16651 1001a750 16645->16651 16647->16618 16648 10019eee 16648->16647 16649 10019ef8 ??2@YAPAXI 16648->16649 16650 10019f20 16649->16650 16650->16618 16652 1001a77b 16651->16652 16653 1001a79b ??2@YAPAXI 16652->16653 16654 1001a7ea 16652->16654 16657 1001a9a8 16652->16657 16658 1001a7b4 16653->16658 16655 1001a7f2 ??2@YAPAXI 16654->16655 16656 1001a845 16654->16656 16660 1001a80f 16655->16660 16661 1001a8a0 16656->16661 16662 1001a84d ??2@YAPAXI 16656->16662 16657->16648 16683 10012140 SetPropA 16658->16683 16666 10012140 SetPropA 16660->16666 16664 1001a8f8 16661->16664 16665 1001a8a8 ??2@YAPAXI 16661->16665 16671 1001a86a 16662->16671 16663 1001a7d6 16663->16648 16669 1001a950 16664->16669 16670 1001a900 ??2@YAPAXI 16664->16670 16674 1001a8c2 16665->16674 16668 1001a831 16666->16668 16667 10012140 SetPropA 16672 1001a88c 16667->16672 16668->16648 16669->16657 16673 1001a958 ??2@YAPAXI 16669->16673 16676 1001a91a 16670->16676 16671->16667 16672->16648 16678 1001a972 16673->16678 16675 10012140 SetPropA 16674->16675 16679 1001a8e4 16675->16679 16677 10012140 SetPropA 16676->16677 16680 1001a93c 16677->16680 16681 10012140 SetPropA 16678->16681 16679->16648 16680->16648 16682 1001a994 16681->16682 16682->16648 16684 1001216a 16683->16684 16684->16663 16685 10013170 GetClientRect 16686 1000fbf0 7 API calls 16685->16686 16687 100131bd 16686->16687 16717 10012060 GetPropA 16687->16717 16718 1001209a SelectObject 16717->16718 16719 10012076 16717->16719 16721 10009a50 16718->16721 16719->16718 16720 10012088 SendMessageA 16719->16720 16720->16718 16722 1001a4f0 16723 1001a50b 16722->16723 16724 1001a65d CallNextHookEx 16722->16724 16723->16724 16725 1001a574 16723->16725 16728 1001a526 16723->16728 16726 1001a5c7 16725->16726 16730 1001a579 16725->16730 16726->16724 16727 1001a5d7 GetPropA 16726->16727 16727->16724 16729 1001a5ec GetPropA 16727->16729 16728->16724 16732 1001a54f SetPropA 16728->16732 16729->16724 16731 1001a5fb GetPropA 16729->16731 16730->16724 16736 1001a5a2 SetPropA 16730->16736 16733 1001a627 GetClassNameA 16731->16733 16734 1001a60a GetPropA 16731->16734 16740 1001a56f 16732->16740 16741 1001a030 16733->16741 16737 10019730 8 API calls 16734->16737 16736->16740 16738 1001a625 16737->16738 16739 1001a64c SetPropA 16738->16739 16739->16724 16740->16724 16862 1001a9c0 _mbscmp 16741->16862 16743 1001a049 16744 1001a059 _mbscmp 16743->16744 16745 1001a04d 16743->16745 16746 1001a086 _mbscmp 16744->16746 16747 1001a06e 16744->16747 16745->16739 16749 1001a095 16746->16749 16750 1001a0ad _mbscmp 16746->16750 16748 10019730 8 API calls 16747->16748 16751 1001a07f 16748->16751 16752 10019730 8 API calls 16749->16752 16753 1001a0cc _mbscmp 16750->16753 16754 1001a0bc 16750->16754 16751->16739 16755 1001a0a6 16752->16755 16757 1001a0f3 _mbscmp 16753->16757 16758 1001a0db 16753->16758 16875 100077b0 16754->16875 16755->16739 16761 1001a102 16757->16761 16762 1001a11a _mbscmp 16757->16762 16760 10019730 8 API calls 16758->16760 16759 1001a0c2 16759->16739 16766 1001a0ec 16760->16766 16763 10019730 8 API calls 16761->16763 16764 1001a141 _mbscmp 16762->16764 16765 1001a129 16762->16765 16767 1001a113 16763->16767 16769 1001a150 16764->16769 16770 1001a168 _mbscmp 16764->16770 16768 10019730 8 API calls 16765->16768 16766->16739 16767->16739 16771 1001a13a 16768->16771 16772 10019730 8 API calls 16769->16772 16773 1001a177 16770->16773 16774 1001a18f _mbscmp 16770->16774 16771->16739 16775 1001a161 16772->16775 16776 10019730 8 API calls 16773->16776 16777 1001a1b6 _mbscmp 16774->16777 16778 1001a19e 16774->16778 16775->16739 16782 1001a188 16776->16782 16780 1001a1c5 16777->16780 16781 1001a1dd _mbscmp 16777->16781 16779 10019730 8 API calls 16778->16779 16783 1001a1af 16779->16783 16784 10019730 8 API calls 16780->16784 16785 1001a204 _mbscmp 16781->16785 16786 1001a1ec 16781->16786 16782->16739 16783->16739 16787 1001a1d6 16784->16787 16789 1001a213 16785->16789 16790 1001a22b _mbscmp 16785->16790 16788 10019730 8 API calls 16786->16788 16787->16739 16791 1001a1fd 16788->16791 16792 10019730 8 API calls 16789->16792 16793 1001a252 _mbscmp 16790->16793 16794 1001a23a 16790->16794 16791->16739 16798 1001a224 16792->16798 16796 1001a261 16793->16796 16797 1001a279 _mbscmp 16793->16797 16795 10019730 8 API calls 16794->16795 16799 1001a24b 16795->16799 16800 10019730 8 API calls 16796->16800 16801 1001a2a0 _mbsstr 16797->16801 16802 1001a288 16797->16802 16798->16739 16799->16739 16803 1001a272 16800->16803 16805 1001a2b5 16801->16805 16806 1001a2cd _mbsstr 16801->16806 16804 10019730 8 API calls 16802->16804 16803->16739 16807 1001a299 16804->16807 16808 10019730 8 API calls 16805->16808 16809 1001a2f4 _mbscmp 16806->16809 16810 1001a2dc 16806->16810 16807->16739 16814 1001a2c6 16808->16814 16812 1001a303 16809->16812 16813 1001a31b _mbscmp 16809->16813 16811 10019730 8 API calls 16810->16811 16815 1001a2ed 16811->16815 16816 10019730 8 API calls 16812->16816 16817 1001a342 _mbscmp 16813->16817 16818 1001a32a 16813->16818 16814->16739 16815->16739 16819 1001a314 16816->16819 16821 1001a351 16817->16821 16822 1001a369 _mbscmp 16817->16822 16820 10019730 8 API calls 16818->16820 16819->16739 16823 1001a33b 16820->16823 16824 10019730 8 API calls 16821->16824 16825 1001a390 _mbsstr 16822->16825 16826 1001a378 16822->16826 16823->16739 16830 1001a362 16824->16830 16828 1001a39f _mbsstr 16825->16828 16829 1001a3ae 16825->16829 16827 10019730 8 API calls 16826->16827 16831 1001a389 16827->16831 16828->16829 16832 1001a3c6 _mbscmp 16828->16832 16833 10019730 8 API calls 16829->16833 16830->16739 16831->16739 16835 1001a3d5 16832->16835 16836 1001a3ed _mbscmp 16832->16836 16834 1001a3bf 16833->16834 16834->16739 16837 10019730 8 API calls 16835->16837 16838 1001a414 _mbscmp 16836->16838 16839 1001a3fc 16836->16839 16842 1001a3e6 16837->16842 16840 1001a423 16838->16840 16841 1001a43b _mbscmp 16838->16841 16843 10019730 8 API calls 16839->16843 16844 10019730 8 API calls 16840->16844 16845 1001a462 _mbscmp 16841->16845 16846 1001a44a 16841->16846 16842->16739 16847 1001a40d 16843->16847 16848 1001a434 16844->16848 16850 1001a471 16845->16850 16851 1001a489 16845->16851 16849 10019730 8 API calls 16846->16849 16847->16739 16848->16739 16852 1001a45b 16849->16852 16853 10019730 8 API calls 16850->16853 16893 1001aa70 _mbsstr 16851->16893 16852->16739 16855 1001a482 16853->16855 16855->16739 16856 1001a496 16857 1001a4d9 16856->16857 16858 1001a4ae _mbsstr 16856->16858 16857->16739 16858->16747 16859 1001a4c1 16858->16859 16860 10019730 8 API calls 16859->16860 16861 1001a4d2 16860->16861 16861->16739 16863 1001a9f7 _mbscmp 16862->16863 16864 1001a9dc 16862->16864 16866 1001aa67 16863->16866 16867 1001aa06 GetParent FindWindowExA 16863->16867 16865 10019730 8 API calls 16864->16865 16868 1001a9f1 16865->16868 16866->16743 16869 1001aa29 FindWindowExA 16867->16869 16870 1001aa5c 16867->16870 16868->16743 16869->16870 16871 1001aa37 FindWindowExA 16869->16871 16870->16743 16871->16870 16872 1001aa45 16871->16872 16873 10019730 8 API calls 16872->16873 16874 1001aa56 16873->16874 16874->16743 16876 100077bd 16875->16876 16877 1000782b 16876->16877 16878 100077f2 16876->16878 16879 10007805 16876->16879 16880 10007818 16876->16880 16881 100077cc 16876->16881 16882 100077df 16876->16882 16877->16759 16883 10019730 8 API calls 16878->16883 16884 10019730 8 API calls 16879->16884 16885 10019730 8 API calls 16880->16885 16886 10019730 8 API calls 16881->16886 16887 10019730 8 API calls 16882->16887 16889 10007803 16883->16889 16890 10007816 16884->16890 16891 10007829 16885->16891 16892 100077dd 16886->16892 16888 100077f0 16887->16888 16888->16759 16889->16759 16890->16759 16891->16759 16892->16759 16894 1001ab3b _mbsstr 16893->16894 16901 1001aa90 16893->16901 16895 1001ab65 _mbscmp 16894->16895 16896 1001ab4a 16894->16896 16898 1001ab95 _mbscmp 16895->16898 16899 1001ab7a 16895->16899 16897 10019730 8 API calls 16896->16897 16902 1001ab5f 16897->16902 16900 1001abae _mbscmp 16898->16900 16976 1001aba4 16898->16976 16903 10019730 8 API calls 16899->16903 16905 1001abd8 _mbscmp 16900->16905 16906 1001abbd 16900->16906 16909 1001aab6 16901->16909 16910 1001aacd 16901->16910 16902->16856 16904 1001ab8f 16903->16904 16904->16856 16911 1001ac02 _mbsstr 16905->16911 16912 1001abe7 16905->16912 16908 10019730 8 API calls 16906->16908 16907 10019730 8 API calls 16913 1001b694 16907->16913 16914 1001abd2 16908->16914 16915 10019730 8 API calls 16909->16915 16917 1001aad1 16910->16917 16924 1001ab04 16910->16924 16925 1001aaed 16910->16925 16918 1001ac1b _mbsstr 16911->16918 16911->16976 16916 10019730 8 API calls 16912->16916 16913->16856 16914->16856 16919 1001aac7 16915->16919 16920 1001abfc 16916->16920 16921 10019730 8 API calls 16917->16921 16922 1001ac93 16918->16922 16923 1001ac2a _mbscmp 16918->16923 16919->16856 16920->16856 16928 1001aae2 16921->16928 16927 1001aca1 _mbscmp 16922->16927 16935 1001b61f 16922->16935 16929 1001ac54 _mbscmp 16923->16929 16930 1001ac39 16923->16930 16924->16917 16946 1001ab24 16924->16946 16926 10019730 8 API calls 16925->16926 16932 1001aafe 16926->16932 16936 1001acb0 16927->16936 16937 1001accb _mbscmp 16927->16937 16928->16856 16933 1001ac63 16929->16933 16934 1001ac76 _mbsstr 16929->16934 16931 10019730 8 API calls 16930->16931 16938 1001ac4e 16931->16938 16932->16856 16939 100077b0 8 API calls 16933->16939 16934->16935 16934->16976 16935->16856 16940 10019730 8 API calls 16936->16940 16941 1001acf5 _mbscmp 16937->16941 16942 1001acda 16937->16942 16938->16856 16945 1001ac6d 16939->16945 16947 1001acc5 16940->16947 16944 1001ad0e _mbscmp 16941->16944 16941->16976 16943 10019730 8 API calls 16942->16943 16948 1001acef 16943->16948 16949 1001ad38 _mbscmp 16944->16949 16950 1001ad1d 16944->16950 16945->16856 16951 10019730 8 API calls 16946->16951 16947->16856 16948->16856 16954 1001ad62 _mbscmp 16949->16954 16955 1001ad47 16949->16955 16952 10019730 8 API calls 16950->16952 16953 1001ab35 16951->16953 16956 1001ad32 16952->16956 16953->16856 16958 1001ad75 _mbscmp 16954->16958 16954->16976 16957 10019730 8 API calls 16955->16957 16956->16856 16959 1001ad5c 16957->16959 16960 1001ad88 _mbscmp 16958->16960 16958->16976 16959->16856 16961 1001ada1 _mbscmp 16960->16961 16960->16976 16962 1001adb0 16961->16962 16963 1001adcb _mbscmp 16961->16963 16964 10019730 8 API calls 16962->16964 16965 1001adf5 _mbscmp 16963->16965 16966 1001adda 16963->16966 16967 1001adc5 16964->16967 16969 1001b664 16965->16969 16970 1001ae08 _mbscmp 16965->16970 16968 10019730 8 API calls 16966->16968 16967->16856 16972 1001adef 16968->16972 16971 10019730 8 API calls 16969->16971 16970->16969 16973 1001ae1b _mbscmp 16970->16973 16974 1001b679 16971->16974 16972->16856 16975 1001ae34 _mbscmp 16973->16975 16973->16976 16974->16856 16977 1001ae43 16975->16977 16978 1001ae5e _mbscmp 16975->16978 16976->16907 16981 10019730 8 API calls 16977->16981 16979 1001ae88 _mbscmp 16978->16979 16980 1001ae6d 16978->16980 16979->16976 16983 1001aea1 _mbscmp 16979->16983 16982 10019730 8 API calls 16980->16982 16984 1001ae58 16981->16984 16985 1001ae82 16982->16985 16986 1001aeb0 16983->16986 16987 1001aecb _mbscmp 16983->16987 16984->16856 16985->16856 16988 10019730 8 API calls 16986->16988 16989 1001aef5 _mbscmp 16987->16989 16990 1001aeda 16987->16990 16991 1001aec5 16988->16991 16989->16976 16993 1001af0e _mbscmp 16989->16993 16992 10019730 8 API calls 16990->16992 16991->16856 16996 1001aeef 16992->16996 16994 1001af38 _mbscmp 16993->16994 16995 1001af1d 16993->16995 16998 1001af62 _mbscmp 16994->16998 16999 1001af47 16994->16999 16997 10019730 8 API calls 16995->16997 16996->16856 17000 1001af32 16997->17000 17002 1001af75 _mbscmp 16998->17002 17003 1001b649 16998->17003 17001 10019730 8 API calls 16999->17001 17000->16856 17004 1001af5c 17001->17004 17002->17003 17005 1001af88 _mbscmp 17002->17005 17006 10019730 8 API calls 17003->17006 17004->16856 17005->16976 17007 1001afa1 _mbscmp 17005->17007 17008 1001b65e 17006->17008 17009 1001afb0 17007->17009 17010 1001afcb _mbscmp 17007->17010 17008->16856 17013 10019730 8 API calls 17009->17013 17011 1001aff5 _mbscmp 17010->17011 17012 1001afda 17010->17012 17011->16976 17015 1001b00e _mbscmp 17011->17015 17014 10019730 8 API calls 17012->17014 17016 1001afc5 17013->17016 17017 1001afef 17014->17017 17018 1001b038 _mbscmp 17015->17018 17019 1001b01d 17015->17019 17016->16856 17017->16856 17021 1001b062 _mbscmp 17018->17021 17022 1001b047 17018->17022 17020 10019730 8 API calls 17019->17020 17023 1001b032 17020->17023 17021->16976 17025 1001b075 _mbscmp 17021->17025 17024 10019730 8 API calls 17022->17024 17023->16856 17027 1001b05c 17024->17027 17025->16976 17026 1001b088 _mbscmp 17025->17026 17026->16976 17028 1001b0a1 _mbscmp 17026->17028 17027->16856 17029 1001b0b0 17028->17029 17030 1001b0cb _mbscmp 17028->17030 17031 10019730 8 API calls 17029->17031 17032 1001b5d0 17030->17032 17033 1001b0de _mbscmp 17030->17033 17034 1001b0c5 17031->17034 17038 10019730 8 API calls 17032->17038 17033->17032 17035 1001b0f1 _mbscmp 17033->17035 17034->16856 17036 1001b100 17035->17036 17037 1001b11b _mbscmp 17035->17037 17040 10019730 8 API calls 17036->17040 17037->16976 17041 1001b134 _mbscmp 17037->17041 17039 1001b5e5 17038->17039 17039->16856 17042 1001b115 17040->17042 17043 1001b143 17041->17043 17044 1001b15e _mbsstr 17041->17044 17042->16856 17045 10019730 8 API calls 17043->17045 17046 1001b171 _mbscmp 17044->17046 17047 1001b3a2 17044->17047 17048 1001b158 17045->17048 17046->17047 17050 1001b184 _mbscmp 17046->17050 17049 10019730 8 API calls 17047->17049 17048->16856 17051 1001b3b7 17049->17051 17052 1001b193 17050->17052 17053 1001b1ae _mbscmp 17050->17053 17051->16856 17054 10019730 8 API calls 17052->17054 17053->16976 17055 1001b1c1 _mbscmp 17053->17055 17056 1001b1a8 17054->17056 17055->16976 17057 1001b1d4 _mbscmp 17055->17057 17056->16856 17057->16976 17058 1001b1e7 _mbscmp 17057->17058 17058->17032 17059 1001b1fa _mbscmp 17058->17059 17059->17032 17060 1001b20d _mbscmp 17059->17060 17061 1001b220 _mbscmp 17060->17061 17062 1001b562 17060->17062 17061->17062 17064 1001b233 _mbscmp 17061->17064 17063 10019730 8 API calls 17062->17063 17066 1001b577 17063->17066 17064->16976 17065 1001b24c _mbscmp 17064->17065 17067 1001b276 _mbscmp 17065->17067 17068 1001b25b 17065->17068 17066->16856 17070 1001b2a0 _mbscmp 17067->17070 17071 1001b285 17067->17071 17069 10019730 8 API calls 17068->17069 17072 1001b270 17069->17072 17070->16976 17074 1001b2b9 _mbscmp 17070->17074 17073 10019730 8 API calls 17071->17073 17072->16856 17075 1001b29a 17073->17075 17076 1001b2e3 _mbscmp 17074->17076 17077 1001b2c8 17074->17077 17075->16856 17078 1001b2f2 17076->17078 17079 1001b30d _mbscmp 17076->17079 17080 10019730 8 API calls 17077->17080 17081 10019730 8 API calls 17078->17081 17079->16976 17082 1001b326 _mbscmp 17079->17082 17083 1001b2dd 17080->17083 17084 1001b307 17081->17084 17085 1001b350 _mbscmp 17082->17085 17086 1001b335 17082->17086 17083->16856 17084->16856 17088 1001b37a _mbscmp 17085->17088 17089 1001b35f 17085->17089 17087 10019730 8 API calls 17086->17087 17090 1001b34a 17087->17090 17088->16976 17092 1001b393 _mbscmp 17088->17092 17091 10019730 8 API calls 17089->17091 17090->16856 17094 1001b374 17091->17094 17092->17047 17093 1001b3bd _mbscmp 17092->17093 17095 1001b3e7 _mbscmp 17093->17095 17096 1001b3cc 17093->17096 17094->16856 17095->16976 17098 1001b400 _mbscmp 17095->17098 17097 10019730 8 API calls 17096->17097 17099 1001b3e1 17097->17099 17100 1001b42a _mbscmp 17098->17100 17101 1001b40f 17098->17101 17099->16856 17103 1001b454 _mbscmp 17100->17103 17104 1001b439 17100->17104 17102 10019730 8 API calls 17101->17102 17106 1001b424 17102->17106 17103->16976 17105 1001b46d _mbscmp 17103->17105 17107 10019730 8 API calls 17104->17107 17109 1001b497 _mbscmp 17105->17109 17110 1001b47c 17105->17110 17106->16856 17108 1001b44e 17107->17108 17108->16856 17112 1001b4c1 _mbscmp 17109->17112 17113 1001b4a6 17109->17113 17111 10019730 8 API calls 17110->17111 17114 1001b491 17111->17114 17112->16976 17116 1001b4d0 _mbscmp 17112->17116 17115 10019730 8 API calls 17113->17115 17114->16856 17117 1001b4bb 17115->17117 17116->16976 17118 1001b4df _mbscmp 17116->17118 17117->16856 17118->16976 17119 1001b4ee _mbscmp 17118->17119 17119->17032 17120 1001b501 _mbscmp 17119->17120 17120->17032 17121 1001b514 _mbscmp 17120->17121 17121->16976 17122 1001b52d _mbscmp 17121->17122 17123 1001b540 _mbscmp 17122->17123 17124 1001b627 17122->17124 17123->17124 17125 1001b553 _mbscmp 17123->17125 17126 10019730 8 API calls 17124->17126 17125->17062 17127 1001b57d _mbscmp 17125->17127 17128 1001b63c 17126->17128 17127->16976 17129 1001b58c _mbscmp 17127->17129 17128->16856 17129->16976 17130 1001b59b _mbscmp 17129->17130 17130->16976 17131 1001b5ae _mbscmp 17130->17131 17131->16976 17132 1001b5c1 _mbscmp 17131->17132 17132->17032 17133 1001b5eb 17132->17133 17133->16935 17134 10019730 8 API calls 17133->17134 17135 1001b619 17134->17135 17135->16856 17136 10025cb0 17137 10025cb5 17136->17137 17140 1002615b 17137->17140 17143 1002612f 17140->17143 17142 10025cda 17144 10026144 __dllonexit 17143->17144 17145 10026138 _onexit 17143->17145 17144->17142 17145->17142 17146 10024770 17147 10024782 17146->17147 17148 100248c0 17146->17148 17151 10024788 17147->17151 17152 100248a9 17147->17152 17149 100248c7 17148->17149 17150 1002493e 17148->17150 17153 10024938 17149->17153 17156 10024a23 CallWindowProcA 17149->17156 17159 100248d8 17149->17159 17154 100249c4 17150->17154 17155 10024945 17150->17155 17151->17156 17164 10024840 17151->17164 17165 10024801 17151->17165 17166 10024a06 17151->17166 17167 100247a6 17151->17167 17168 1002486a 17151->17168 17169 1002482b 17151->17169 17170 100247ec 17151->17170 17171 100249f0 17151->17171 17172 100247d0 17151->17172 17173 10024816 17151->17173 17174 10024894 17151->17174 17175 10024855 17151->17175 17176 100247bb 17151->17176 17177 1002487f 17151->17177 17392 10021500 17152->17392 17162 100249cb 17154->17162 17163 10024a1c 17154->17163 17160 10024947 17155->17160 17161 100249af 17155->17161 17158 100248bc 17192 100248f4 17159->17192 17193 10024909 17159->17193 17194 1002491e 17159->17194 17195 100248df 17159->17195 17182 1002494e 17160->17182 17183 1002498f 17160->17183 17513 10022680 17161->17513 17162->17166 17197 100249cd 17162->17197 17163->17156 17181 10024a40 17163->17181 17377 10022580 CallWindowProcA 17164->17377 17260 100223f0 17165->17260 17528 10021c00 17166->17528 17306 10021ca0 GetWindowRect PtInRect 17167->17306 17388 10022070 CallWindowProcA 17168->17388 17278 10021a80 17169->17278 17247 100227c0 CallWindowProcA 17170->17247 17299 10022720 IsWindowVisible 17171->17299 17189 10012460 SendMessageA 17172->17189 17263 10022200 17173->17263 17187 10012100 CallWindowProcA 17174->17187 17383 10022790 17175->17383 17243 10022430 17176->17243 17389 10024d50 17177->17389 17538 10021c60 17181->17538 17205 10024979 17182->17205 17226 10024964 17182->17226 17227 1002495a 17182->17227 17183->17156 17211 1002499a 17183->17211 17209 100248a5 17187->17209 17212 100247d7 17189->17212 17463 100225e0 17192->17463 17469 100216f0 17193->17469 17482 10022a20 IsWindowVisible 17194->17482 17431 10021800 17195->17431 17197->17171 17218 100249d4 17197->17218 17202 10024a18 17228 10012370 7 API calls 17205->17228 17206 1002487b 17207 100247b7 17208 10024890 17210 100247cc 17509 10022630 17211->17509 17351 100220a0 17212->17351 17213 100249c0 17216 10024812 17218->17156 17233 100249db 17218->17233 17219 10024827 17221 1002483c 17223 10024a02 17224 10024934 17494 100224c0 17226->17494 17227->17205 17235 1002495f 17227->17235 17237 1002498b 17228->17237 17231 100248f0 17232 10024905 17521 100217a0 GetSystemMenu 17233->17521 17234 1002491a 17235->17156 17238 100249ab 17239 100247e8 17241 10024975 17244 10022443 LoadCursorA SetCursor 17243->17244 17245 10022478 CallWindowProcA 17243->17245 17244->17210 17245->17210 17248 1002285d 17247->17248 17249 100227ee 17247->17249 17545 10024e80 GetWindowInfo 17249->17545 17251 100227f8 17252 100228a4 17251->17252 17253 10022809 17251->17253 17254 10022f90 GetMenu 17252->17254 17253->17248 17554 10022f90 17253->17554 17256 100228c8 17254->17256 17256->17248 17258 10022fd0 3 API calls 17256->17258 17257 10022852 17257->17248 17557 10022fd0 GetMenuItemCount 17257->17557 17258->17248 17261 100223fe 17260->17261 17262 1002240d CallWindowProcA 17260->17262 17261->17262 17262->17216 17264 10022219 17263->17264 17265 100223cc CallWindowProcA 17263->17265 17264->17265 17266 10022231 17264->17266 17267 1002223f 17264->17267 17265->17219 17563 10024730 ShowWindow ShowWindow ShowWindow ShowWindow 17266->17563 17269 10022246 17267->17269 17270 1002224f 17267->17270 17564 10024730 ShowWindow ShowWindow ShowWindow ShowWindow 17269->17564 17273 1002225f GetWindowRect SetWindowPos SetWindowPos SetWindowPos 17270->17273 17274 1002234c SetWindowPos SetWindowPos SetWindowPos 17270->17274 17271 1002223a 17271->17265 17275 100223b8 SetWindowPos 17273->17275 17274->17275 17275->17265 17276 100223c5 17275->17276 17565 10025870 17276->17565 17279 10021a94 17278->17279 17280 10021b1e 17278->17280 17281 10021af1 17279->17281 17282 10021a9e 17279->17282 17283 10021bdf 17280->17283 17293 10021b36 17280->17293 17284 10023f00 10 API calls 17281->17284 17799 10023f00 GetCursorPos GetWindowRect PtInRect 17282->17799 17286 100157b0 61 API calls 17283->17286 17287 10021af6 17284->17287 17289 10021bf1 17286->17289 17290 10021bc1 CallWindowProcA 17287->17290 17291 10024e60 115 API calls 17287->17291 17288 10021aa3 17292 10021aa8 17288->17292 17294 10021acc 17288->17294 17289->17221 17290->17221 17295 10021ac7 17291->17295 17292->17290 17809 10024e60 17292->17809 17293->17290 17816 10023070 17293->17816 17294->17290 17297 10024e60 115 API calls 17294->17297 17295->17290 17297->17295 17300 10022760 CallWindowProcA 17299->17300 17301 10022731 17299->17301 17300->17223 17302 10022a20 8 API calls 17301->17302 17303 1002274c 17302->17303 17304 100220a0 233 API calls 17303->17304 17305 10022759 17304->17305 17305->17223 17307 10021cf7 PtInRect 17306->17307 17308 10021ce8 17306->17308 17309 10021d06 17307->17309 17310 10021d3a 17307->17310 17308->17207 17311 10021d2b 17309->17311 17984 100124d0 SetTimer 17309->17984 17312 10022038 17310->17312 17313 10021d48 IsRectEmpty 17310->17313 17311->17207 17314 10016220 4 API calls 17312->17314 17316 10021e02 GetPropA 17313->17316 17317 10021d5d PtInRect 17313->17317 17318 10022049 17314->17318 17316->17318 17319 10021e19 17316->17319 17320 10021d73 PtInRect 17317->17320 17321 10021d6c 17317->17321 17318->17207 17319->17312 17322 10021e29 PtInRect 17319->17322 17320->17321 17323 10021d89 PtInRect 17320->17323 17325 10021dd8 17321->17325 17985 100124d0 SetTimer 17321->17985 17326 10021e3c 17322->17326 17327 10021f3d PtInRect 17322->17327 17323->17321 17324 10021d9f PtInRect 17323->17324 17324->17321 17328 10021de4 PtInRect 17324->17328 17325->17207 17332 10021e4c PtInRect 17326->17332 17333 10021ecd CreateRectRgn GetWindowRgn 17326->17333 17330 10021f5b PtInRect 17327->17330 17331 10021f4c 17327->17331 17328->17316 17336 10021df3 17328->17336 17337 10021f6a 17330->17337 17338 10021f79 PtInRect 17330->17338 17331->17207 17339 10021e72 17332->17339 17340 10021e81 PtInRect 17332->17340 17334 10021f1e DeleteObject 17333->17334 17335 10021eec PtInRegion 17333->17335 17334->17207 17343 10021f16 17335->17343 17344 10021efe PtInRegion 17335->17344 17336->17207 17337->17207 17338->17312 17345 10021f8c 17338->17345 17339->17207 17341 10021ecb 17340->17341 17342 10021ebc 17340->17342 17341->17333 17342->17207 17343->17334 17344->17343 17346 10021f0a PtInRegion 17344->17346 17347 10021f9a PtInRect 17345->17347 17348 1002201a 17345->17348 17346->17334 17346->17343 17349 10021fce 17347->17349 17350 10021fdd PtInRect 17347->17350 17348->17207 17349->17207 17350->17348 17352 100220b4 IsWindowVisible 17351->17352 17353 100221eb 17351->17353 17352->17353 17354 100220c6 17352->17354 17353->17239 17355 100220d0 GetWindowRect 17354->17355 17356 1002211a 17354->17356 17357 100220fd 17355->17357 17358 10024e80 7 API calls 17356->17358 17357->17356 17986 10024390 GetWindowRect 17357->17986 17360 10022123 17358->17360 17361 10022135 17360->17361 17362 100250c0 40 API calls 17360->17362 17361->17353 17365 10022164 IsRectEmpty 17361->17365 17366 1002215a 17361->17366 17363 1002212e 17362->17363 17364 10025870 97 API calls 17363->17364 17364->17361 17368 10022162 17365->17368 17367 10023530 115 API calls 17366->17367 17367->17368 17369 10022187 IsRectEmpty 17368->17369 17370 1002219e IsRectEmpty 17368->17370 17369->17370 17371 10022194 17369->17371 17372 100221ab 17370->17372 17373 100221bd 17370->17373 17374 10015840 53 API calls 17371->17374 17372->17373 17375 10023960 58 API calls 17372->17375 17376 100221c7 SendMessageA 17373->17376 17374->17370 17375->17373 17376->17239 17378 100225d0 17377->17378 17379 100225aa 17377->17379 17380 10024e80 7 API calls 17379->17380 17381 100225b3 17380->17381 17381->17378 17382 100225b7 SetWindowPos 17381->17382 17382->17378 17384 10022a20 8 API calls 17383->17384 17385 100227ab 17384->17385 17386 10023530 115 API calls 17385->17386 17387 100227b6 17386->17387 17388->17206 17390 10024d90 CallWindowProcA 17389->17390 17391 10024d5e 17389->17391 17390->17208 17391->17390 17393 10021511 17392->17393 17394 1002166f 17392->17394 17395 100215d9 17393->17395 17401 100216a0 CallWindowProcA 17393->17401 17406 1002159b IsZoomed 17393->17406 17407 1002152d 17393->17407 17396 10021677 17394->17396 17397 100216be 17394->17397 17399 100215f8 17395->17399 17400 100215de 17395->17400 17396->17401 17408 10021687 17396->17408 17996 10025b90 17397->17996 17404 10021617 17399->17404 17405 100215fd 17399->17405 17403 10023070 34 API calls 17400->17403 17401->17158 17402 100216c5 17402->17158 17414 100215f1 17403->17414 17411 10021636 17404->17411 17412 1002161c 17404->17412 17415 10023070 34 API calls 17405->17415 17406->17401 17413 100215ad GetSystemMetrics 17406->17413 17409 10021594 17407->17409 17417 1002155f SendMessageA 17407->17417 17418 1002154d ??3@YAXPAX 17407->17418 17410 10016060 87 API calls 17408->17410 17409->17158 17419 1002169b 17410->17419 17421 10021655 17411->17421 17422 1002163b 17411->17422 17420 10023070 34 API calls 17412->17420 17413->17401 17423 100215be 17413->17423 17414->17158 17416 10021610 17415->17416 17416->17158 17417->17409 17418->17417 17418->17418 17419->17158 17424 1002162f 17420->17424 17427 10023070 34 API calls 17421->17427 17425 10023070 34 API calls 17422->17425 17426 10022a20 8 API calls 17423->17426 17424->17158 17428 1002164e 17425->17428 17429 100215d4 17426->17429 17430 10021668 17427->17430 17428->17158 17429->17158 17430->17158 17432 10021813 17431->17432 17433 10021a00 17431->17433 17434 10021977 KillTimer 17432->17434 17436 10021819 17432->17436 17435 10021a25 CallWindowProcA 17433->17435 17437 10021a0e 17433->17437 17438 10023f00 10 API calls 17434->17438 17435->17231 17436->17435 17439 10021834 17436->17439 17440 10015be0 63 API calls 17437->17440 17441 10021997 17438->17441 17442 10023070 34 API calls 17439->17442 17443 10021a20 17440->17443 18014 10024cf0 GetMenuItemInfoA 17441->18014 17445 10021847 17442->17445 17443->17231 17446 100218a3 17445->17446 17447 10021970 17445->17447 17448 10021901 17445->17448 17449 10021856 17445->17449 17457 10021874 17445->17457 17446->17447 17453 100218b3 IsIconic 17446->17453 17447->17231 17448->17447 17451 1002190d GetSystemMenu GetMenuState 17448->17451 17449->17447 17452 10021866 IsZoomed 17449->17452 17450 100219f9 17450->17231 17451->17447 17454 1002192c SendMessageA 17451->17454 17456 10021883 SendMessageA 17452->17456 17452->17457 17458 100218e1 SendMessageA 17453->17458 17459 100218c1 SendMessageA 17453->17459 17454->17231 17455 10021961 SendMessageA 17455->17447 17456->17231 17457->17447 17457->17455 17458->17231 17459->17231 17460 100219a5 17460->17450 17461 10024e60 115 API calls 17460->17461 17462 100219d3 GetMenuItemID SendMessageA 17461->17462 17462->17450 17464 10022615 17463->17464 17465 100225eb 17463->17465 17467 10021500 199 API calls 17464->17467 17465->17464 17466 100225f9 CallWindowProcA 17465->17466 17466->17232 17468 10022622 17467->17468 17468->17232 17470 10021702 17469->17470 17471 10021776 CallWindowProcA 17469->17471 17472 10021707 17470->17472 17473 10021764 SendMessageA 17470->17473 17471->17234 17472->17471 17474 10021719 KillTimer 17472->17474 17473->17471 17475 10023f00 10 API calls 17474->17475 17476 10021739 17475->17476 17477 10021751 17476->17477 17478 1002173e 17476->17478 17480 10024e60 115 API calls 17477->17480 17479 10024e60 115 API calls 17478->17479 17481 1002174f 17479->17481 17480->17481 17481->17471 17483 10022a70 CallWindowProcA 17482->17483 17484 10022a36 17482->17484 17483->17224 17484->17483 17485 10022a96 17484->17485 17486 10022aca 17485->17486 17487 10022aae GetMenu 17485->17487 17489 10022ae2 GetWindowRect SendMessageA 17486->17489 17490 10022b07 CallWindowProcA 17486->17490 17487->17486 17488 10022abe SetMenu 17487->17488 17488->17486 17489->17490 17491 10022b32 17490->17491 17492 10022b49 17491->17492 17493 10022b3e SetMenu 17491->17493 17492->17224 17493->17492 17495 100224e6 GetSystemMetrics 17494->17495 17496 100224da 17494->17496 17497 100224f3 17495->17497 17498 1002250f 17495->17498 17496->17495 17496->17498 17500 10022a20 8 API calls 17497->17500 17499 1002252f 17498->17499 18015 10025b30 17498->18015 17501 10023530 115 API calls 17499->17501 17502 10022509 17500->17502 17504 10022538 CallWindowProcA 17501->17504 17502->17241 17505 10023530 115 API calls 17504->17505 17506 1002255c 17505->17506 17507 10022576 17506->17507 17508 10025b30 234 API calls 17506->17508 17507->17241 17508->17507 17510 1002263c 17509->17510 17511 1002265c CallWindowProcA 17510->17511 18021 10022dd0 17510->18021 17511->17238 17514 100226f7 CallWindowProcA 17513->17514 17515 1002269c 17513->17515 17514->17213 17516 10023f00 10 API calls 17515->17516 17517 100226a1 17516->17517 17518 100226ac KillTimer 17517->17518 17519 100226cf 17517->17519 17518->17514 17518->17519 17519->17514 17520 10024e60 115 API calls 17519->17520 17520->17514 17522 10022a20 8 API calls 17521->17522 17523 100217cd 17522->17523 17524 100217e1 17523->17524 17525 100217d9 GetSystemMenu 17523->17525 17526 100220a0 233 API calls 17524->17526 17525->17524 17527 100217ec 17526->17527 17529 10021c0a 17528->17529 17530 10021c2f 17528->17530 17532 10021c11 CallWindowProcA 17529->17532 17533 10021c57 17529->17533 17531 10015400 3 API calls 17530->17531 17534 10021c45 17531->17534 17532->17202 17533->17202 17535 10024e80 7 API calls 17534->17535 17536 10021c4e 17535->17536 17537 10024390 7 API calls 17536->17537 17537->17533 18030 10024650 17538->18030 17541 10024390 7 API calls 17542 10021c71 17541->17542 18033 10024b50 17542->18033 17546 10024ec6 17545->17546 17547 10024ef0 17546->17547 17560 10024ff0 17546->17560 17549 10024efc IsWindowVisible 17547->17549 17552 10024f7e 17547->17552 17550 10024f0e OffsetRect OffsetRect 17549->17550 17549->17552 17551 10024f54 EqualRect 17550->17551 17550->17552 17551->17552 17553 10024f6c EqualRect 17551->17553 17552->17251 17553->17552 17555 10022fb1 GetMenu 17554->17555 17556 10022f9f 17554->17556 17555->17257 17556->17257 17558 10022ff5 GetMenuItemRect GetMenuItemRect 17557->17558 17559 10023057 17557->17559 17558->17559 17559->17248 17561 10025015 IsZoomed 17560->17561 17562 10025023 17560->17562 17561->17562 17562->17547 17563->17271 17564->17270 17566 100258a8 GetWindowRect OffsetRect 17565->17566 17570 10025880 17565->17570 17567 100258e2 CreateRoundRectRgn 17566->17567 17568 1002591e CreateRectRgn 17566->17568 17574 100259b3 17567->17574 17580 100259e0 17568->17580 17570->17265 17572 100259e0 36 API calls 17575 10025973 17572->17575 17573 100259d4 17573->17265 17574->17573 17593 100246e0 17574->17593 17577 100259e0 36 API calls 17575->17577 17578 10025993 17577->17578 17579 100259e0 36 API calls 17578->17579 17579->17574 17581 10025956 17580->17581 17582 10025a0d IsRectEmpty 17580->17582 17581->17572 17582->17581 17583 10025a23 17582->17583 17584 10006940 2 API calls 17583->17584 17585 10025a68 SelectObject 17584->17585 17605 1000b6e0 17585->17605 17587 10025aaa SelectObject 17676 1001c210 GlobalAlloc GlobalFix SetRect 17587->17676 17589 10025ad2 17590 10025b05 17589->17590 17591 10025adc OffsetRgn CombineRgn DeleteObject 17589->17591 17592 10006920 DeleteObject 17590->17592 17591->17590 17592->17581 17594 100246ed IsRectEmpty 17593->17594 17604 10024724 17593->17604 17595 100246fe IsWindowVisible 17594->17595 17594->17604 17596 1002470c 17595->17596 17595->17604 17705 10004e30 GetWindowRect 17596->17705 17604->17573 17606 1000bfd7 17605->17606 17607 1000b6f6 17605->17607 17606->17587 17607->17606 17608 1000bb47 BitBlt 17607->17608 17609 1000b72f 17607->17609 17610 1000bbb5 17608->17610 17611 1000bb87 17608->17611 17612 1000b4c0 7 API calls 17609->17612 17701 1000b5f0 17610->17701 17691 1000b120 17611->17691 17615 1000b754 17612->17615 17618 1000b7a6 17615->17618 17619 1000b76a 17615->17619 17617 1000bbe1 BitBlt 17621 1000bc32 17617->17621 17622 1000bc64 17617->17622 17620 1000b4c0 7 API calls 17618->17620 17681 1000b2e0 17619->17681 17625 1000b7a1 17620->17625 17626 1000b120 4 API calls 17621->17626 17624 1000b5f0 BitBlt 17622->17624 17627 1000bc62 17624->17627 17630 1000b4c0 7 API calls 17625->17630 17626->17627 17628 1000bcb8 17627->17628 17629 1000bd0d 17627->17629 17631 1000b120 4 API calls 17628->17631 17633 1000b5f0 BitBlt 17629->17633 17632 1000b80f 17630->17632 17634 1000bd0b 17631->17634 17635 1000b830 17632->17635 17636 1000b86c 17632->17636 17633->17634 17638 1000bdc3 17634->17638 17639 1000bd84 17634->17639 17637 1000b2e0 7 API calls 17635->17637 17640 1000b4c0 7 API calls 17636->17640 17641 1000b867 17637->17641 17643 1000b5f0 BitBlt 17638->17643 17642 1000b120 4 API calls 17639->17642 17640->17641 17646 1000b925 17641->17646 17647 1000b8c6 17641->17647 17644 1000bdc1 17642->17644 17645 1000be00 BitBlt 17643->17645 17644->17645 17648 1000be87 17645->17648 17649 1000be49 17645->17649 17650 1000b4c0 7 API calls 17646->17650 17652 1000b2e0 7 API calls 17647->17652 17651 1000b5f0 BitBlt 17648->17651 17653 1000b120 4 API calls 17649->17653 17655 1000b920 17650->17655 17656 1000bec3 BitBlt 17651->17656 17652->17655 17654 1000be85 17653->17654 17654->17656 17658 1000b9a2 17655->17658 17659 1000b9eb 17655->17659 17657 1000bb3f 17656->17657 17657->17606 17663 1000bf52 OffsetRect 17657->17663 17664 1000bf17 17657->17664 17660 1000b2e0 7 API calls 17658->17660 17661 1000b4c0 7 API calls 17659->17661 17662 1000b9e6 17660->17662 17661->17662 17668 1000b4c0 7 API calls 17662->17668 17666 1000b4c0 7 API calls 17663->17666 17665 1000b4c0 7 API calls 17664->17665 17667 1000bf47 17665->17667 17666->17606 17667->17587 17669 1000ba60 17668->17669 17670 1000bac2 17669->17670 17671 1000ba79 17669->17671 17672 1000b4c0 7 API calls 17670->17672 17673 1000b2e0 7 API calls 17671->17673 17674 1000babd 17672->17674 17673->17674 17675 1000b4c0 7 API calls 17674->17675 17675->17657 17677 1001c3a9 ExtCreateRegion GlobalUnWire GlobalFree 17676->17677 17680 1001c284 17676->17680 17677->17589 17678 1001c2ea GlobalUnWire GlobalReAlloc GlobalFix 17679 1001c31e SetRect 17678->17679 17679->17680 17680->17677 17680->17678 17680->17679 17682 1000b327 17681->17682 17683 1000b396 17681->17683 17682->17683 17685 1000b4c0 7 API calls 17682->17685 17684 1000b4c0 7 API calls 17683->17684 17689 1000b3f5 17683->17689 17684->17683 17685->17682 17686 1000b458 17688 1000b4c0 7 API calls 17686->17688 17690 1000b4a4 17686->17690 17687 1000b4c0 7 API calls 17687->17689 17688->17690 17689->17686 17689->17687 17690->17625 17692 1000b1d0 17691->17692 17698 1000b167 17691->17698 17693 1000b229 17692->17693 17696 1000b1f1 BitBlt 17692->17696 17694 1000b286 17693->17694 17699 1000b252 BitBlt 17693->17699 17697 1000b2cf 17694->17697 17700 1000b29e BitBlt 17694->17700 17695 1000b183 BitBlt 17695->17695 17695->17698 17696->17693 17696->17696 17697->17617 17698->17692 17698->17695 17699->17694 17699->17699 17700->17697 17702 1000b5fd 17701->17702 17703 1000b64e 17701->17703 17702->17703 17704 1000b621 BitBlt 17702->17704 17703->17617 17704->17617 17706 10005585 17705->17706 17707 10004e8e 17705->17707 17748 10004590 GetWindowRect 17706->17748 17707->17706 17708 10006940 2 API calls 17707->17708 17711 10004ebd 17708->17711 17709 1000556e 17710 10006920 DeleteObject 17709->17710 17710->17706 17711->17709 17712 10006940 2 API calls 17711->17712 17713 10004fbf 17712->17713 17714 10004fc7 CreateCompatibleDC SelectObject SetBkMode 17713->17714 17715 1000555d 17713->17715 17717 10005016 17714->17717 17716 10006920 DeleteObject 17715->17716 17716->17709 17718 1000b4c0 7 API calls 17717->17718 17719 1000505f 17718->17719 17777 100055a0 17719->17777 17722 1000508f DrawIconEx 17724 100050bf GetWindowTextA DrawTextA 17722->17724 17725 10005167 17724->17725 17726 1000549b 17724->17726 17727 10005172 IsRectEmpty 17725->17727 17728 1000521c IsRectEmpty 17725->17728 17729 100054cc SelectObject DeleteDC CreateCompatibleDC SelectObject 17726->17729 17727->17728 17731 10005187 IsIconic 17727->17731 17730 1000524a 17728->17730 17734 1000519b 17728->17734 17736 10005556 DeleteObject 17729->17736 17732 10005359 IsRectEmpty 17730->17732 17733 1000525d IsRectEmpty 17730->17733 17731->17734 17738 1000538b GetSystemMenu GetMenuState 17732->17738 17739 10005280 17732->17739 17733->17732 17735 1000526c IsZoomed 17733->17735 17737 1000b6e0 17 API calls 17734->17737 17735->17739 17736->17715 17737->17730 17740 100053aa 17738->17740 17741 1000b6e0 17 API calls 17739->17741 17743 1000b6e0 17 API calls 17740->17743 17742 10005388 17741->17742 17742->17738 17744 10005433 IsRectEmpty 17743->17744 17744->17726 17745 10005447 SetBkMode 17744->17745 17746 1000545b 17745->17746 17747 1000b6e0 17 API calls 17746->17747 17747->17726 17749 10004776 17748->17749 17750 100045f2 17748->17750 17757 10004960 GetWindowRect 17749->17757 17750->17749 17751 10006940 2 API calls 17750->17751 17754 1000461b 17751->17754 17752 10004762 17753 10006920 DeleteObject 17752->17753 17753->17749 17754->17752 17755 100046e5 CreateCompatibleDC SelectObject 17754->17755 17756 1000475b DeleteObject 17755->17756 17756->17752 17758 10004b57 17757->17758 17759 100049c2 17757->17759 17766 10002ec0 GetWindowRect 17758->17766 17759->17758 17760 10006940 2 API calls 17759->17760 17763 100049eb 17760->17763 17761 10004b43 17762 10006920 DeleteObject 17761->17762 17762->17758 17763->17761 17764 10004ac7 CreateCompatibleDC SelectObject 17763->17764 17765 10004b3c DeleteObject 17764->17765 17765->17761 17767 10002f17 17766->17767 17768 10006940 2 API calls 17767->17768 17769 10002f2f 17768->17769 17770 10002f33 17769->17770 17773 10002f4c 17769->17773 17771 10006920 DeleteObject 17770->17771 17772 10002f47 17771->17772 17772->17604 17774 1000300e CreateCompatibleDC SelectObject 17773->17774 17775 10003083 DeleteObject 17774->17775 17776 10006920 DeleteObject 17775->17776 17776->17772 17778 100055b6 GetWindowRect SetRect GetWindowLongA 17777->17778 17788 10005068 SelectObject SetTextColor 17777->17788 17779 10005606 17778->17779 17780 10005808 SetRectEmpty SetRectEmpty SetRectEmpty SetRectEmpty SetRectEmpty 17778->17780 17781 100056df SetRectEmpty SetRectEmpty 17779->17781 17784 10005663 17779->17784 17792 100057c4 17780->17792 17781->17784 17782 1000585a IsRectEmpty 17787 100058a2 IsRectEmpty 17782->17787 17782->17788 17783 1000584d IsRectEmpty 17783->17782 17786 10005783 SetRectEmpty 17784->17786 17789 10005722 17784->17789 17786->17789 17787->17788 17788->17722 17788->17724 17789->17792 17794 10025c70 SendMessageA 17789->17794 17792->17782 17792->17783 17793 100057b5 SetRectEmpty 17793->17792 17795 100057ab 17794->17795 17796 10025c89 SendMessageA 17794->17796 17795->17792 17795->17793 17796->17795 17797 10025c94 GetClassLongA 17796->17797 17797->17795 17798 10025ca1 SendMessageA 17797->17798 17798->17795 17800 10023f42 PtInRect 17799->17800 17801 10024043 17799->17801 17800->17801 17802 10023f71 GetMenuItemCount 17800->17802 17801->17288 17802->17801 17806 10023fa6 17802->17806 17805 10024021 PtInRect 17805->17806 17807 1002404e 17805->17807 17806->17801 17806->17805 17808 10023ff2 OffsetRect 17806->17808 17854 10024db0 GetMenuItemRect 17806->17854 17807->17288 17808->17805 17810 10024e72 17809->17810 17811 10024e6c 17809->17811 17901 10023960 17810->17901 17858 10023530 17811->17858 17817 10023082 17816->17817 17829 10023511 17816->17829 17818 10023090 IsWindowVisible 17817->17818 17817->17829 17821 100230a2 17818->17821 17818->17829 17819 10023422 IsRectEmpty 17822 10023439 IsRectEmpty 17819->17822 17819->17829 17820 100230de 17823 10023100 IsRectEmpty 17820->17823 17824 100231a8 IsRectEmpty 17820->17824 17820->17829 17821->17819 17821->17820 17821->17829 17825 10023446 IsIconic 17822->17825 17826 1002347b IsRectEmpty 17822->17826 17823->17824 17827 10023111 IsIconic 17823->17827 17831 100231d2 17824->17831 17832 10023125 17824->17832 17828 10023464 17825->17828 17830 10023488 IsZoomed 17826->17830 17845 100234bc 17826->17845 17827->17832 17841 1000b6e0 17 API calls 17828->17841 17829->17290 17836 100234a6 17830->17836 17833 100231e5 IsRectEmpty 17831->17833 17834 100232dd IsRectEmpty 17831->17834 17837 1000b6e0 17 API calls 17832->17837 17833->17834 17839 100231f0 IsZoomed 17833->17839 17838 1002330a GetSystemMenu GetMenuState 17834->17838 17848 10023204 17834->17848 17835 1000b6e0 17 API calls 17840 100234e3 IsRectEmpty 17835->17840 17842 1000b6e0 17 API calls 17836->17842 17837->17831 17843 10023329 17838->17843 17839->17848 17840->17829 17847 100233db 17840->17847 17844 10023478 17841->17844 17842->17845 17851 1000b6e0 17 API calls 17843->17851 17844->17826 17845->17835 17846 1000b6e0 17 API calls 17849 10023307 17846->17849 17850 1000b6e0 17 API calls 17847->17850 17848->17846 17849->17838 17850->17829 17852 100233b3 IsRectEmpty 17851->17852 17852->17829 17853 100233c7 SetBkMode 17852->17853 17853->17847 17855 10024de6 OffsetRect 17854->17855 17856 10024dd5 17854->17856 17857 10023fb9 GetMenuItemInfoA 17855->17857 17856->17855 17857->17805 17857->17806 17859 1002355c 17858->17859 17889 10023939 17858->17889 17860 1002356a IsWindowVisible 17859->17860 17859->17889 17861 1002357c 17860->17861 17860->17889 17862 1000fbf0 7 API calls 17861->17862 17861->17889 17863 100235d8 17862->17863 17864 100236a3 17863->17864 17865 100235ff 17863->17865 17867 1000b6e0 17 API calls 17864->17867 17866 1000b6e0 17 API calls 17865->17866 17868 10023620 17866->17868 17869 100236c7 17867->17869 17870 1000b6e0 17 API calls 17868->17870 17871 1000b6e0 17 API calls 17869->17871 17872 10023644 17870->17872 17873 100236ea 17871->17873 17874 1000b6e0 17 API calls 17872->17874 17875 1000b6e0 17 API calls 17873->17875 17876 10023667 17874->17876 17877 1002370d 17875->17877 17879 1000b6e0 17 API calls 17876->17879 17878 1000b6e0 17 API calls 17877->17878 17880 10023689 SetTextColor 17878->17880 17879->17880 17882 1000b4c0 7 API calls 17880->17882 17883 10023798 17882->17883 17884 100238e4 BitBlt 17883->17884 17885 10023070 34 API calls 17883->17885 17886 1002391b 17884->17886 17887 100237ba 17885->17887 17969 1000fc70 SelectObject DeleteDC DeleteObject 17886->17969 17890 100237c2 GetWindowTextA 17887->17890 17891 100237e9 17887->17891 17889->17295 17890->17891 17892 100237f3 DrawIconEx 17891->17892 17893 10023827 17891->17893 17892->17893 17894 1002389b SetBkMode 17893->17894 17895 10023879 17893->17895 17965 100120b0 GetPropA 17894->17965 17895->17893 17936 100250c0 17895->17936 17900 10023960 58 API calls 17900->17894 17902 1002398d 17901->17902 17923 10023ee5 17901->17923 17903 1002399b IsWindowVisible 17902->17903 17902->17923 17904 100239ad IsRectEmpty 17903->17904 17903->17923 17905 100239c2 17904->17905 17904->17923 17906 10022b70 6 API calls 17905->17906 17907 100239c9 17906->17907 17908 1000fbf0 7 API calls 17907->17908 17909 10023a1e SetBkMode SelectObject SelectObject 17908->17909 17910 10023a7e 17909->17910 17911 10023a9d SetTextColor 17909->17911 17910->17911 17912 10023aeb 17911->17912 17913 10023ab9 BitBlt 17911->17913 17980 1000b6a0 17912->17980 17914 10023b23 GetMenuItemCount 17913->17914 17917 10023b3e GetMenuItemInfoA 17914->17917 17918 10023e3d BitBlt 17914->17918 17919 10024db0 2 API calls 17917->17919 17920 10023ebc 17918->17920 17925 10023e74 17918->17925 17931 10023b9b 17919->17931 17983 1000fc70 SelectObject DeleteDC DeleteObject 17920->17983 17922 10023cf4 GetSystemMetrics OffsetRect 17922->17931 17923->17295 17924 10023c51 SetTextColor 17926 10023c6b DrawTextA SetTextColor 17924->17926 17925->17920 17929 1000b6e0 17 API calls 17925->17929 17926->17931 17927 10025c70 4 API calls 17930 10023cb3 DrawIconEx 17927->17930 17928 10023bbe InflateRect 17928->17931 17932 10023bd8 SetTextColor 17928->17932 17929->17920 17930->17931 17931->17917 17931->17922 17931->17924 17931->17926 17931->17927 17931->17928 17933 10023e36 17931->17933 17934 10023c0d SetTextColor 17931->17934 17935 1000b6e0 17 API calls 17931->17935 17932->17931 17933->17918 17934->17931 17935->17931 17937 10022f90 GetMenu 17936->17937 17938 100250ce 17937->17938 17943 100250e4 17938->17943 17970 10022b70 17938->17970 17940 100250dd 17942 10022fd0 3 API calls 17940->17942 17941 1002529e SetRectEmpty SetRectEmpty SetRectEmpty SetRectEmpty 17944 100251b3 17941->17944 17942->17943 17943->17941 17943->17944 17945 10025613 6 API calls 17944->17945 17946 100252f0 17944->17946 17959 1002388f 17944->17959 17953 100255c9 17945->17953 17947 10025300 17946->17947 17948 10025528 SetRectEmpty SetRectEmpty SetRectEmpty SetRectEmpty SetRectEmpty 17946->17948 17950 100253e7 SetRectEmpty SetRectEmpty 17947->17950 17957 10025361 17947->17957 17963 100254e4 17948->17963 17949 10025567 IsRectEmpty 17955 10025574 IsRectEmpty 17949->17955 17952 100253f9 IsRectEmpty 17950->17952 17958 1002540a IsRectEmpty 17952->17958 17961 10025415 17952->17961 17954 100256e7 GetMenuItemCount GetMenuItemRect GetMenuItemRect 17953->17954 17953->17959 17954->17959 17955->17953 17956 100255bc IsRectEmpty 17955->17956 17956->17953 17957->17952 17958->17961 17959->17900 17960 10025c70 4 API calls 17962 100254cf 17960->17962 17961->17955 17961->17960 17962->17963 17964 100254d9 SetRectEmpty 17962->17964 17963->17949 17963->17955 17964->17963 17966 100120ea SelectObject DrawTextA 17965->17966 17967 100120c6 17965->17967 17966->17884 17967->17966 17968 100120d8 SendMessageA 17967->17968 17968->17966 17969->17889 17971 10022b83 17970->17971 17972 10022b8b GetMenuItemCount 17970->17972 17971->17940 17973 10022ba4 GetMenuItemInfoA 17972->17973 17976 10022d93 17972->17976 17979 10022be2 17973->17979 17974 10022d6c ??2@YAPAXI 17974->17976 17975 10022c60 ??2@YAPAXI ??2@YAPAXI 17975->17979 17976->17940 17977 10022d34 17977->17974 17977->17976 17978 10022cbc SetMenuItemInfoA 17978->17979 17979->17973 17979->17975 17979->17977 17979->17978 17981 1000b6e0 17 API calls 17980->17981 17982 1000b6dc 17981->17982 17982->17914 17983->17923 17984->17311 17985->17325 17987 100243b0 17986->17987 17988 10024519 17987->17988 17989 100243c7 IsRectEmpty 17987->17989 17988->17356 17989->17988 17990 100243da 17989->17990 17991 10022f90 GetMenu 17990->17991 17992 1002449c 17991->17992 17994 10022fd0 3 API calls 17992->17994 17995 100244a7 17992->17995 17993 100244f6 SetWindowPos 17993->17988 17994->17995 17995->17988 17995->17993 17997 10023f00 10 API calls 17996->17997 17998 10025b98 17997->17998 17999 10025c63 17998->17999 18000 10025bb5 17998->18000 18001 10025c4a KillTimer 17998->18001 17999->17402 18012 10024cf0 GetMenuItemInfoA 18000->18012 18001->17999 18003 10025bbd 18003->17999 18004 10025c35 18003->18004 18005 10025bcf 18003->18005 18007 10024e60 115 API calls 18004->18007 18006 10024e60 115 API calls 18005->18006 18008 10025bea 18006->18008 18009 10025c46 18007->18009 18013 100124d0 SetTimer 18008->18013 18009->17402 18011 10025bf8 TrackPopupMenu 18011->17402 18012->18003 18013->18011 18014->17460 18016 10025b83 18015->18016 18017 10025b3f 18015->18017 18016->17499 18018 10025b60 IsWindowVisible 18017->18018 18018->18016 18019 10025b6e 18018->18019 18020 100220a0 233 API calls 18019->18020 18020->18016 18022 10022de7 18021->18022 18023 10022f7e 18021->18023 18024 10022e0e GetWindowRect GetMenuItemCount 18022->18024 18025 10022dfc ??3@YAXPAX 18022->18025 18023->17511 18024->18023 18029 10022e47 18024->18029 18025->18024 18025->18025 18026 10022e4d GetMenuItemRect 18027 10022e78 OffsetRect 18026->18027 18026->18029 18027->18029 18028 10022ee9 GetSubMenu ??2@YAPAXI 18028->18029 18029->18023 18029->18026 18029->18027 18029->18028 18031 10024660 8 API calls 18030->18031 18032 10021c68 18030->18032 18031->18032 18032->17541 18034 10021c8f 18033->18034 18038 10024b67 18033->18038 18035 10024bbd GetMenuItemCount 18035->18034 18036 10024bda GetMenuItemInfoA 18035->18036 18042 10024c29 18036->18042 18037 10024b8d 18037->18035 18038->18035 18038->18037 18039 10024bb4 ??3@YAXPAX 18038->18039 18039->18035 18040 10024c4f SetMenuItemInfoA 18041 10024ccf ??3@YAXPAX 18040->18041 18040->18042 18041->18042 18042->18034 18042->18036 18042->18040 18042->18041 18043 10024cc6 ??3@YAXPAX 18042->18043 18043->18041 18044 10025c70 SendMessageA 18045 10025ca9 18044->18045 18046 10025c89 SendMessageA 18044->18046 18046->18045 18047 10025c94 GetClassLongA 18046->18047 18047->18045 18048 10025ca1 SendMessageA 18047->18048 18048->18045 18049 10026218 18050 1002622b 18049->18050 18053 10026234 18049->18053 18058 1002625c 18050->18058 18059 10025d80 18050->18059 18053->18050 18053->18058 18066 1002616d 18053->18066 18054 10026268 18055 1002627c 18054->18055 18057 1002616d 3 API calls 18054->18057 18054->18058 18056 1002616d 3 API calls 18055->18056 18055->18058 18056->18058 18057->18055 18060 10025d9e 18059->18060 18062 10025d89 18059->18062 18078 10025d50 18060->18078 18061 10025da3 18061->18054 18062->18061 18073 10025d00 18062->18073 18067 10026175 18066->18067 18068 100261ab 18067->18068 18069 10026196 malloc 18067->18069 18071 100261d5 18067->18071 18068->18050 18069->18068 18070 100261af _initterm 18069->18070 18070->18068 18071->18068 18072 10026202 ??3@YAXPAX 18071->18072 18072->18068 18074 10025d0a ??2@YAPAXI 18073->18074 18076 10025d27 18073->18076 18075 10025d1b 18074->18075 18074->18076 18083 10019250 18075->18083 18076->18054 18079 10025d75 18078->18079 18080 10025d5b 18078->18080 18079->18061 18208 100194e0 UnhookWindowsHookEx 18080->18208 18093 10017090 12 API calls 18083->18093 18085 1001927b 18142 1001a700 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 18085->18142 18087 1001928b 18096 10011450 18087->18096 18092 100193b7 18094 100172bb 18093->18094 18095 10017317 CreateCompatibleDC CreateCompatibleDC 18094->18095 18095->18085 18143 10011460 14 API calls 18096->18143 18098 10011458 18099 10009db0 18098->18099 18144 10026920 18099->18144 18102 10026920 6 API calls 18103 10009dd1 18102->18103 18104 10026920 6 API calls 18103->18104 18105 10009de0 18104->18105 18106 10026920 6 API calls 18105->18106 18107 10009def 18106->18107 18108 10026920 6 API calls 18107->18108 18109 10009dfe 18108->18109 18110 10026920 6 API calls 18109->18110 18111 10009e0d 18110->18111 18112 10026920 6 API calls 18111->18112 18113 10009e1c 18112->18113 18114 10026920 6 API calls 18113->18114 18115 10009e2b 18114->18115 18116 10026920 6 API calls 18115->18116 18117 10009e3a 18116->18117 18118 10026920 6 API calls 18117->18118 18119 10009e49 18118->18119 18120 10026920 6 API calls 18119->18120 18121 10009e58 18120->18121 18122 10026920 6 API calls 18121->18122 18123 10009e67 18122->18123 18124 10026920 6 API calls 18123->18124 18125 10009e76 18124->18125 18126 10026920 6 API calls 18125->18126 18127 10009e85 18126->18127 18128 10026920 6 API calls 18127->18128 18129 10009e94 18128->18129 18130 10026920 6 API calls 18129->18130 18131 10009ea3 18130->18131 18132 10026920 6 API calls 18131->18132 18133 10009eb2 18132->18133 18134 10026920 6 API calls 18133->18134 18135 10009ec1 18134->18135 18136 10026920 6 API calls 18135->18136 18137 10009ed0 18136->18137 18138 10026920 6 API calls 18137->18138 18139 10009edf 18138->18139 18140 10026920 6 API calls 18139->18140 18141 10009eee 6F984BC0 GetVersion 18140->18141 18141->18092 18142->18087 18143->18098 18147 10026940 18144->18147 18148 10026958 18147->18148 18150 10009dc2 18148->18150 18151 10026530 18148->18151 18150->18102 18158 10026543 18151->18158 18153 100265b4 18167 10026655 18153->18167 18190 10026440 GetCurrentProcess 18153->18190 18156 10026440 3 API calls 18157 10026687 18156->18157 18159 10026695 18157->18159 18161 100266b4 18157->18161 18158->18153 18200 10026aa0 18158->18200 18160 100264c0 2 API calls 18159->18160 18162 100266a4 18160->18162 18164 100266c0 18161->18164 18165 100266df 18161->18165 18163 100264c0 2 API calls 18162->18163 18163->18167 18166 100264c0 2 API calls 18164->18166 18169 10026720 18165->18169 18171 10026aa0 SetLastError 18165->18171 18168 100266cf 18166->18168 18167->18150 18170 100264c0 2 API calls 18168->18170 18172 10026747 18169->18172 18173 10026728 18169->18173 18170->18167 18171->18165 18176 10026760 18172->18176 18177 1002677c 18172->18177 18174 100264c0 2 API calls 18173->18174 18175 10026737 18174->18175 18178 100264c0 2 API calls 18175->18178 18179 100264c0 2 API calls 18176->18179 18182 100267b9 18177->18182 18183 1002679d 18177->18183 18178->18167 18180 1002676f 18179->18180 18181 100264c0 2 API calls 18180->18181 18181->18167 18195 100264c0 18182->18195 18185 100264c0 2 API calls 18183->18185 18187 100267ac 18185->18187 18189 100264c0 2 API calls 18187->18189 18188 100264c0 2 API calls 18188->18167 18189->18167 18191 10026477 18190->18191 18194 10026498 18190->18194 18192 10026480 FlushInstructionCache 18191->18192 18191->18194 18193 1002649a VirtualProtect 18192->18193 18192->18194 18193->18194 18194->18156 18196 100264d2 18195->18196 18197 10026509 18195->18197 18196->18197 18198 100264e4 FlushInstructionCache 18196->18198 18197->18188 18198->18197 18199 1002650b VirtualProtect 18198->18199 18199->18197 18201 10026ab4 18200->18201 18204 10026bd0 18201->18204 18205 10026bdf 18204->18205 18206 10026ac4 18205->18206 18207 10026bee SetLastError 18205->18207 18206->18158 18207->18206 18231 1001bbf0 18208->18231 18210 10019516 18211 10019530 ??3@YAXPAX 18210->18211 18212 10019542 18210->18212 18211->18211 18211->18212 18213 10019569 ??3@YAXPAX 18212->18213 18214 1001957b 18212->18214 18213->18213 18213->18214 18215 100195a2 ??3@YAXPAX 18214->18215 18216 100195b4 18214->18216 18215->18215 18215->18216 18217 100195db ??3@YAXPAX 18216->18217 18218 100195ed 18216->18218 18217->18217 18217->18218 18219 10019614 ??3@YAXPAX 18218->18219 18220 10019626 18218->18220 18219->18219 18219->18220 18221 1001964d ??3@YAXPAX 18220->18221 18222 1001965f 18220->18222 18221->18221 18221->18222 18223 10019686 ??3@YAXPAX 18222->18223 18224 10019698 18222->18224 18223->18223 18223->18224 18225 100196d1 18224->18225 18226 100196bf ??3@YAXPAX 18224->18226 18253 10009f00 18225->18253 18226->18225 18226->18226 18228 100196f9 18296 10017350 18228->18296 18230 10019718 ??3@YAXPAX 18230->18079 18232 1001bc04 18231->18232 18233 1001bbfd 18231->18233 18234 1001bc13 DeleteObject 18232->18234 18235 1001bc24 18232->18235 18233->18210 18234->18235 18236 1001bc2e DeleteObject 18235->18236 18237 1001bc43 18235->18237 18236->18237 18238 1001bc5a DeleteObject 18237->18238 18239 1001bc9a 18237->18239 18240 1001bc7e DeleteObject 18237->18240 18238->18237 18241 1001bca1 DeleteObject 18239->18241 18242 1001bcb3 18239->18242 18240->18237 18241->18242 18243 1001bcba DeleteObject 18242->18243 18252 1001bccc 18242->18252 18243->18252 18244 1001bda5 18245 1001bdd1 18244->18245 18246 1001bdbf ??3@YAXPAX 18244->18246 18305 1001c570 18245->18305 18246->18245 18246->18246 18248 1001bd1a SendMessageA 18250 1001bd37 IsWindowVisible 18248->18250 18248->18252 18251 1001bd42 SetWindowPos InvalidateRect 18250->18251 18250->18252 18251->18252 18252->18244 18252->18248 18252->18250 18323 100262d0 18253->18323 18256 100262d0 11 API calls 18257 10009f1e 18256->18257 18258 100262d0 11 API calls 18257->18258 18259 10009f2d 18258->18259 18260 100262d0 11 API calls 18259->18260 18261 10009f3c 18260->18261 18262 100262d0 11 API calls 18261->18262 18263 10009f4b 18262->18263 18264 100262d0 11 API calls 18263->18264 18265 10009f5a 18264->18265 18266 100262d0 11 API calls 18265->18266 18267 10009f69 18266->18267 18268 100262d0 11 API calls 18267->18268 18269 10009f78 18268->18269 18270 100262d0 11 API calls 18269->18270 18271 10009f87 18270->18271 18272 100262d0 11 API calls 18271->18272 18273 10009f96 18272->18273 18274 100262d0 11 API calls 18273->18274 18275 10009fa5 18274->18275 18276 100262d0 11 API calls 18275->18276 18277 10009fb4 18276->18277 18278 100262d0 11 API calls 18277->18278 18279 10009fc3 18278->18279 18280 100262d0 11 API calls 18279->18280 18281 10009fd2 18280->18281 18282 100262d0 11 API calls 18281->18282 18283 10009fe1 18282->18283 18284 100262d0 11 API calls 18283->18284 18285 10009ff0 18284->18285 18286 100262d0 11 API calls 18285->18286 18287 10009fff 18286->18287 18288 100262d0 11 API calls 18287->18288 18289 1000a00e 18288->18289 18290 100262d0 11 API calls 18289->18290 18291 1000a01d 18290->18291 18292 100262d0 11 API calls 18291->18292 18293 1000a02c 18292->18293 18294 100262d0 11 API calls 18293->18294 18295 1000a03b 18294->18295 18295->18228 18297 10017386 DeleteDC 18296->18297 18298 1001738c 18296->18298 18297->18298 18299 10017393 DeleteDC 18298->18299 18300 10017399 18298->18300 18299->18300 18301 100173a0 DeleteObject 18300->18301 18302 100173aa 18300->18302 18301->18302 18303 10006920 DeleteObject 18302->18303 18304 100173c9 12 API calls 18303->18304 18304->18230 18306 1001c586 ??3@YAXPAX 18305->18306 18314 1001c598 18305->18314 18306->18306 18306->18314 18307 1001c632 18308 1001c64a ??3@YAXPAX 18307->18308 18317 1001c65c 18307->18317 18308->18308 18308->18317 18310 1001c6f6 18312 1001bde1 18310->18312 18313 1001c70e ??3@YAXPAX 18310->18313 18312->18210 18313->18312 18313->18313 18314->18307 18318 1001c4e0 IsMenu 18314->18318 18315 1001c4e0 3 API calls 18316 1001c6ab ??3@YAXPAX 18315->18316 18316->18317 18317->18310 18317->18315 18319 1001c4f5 GetMenuItemInfoA 18318->18319 18320 1001c567 ??3@YAXPAX 18318->18320 18319->18320 18321 1001c533 SetMenuItemInfoA 18319->18321 18320->18314 18321->18320 18324 100262e1 18323->18324 18325 10026309 SetLastError 18324->18325 18326 10026318 18324->18326 18327 10009f0f 18325->18327 18328 1002632a SetLastError 18326->18328 18329 10026339 18326->18329 18327->18256 18328->18327 18330 10026366 SetLastError 18329->18330 18331 10026375 18329->18331 18330->18327 18332 100263a2 18331->18332 18333 10026393 SetLastError 18331->18333 18334 10026440 3 API calls 18332->18334 18333->18327 18340 100263b2 18334->18340 18335 100263f5 18337 10026419 18335->18337 18338 100263fd SetLastError 18335->18338 18336 10026aa0 SetLastError 18336->18340 18339 100264c0 2 API calls 18337->18339 18341 100264c0 2 API calls 18338->18341 18339->18327 18340->18335 18340->18336 18341->18327

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 60 10017540-10017566 61 10017b84-10017b93 60->61 62 1001756c-10017575 60->62 62->61 63 1001757b-1001757e 62->63 64 10017584-10017588 63->64 65 1001760f-1001761e 63->65 64->65 66 1001758e-10017592 64->66 66->65 67 10017594-10017598 66->67 67->65 68 1001759a-1001759f 67->68 69 100175a1-100175a5 68->69 70 100175b9-100175cf call 10001020 68->70 69->70 71 100175a7-100175b6 69->71 74 100175d1-100175e0 70->74 75 100175e3-100175fa ??2@YAPAXI@Z call 10001030 70->75 77 100175ff-10017604 75->77 78 10017621-1001765e 77->78 79 10017606-1001760c ??3@YAXPAX@Z 77->79 80 10017660-10017662 78->80 81 10017665-10017667 78->81 79->65 80->81 82 10017700-100177b7 81->82 83 1001766d-10017692 81->83 86 100177b9 82->86 87 100177bb-100177dc 82->87 84 10017694-100176ac ??3@YAXPAX@Z 83->84 85 100176af-100176da call 1000f6d0 83->85 95 100176e1-100176e3 85->95 96 100176dc-100176de 85->96 86->87 89 100177e0-10017805 87->89 90 100177de 87->90 92 10017810 89->92 93 10017807-1001780e 89->93 90->89 94 10017813-10017846 92->94 93->94 97 10017848 94->97 98 1001784a-10017882 94->98 95->82 99 100176e5-100176fd ??3@YAXPAX@Z 95->99 96->95 97->98 100 10017884-10017887 98->100 101 10017889 98->101 102 1001788c-100178c5 100->102 101->102 103 100178c7-100178cd 102->103 104 100178cf-100178d2 102->104 105 100178d5-10017a14 call 10006b30 103->105 104->105 108 10017a1a-10017ac9 ??3@YAXPAX@Z 105->108 109 10017acc-10017af4 ??3@YAXPAX@Z SelectObject 105->109 110 10017b04-10017b81 CreateCompatibleBitmap SelectObject BitBlt SelectObject call 10018e00 call 10018f60 call 10020d90 call 100191c0 109->110 111 10017af6-10017afd DeleteObject 109->111 111->110
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@$??2@
      • String ID:
      • API String ID: 4113381792-0
      • Opcode ID: 9388b787652bdbff9eaa412c0bc90e9dfb8bf73614623a41e9d47ac01e50c4b4
      • Instruction ID: 33afa64b527c78f8bd4c2c7d176e8c765b8c94169a76a89671ef6ae364567c8b
      • Opcode Fuzzy Hash: 9388b787652bdbff9eaa412c0bc90e9dfb8bf73614623a41e9d47ac01e50c4b4
      • Instruction Fuzzy Hash: 8502D0756002488FDB28CF14D890BEA77E2FB88310F59857DED0A5F381DB75AA45CB91

      Control-flow Graph

      APIs
      • GetPropA.USER32(?,1002C03C), ref: 10007A3D
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?,?,?,100065A9,?,?,?,?), ref: 10007A59
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: cb2a118e651b28c30f67082bd4fe69c13c495138cac0e45b77bb26f8af636f3a
      • Instruction ID: 97ae2f1b3464a4c4e6a23b637a735b9b026802ad9d4f48c1e8d21a1d89c5b290
      • Opcode Fuzzy Hash: cb2a118e651b28c30f67082bd4fe69c13c495138cac0e45b77bb26f8af636f3a
      • Instruction Fuzzy Hash: BA415F767041019BE204DB58E8D4DBFB3A9EBD83A1F10882FF585C3256CB74AC5697B2

      Control-flow Graph

      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000DA9C
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000DAB8
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 6840023b0d9f93a644c901cc63a780c081a2c5d3ad5d97a37642cacfd9b32677
      • Instruction ID: 228e3ab525f591684e137e6fd99d1f9435fde28c84332add3aa5917434ab564e
      • Opcode Fuzzy Hash: 6840023b0d9f93a644c901cc63a780c081a2c5d3ad5d97a37642cacfd9b32677
      • Instruction Fuzzy Hash: 6E31397A7042019BE100EE58E880D6F77E9DBD47A0F118C1BF6819725AC770DC8697B2

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 10013170-10013206 GetClientRect call 1000fbf0 call 10012060 SelectObject call 10009a50 IsWindowEnabled 8 10013291-100132a0 0->8 9 1001320c-10013212 0->9 12 100132a6-100132b0 8->12 10 10013214-10013229 9->10 11 1001322b-1001322e 9->11 10->12 13 10013251-10013261 GetFocus 11->13 14 10013230-1001324f 11->14 15 100132b1-1001333b call 1000b6e0 InflateRect GetWindowTextA 12->15 16 10013263-10013273 13->16 17 10013275-1001328f 13->17 14->15 20 10013341-10013355 SendMessageA 15->20 21 1001340a-1001340d 15->21 16->12 17->15 24 100133f0-10013405 20->24 25 1001335b-1001335d 20->25 22 10013413-10013428 SendMessageA 21->22 23 100134ac-100134ae 21->23 26 10013497-100134a7 22->26 27 1001342a-1001342c 22->27 28 100134b4-100134c8 23->28 29 10013669-100136bf BitBlt call 1000fc70 23->29 24->23 25->24 30 10013363-100133ee GetIconInfo GetObjectA GetTextExtentPointA DeleteObject * 2 25->30 26->23 27->26 33 1001342e-10013493 GetObjectA GetTextExtentPointA 27->33 34 100134d4-100134d7 28->34 35 100134ca-100134d3 28->35 30->24 33->26 37 100134dd-10013536 DrawTextA 34->37 38 1001359c-100135a5 34->38 35->34 41 10013538-1001354c 37->41 42 1001354e-10013554 37->42 39 100135b7-100135c8 GetPropA 38->39 40 100135a7-100135ad 38->40 47 100135ca-100135cb 39->47 48 100135cd-100135d9 IsWindowEnabled 39->48 45 100135b4 40->45 46 100135af-100135b2 40->46 41->39 43 10013556-1001356a 42->43 44 1001356c-1001359a 42->44 43->39 44->39 45->39 46->39 49 10013602-10013606 47->49 50 100135f2-10013601 48->50 51 100135db-100135f0 48->51 52 10013607-10013611 SetTextColor 49->52 50->49 51->52 53 10013631-10013663 SetBkMode DrawTextA 52->53 54 10013613-1001362b OffsetRect 52->54 53->29 54->53
      APIs
      • GetClientRect.USER32(?,?), ref: 1001319A
        • Part of subcall function 1000FBF0: CreateCompatibleDC.GDI32(?), ref: 1000FC09
        • Part of subcall function 1000FBF0: CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 1000FC14
        • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
        • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
        • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
        • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
        • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
        • Part of subcall function 10012060: GetPropA.USER32(?,1002C2CC), ref: 1001206C
        • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
      • SelectObject.GDI32(?,00000000), ref: 100131E3
      • IsWindowEnabled.USER32(?), ref: 100131FE
      • InflateRect.USER32(?,000000FE,000000FE), ref: 100132E2
      • GetWindowTextA.USER32(?,?,00000400), ref: 10013319
      • SendMessageA.USER32(?,000000F6,00000001,00000000), ref: 1001334D
      • GetIconInfo.USER32(00000000,?), ref: 10013369
      • GetObjectA.GDI32(?,00000018,?), ref: 1001337B
      • GetTextExtentPointA.GDI32(?,?,?,?), ref: 100133A5
      • DeleteObject.GDI32(?), ref: 100133E7
      • DeleteObject.GDI32(?), ref: 100133EE
      • SendMessageA.USER32(?,000000F6,00000000,00000000), ref: 10013420
      • GetObjectA.GDI32(00000000,00000018,?), ref: 10013436
      • GetTextExtentPointA.GDI32(?,?,?,?), ref: 10013460
      • DrawTextA.USER32(?,?,-00000001,?,00000000), ref: 1001352A
      • GetPropA.USER32(?,1002C2C0), ref: 100135C0
      • IsWindowEnabled.USER32(?), ref: 100135D1
      • SetTextColor.GDI32(?,?), ref: 10013607
      • OffsetRect.USER32(?,?,?), ref: 1001362B
      • SetBkMode.GDI32(?,00000001), ref: 10013638
      • DrawTextA.USER32(?,?,?,?,00000000), ref: 10013663
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1001368D
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Text$Rect$CreateDeleteMessageSelectSendWindow$ClipCompatibleDrawEnabledExtentPointProp$BitmapClientColorIconInflateInfoModeOffset
      • String ID:
      • API String ID: 660395982-0
      • Opcode ID: caf21a1c7cf1fe260952df342b86851fbddba4b749565e73e7d7b216ba7894aa
      • Instruction ID: 0720dea72c005f8db2774b89525498d56df710bbe5d87d96d133ef9dad5b9a48
      • Opcode Fuzzy Hash: caf21a1c7cf1fe260952df342b86851fbddba4b749565e73e7d7b216ba7894aa
      • Instruction Fuzzy Hash: 7FF14AB42087419FE324CF64C885E6BB7E9FBC8710F108A1CF69987290DB74E949CB52

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??2@$CompatibleCreate
      • String ID:
      • API String ID: 2751892210-0
      • Opcode ID: e8fdb1ed28e246d3529f5ed77cbc3c3ceb66a55df81643b3e8b54a0f077fd1d3
      • Instruction ID: 0f10bd593ae600cb38cbaaa22fec1f499e913940d81218a79a1784d92bf44df9
      • Opcode Fuzzy Hash: e8fdb1ed28e246d3529f5ed77cbc3c3ceb66a55df81643b3e8b54a0f077fd1d3
      • Instruction Fuzzy Hash: FF7118B45007889BEB30CF29C8A17DABBE1FF4C310F90442E9A4D9B791DB7666558B81

      Control-flow Graph

      APIs
      • GetWindowRect.USER32(?,?), ref: 10022268
      • SetWindowPos.USER32(?,?,?,?,00000000,00000000,00002719), ref: 1002229B
      • SetWindowPos.USER32(?,?,?,?,00000000,00000000,00002719), ref: 100222D3
      • SetWindowPos.USER32(?,?,?,?,00000000,00000000,00002719), ref: 10022313
      • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,0000271B), ref: 100223B8
        • Part of subcall function 10024730: ShowWindow.USER32(?,1002224F,?,?,?,1002224F,00000008,?,?), ref: 10024747
        • Part of subcall function 10024730: ShowWindow.USER32(?,1002224F), ref: 10024751
        • Part of subcall function 10024730: ShowWindow.USER32(?,1002224F), ref: 1002475B
        • Part of subcall function 10024730: ShowWindow.USER32(?,1002224F), ref: 10024765
      • CallWindowProcA.USER32(?,?,00000047,?,?), ref: 100223DC
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$Show$CallProcRect
      • String ID:
      • API String ID: 3118190714-0
      • Opcode ID: 83421723ea342ca1ad6f25ff292cafd13031697b20443bd079c89a1a0dbc7951
      • Instruction ID: 8dc1deb737b558b6c714bf112c7838984d22b05039a9ca3c04896061e2edaa8e
      • Opcode Fuzzy Hash: 83421723ea342ca1ad6f25ff292cafd13031697b20443bd079c89a1a0dbc7951
      • Instruction Fuzzy Hash: 3651FF75344701AFE224DA68DC96FABB3E9EB88B10F10890DF65A973D5CA74BC018B54

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 136 1001a4f0-1001a505 137 1001a50b-1001a50d 136->137 138 1001a65d-1001a679 CallNextHookEx 136->138 137->138 139 1001a513-1001a518 137->139 139->138 140 1001a51e-1001a524 139->140 141 1001a574-1001a577 140->141 142 1001a526-1001a52d 140->142 143 1001a5c7-1001a5ca 141->143 144 1001a579-1001a57e 141->144 142->138 145 1001a533-1001a536 142->145 147 1001a5d7-1001a5ea GetPropA 143->147 148 1001a5cc-1001a5d1 143->148 144->138 146 1001a584-1001a589 144->146 145->138 149 1001a53c-1001a549 call 10009a50 145->149 146->138 150 1001a58f-1001a59c call 10009a50 146->150 147->138 152 1001a5ec-1001a5f9 GetPropA 147->152 148->138 148->147 149->138 157 1001a54f-1001a56f SetPropA call 100099f0 149->157 150->138 161 1001a5a2-1001a5c2 SetPropA call 100099f0 150->161 152->138 155 1001a5fb-1001a608 GetPropA 152->155 158 1001a627-1001a647 GetClassNameA call 1001a030 155->158 159 1001a60a-1001a625 GetPropA call 10019730 155->159 157->138 165 1001a64c-1001a657 SetPropA 158->165 159->165 161->138 165->138
      APIs
      • SetPropA.USER32(?,1002C058,00000000), ref: 1001A559
      • SetPropA.USER32(?,1002C058,00000000), ref: 1001A5AC
      • CallNextHookEx.USER32(?,?,?,?), ref: 1001A66D
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Prop$CallHookNext
      • String ID:
      • API String ID: 3868478265-0
      • Opcode ID: ba536d1b1a470f14f7738c772cb23c0568ed46f4c70e7589315eeac59150253b
      • Instruction ID: 7811e094c1e109cc8e8b8a1a0b8848a8eb1566d8d7a83a7f68ba57272ffb72e5
      • Opcode Fuzzy Hash: ba536d1b1a470f14f7738c772cb23c0568ed46f4c70e7589315eeac59150253b
      • Instruction Fuzzy Hash: 0D415479600611EFD614DB94CC80D2773E9EF966A07158A18F66ACB690D734FC85CB20

      Control-flow Graph

      APIs
      • IsWindowVisible.USER32(?), ref: 1002356E
      • SetTextColor.GDI32(?,?), ref: 1002374A
      • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 1002390B
        • Part of subcall function 10023070: IsWindowVisible.USER32(?), ref: 10023094
        • Part of subcall function 10023070: IsRectEmpty.USER32(?), ref: 10023107
        • Part of subcall function 10023070: IsIconic.USER32(?), ref: 10023115
        • Part of subcall function 10023070: IsRectEmpty.USER32(?), ref: 100231E6
        • Part of subcall function 10023070: IsZoomed.USER32(?), ref: 100231F4
        • Part of subcall function 10023070: GetSystemMenu.USER32(?,00000000,0000F060,00000000), ref: 10023317
        • Part of subcall function 10023070: GetMenuState.USER32(00000000), ref: 1002331E
      • GetWindowTextA.USER32(?,?,00000400), ref: 100237DD
      • DrawIconEx.USER32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 1002381F
      • SetBkMode.GDI32(?,00000001), ref: 100238A2
      • SelectObject.GDI32(?,00000000), ref: 100238B7
      • DrawTextA.USER32(?,?,?,?,00040024), ref: 100238DE
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: TextWindow$DrawEmptyMenuRectVisible$ColorIconIconicModeObjectSelectStateSystemZoomed
      • String ID:
      • API String ID: 3608014746-0
      • Opcode ID: b124cef97b468efd2e6cf9f063e6fb4f9423a705c9c23057f94ce808e329f1e3
      • Instruction ID: 32d7335e5a1ed0603d0bba8e657fa13f5095f1cf460f47c86137365764961296
      • Opcode Fuzzy Hash: b124cef97b468efd2e6cf9f063e6fb4f9423a705c9c23057f94ce808e329f1e3
      • Instruction Fuzzy Hash: 4AC108B9240705AFE354CB64CC85FA7B3E9EB88740F208A1DF55A87255DA75FC06CBA0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 230 1000b4c0-1000b4c6 231 1000b4c8 230->231 232 1000b4ce-1000b4d7 230->232 231->232 233 1000b5dc-1000b5e1 232->233 234 1000b4dd-1000b4e3 232->234 234->233 235 1000b4e9-1000b4ef 234->235 235->233 236 1000b4f5-1000b4fb 235->236 236->233 237 1000b501-1000b507 236->237 237->233 238 1000b50d-1000b50f 237->238 239 1000b511-1000b513 238->239 240 1000b542-1000b59c CreateCompatibleDC CreateCompatibleBitmap SelectObject call 100271c4 238->240 239->240 241 1000b515-1000b541 746D1530 239->241 243 1000b5a1-1000b5db 746D1530 DeleteObject DeleteDC 240->243
      APIs
      • 746D1530.MSIMG32(?,?,?,?,?,?,1000BFD7,1000BFD7,?,1000BFD7,?,00000000,?,?,1000BFD7,?), ref: 1000B538
      • CreateCompatibleDC.GDI32(?), ref: 1000B548
      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 1000B553
      • SelectObject.GDI32(00000000,00000000), ref: 1000B55F
      • 746D1530.MSIMG32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?), ref: 1000B5BA
      • DeleteObject.GDI32(?), ref: 1000B5C5
      • DeleteDC.GDI32(00000000), ref: 1000B5CC
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CompatibleCreateD1530DeleteObject$BitmapSelect
      • String ID:
      • API String ID: 4272861949-0
      • Opcode ID: cea02a7140ad39d7cb010459c9ee0d1b607245b3b0f0fafe053c611a6cff785f
      • Instruction ID: a2bec2eff1570f1e033dcbeedc9227712d92de05b5e2e1092a7d92024c81a4dd
      • Opcode Fuzzy Hash: cea02a7140ad39d7cb010459c9ee0d1b607245b3b0f0fafe053c611a6cff785f
      • Instruction Fuzzy Hash: 083114B6206611BFE254DF59CC88F6BB7EDEBC8B91F10495CF64987250D630EC028B61

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 244 1001c450-1001c469 GetPropA 245 1001c485-1001c48f GetPropA 244->245 246 1001c46b-1001c47f RemovePropA SendMessageA 244->246 247 1001c491-1001c494 245->247 248 1001c4d4-1001c4d7 245->248 246->245 249 1001c496-1001c4a8 247->249 250 1001c4ae-1001c4b7 IsWindowVisible 247->250 249->250 250->248 251 1001c4b9-1001c4ce InvalidateRect SetWindowPos 250->251 251->248
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001C463
      • RemovePropA.USER32(?,1002C460), ref: 1001C471
      • SendMessageA.USER32(?,00006A30,00000000,00000000), ref: 1001C47F
      • GetPropA.USER32(?,1002C03C), ref: 1001C48B
      • IsWindowVisible.USER32(?), ref: 1001C4AF
      • InvalidateRect.USER32(?,00000000,00000001,?,?,?,1001C40B,?), ref: 1001C4BD
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237,?,?,?,1001C40B,?), ref: 1001C4CE
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Prop$Window$InvalidateMessageRectRemoveSendVisible
      • String ID:
      • API String ID: 2510188223-0
      • Opcode ID: 51a537452bd44370889b0a1f1f194821304f9a483811099fd7e9da286f0db7f1
      • Instruction ID: 11fdaa9114d1614bf2f695c029d4fea50ea2cb84254ba2801cf49c8279bf9916
      • Opcode Fuzzy Hash: 51a537452bd44370889b0a1f1f194821304f9a483811099fd7e9da286f0db7f1
      • Instruction Fuzzy Hash: B0016D75202A29EFE780AF954CC8DFB76ACEF45285B1280B9F20596011C7708A428BA5

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Empty$Window$MessageSendVisible
      • String ID:
      • API String ID: 1963373104-0
      • Opcode ID: e9bd8bf3015e0fc931efd3356353d720a6aee9b169a9c962a95d430c27da7b1e
      • Instruction ID: 15d01376b549b43e06bef1ecdf41231e929ad262f4cddba4413b2d284a982563
      • Opcode Fuzzy Hash: e9bd8bf3015e0fc931efd3356353d720a6aee9b169a9c962a95d430c27da7b1e
      • Instruction Fuzzy Hash: A131AD38300B02ABD654DA75DC95FABB3E9EF94740F41890CFA5AC3250DB70E951CB90

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 287 10025c70-10025c87 SendMessageA 288 10025ca9-10025cab 287->288 289 10025c89-10025c92 SendMessageA 287->289 289->288 290 10025c94-10025c9f GetClassLongA 289->290 290->288 291 10025ca1-10025ca7 SendMessageA 290->291 291->288
      APIs
      • SendMessageA.USER32(?,0000007F,00000002,00000000), ref: 10025C83
      • SendMessageA.USER32(?,0000007F,00000000,00000000), ref: 10025C8E
      • GetClassLongA.USER32(?,000000F2), ref: 10025C97
      • SendMessageA.USER32(?,0000007F,00000001,00000000), ref: 10025CA7
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSend$ClassLong
      • String ID:
      • API String ID: 1264571673-0
      • Opcode ID: 370d63bef3b9863a2f2e968b8f2886904922ea484c8d1e949867ab0d5a59f7f0
      • Instruction ID: 947a8f3f8a0cea30fb6e839a99a16b54cd066c6a9c51171dd670646b1ab2be3e
      • Opcode Fuzzy Hash: 370d63bef3b9863a2f2e968b8f2886904922ea484c8d1e949867ab0d5a59f7f0
      • Instruction Fuzzy Hash: AEE0DF6A3453277DF11066269C02FAB328C8F91B91F224120FB04F50C4E2A6AD0306B8

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 292 1000a460-1000a47d GetPropA 293 1000a486-1000a496 call 10009c60 292->293 294 1000a47f-1000a484 292->294 297 1000a49b-1000a4a0 293->297 294->293 295 1000a4a3-1000a4a9 294->295 298 1000a4b5-1000a4bc 295->298 299 1000a4ab-1000a4b2 295->299 300 1000a4f4-1000a4fa 298->300 301 1000a4be-1000a4c1 298->301 302 1000a500-1000a504 300->302 303 1000a4c3-1000a4cb 301->303 304 1000a4de-1000a4e0 301->304 307 1000a512-1000a516 302->307 308 1000a506-1000a50f 302->308 303->300 309 1000a4cd-1000a4d2 303->309 305 1000a4e2-1000a4e9 304->305 306 1000a4ec-1000a4f2 304->306 306->302 310 1000a518-1000a524 307->310 311 1000a52b-1000a52f 307->311 308->307 309->306 312 1000a4d4-1000a4db 309->312 313 1000a526 310->313 314 1000a528 310->314 315 1000a531-1000a539 311->315 316 1000a57b-1000a585 311->316 313->314 314->311 319 1000a53b 315->319 320 1000a53d-1000a544 315->320 317 1000a591 316->317 318 1000a587-1000a58f 316->318 321 1000a593-1000a596 317->321 318->321 319->320 322 1000a546-1000a54a 320->322 323 1000a54c 320->323 325 1000a598-1000a59f 321->325 326 1000a60e-1000a614 321->326 324 1000a54e-1000a55a 322->324 323->324 327 1000a560-1000a56e 324->327 328 1000a55c-1000a55e 324->328 331 1000a5a1-1000a5a4 325->331 332 1000a5c8-1000a5cd 325->332 329 1000a630-1000a638 326->329 330 1000a616-1000a623 IsWindowVisible 326->330 333 1000a570-1000a578 327->333 328->333 330->329 334 1000a625-1000a62b call 10015840 330->334 335 1000a5a6-1000a5ad 331->335 336 1000a5af 331->336 337 1000a5f2-1000a5f7 332->337 338 1000a5cf 332->338 333->316 334->329 343 1000a5b2-1000a5b5 335->343 336->343 337->326 341 1000a5f9-1000a607 337->341 339 1000a5d1-1000a5d3 338->339 340 1000a5d5-1000a5d8 338->340 339->337 339->340 340->337 344 1000a5da-1000a5df 340->344 345 1000a608 ShowScrollBar 341->345 343->326 346 1000a5b7-1000a5c6 343->346 344->326 347 1000a5e1-1000a5f0 344->347 345->326 346->345 347->345
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000A46F
      • ShowScrollBar.USER32(?), ref: 1000A608
      • IsWindowVisible.USER32(?), ref: 1000A61B
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: PropScrollShowVisibleWindow
      • String ID:
      • API String ID: 925533089-0
      • Opcode ID: b05e0342eeb9d100af01acffb98c79fbe272d89ffbffb893b2e8404fb9fbfbc6
      • Instruction ID: 5d9c8eb271cc9b0f02aa51a35db3e0294c315e2d033d928ddf3a82af3e440562
      • Opcode Fuzzy Hash: b05e0342eeb9d100af01acffb98c79fbe272d89ffbffb893b2e8404fb9fbfbc6
      • Instruction Fuzzy Hash: 36617C75304B029FE724CE24D984B5BB7E5FB86395F20CA2DE846CB648E771E885CB50

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 425 10015400-10015408 426 10015433-10015497 call 10009bd0 * 2 425->426 427 1001540a-1001540f 425->427 434 100154b3-100154c6 SetWindowPos 426->434 435 10015499-100154ad CallWindowProcA 426->435 428 10015415-10015430 CallWindowProcA 427->428 429 100154cc-100154cf 427->429 434->429 435->434
      APIs
      • CallWindowProcA.USER32(?,?,00000001,?,?), ref: 10015429
      • CallWindowProcA.USER32(?,?,00000001,?,?), ref: 100154AD
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,0000263F), ref: 100154C6
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$CallProc
      • String ID:
      • API String ID: 883168683-0
      • Opcode ID: 049282dc8febc6ffcff643e693e9be518f14e6765984f4641e482d5a9bc57cbd
      • Instruction ID: 2f0a6d1fae90f1da847d9558e590aaa30e7de1fb8e63c55613dd495823e97c50
      • Opcode Fuzzy Hash: 049282dc8febc6ffcff643e693e9be518f14e6765984f4641e482d5a9bc57cbd
      • Instruction Fuzzy Hash: 4621E8B4204701EFE360CF24C884F97B7E9EB88314F10891DF5AA8B690D771E885CB60

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 436 1002616d-10026173 437 10026183-10026194 436->437 438 10026175-1002617b 436->438 441 10026196-100261a9 malloc 437->441 442 100261d5-100261d7 437->442 439 100261ab-100261ad 438->439 440 1002617d 438->440 444 10026215 439->444 440->437 441->439 443 100261af-100261d3 _initterm 441->443 445 10026212-10026214 442->445 446 100261d9-100261e0 442->446 443->445 445->444 446->445 447 100261e2-100261e9 446->447 448 100261ec-100261ee 447->448 449 10026202-10026211 ??3@YAXPAX@Z 448->449 450 100261f0-100261f4 448->450 449->445 451 100261f6-100261f8 450->451 452 100261fd-10026200 450->452 451->452 452->448
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@_inittermmalloc
      • String ID:
      • API String ID: 1640728331-0
      • Opcode ID: 28efe3b135363df1d26e65f438198e95a9e2b0e57acad8b9d4fda251abc1b172
      • Instruction ID: c3025327f4686e2d82251761483d94adc5640adac6d06395e623d3ba54a4f38f
      • Opcode Fuzzy Hash: 28efe3b135363df1d26e65f438198e95a9e2b0e57acad8b9d4fda251abc1b172
      • Instruction Fuzzy Hash: 07115E316452A1CFF784CBA4EEC4B1A37A4FB09391B650479FC05CB2A5D721AC42CB00
      APIs
      • GetCurrentProcess.KERNEL32(?,?,10026677,00000000,00000020), ref: 10026463
      • FlushInstructionCache.KERNEL32(10026677,00000000,10026677,?,10026677,00000000,00000020), ref: 1002648E
      • VirtualProtect.KERNEL32(00000000,10026677,00000040,00000014,?,10026677,00000000,00000020), ref: 100264AB
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
      • String ID:
      • API String ID: 3733156554-0
      • Opcode ID: 6ab28333a214872ef38e7cec3ea03a05ced2cd15625bfb15ed58538e5cadbd30
      • Instruction ID: 63f23e8b59d19312b92c29cae95ac7a559587f2e0b5583b49ef3a248e102aaa7
      • Opcode Fuzzy Hash: 6ab28333a214872ef38e7cec3ea03a05ced2cd15625bfb15ed58538e5cadbd30
      • Instruction Fuzzy Hash: 0E11A278A00208EFDB44DF98D984A9AB7F5FB48304F20C199F9099B350C735EE41DB90
      APIs
      • LoadCursorA.USER32(00000000,00007F84), ref: 10022466
      • SetCursor.USER32(00000000), ref: 1002246D
      • CallWindowProcA.USER32(?,?,00000020,?,?), ref: 10022488
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Cursor$CallLoadProcWindow
      • String ID:
      • API String ID: 831520691-0
      • Opcode ID: bf4b07cb46031061091a48be3070b511f6d722d995ee6d89d0a7fe8c069e6cd6
      • Instruction ID: 062c7e92b90e4879049151a24f00c03cd6efa16da21a8c855a1b890bc08c09af
      • Opcode Fuzzy Hash: bf4b07cb46031061091a48be3070b511f6d722d995ee6d89d0a7fe8c069e6cd6
      • Instruction Fuzzy Hash: 3EF02771608302F7F214EB90CC45E3B7268EB89B04FB0C224F2488A0D1CA34D402C712
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2271924208.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2271885601.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006C2000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006CF000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006FD000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000719000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.000000000071F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000721000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000725000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000729000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272345644.000000000072B000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272365555.000000000072D000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 1.0.0$h/AO$jjj
      • API String ID: 0-2783887836
      • Opcode ID: 65dfdecd0a503b257aa230997f0f2d39a74600fa8eb3eb88a51f610deca3f358
      • Instruction ID: 47ac5ea5ded28ca46134445a046575d2997d6d6a7c11a59719bb35b119e2de65
      • Opcode Fuzzy Hash: 65dfdecd0a503b257aa230997f0f2d39a74600fa8eb3eb88a51f610deca3f358
      • Instruction Fuzzy Hash: 14410572909380AFCB058B305D096687F60FB23314F1946FBD986AB1D3E23D492A875F
      APIs
      • CallWindowProcA.USER32(?,?,00000000,?,?), ref: 10015010
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 10015136
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow
      • String ID:
      • API String ID: 2714655100-0
      • Opcode ID: 3a34cf9c1cf895b50e1ffedf62062b269e6f1887e1c20b20102255bf11944071
      • Instruction ID: 3a9bc6d7e016e4f588f7fcbb5cad357005f6a59b672cc3281e17a6244433939f
      • Opcode Fuzzy Hash: 3a34cf9c1cf895b50e1ffedf62062b269e6f1887e1c20b20102255bf11944071
      • Instruction Fuzzy Hash: 815151BA208610EFD249DB54D851E7FB3AAEBD8711F14C90DF2568F245CA31EC8287A5
      APIs
      • FlushInstructionCache.KERNEL32(?,00000000,00000000), ref: 100264FF
      • VirtualProtect.KERNEL32(00000000,00000000,00000000,00000000), ref: 10026524
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CacheFlushInstructionProtectVirtual
      • String ID:
      • API String ID: 403598440-0
      • Opcode ID: c3da033d4900e79327e44b0a828f40d223d41c1a4726ae3b7a942c81a8011169
      • Instruction ID: 4cf98e0dcf6dfc27f34e277785f8542e4947d89007de13e16ffdbbdb6af82732
      • Opcode Fuzzy Hash: c3da033d4900e79327e44b0a828f40d223d41c1a4726ae3b7a942c81a8011169
      • Instruction Fuzzy Hash: 5E01D778A00208EFD740CF94D894A9DFBB9FB48314F50C298E80997355D731EE86CB50
      APIs
      • IsWindowVisible.USER32(?), ref: 10022727
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 10022777
        • Part of subcall function 10022A20: IsWindowVisible.USER32(?), ref: 10022A2C
        • Part of subcall function 10022A20: CallWindowProcA.USER32(?,?,?,?,?), ref: 10022A87
        • Part of subcall function 100220A0: IsWindowVisible.USER32(?), ref: 100220B8
        • Part of subcall function 100220A0: GetWindowRect.USER32 ref: 100220E3
        • Part of subcall function 100220A0: IsRectEmpty.USER32(?), ref: 1002218E
        • Part of subcall function 100220A0: IsRectEmpty.USER32(?), ref: 100221A5
        • Part of subcall function 100220A0: SendMessageA.USER32(?,00007401,?,?), ref: 100221DA
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$RectVisible$CallEmptyProc$MessageSend
      • String ID:
      • API String ID: 4052620737-0
      • Opcode ID: 32b9e609d8ef7e85d037e18e0d6d777959baff4de8e75da9bb6dee04d9dbc7e5
      • Instruction ID: ecefd7cb717017ce8ca5c15fabac25cc6db7c6444c9262e517bd60f13e577a75
      • Opcode Fuzzy Hash: 32b9e609d8ef7e85d037e18e0d6d777959baff4de8e75da9bb6dee04d9dbc7e5
      • Instruction Fuzzy Hash: C1F0EC79314711BBD614CB59D885FABB3EAEBC8710F10890DF64587290C670EC458765
      APIs
        • Part of subcall function 100031A0: LoadCursorA.USER32 ref: 100031E6
        • Part of subcall function 100031A0: RegisterClassExA.USER32 ref: 1000320D
      • GetCurrentThreadId.KERNEL32 ref: 1001949E
      • SetWindowsHookExA.USER32(00000004,1001A4F0,?,00000000), ref: 100194AD
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ClassCurrentCursorHookLoadRegisterThreadWindows
      • String ID:
      • API String ID: 1908744831-0
      • Opcode ID: 19cee74c161a8a1ef3f8c2fedae50ded263d7b6a45f83f2ca4177339b9e5c586
      • Instruction ID: 1960aa195ee1fe07530ea21f1dd313f19c5464d8ba1e979a915d34b59bad2663
      • Opcode Fuzzy Hash: 19cee74c161a8a1ef3f8c2fedae50ded263d7b6a45f83f2ca4177339b9e5c586
      • Instruction Fuzzy Hash: 40F082B9A001049FE314CF58E885B9A7BE8EB88711F00812AFA0BC7340EB31A451C751
      APIs
      • GetPropA.USER32(?,1002C2CC), ref: 1001206C
      • SendMessageA.USER32(?,00000031,?,?), ref: 10012090
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessagePropSend
      • String ID:
      • API String ID: 25370605-0
      • Opcode ID: 7d5e3bc90b47571d82ce137a822031f71c38e63c62c9b70d0aa0c542d69259e0
      • Instruction ID: b8d12084a5fb27a2b02e8c7b5d46552afd1830b42c17ef8beebdc7801db986c6
      • Opcode Fuzzy Hash: 7d5e3bc90b47571d82ce137a822031f71c38e63c62c9b70d0aa0c542d69259e0
      • Instruction Fuzzy Hash: E4E06DB93003139BE360CB98CC84E5273ECEF88694B114518F509CB211D7B0EC91CB50
      APIs
      • GetCurrentThreadId.KERNEL32 ref: 1001C3E7
      • EnumThreadWindows.USER32(00000000), ref: 1001C3EE
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Thread$CurrentEnumWindows
      • String ID:
      • API String ID: 2396873506-0
      • Opcode ID: d622cf26246987ff9e9421572da9bcdcb2b88d34bd5217939b00bcf58dbb3ef1
      • Instruction ID: 12c5552e0a4cb50a56c7161035d2123e8fa57657582dde7ac2283fab1c990b87
      • Opcode Fuzzy Hash: d622cf26246987ff9e9421572da9bcdcb2b88d34bd5217939b00bcf58dbb3ef1
      • Instruction Fuzzy Hash: BFB0027554511457ED1057A04D5DF95361C9744706F214440F305D50D0C67491A38755
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2271924208.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2271885601.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006C2000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006CF000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006FD000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000719000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.000000000071F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000721000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000725000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000729000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272345644.000000000072B000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272365555.000000000072D000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 1.0.0$jjj
      • API String ID: 0-1597944893
      • Opcode ID: 694f9ea29cf58fa4125ec0636f03da86250f1072188f7a1b006dce6c966ed8e8
      • Instruction ID: 6228866e52e494c37f3b604a63eb1282b7345db33720fa8a27b0dde577abd5de
      • Opcode Fuzzy Hash: 694f9ea29cf58fa4125ec0636f03da86250f1072188f7a1b006dce6c966ed8e8
      • Instruction Fuzzy Hash: 5981227294C341ABCB118B704D06B387B20BB26715F1846BBED427A2D3E27E5836834F
      APIs
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 10024A36
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow
      • String ID:
      • API String ID: 2714655100-0
      • Opcode ID: ccc98896fe80d5754182099f52a7d0c2ef5bca29cf5af2a5b87928f1901503f8
      • Instruction ID: 0276685cddaf8491d1b69849fc3bfca2be8f4e4163da7e6ce67b870ed928455b
      • Opcode Fuzzy Hash: ccc98896fe80d5754182099f52a7d0c2ef5bca29cf5af2a5b87928f1901503f8
      • Instruction Fuzzy Hash: 358163BA308350AF9144DB58E491E7FB3E9EBD8710F51CD0DF55687244CB30AC8287AA
      APIs
      • CallWindowProcA.USER32(?,?,00000083,?,?), ref: 100227DD
        • Part of subcall function 10024E80: GetWindowInfo.USER32(?), ref: 10024E99
        • Part of subcall function 10024E80: IsWindowVisible.USER32(?), ref: 10024F00
        • Part of subcall function 10024E80: OffsetRect.USER32(?,?,?), ref: 10024F39
        • Part of subcall function 10024E80: OffsetRect.USER32(?,?,?), ref: 10024F4E
        • Part of subcall function 10024E80: EqualRect.USER32(?,?), ref: 10024F66
        • Part of subcall function 10024E80: EqualRect.USER32(?,?), ref: 10024F78
        • Part of subcall function 10022FD0: GetMenuItemCount.USER32(?), ref: 10022FE9
        • Part of subcall function 10022FD0: GetMenuItemRect.USER32(?,?,00000000,?,?,?,?,100250E4,00040024,?,00000000,?), ref: 1002300D
        • Part of subcall function 10022FD0: GetMenuItemRect.USER32(?,?,-00000001,?,?,?,?,100250E4,00040024,?,00000000,?), ref: 10023021
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$ItemMenuWindow$EqualOffset$CallCountInfoProcVisible
      • String ID:
      • API String ID: 2682827658-0
      • Opcode ID: ba77e99849152b532a34ce5233054817b3643cd4816e7d9f4adc947aa763c3b2
      • Instruction ID: e8be41dcc1f79ff3f90e0d34badb2271f0da0451bde1e7ce2bf7accdd2581f9d
      • Opcode Fuzzy Hash: ba77e99849152b532a34ce5233054817b3643cd4816e7d9f4adc947aa763c3b2
      • Instruction Fuzzy Hash: 9B711374601A029FC348CF69D994A56F7E2FF88314F65862DD85E8B755DB30F892CB80
      APIs
      • CallWindowProcA.USER32(?,?,000000A0,?,?), ref: 10021BD4
        • Part of subcall function 10023F00: GetCursorPos.USER32(?), ref: 10023F0E
        • Part of subcall function 10023F00: GetWindowRect.USER32(?,?), ref: 10023F1D
        • Part of subcall function 10023F00: PtInRect.USER32(?,?,?), ref: 10023F38
        • Part of subcall function 10023F00: PtInRect.USER32(00000168,?,?), ref: 10023F67
        • Part of subcall function 10023F00: GetMenuItemCount.USER32(?), ref: 10023F94
        • Part of subcall function 10023F00: GetMenuItemInfoA.USER32 ref: 10023FE3
        • Part of subcall function 10023F00: OffsetRect.USER32(?,?,00000000), ref: 1002401B
        • Part of subcall function 10023F00: PtInRect.USER32(?,00000400,00000000), ref: 10024030
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$ItemMenuWindow$CallCountCursorInfoOffsetProc
      • String ID:
      • API String ID: 944667833-0
      • Opcode ID: e4d9995297009689fcc7e67a9ba043a09e95ad2d942d020a218746b7a4d2f7d6
      • Instruction ID: c3f383d5eed1be691a123e0e061e0b2aa4d52c285376cd1728423dfd6ea2ef12
      • Opcode Fuzzy Hash: e4d9995297009689fcc7e67a9ba043a09e95ad2d942d020a218746b7a4d2f7d6
      • Instruction Fuzzy Hash: C631A139704702DAD762DA64F4897DE76F6EBB5340F920C1BE45A97280E770AC808792
      APIs
      • CallWindowProcA.USER32(?,?,00000083,?,?), ref: 100155BB
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow
      • String ID:
      • API String ID: 2714655100-0
      • Opcode ID: 5d0bdd36328f84d96af1c0e60120005e76f9a7083c5701b91d0d2ef7dfa2a6cb
      • Instruction ID: 664da86f57333d2594dda9d77ea2a9eee9da370e28bc646d6d5ed37cb1cf24e2
      • Opcode Fuzzy Hash: 5d0bdd36328f84d96af1c0e60120005e76f9a7083c5701b91d0d2ef7dfa2a6cb
      • Instruction Fuzzy Hash: E2212674600B02DFD354CF29C890E96BBE6EF88324F14866DA55E8B365CB31F881CB50
      APIs
        • Part of subcall function 100069F0: DeleteObject.GDI32(?), ref: 100069FE
      • CreateDIBSection.GDI32(00000000,?,00000000,00000000,00000000,00000000), ref: 10006998
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CreateDeleteObjectSection
      • String ID:
      • API String ID: 2173382960-0
      • Opcode ID: b44d19ee47adf816a5838236eb5bbaaf53ce51a02b38ab68da79dc6121e5c2f5
      • Instruction ID: 7c6951bcf0e21e93eae5dd231c3839bee3ae470e0ee931b53b39c6278d73b45b
      • Opcode Fuzzy Hash: b44d19ee47adf816a5838236eb5bbaaf53ce51a02b38ab68da79dc6121e5c2f5
      • Instruction Fuzzy Hash: 14116D726107058AE330CF15DD81B57F7E9EF94790F54893EE185CAA91D771E8088B60
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000A896
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Prop
      • String ID:
      • API String ID: 257714900-0
      • Opcode ID: 9e952fefe096254a1bbe306181cc1f219a277d469f60241f2d76a5743c8985b5
      • Instruction ID: b92aa163cc4772d189c91a95496e01ad41b9399914cdb497733bef8968714656
      • Opcode Fuzzy Hash: 9e952fefe096254a1bbe306181cc1f219a277d469f60241f2d76a5743c8985b5
      • Instruction Fuzzy Hash: 06F06276208621ABA110DA5C9CC0C7FE7ACDBD66B0720472DF660D32D7CB20AC4697A1
      APIs
      • CallWindowProcA.USER32(?,?,00000082,?,?), ref: 1001211B
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow
      • String ID:
      • API String ID: 2714655100-0
      • Opcode ID: 030ee3439517a845b7d82d67b14f3aff6846b9a8e8a57e3d2cf6ecb39df51a96
      • Instruction ID: 290b3ffbc8d81257372996e1971beab4bfcff2d7a1735a6a4ddaedf5bc9e0035
      • Opcode Fuzzy Hash: 030ee3439517a845b7d82d67b14f3aff6846b9a8e8a57e3d2cf6ecb39df51a96
      • Instruction Fuzzy Hash: 45E04F76300610AFD210DA49C844E57B3E9EFD8710F11851EF685C7250CAB0EC868BA0
      APIs
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 1000794E
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow
      • String ID:
      • API String ID: 2714655100-0
      • Opcode ID: 3837359f5aa365d52d23818cb5a4e785554cb113e94c8a2c60ee71aa23cfa8d2
      • Instruction ID: 3233c890d28c53d32e3e190f2b8006c9aae7ff1ccd48ca7d894a4f2dc1e0a51b
      • Opcode Fuzzy Hash: 3837359f5aa365d52d23818cb5a4e785554cb113e94c8a2c60ee71aa23cfa8d2
      • Instruction Fuzzy Hash: 99E092B5614711ABD724CB68D884DABB3E9FB8C340B008A1EB58EC3655DB74EC41CBA5
      APIs
      • SetPropA.USER32(?,1002C03C,00000000), ref: 10012151
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Prop
      • String ID:
      • API String ID: 257714900-0
      • Opcode ID: ad9e8f4c746ecc45e60b6a0c308ab00b59580d52182ade068d68dd5d959c878d
      • Instruction ID: 35157bf594c235461d53df282a2f192a396ed101a5a2d3219a77b9f403ebd6a7
      • Opcode Fuzzy Hash: ad9e8f4c746ecc45e60b6a0c308ab00b59580d52182ade068d68dd5d959c878d
      • Instruction Fuzzy Hash: 91E01A79504720EFC760DF69C888C47FBE8EF582203108B1EB499C3252D630E880CB90
      APIs
      • CallWindowProcA.USER32(?,?,00000202,?,?), ref: 1000798E
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow
      • String ID:
      • API String ID: 2714655100-0
      • Opcode ID: 0077ab38353094712698eb6dd30769997c8e5cb9205edea728dd21dabe57070d
      • Instruction ID: 2e45f834aee2e2b688859d921c8f99aa2f403f919a164ed404510ddb608d3ca7
      • Opcode Fuzzy Hash: 0077ab38353094712698eb6dd30769997c8e5cb9205edea728dd21dabe57070d
      • Instruction Fuzzy Hash: 8CE04F756047109FD714CB68C844D97B3E8FB88340B008A1EB08EC3655D774EC41C750
      APIs
      • CallWindowProcA.USER32(?,?,00000046,?,?), ref: 1002241D
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow
      • String ID:
      • API String ID: 2714655100-0
      • Opcode ID: e3bc2e746433023f95ead78f46c0119a23b9cb0d4e988137bf02804617c1a965
      • Instruction ID: 7a9d2a18568fca2f1777ed7b6681e46c759f9dce21c5a15a22889261b2edb605
      • Opcode Fuzzy Hash: e3bc2e746433023f95ead78f46c0119a23b9cb0d4e988137bf02804617c1a965
      • Instruction Fuzzy Hash: 41E092B6A00201ABD644DE98D885E52B3E9EBA8784B248058F64CCB255D236ED87DB91
      APIs
        • Part of subcall function 1001C450: GetPropA.USER32(?,1002C03C), ref: 1001C463
        • Part of subcall function 1001C450: RemovePropA.USER32(?,1002C460), ref: 1001C471
        • Part of subcall function 1001C450: SendMessageA.USER32(?,00006A30,00000000,00000000), ref: 1001C47F
        • Part of subcall function 1001C450: GetPropA.USER32(?,1002C03C), ref: 1001C48B
        • Part of subcall function 1001C450: IsWindowVisible.USER32(?), ref: 1001C4AF
        • Part of subcall function 1001C450: InvalidateRect.USER32(?,00000000,00000001,?,?,?,1001C40B,?), ref: 1001C4BD
        • Part of subcall function 1001C450: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237,?,?,?,1001C40B,?), ref: 1001C4CE
      • EnumChildWindows.USER32(?,1001C430,?), ref: 1001C419
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Prop$Window$ChildEnumInvalidateMessageRectRemoveSendVisibleWindows
      • String ID:
      • API String ID: 3749985120-0
      • Opcode ID: b9a06091cf27c0a1cdba5cc864607ad6be3b95ef9907f11268cd4fc7a1c9827e
      • Instruction ID: 9d20c7b3d0f7a05e384f27410cf9e7c35a197a4ef50129b58ecd41070bc00b86
      • Opcode Fuzzy Hash: b9a06091cf27c0a1cdba5cc864607ad6be3b95ef9907f11268cd4fc7a1c9827e
      • Instruction Fuzzy Hash: 1AC0127901913067E100D7089C50DDB725CEF55218F004411F94497200C334F99647E6
      APIs
      • ??2@YAPAXI@Z.MSVCRT ref: 10025D0F
        • Part of subcall function 10019250: 6F984BC0.MSVFW32 ref: 10019374
        • Part of subcall function 10019250: GetVersion.KERNEL32 ref: 10019392
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??2@F984Version
      • String ID:
      • API String ID: 910167631-0
      • Opcode ID: b42eda6355405cee72902d32ec50ce663df726c730aeb1b8a14187fe49f5916d
      • Instruction ID: 7e419e08a8c89389e48617f3b5b6180ff5c9c39a8ef321e5e2b9f2201d5a6f9d
      • Opcode Fuzzy Hash: b42eda6355405cee72902d32ec50ce663df726c730aeb1b8a14187fe49f5916d
      • Instruction Fuzzy Hash: 29E09A787001098FE728CB78ECD4E2637E1EBD8600B21853DE90AC3292FA31E862D604
      Memory Dump Source
      • Source File: 00000000.00000002.2271924208.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2271885601.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006C2000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006CF000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006FD000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000719000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.000000000071F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000721000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000725000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000729000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272345644.000000000072B000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272365555.000000000072D000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 21ce42e2a6a8e859888334f10a818579b3eb88427fb5d51f8b28a9f24d1691ff
      • Instruction ID: 01c0f0202f684e85914bce64c7b5eade3e0da4db066aaeac8dc6d161bcd00f86
      • Opcode Fuzzy Hash: 21ce42e2a6a8e859888334f10a818579b3eb88427fb5d51f8b28a9f24d1691ff
      • Instruction Fuzzy Hash: B7312B726052411BEB0C96396C91B7727A9DF19324718027FFA42EF7F6EA3C9C40C259
      Memory Dump Source
      • Source File: 00000000.00000002.2271924208.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2271885601.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006C2000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006CF000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006FD000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000719000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.000000000071F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000721000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000725000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000729000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272345644.000000000072B000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272365555.000000000072D000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 282781ad850d0f5377eb5ebd3c088aae73bef9e4d7193e358584d007400ca782
      • Instruction ID: 8431e423196a5e010cd1fdec70db2e1a2e418a78fcc832cbd3b53f8ccb62c907
      • Opcode Fuzzy Hash: 282781ad850d0f5377eb5ebd3c088aae73bef9e4d7193e358584d007400ca782
      • Instruction Fuzzy Hash: 4FF0F9762006115AEB1CA669AC91E7723ADFD5D365314013FEB03EE3E1E928DD01C265
      Memory Dump Source
      • Source File: 00000000.00000002.2271924208.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2271885601.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006C2000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006CF000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006FD000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000719000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.000000000071F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000721000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000725000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000729000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272345644.000000000072B000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272365555.000000000072D000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 605bc37fe4d4e6f457f4de498ddc64b0a3cf4119b823fe1be2ab728b009ddf3f
      • Instruction ID: 7d2fadf0b1d01d421f652e498d40ef672197189c333635745e405da412b580e2
      • Opcode Fuzzy Hash: 605bc37fe4d4e6f457f4de498ddc64b0a3cf4119b823fe1be2ab728b009ddf3f
      • Instruction Fuzzy Hash: 04F06D3294834CDACF265EB089006BE7E31AB22301F0840A3E1517A2D3C27F0930936F
      Memory Dump Source
      • Source File: 00000000.00000002.2271924208.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2271885601.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006A4000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006C2000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006CF000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.00000000006FD000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000719000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.000000000071F000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000721000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000725000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2271924208.0000000000729000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272345644.000000000072B000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2272365555.000000000072D000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f8bd35eae000479bd508d7d46edbf26164fdf6c6f8fb0ae214bac149c8971b8f
      • Instruction ID: 55cfb59443020752cc166607f12a2405de92669b3a53c4d2eba9cae4440f09ca
      • Opcode Fuzzy Hash: f8bd35eae000479bd508d7d46edbf26164fdf6c6f8fb0ae214bac149c8971b8f
      • Instruction Fuzzy Hash: DDD09E31919348DACB19DA604B040B97762A613311F1441B7A8967E2D2D53D4F36E71F
      APIs
      • GetWindowRect.USER32(?,?), ref: 10004E5F
        • Part of subcall function 10006940: CreateDIBSection.GDI32(00000000,?,00000000,00000000,00000000,00000000), ref: 10006998
      • CreateCompatibleDC.GDI32(00000000), ref: 10004FC9
      • SelectObject.GDI32(00000000,?), ref: 10004FDD
      • SetBkMode.GDI32(00000000,00000001), ref: 10004FE6
        • Part of subcall function 1000B4C0: 746D1530.MSIMG32(?,?,?,?,?,?,1000BFD7,1000BFD7,?,1000BFD7,?,00000000,?,?,1000BFD7,?), ref: 1000B538
        • Part of subcall function 100055A0: GetWindowRect.USER32(?,?), ref: 100055C2
        • Part of subcall function 100055A0: SetRect.USER32(?,00000000,00000000,?,?), ref: 100055E3
        • Part of subcall function 100055A0: GetWindowLongA.USER32(?,000000F0), ref: 100055EF
      • SelectObject.GDI32(00000000,?), ref: 10005076
      • SetTextColor.GDI32(00000000,?), ref: 1000507F
      • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 100050B7
      • GetWindowTextA.USER32(?,?,00000400), ref: 10005127
      • DrawTextA.USER32(00000000,?,?,?,00040024), ref: 10005150
      • IsRectEmpty.USER32(?), ref: 10005179
      • IsIconic.USER32(?), ref: 1000518B
      • IsRectEmpty.USER32(?), ref: 1000525E
      • IsZoomed.USER32(?), ref: 10005270
      • GetSystemMenu.USER32(?,00000000,0000F060,00000000), ref: 10005398
      • GetMenuState.USER32(00000000), ref: 1000539F
      • IsRectEmpty.USER32(?), ref: 1000543D
      • SetBkMode.GDI32(00000000,00000001), ref: 1000544A
      • SelectObject.GDI32(00000000,?), ref: 100054D5
      • DeleteDC.GDI32(00000000), ref: 100054DC
      • CreateCompatibleDC.GDI32(00000000), ref: 100054E4
      • SelectObject.GDI32(00000000,?), ref: 100054F5
      • DeleteObject.GDI32(00000000), ref: 10005557
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Object$SelectWindow$CreateEmptyText$CompatibleDeleteDrawMenuMode$ColorD1530IconIconicLongSectionStateSystemZoomed
      • String ID:
      • API String ID: 2183519620-0
      • Opcode ID: 9c7497e2cfce68d7d1ee3b711070bc8556336249f9ef28a1abf37c54f6cf735d
      • Instruction ID: cea4122b0922ce362506ef713f39b4431f8d55212c238b2335c3802d68202380
      • Opcode Fuzzy Hash: 9c7497e2cfce68d7d1ee3b711070bc8556336249f9ef28a1abf37c54f6cf735d
      • Instruction Fuzzy Hash: 92227B79240205AFF324CB64CC89FAB77A9FF84745F20491CF95A87295EA71B906CB60
      APIs
      • IsWindowVisible.USER32(?), ref: 10023094
      • IsRectEmpty.USER32(?), ref: 10023107
      • IsIconic.USER32(?), ref: 10023115
      • IsRectEmpty.USER32(?), ref: 100231E6
      • IsZoomed.USER32(?), ref: 100231F4
      • GetSystemMenu.USER32(?,00000000,0000F060,00000000), ref: 10023317
      • GetMenuState.USER32(00000000), ref: 1002331E
      • IsRectEmpty.USER32(?), ref: 100233BD
      • SetBkMode.GDI32(?,00000001), ref: 100233CA
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: EmptyRect$Menu$IconicModeStateSystemVisibleWindowZoomed
      • String ID:
      • API String ID: 549281773-0
      • Opcode ID: 0859ee2c90a4b87bb8b63a2d08eab5df806f4869aada2a1f22d7c7a97dd138e1
      • Instruction ID: d06e77375d5cb7ab1f1ac25b83a2b383d651d1881662a64e5f1b630b1572dc97
      • Opcode Fuzzy Hash: 0859ee2c90a4b87bb8b63a2d08eab5df806f4869aada2a1f22d7c7a97dd138e1
      • Instruction Fuzzy Hash: 1DD16CB9241B06AFE324CB64DCC4FAB73A9FF84744F60891CE55A87241E634FD468B60
      APIs
      • ??2@YAPAXI@Z.MSVCRT ref: 100039AB
      • ??2@YAPAXI@Z.MSVCRT ref: 100039BD
      • PtInRegion.GDI32(?,00000000,00000000,00000000,1002CDC8,?,?,?,?,?,?,100032B1,?,00000000,00000020,00000020), ref: 10003A4F
      • PtInRegion.GDI32(?,?,00000000,00000000,1002CDC8,?,?,?,?,?,?,100032B1,?,00000000,00000020,00000020), ref: 10003AB3
      • ??2@YAPAXI@Z.MSVCRT ref: 10003B14
      • ??2@YAPAXI@Z.MSVCRT ref: 10003C36
      • _ftol.MSVCRT ref: 10003D2F
      • OffsetRgn.GDI32(?,?,?), ref: 10004038
      • PtInRegion.GDI32(?,-00000001,?,?,?,00000000,1002CDC8,?,?,?,?,?,?,100032B1,?,00000000), ref: 100041D4
      • ??3@YAXPAX@Z.MSVCRT ref: 1000428E
      • ??3@YAXPAX@Z.MSVCRT ref: 10004298
      • ??3@YAXPAX@Z.MSVCRT ref: 100042A2
      • ??3@YAXPAX@Z.MSVCRT ref: 100042AC
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??2@??3@$Region$Offset_ftol
      • String ID:
      • API String ID: 2490806229-0
      • Opcode ID: 3332ea473a6ccd60d99c3072682dfdc1543af2f0e043ce5f93a789c708154b13
      • Instruction ID: 98ed0c605d52677ada83a984198e756a1aca9b3409a824ef284006b387393d3d
      • Opcode Fuzzy Hash: 3332ea473a6ccd60d99c3072682dfdc1543af2f0e043ce5f93a789c708154b13
      • Instruction Fuzzy Hash: F3626975A086468FD709CF19C88051AB7E6FFC8384F15C92DE899DB359EB30E946CB81
      APIs
      • KillTimer.USER32 ref: 1002198A
      • GetMenuItemID.USER32(?,?), ref: 100219E3
      • SendMessageA.USER32(?,00000111,00000000), ref: 100219F3
      • CallWindowProcA.USER32(?,?,000000A2,?,?), ref: 10021A38
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallItemKillMenuMessageProcSendTimerWindow
      • String ID:
      • API String ID: 2515994771-0
      • Opcode ID: 3b3b23c477d770ed4f7aa771234f3d45869d44fa6d65c12bb79bc5aa267ef81e
      • Instruction ID: 89b724dc2ca4cdc55add286efa33b9077fff919ea1f62498a6f78f4254ff7468
      • Opcode Fuzzy Hash: 3b3b23c477d770ed4f7aa771234f3d45869d44fa6d65c12bb79bc5aa267ef81e
      • Instruction Fuzzy Hash: 64518179304702AFE354DB64D895FEBB3E9FB98740F50891DF696C6190CB70A886CB50
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 10009350
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000936C
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 9ead5d21b62799828bb9cc85ce7bf4125b4fa391575515c34ce0a3c6fe3e6a79
      • Instruction ID: 66a860390867b69e52e3412568fee3c891a1f5c98dd500308f81789add6bf3bd
      • Opcode Fuzzy Hash: 9ead5d21b62799828bb9cc85ce7bf4125b4fa391575515c34ce0a3c6fe3e6a79
      • Instruction Fuzzy Hash: E941907A205600ABE200DB58DC84DABB3E8FBC4751F50491DF98683251C774ED0ACBB2
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000C400
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000C41C
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: d5b8f05a9e68d77798507910b0dc128c9ddebfdd8b18848f9afa2fd6e5e951aa
      • Instruction ID: e4712fcc12151d2cebdf1b72559aff8232ef5eb8468fa4595113e4497e6478ba
      • Opcode Fuzzy Hash: d5b8f05a9e68d77798507910b0dc128c9ddebfdd8b18848f9afa2fd6e5e951aa
      • Instruction Fuzzy Hash: 7F419F7A205704ABE250EB58DC88D6BB7E8FBC8751F50491DF94283252C774ED0A8BB2
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ObjectSelect
      • String ID: d
      • API String ID: 1517587568-2564639436
      • Opcode ID: e8fe37feeedc5176edb72908326fcab56499c37ee1606bf214a7b0158950a6d1
      • Instruction ID: 4b82767d9c842e9e08e3940738fc6923ca1a8521680a6cc2111a8d75eee5b889
      • Opcode Fuzzy Hash: e8fe37feeedc5176edb72908326fcab56499c37ee1606bf214a7b0158950a6d1
      • Instruction Fuzzy Hash: 4A32E571A047128FD319CF14D8907AAB3E5FFC8340F558A7DE8969B291D734EA89CB42
      APIs
      • GetCursorPos.USER32(?), ref: 10005959
      • GetWindowRect.USER32(?,?), ref: 1000596C
      • PtInRect.USER32(?,?,?), ref: 1000599D
      • PtInRect.USER32(?,?,?), ref: 100059B4
      • PtInRect.USER32(?,?,?), ref: 100059CB
      • PtInRect.USER32(?,?,?), ref: 100059E2
      • KillTimer.USER32(?,00006625,?,?,?,?,?,?,?,10004CEB,?,?,00000000,?,?), ref: 100059F2
        • Part of subcall function 10004E30: GetWindowRect.USER32(?,?), ref: 10004E5F
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?,?,?,?,?,10004CEB,?,?,00000000,?,?), ref: 10005A27
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Window$CursorKillNtdllProc_Timer
      • String ID:
      • API String ID: 1632373092-0
      • Opcode ID: b8796e62a7e9f8a1269d68023e98339359b7a28a012fa2bbc78eefee34ee6aa6
      • Instruction ID: 9a3ddf00fd3851daef2864d54b78be332d389b06acf702b9600ba59b9845d60c
      • Opcode Fuzzy Hash: b8796e62a7e9f8a1269d68023e98339359b7a28a012fa2bbc78eefee34ee6aa6
      • Instruction Fuzzy Hash: 51212CB6614302AFE314DB64CC88C6BB7E9FFC8794F008A1DF49AD3214D631E9058B62
      APIs
      • GetSystemMenu.USER32(?,00000000,0000F060,00000000), ref: 100060BF
      • GetMenuState.USER32(00000000), ref: 100060C6
      • SendMessageA.USER32(?,00000112,0000F180,?), ref: 100060F9
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10006113
      • IsIconic.USER32(?), ref: 10006140
      • IsZoomed.USER32(?), ref: 10006175
      • GetWindowRect.USER32(?,?), ref: 100061D5
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MenuWindow$IconicMessageNtdllProc_RectSendStateSystemZoomed
      • String ID:
      • API String ID: 2402596737-0
      • Opcode ID: b69b15834c892beeed1b480f94f00d19f9b29f457a9198a69cb5ccd5db3eb9f8
      • Instruction ID: 78fae97c3b3d758016bdd88b3edc2bbb39c56561e34d261a66fd0e63483e71a1
      • Opcode Fuzzy Hash: b69b15834c892beeed1b480f94f00d19f9b29f457a9198a69cb5ccd5db3eb9f8
      • Instruction Fuzzy Hash: C131A275244702ABF330DBA4CC99FBB73EEEB88780F204A2CB55682595DA35E944C720
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 100098BE
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 100098DA
      • KillTimer.USER32(?,?,00000000), ref: 10009914
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: KillNtdllProc_PropTimerWindow
      • String ID:
      • API String ID: 3733616403-0
      • Opcode ID: 3c55ececde0a7ee3e163387940c24b6939577072ee2d8cbbac78a905ef7d04e5
      • Instruction ID: adc7337034f0b9ec4e7ed3ed95778db363d18d8614baef39ea8ea303d17308f6
      • Opcode Fuzzy Hash: 3c55ececde0a7ee3e163387940c24b6939577072ee2d8cbbac78a905ef7d04e5
      • Instruction Fuzzy Hash: EF21F336305215ABE210DA54ECC4E7F77ACEBC5BE1F10451EF68293241C726AC069761
      APIs
      • GetModuleHandleA.KERNEL32(00000000,?,?,10025E63,?,?,?,?,?,?), ref: 1001B8F4
      • FindResourceA.KERNEL32(00000000,?,?), ref: 1001B913
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: FindHandleModuleResource
      • String ID:
      • API String ID: 3537982541-0
      • Opcode ID: 20047523e8b2d551bcd9e8a145dcbb2bf7234696f2abbd8170a661a441ae52bd
      • Instruction ID: 5268aa00fc51c7ef6193ce43b0a0328cd4925fc10cfa97f1260c64665a9d4d10
      • Opcode Fuzzy Hash: 20047523e8b2d551bcd9e8a145dcbb2bf7234696f2abbd8170a661a441ae52bd
      • Instruction Fuzzy Hash: 0501DF7A2056206BE3119728EC88D6F77ECEFC9211F114119FA44C7200DB34CE4387B1
      APIs
      • BitBlt.GDI32(?,00000000,?,?,?,?,?,?,00CC0020), ref: 1000BB67
      • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000BE29
      • BitBlt.GDI32(?,?,?,00000020,?,?,?,?,00CC0020), ref: 1000BEF2
      • OffsetRect.USER32(?,1000329E,000000FF), ref: 1000BFA9
      • BitBlt.GDI32(?,?,?,00000020,?,?,?,?,00CC0020), ref: 1000BC0B
        • Part of subcall function 1000B4C0: 746D1530.MSIMG32(?,?,?,?,?,?,1000BFD7,1000BFD7,?,1000BFD7,?,00000000,?,?,1000BFD7,?), ref: 1000B538
        • Part of subcall function 1000B4C0: CreateCompatibleDC.GDI32(?), ref: 1000B548
        • Part of subcall function 1000B4C0: CreateCompatibleBitmap.GDI32(?,?,?), ref: 1000B553
        • Part of subcall function 1000B4C0: SelectObject.GDI32(00000000,00000000), ref: 1000B55F
        • Part of subcall function 1000B4C0: 746D1530.MSIMG32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?), ref: 1000B5BA
        • Part of subcall function 1000B4C0: DeleteObject.GDI32(?), ref: 1000B5C5
        • Part of subcall function 1000B4C0: DeleteDC.GDI32(00000000), ref: 1000B5CC
        • Part of subcall function 1000B5F0: BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B646
        • Part of subcall function 1000B120: BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B1A0
        • Part of subcall function 1000B120: BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B216
        • Part of subcall function 1000B120: BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B273
        • Part of subcall function 1000B120: BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B2C9
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CompatibleCreateD1530DeleteObject$BitmapOffsetRectSelect
      • String ID:
      • API String ID: 2188787078-0
      • Opcode ID: cac2739ba0984c5b844557e8b4f5d791b105f7fe2c822b0771468b378f7f900f
      • Instruction ID: b631010fc7c61f0dbc485572ac6f53e1cb0354f72aed0dfdbd8fa92e86ef0b76
      • Opcode Fuzzy Hash: cac2739ba0984c5b844557e8b4f5d791b105f7fe2c822b0771468b378f7f900f
      • Instruction Fuzzy Hash: F872B6B5700901AFD358CE6ECE95D27F7EAEFC8610314CA1CA55EC3A5CEA30F8558A64
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001D8EC
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001D908
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: e4a0d490164f6d9069ce7e86964c5195bdc24712ecee0d29021a28e2da7046a5
      • Instruction ID: 3dd76a049db869770da15870645d9af25493a0817101984a39104c73db85ad87
      • Opcode Fuzzy Hash: e4a0d490164f6d9069ce7e86964c5195bdc24712ecee0d29021a28e2da7046a5
      • Instruction Fuzzy Hash: D741447A7082119BD640FE58E880E6F77A9EBD4750F108C1BF5818B256C270DCC697B2
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000831C
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10008338
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 76ff8970db67151db0b6f6ec3473056875dcff3a0f31a7fb73f1cb6230d5cb84
      • Instruction ID: d5cf22ff5653e0c4365a76e3bc0a6f530f10b9ff97d098438d5549bdcf248cbb
      • Opcode Fuzzy Hash: 76ff8970db67151db0b6f6ec3473056875dcff3a0f31a7fb73f1cb6230d5cb84
      • Instruction Fuzzy Hash: 0E216476308612ABE204DB18EC84EAF77A9EBD8760F104919F181D7295C770ED9687B1
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001FD66
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001FD7E
      • FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1001FDBE
      • GetPropA.USER32(00000000,1002C03C), ref: 1001FDD0
      • GetWindowRect.USER32(00000000,?), ref: 1001FDED
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$Prop$FindNtdllProc_Rect
      • String ID:
      • API String ID: 1621342347-0
      • Opcode ID: e209e126209f789dd80fe51a7b19f8c596f70caf1b5d236961e23ecb73bb45dc
      • Instruction ID: 6b8d0221fe97fab34533167ca4c9a37e3e90209f2d168c5ada330748bbe964d0
      • Opcode Fuzzy Hash: e209e126209f789dd80fe51a7b19f8c596f70caf1b5d236961e23ecb73bb45dc
      • Instruction Fuzzy Hash: F83187356042009FD304DF18C888E7BB3E9FBD8654F55895DF9459B352C730EE468B66
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000871D
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10008739
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 826a2f52f7e6cf888468cf574442a5b1d842237e04ebc0d74020836fc4713a4a
      • Instruction ID: 4fac22d2b0eaef5fff40d3138b4cbdac12c866ca4beaf184c634f33bf18d14c9
      • Opcode Fuzzy Hash: 826a2f52f7e6cf888468cf574442a5b1d842237e04ebc0d74020836fc4713a4a
      • Instruction Fuzzy Hash: 055164763041119BE204DA48D8D4DBFB3AEEBD4392F14842BF68187296CB71EC5697B2
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001FEAD
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001FEC9
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 5716e03bdd05c131fa1711044e4bacf8af709cbf5cb97f13cea4ef0443b835b5
      • Instruction ID: 62426f1cfc6e2e8613ee12b2a616a1d9dd04dd25ff66616f45cf830b1ca35ad5
      • Opcode Fuzzy Hash: 5716e03bdd05c131fa1711044e4bacf8af709cbf5cb97f13cea4ef0443b835b5
      • Instruction Fuzzy Hash: 6341A6B77042115BE100DA58E8C4EBFB39ADBD83A1F50842FF68587252C770DC9697B5
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001163C
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10011658
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 526c9ef3a2a92265fd59938002838eeed9a0dafe04fa7b4cf744bce3a05f278e
      • Instruction ID: e71c5dea82c0fa7fedd5e34c1b30a37f09bcbf9f8200f5aed356c99c4536bfaa
      • Opcode Fuzzy Hash: 526c9ef3a2a92265fd59938002838eeed9a0dafe04fa7b4cf744bce3a05f278e
      • Instruction Fuzzy Hash: DB41767A7082119BD248DA08E894DAF73E9DBD8750F10491DF142CB396C770EC8A87B2
      APIs
      • GetPropA.USER32(?,1002C058), ref: 10008D4C
      • RemovePropA.USER32(?,1002C058), ref: 10008D5E
      • CallWindowProcA.USER32(00000000,?,?,?,?), ref: 10008D88
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10008DD0
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: PropWindow$CallNtdllProcProc_Remove
      • String ID:
      • API String ID: 167436498-0
      • Opcode ID: ae9651af754efeaf910986bedca81cdbe93bc3ee3aa19282c3980d9b3a87c30d
      • Instruction ID: 7f1ce935ea723094267178f469a7703aac22c69bbb9d6f32e347a6d7df6c448d
      • Opcode Fuzzy Hash: ae9651af754efeaf910986bedca81cdbe93bc3ee3aa19282c3980d9b3a87c30d
      • Instruction Fuzzy Hash: 6D11697A105511ABA241DB18DC84CBF7BADEFD5790F10491DF58183296C720AD4AC7F6
      APIs
      • SendMessageA.USER32(?,000000A3,00000000,?), ref: 10006251
      • IsZoomed.USER32(?), ref: 10006263
      • SendMessageA.USER32(?,00000112,0000F120,?), ref: 1000628C
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000629E
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSend$NtdllProc_WindowZoomed
      • String ID:
      • API String ID: 3817661499-0
      • Opcode ID: 59ecf38404d98d9ec851b4ba962d59f829691b14b21d3cf372e0dd2180b405dc
      • Instruction ID: eeee65897a81c753e1d90b7653fb0aee454dfca9b9f4ca2aae893ff5cca018b4
      • Opcode Fuzzy Hash: 59ecf38404d98d9ec851b4ba962d59f829691b14b21d3cf372e0dd2180b405dc
      • Instruction Fuzzy Hash: 0CF03C75305B02AFE264CB95DC85EABB3ADEBCCB40F20890CF68557195C670E8458724
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000F75C
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000F778
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: d06918abb0d3f2a99f0b8790ebeffd6e64b80bf03755ea9d7ece643dea9d183d
      • Instruction ID: 2528abf51e870a12b61f462225b441024f09dc823bf7e01d6d69a58c881fcfe4
      • Opcode Fuzzy Hash: d06918abb0d3f2a99f0b8790ebeffd6e64b80bf03755ea9d7ece643dea9d183d
      • Instruction Fuzzy Hash: A74177B63086119FE248DE08E865D7F73AADBD4750F10891DF14287296CB30AC8A97B6
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001479C
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 100147B8
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: aabdaddb52ba19fe15e07398bace0ccf46ff83178fe0b4999134df6da741ce6e
      • Instruction ID: 5cef6116b7980ede2fc3cff8751f03a03dbdccd6a3174d1e1b5d14adc9a2bdd3
      • Opcode Fuzzy Hash: aabdaddb52ba19fe15e07398bace0ccf46ff83178fe0b4999134df6da741ce6e
      • Instruction Fuzzy Hash: 134153B67086119BD244DA18E8A5D7F73A9EBD4750F01481DF1428B3A6CF70EC8687B6
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000FD5B
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000FD77
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 44a9cc59f4e6ab64c4beb2c156f6846ce86c779df6cdf7289ec6719d91925d85
      • Instruction ID: 4488ee033ce5568a6e9b86f628f37d529af62b25991ac58fd4dce584937037cd
      • Opcode Fuzzy Hash: 44a9cc59f4e6ab64c4beb2c156f6846ce86c779df6cdf7289ec6719d91925d85
      • Instruction Fuzzy Hash: D9414AB63082459BE240DE54D980D7F73E9EBC4790F118C0EF5818765AC770EC8697B6
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001C80C
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001C828
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: f8d477e5692cdd5ca17986cf2d97dfdfc446317701b126a3d5f38e338d641d94
      • Instruction ID: 1e50225a5a76dfa976e6c4c56d3e30440892ed78c8c68004a9b13c076068a0f2
      • Opcode Fuzzy Hash: f8d477e5692cdd5ca17986cf2d97dfdfc446317701b126a3d5f38e338d641d94
      • Instruction Fuzzy Hash: A13155BB7083159BD240DE58E884D6F73A9EBD4760F108C1AF5819B256C770ECCA97B2
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001E7FC
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001E818
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 2bb6b4c9f7c8451d55efabac318bb80ec691770c947b02e026458401ab56470f
      • Instruction ID: 8b1d6d09460b07866bb12f6193a6cd946900c67d8b00bd84724c958df11b5175
      • Opcode Fuzzy Hash: 2bb6b4c9f7c8451d55efabac318bb80ec691770c947b02e026458401ab56470f
      • Instruction Fuzzy Hash: 063152BA6082519BD240DE58E880DAFB7E9EBD8751F108C19F281C7252C730ECCAD7B1
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000D33D
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000D359
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 7c525df14ed70a4f11c4a69d41a52e97dcc25fc77dcc8a51e8dfaffd4d0c7820
      • Instruction ID: 3cad35e25735ce33caab85577b29180f6f89a3b7f1056cd299d0b253d523294e
      • Opcode Fuzzy Hash: 7c525df14ed70a4f11c4a69d41a52e97dcc25fc77dcc8a51e8dfaffd4d0c7820
      • Instruction Fuzzy Hash: 9C21B5B7700111ABE200EA58D8D8DAFF7ADEBD42A1F10852BF54187286C770DC46D7B2
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 10013DAC
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10013DC8
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 8ce96701103211df28a60adab9aab3bd328910b0f052636790040f0ca7b46eaf
      • Instruction ID: 4bf817b2858c0e7a759d776878d335dbdc853776b506ffad1926632038d3614c
      • Opcode Fuzzy Hash: 8ce96701103211df28a60adab9aab3bd328910b0f052636790040f0ca7b46eaf
      • Instruction Fuzzy Hash: 992133BB704211ABD240DA58E884D6F77E9DBD4760F11C919F541CB296C270DCCA97B1
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 10012ADB
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10012AF7
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: f859cb2866e1b746edcdcea0132dc8f0da540a57dcf5b24eda86e99f76fe94e6
      • Instruction ID: d284b80dbbabb1398f9d2070992cac2ce438575b69408aea9e9a94da9e131599
      • Opcode Fuzzy Hash: f859cb2866e1b746edcdcea0132dc8f0da540a57dcf5b24eda86e99f76fe94e6
      • Instruction Fuzzy Hash: 5E111FFA208212AFD244DF58E984DAB73E9EBC8750F108D09F5819B245C734EC96C7B6
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 10012BFC
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10012C18
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: 185552ad6ea6ac270079b2802cbaebd668f86dd486cc4b8468dc4ddae3fa65e1
      • Instruction ID: 2331f883b3d6d46fcb743b651009c8baabaccb07b2ddfb5f76acc19c2e81c812
      • Opcode Fuzzy Hash: 185552ad6ea6ac270079b2802cbaebd668f86dd486cc4b8468dc4ddae3fa65e1
      • Instruction Fuzzy Hash: 231154BA2082129BD204DF59E880DAFB7A9EBD4721F118C1AF641C7211C770EC96C7B1
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001D33B
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001D357
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 1001D386
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$CallNtdllProcProc_Prop
      • String ID:
      • API String ID: 1641805499-0
      • Opcode ID: 46341e93d8e58ef3595aaf0da966454599506139a11b45700178d658ee10fc8e
      • Instruction ID: 45f5a508404fa7b349f84285f489640ca45463347baf7dd885cba52e9e31337c
      • Opcode Fuzzy Hash: 46341e93d8e58ef3595aaf0da966454599506139a11b45700178d658ee10fc8e
      • Instruction Fuzzy Hash: 83017576205211AFD641EE68D894D9B77E9EBC8700F10CD0AF5819B209C370ED86C7B2
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000635B
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10006377
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 100063A3
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$CallNtdllProcProc_Prop
      • String ID:
      • API String ID: 1641805499-0
      • Opcode ID: b2e07a47a1426d67f7f142ce626aa22bb2d9af6c5e67b1305e8dc8a19f5800c8
      • Instruction ID: b12fdf80a4ee98a0669d910f96ba9de27c494e6b3a9d2ac390c97d8e35b7d40b
      • Opcode Fuzzy Hash: b2e07a47a1426d67f7f142ce626aa22bb2d9af6c5e67b1305e8dc8a19f5800c8
      • Instruction Fuzzy Hash: 2A010CB6205212AFE604DE54D844CAB77E9EBC8750F10890DF58597245C730ED4687B6
      APIs
      • IsWindowEnabled.USER32(?), ref: 100062CA
      • SendMessageA.USER32(?,00000313,00000000,?), ref: 100062E0
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 100062F6
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$EnabledMessageNtdllProc_Send
      • String ID:
      • API String ID: 2494340020-0
      • Opcode ID: 29ef5c36759909998ca288fb9ceec95f70c955037747a1ce61ac65453ab41c58
      • Instruction ID: b518878becbef3456e94c07293a0586dd5aa6203277d98abda6802a90051a15b
      • Opcode Fuzzy Hash: 29ef5c36759909998ca288fb9ceec95f70c955037747a1ce61ac65453ab41c58
      • Instruction Fuzzy Hash: 4FF0F879204712ABE250CF65DD48E97B7FDEBD8740F20480CB58193260C770E949CB65
      APIs
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 100170FF
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 1001710F
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 1001711C
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 10017129
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 10017139
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 10017149
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 100171FB
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 1001720B
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 10017218
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 10017225
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 10017235
        • Part of subcall function 10017090: ??2@YAPAXI@Z.MSVCRT ref: 10017245
        • Part of subcall function 1001A700: GetModuleHandleA.KERNEL32(1002C484,1002C48C,00000000,?,?,1001928B), ref: 1001A715
        • Part of subcall function 1001A700: GetProcAddress.KERNEL32(00000000), ref: 1001A71E
        • Part of subcall function 1001A700: GetModuleHandleA.KERNEL32(1002C484,1002C468,?,?,1001928B), ref: 1001A72C
        • Part of subcall function 1001A700: GetProcAddress.KERNEL32(00000000), ref: 1001A72F
      • 6F984BC0.MSVFW32 ref: 10019374
      • GetVersion.KERNEL32 ref: 10019392
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??2@$AddressHandleModuleProc$F984Version
      • String ID:
      • API String ID: 3450480690-0
      • Opcode ID: 75fbd79844d9eb319f2b12770aaf3b233e693f84d3838c57fe8f29243c82a089
      • Instruction ID: 5b54c09bc1dd4f1213f150441d2aaf7ae1adbd29d96e13561a9b09d10e717ef9
      • Opcode Fuzzy Hash: 75fbd79844d9eb319f2b12770aaf3b233e693f84d3838c57fe8f29243c82a089
      • Instruction Fuzzy Hash: A351F8F4801B059FC325CF2AC58169AFBE8FFA4310F10892FE2AA87251DBB46644CF55
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 10008CBB
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10008CD7
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: feaf19fdce81d9a1ca190ef1869b546541239fbc762c3de87076e7c699cb6eff
      • Instruction ID: ba7b9a7e75b5fd1a47e67aed631709819a18bd4e2cca9f68860d5bab8b638427
      • Opcode Fuzzy Hash: feaf19fdce81d9a1ca190ef1869b546541239fbc762c3de87076e7c699cb6eff
      • Instruction Fuzzy Hash: CA01FFB6209212AFE640DB54E880DAF73E9EFD4740F118D0DF58197255C770ED868BB6
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000CBCB
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000CBE7
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_PropWindow
      • String ID:
      • API String ID: 2172124074-0
      • Opcode ID: a25ab68950917d6236ee748f622a9537c84212b176b5efc6b59e8fcbf1fbc87d
      • Instruction ID: 539b395f2d12ac3cc3f2cd791ecb8ee3aacd8a81aa599b83fb95c9963a22f77c
      • Opcode Fuzzy Hash: a25ab68950917d6236ee748f622a9537c84212b176b5efc6b59e8fcbf1fbc87d
      • Instruction Fuzzy Hash: A0F04F76108655ABE200DB48E890DAF73E8EBC5740F11CC0DF485D7216C770EC8687B2
      APIs
      • EnableWindow.USER32(?,00000001), ref: 10005913
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?,00000001), ref: 10005929
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$EnableNtdllProc_
      • String ID:
      • API String ID: 2905733468-0
      • Opcode ID: 719e8c1450cfd200e18918fc11f0fd4e99bbf67ebc8cbd57fa14c97069a83939
      • Instruction ID: 0cf3b8049646225b0fa173834b48b0a82b0c75d0bbbbcebd8970548d311ac697
      • Opcode Fuzzy Hash: 719e8c1450cfd200e18918fc11f0fd4e99bbf67ebc8cbd57fa14c97069a83939
      • Instruction Fuzzy Hash: 54D0C9B8116621EFE205DF00EC88DAB77ADEFC8700F104408F84142251C760AD4A8BB6
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10004D01
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: 31a8e49bf0f8921b0a2aa4cc36cf9ef07e022d74f52cb5b04577164ebb7e90d0
      • Instruction ID: 0b222c3024169f657697f4807f45d8ba6cc9b1c5df0fdb5bc05cb1375a895788
      • Opcode Fuzzy Hash: 31a8e49bf0f8921b0a2aa4cc36cf9ef07e022d74f52cb5b04577164ebb7e90d0
      • Instruction Fuzzy Hash: 4431A9FA618241AFD248DF58D891C2BB3E9EBD8700F54890CB69587256D731EC19CB72
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10004929
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: 85290e7a88c611dc07aaac6370783e7bcb03fd41bf1290a2f333ba97cf3b24a8
      • Instruction ID: 225bf36e4a0812ad4753787a01e5a8dd77c9d750d7cfa771ec93f23d9b1118eb
      • Opcode Fuzzy Hash: 85290e7a88c611dc07aaac6370783e7bcb03fd41bf1290a2f333ba97cf3b24a8
      • Instruction Fuzzy Hash: CCF0B6F9618242AFE204DB54D890D2BB3E9EBC8780F118D1DB685C3265DA30ED04CB36
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10004559
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: 85290e7a88c611dc07aaac6370783e7bcb03fd41bf1290a2f333ba97cf3b24a8
      • Instruction ID: 426c8d43d59635654131c640abf00cd082b32ef771906314d33d0ca2d6834fbf
      • Opcode Fuzzy Hash: 85290e7a88c611dc07aaac6370783e7bcb03fd41bf1290a2f333ba97cf3b24a8
      • Instruction Fuzzy Hash: B2F0B6F9618642AFE204DA54D881D2BB3E9EBC8780F518D0DB68583256DA30EC44CB36
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10002E89
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: eafbc55fe3c2f1772681b34cb3290cd541762abe2b2c9e9570eb85c6031177f9
      • Instruction ID: 6bebc549723526bab81e68595eedc138839718632c5911c4ede022b626121a3a
      • Opcode Fuzzy Hash: eafbc55fe3c2f1772681b34cb3290cd541762abe2b2c9e9570eb85c6031177f9
      • Instruction Fuzzy Hash: E8F0B6B9608242AFE604DA54D885D2BB3E9EBC8780F108D0DB685C3266D730EC44CB32
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?), ref: 1002139A
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: fa6927fc20b934934ada2a6b1f6172b590dcb0593d51e0bebfceb64f8b964d96
      • Instruction ID: 41b4c4c1d07db306ce10cd67641d760d70f174c67aebd5bad7bb4afc3ef3a17f
      • Opcode Fuzzy Hash: fa6927fc20b934934ada2a6b1f6172b590dcb0593d51e0bebfceb64f8b964d96
      • Instruction Fuzzy Hash: 34D012BA305149DFE205CF44D884CBFF7ACEBC9212F14865EF98182201C731A816DB71
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?), ref: 10020B95
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction ID: 0172efcda497a3b399d39dc5bf1ed2c498a6097f1a7d51f7ae41435c564a9107
      • Opcode Fuzzy Hash: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction Fuzzy Hash: 56C04CB601A450AEB74197549C9ADFB776CDA95310710C94DF0D145146D27069028BA9
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?), ref: 1000E465
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction ID: 0172efcda497a3b399d39dc5bf1ed2c498a6097f1a7d51f7ae41435c564a9107
      • Opcode Fuzzy Hash: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction Fuzzy Hash: 56C04CB601A450AEB74197549C9ADFB776CDA95310710C94DF0D145146D27069028BA9
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?), ref: 100214D5
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction ID: 0172efcda497a3b399d39dc5bf1ed2c498a6097f1a7d51f7ae41435c564a9107
      • Opcode Fuzzy Hash: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction Fuzzy Hash: 56C04CB601A450AEB74197549C9ADFB776CDA95310710C94DF0D145146D27069028BA9
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?), ref: 10006585
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction ID: 0172efcda497a3b399d39dc5bf1ed2c498a6097f1a7d51f7ae41435c564a9107
      • Opcode Fuzzy Hash: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction Fuzzy Hash: 56C04CB601A450AEB74197549C9ADFB776CDA95310710C94DF0D145146D27069028BA9
      APIs
      • NtdllDefWindowProc_A.NTDLL(?,?,?), ref: 10014EC5
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: NtdllProc_Window
      • String ID:
      • API String ID: 4255912815-0
      • Opcode ID: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction ID: 0172efcda497a3b399d39dc5bf1ed2c498a6097f1a7d51f7ae41435c564a9107
      • Opcode Fuzzy Hash: d24292a72336a05c80f9219229973683b75a3868fbc599214ce99b792ef951cd
      • Instruction Fuzzy Hash: 56C04CB601A450AEB74197549C9ADFB776CDA95310710C94DF0D145146D27069028BA9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: R
      • API String ID: 0-1466425173
      • Opcode ID: cd3b73b7348ff081589cfac0100b05dc96f159948ea6ee02f68d477cfa1a48d5
      • Instruction ID: 8be94b6153ab9119319510401fc8330cfa8a6dc569db2486da79333d3fcb569b
      • Opcode Fuzzy Hash: cd3b73b7348ff081589cfac0100b05dc96f159948ea6ee02f68d477cfa1a48d5
      • Instruction Fuzzy Hash: E1519E5804D7C11FC3278B3888659A7BF216F57528B0F8AEBD4D08F963C249994AD7A2
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a339960ffb5a704b000e7367763248f18282941ed323104f3f76a1d61ee49cb0
      • Instruction ID: 983c4fcd37887a59a0cb9d3b85b446299f8e70ed709c6495451e70af00230a31
      • Opcode Fuzzy Hash: a339960ffb5a704b000e7367763248f18282941ed323104f3f76a1d61ee49cb0
      • Instruction Fuzzy Hash: 1142A2377406154BEB0CCD5EC8B16BDB3D3ABC835474D463D9A5BD3782EDB8A80A8684
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 07396eee454c85584817cf15b8c0d006d29891ab31e0bab80244d1fd90dbd4d6
      • Instruction ID: 93596e6502c76a15187eaa282ea5bd3d0e08f7ebc6713d694ddc07016d6b6326
      • Opcode Fuzzy Hash: 07396eee454c85584817cf15b8c0d006d29891ab31e0bab80244d1fd90dbd4d6
      • Instruction Fuzzy Hash: 19124A32B086154FE71CCE28C49426EB7E2EBC8394F16463EE95AD7748DA30D945CBC1
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a01781256ee79fcf471860e977b16b7ce8c920ade3d6f3453a41c6b7b0ce33b4
      • Instruction ID: 428467e42f7f86c7821e8e1e21e6f22a2fc9309eb635c514b15cab7e2e214c89
      • Opcode Fuzzy Hash: a01781256ee79fcf471860e977b16b7ce8c920ade3d6f3453a41c6b7b0ce33b4
      • Instruction Fuzzy Hash: 3C61C82914D3C15FC7874B7444661A27FB1AE1B22870E85DAC9C18F173D299AC4FEFA1
      APIs
        • Part of subcall function 1001A9C0: _mbscmp.MSVCRT ref: 1001A9D3
      • _mbscmp.MSVCRT ref: 1001A065
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: _mbscmp
      • String ID:
      • API String ID: 2888065108-0
      • Opcode ID: 2db2da2f1ae1e61f1de84b9da0cee3094acc3992bba78dd0357555a99ed89133
      • Instruction ID: 3c9746c1fec8770da351958914ea95a60552062d740270c3ce570340641db563
      • Opcode Fuzzy Hash: 2db2da2f1ae1e61f1de84b9da0cee3094acc3992bba78dd0357555a99ed89133
      • Instruction Fuzzy Hash: A6B1902739152923D101F2E5BCC1EEE634CDFE22A7F118032F705ED081DA36EA9682B5
      APIs
      • SendMessageA.USER32(?), ref: 10014BF2
      • CallWindowProcA.USER32(?,?,00000001,?,?), ref: 10014C13
      • CallWindowProcA.USER32(?,?,00000001,00000000,?), ref: 10014C38
      • IsWindowVisible.USER32(?), ref: 10014C42
      • InvalidateRect.USER32(?,00000000,00000001), ref: 10014C54
      • GetWindowRect.USER32(?,000000F0), ref: 10014C87
      • GetParent.USER32(?), ref: 10014C9D
      • ScreenToClient.USER32(00000000), ref: 10014CA6
      • GetParent.USER32(?), ref: 10014CB1
      • ScreenToClient.USER32(00000000), ref: 10014CB4
      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 10014CE7
      • GetWindowRect.USER32(?,000000F0), ref: 10014CF6
      • GetParent.USER32(?), ref: 10014D1C
      • ScreenToClient.USER32(00000000), ref: 10014D25
      • GetParent.USER32(?), ref: 10014D30
      • ScreenToClient.USER32(00000000), ref: 10014D33
      • GetWindowRect.USER32(?,000000F0), ref: 10014D72
      • GetParent.USER32(?), ref: 10014D88
      • ScreenToClient.USER32(00000000), ref: 10014D91
      • GetParent.USER32(?), ref: 10014D9C
      • ScreenToClient.USER32(00000000), ref: 10014D9F
      • GetParent.USER32(?), ref: 10014DE5
      • ScreenToClient.USER32(00000000), ref: 10014DEE
      • GetParent.USER32(?), ref: 10014DF9
      • ScreenToClient.USER32(00000000), ref: 10014DFC
      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 10014E2F
      • GetWindowRect.USER32(?,000000F0), ref: 10014E3E
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$ClientParentScreen$Rect$CallMoveProc$InvalidateMessageSendVisible
      • String ID:
      • API String ID: 1330197011-0
      • Opcode ID: 27cd31995633851774bee205df8a30004b9258d202a727f50e8ef6ab539021a8
      • Instruction ID: c47097b4e2208499dd9ef6fa9ca82aafd1a7c7d366bf9be39b5b8423eecfa7f7
      • Opcode Fuzzy Hash: 27cd31995633851774bee205df8a30004b9258d202a727f50e8ef6ab539021a8
      • Instruction Fuzzy Hash: 67A139B52047069FE314CF65C884F6BB7E9EBC8704F11891CF599972A0DA74F98ACB60
      APIs
        • Part of subcall function 10022FD0: GetMenuItemCount.USER32(?), ref: 10022FE9
        • Part of subcall function 10022FD0: GetMenuItemRect.USER32(?,?,00000000,?,?,?,?,100250E4,00040024,?,00000000,?), ref: 1002300D
        • Part of subcall function 10022FD0: GetMenuItemRect.USER32(?,?,-00000001,?,?,?,?,100250E4,00040024,?,00000000,?), ref: 10023021
      • SetRectEmpty.USER32(?), ref: 100252A5
      • SetRectEmpty.USER32(?), ref: 100252AE
      • SetRectEmpty.USER32(?), ref: 100252B7
      • SetRectEmpty.USER32(?), ref: 100252C0
      • SetRectEmpty.USER32(?), ref: 100253EE
      • SetRectEmpty.USER32(?), ref: 100253F7
      • IsRectEmpty.USER32(?), ref: 10025400
      • IsRectEmpty.USER32(?), ref: 1002540B
      • SetRectEmpty.USER32(?), ref: 100254E0
      • SetRectEmpty.USER32(?), ref: 1002552F
      • SetRectEmpty.USER32(?), ref: 10025538
      • SetRectEmpty.USER32(?), ref: 10025541
      • SetRectEmpty.USER32(?), ref: 1002554A
      • SetRectEmpty.USER32(?), ref: 10025553
      • IsRectEmpty.USER32(?), ref: 1002556E
      • IsRectEmpty.USER32(?), ref: 100255B6
      • IsRectEmpty.USER32(?), ref: 100255C3
      • SetRectEmpty.USER32(?), ref: 1002561A
      • SetRectEmpty.USER32(?), ref: 10025623
      • SetRectEmpty.USER32(?), ref: 1002562C
      • SetRectEmpty.USER32(?), ref: 10025635
      • SetRectEmpty.USER32(?), ref: 1002563E
      • SetRectEmpty.USER32(?), ref: 10025647
      • GetMenuItemCount.USER32(?), ref: 100256E8
      • GetMenuItemRect.USER32(?,?,00000000,?,?,?,?,?,?,?,1002388F,?), ref: 10025708
      • GetMenuItemRect.USER32(?,?,-00000001,?,?,?,?,?,?,?,1002388F,?), ref: 1002571C
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Empty$ItemMenu$Count
      • String ID:
      • API String ID: 3556175780-0
      • Opcode ID: 51b63d87aa26e79ce635bc53da4e79dd0ac5e2a0a2ba4a142e7e1ecfd1e9703b
      • Instruction ID: 3580b85264a0b11b2af6f932b74e5bb24bd1c90a80f22c94ed852e82d06a07f9
      • Opcode Fuzzy Hash: 51b63d87aa26e79ce635bc53da4e79dd0ac5e2a0a2ba4a142e7e1ecfd1e9703b
      • Instruction Fuzzy Hash: 4D12CF75605B058FC368CB28D888AE6B7E5FF88305F65896ED8AF87315DB31B841CB44
      APIs
      • GetCursorPos.USER32(?), ref: 1001CC0F
      • ScreenToClient.USER32(?,?), ref: 1001CC1E
      • GetClientRect.USER32(?,?), ref: 1001CC57
      • GetParent.USER32(?), ref: 1001CC61
      • GetClassNameA.USER32(00000000,?,00000040), ref: 1001CC73
      • _mbscmp.MSVCRT ref: 1001CC89
      • _mbscmp.MSVCRT ref: 1001CC9C
      • CreateCompatibleDC.GDI32(?), ref: 1001CCB8
      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 1001CCCB
      • SelectObject.GDI32(00000000,00000000), ref: 1001CCDD
      • SelectObject.GDI32(00000000,?), ref: 1001CCEC
      • PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1001CD02
      • SetRect.USER32(?,?,?,?,?), ref: 1001CD41
      • SetRect.USER32(?,?,?,?,?), ref: 1001CD64
      • IsWindowEnabled.USER32(?), ref: 1001CD6A
      • PtInRect.USER32(?,?,?), ref: 1001CD8D
      • PtInRect.USER32(?,?,?), ref: 1001CE0C
      • PtInRect.USER32(?,?,?), ref: 1001CFDF
      • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 1001D0F1
      • DeleteDC.GDI32(00000000), ref: 1001D0F8
      • DeleteObject.GDI32(?), ref: 1001D103
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Object$ClientCompatibleCreateDeleteSelect_mbscmp$BitmapClassCursorEnabledNameParentScreenWindow
      • String ID:
      • API String ID: 3766834539-0
      • Opcode ID: c2ef48b3f6ec4ec22484b2a45e11998c80fbc2def04bd750a7d1df5ab2a244b6
      • Instruction ID: 3e656c1c5e6747a07933068c804b643b2a797f552276aae395ead9c06b7a3bed
      • Opcode Fuzzy Hash: c2ef48b3f6ec4ec22484b2a45e11998c80fbc2def04bd750a7d1df5ab2a244b6
      • Instruction Fuzzy Hash: 20F159B9204204AFE304DB54CC85EABB3ADFFC8744F148A69F95887355D634EE46CB61
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Window
      • String ID:
      • API String ID: 924285169-0
      • Opcode ID: 10a71a3ec35c7868adf77ffbb036b0aa99efc379083cf3b09a92fc681535840c
      • Instruction ID: 9d0981d9d4456fe75954a96ff124bc768ed38601b0fc248c18501ffb98e7e012
      • Opcode Fuzzy Hash: 10a71a3ec35c7868adf77ffbb036b0aa99efc379083cf3b09a92fc681535840c
      • Instruction Fuzzy Hash: BDB1B276600305ABE360CBA9ECC4EE7B7ECEBD8790F51492EF859C6240D635E949C760
      APIs
      • GetWindowRect.USER32(?,?), ref: 10005A7B
      • IsRectEmpty.USER32(?), ref: 10005AA1
      • PtInRect.USER32(?), ref: 10005AB8
      • PtInRect.USER32(?), ref: 10005AEE
      • SetTimer.USER32 ref: 10005BAC
      • GetWindowLongA.USER32(?,000000F0), ref: 10005BC6
      • SetRect.USER32(?,00000000,00000000,?,?), ref: 10005BF3
      • OffsetRect.USER32(?,?,?), ref: 10005C08
      • SetRect.USER32(?,?,00000000,?,?), ref: 10005C2A
      • SetRect.USER32(?,?,00000000,?,00000004), ref: 10005C48
      • PtInRect.USER32(?), ref: 10005C57
      • LoadCursorA.USER32(00000000,00007F82), ref: 10005C64
      • SetCursor.USER32(00000000), ref: 10005C6B
      • PtInRect.USER32(?), ref: 10005C84
      • LoadCursorA.USER32(00000000,00007F83), ref: 10005C91
      • SetCursor.USER32(00000000), ref: 10005C98
      • PtInRect.USER32(?), ref: 10005CAE
      • LoadCursorA.USER32(00000000,00007F85), ref: 10005CBB
      • SetCursor.USER32(00000000), ref: 10005CC2
      • SendMessageA.USER32(?,000000A0,00000002,?), ref: 10005CE1
      • SendMessageA.USER32(?,000000A0,00000002,?), ref: 10005D01
      • SendMessageA.USER32(?,000000A0,00000000,?), ref: 10005D21
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Cursor$LoadMessageSend$Window$EmptyLongOffsetTimer
      • String ID:
      • API String ID: 2893196457-0
      • Opcode ID: 902516e2ad07cbefe771bea99530dc0d5126a395b07b91597ea6cbffea2d3192
      • Instruction ID: 9d0a464911b7ef7bcec7ec9608391aee764f330c109169fbf27a68b1f538e316
      • Opcode Fuzzy Hash: 902516e2ad07cbefe771bea99530dc0d5126a395b07b91597ea6cbffea2d3192
      • Instruction Fuzzy Hash: 3C716C75204705AFF320DBA4CC89F6B77E8EB88B81F204919F656C6294E771F905CB25
      APIs
      • IsWindowVisible.USER32(?), ref: 1002399F
      • IsRectEmpty.USER32(?), ref: 100239B4
      • SetBkMode.GDI32 ref: 10023A30
      • SelectObject.GDI32(?,?), ref: 10023A4D
      • SelectObject.GDI32(?,?), ref: 10023A5D
      • SetTextColor.GDI32(?,?), ref: 10023AAD
      • BitBlt.GDI32(?,00000000,00000000,?,00000001,00000000,?,?,00CC0020), ref: 10023AE3
      • GetMenuItemCount.USER32(00000000), ref: 10023B2A
      • GetMenuItemInfoA.USER32(00000000,00000000,00000400,?), ref: 10023B88
        • Part of subcall function 10024DB0: GetMenuItemRect.USER32(?,00000000,?,?,?,?,75296D90,00000000,10023B9B,00000000,?), ref: 10024DCB
        • Part of subcall function 10024DB0: OffsetRect.USER32(?,?,?), ref: 10024DF9
      • InflateRect.USER32(?,000000FF,000000FF), ref: 10023BC7
      • SetTextColor.GDI32(?,?), ref: 10023BEF
      • SetTextColor.GDI32(?,?), ref: 10023C25
      • SetTextColor.GDI32(?,?), ref: 10023C69
      • DrawTextA.USER32(?,?,?,?,00000025), ref: 10023C8B
      • SetTextColor.GDI32(?,?), ref: 10023C9B
      • DrawIconEx.USER32(?,?,?,00000000,00000010,00000010,00000000,00000000,00000003), ref: 10023CE9
      • GetSystemMetrics.USER32(00000020), ref: 10023CFE
      • OffsetRect.USER32(?,00000000), ref: 10023D19
      • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 10023E64
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Text$ColorRect$ItemMenu$DrawObjectOffsetSelect$CountEmptyIconInflateInfoMetricsModeSystemVisibleWindow
      • String ID: 0
      • API String ID: 2055320636-4108050209
      • Opcode ID: 37e9a5e0e2e580665de7cd9a3032d2bb2df789812bb621c82e55d9ffef3a9a1e
      • Instruction ID: a9acdb67b72450ec93636fc2c6a84ac6b9940729399217752d96d5b5a37b2c08
      • Opcode Fuzzy Hash: 37e9a5e0e2e580665de7cd9a3032d2bb2df789812bb621c82e55d9ffef3a9a1e
      • Instruction Fuzzy Hash: 5DF14975204741AFE354CF28D885FABB3E9FB88704F608A2DF95997290DB30E906CB51
      APIs
      • GetWindowRect.USER32(?,00000000), ref: 10010213
      • GetClientRect.USER32(?,?), ref: 10010222
      • ClientToScreen.USER32(?,?), ref: 10010237
      • ClientToScreen.USER32(?,?), ref: 10010242
      • SetBkMode.GDI32(?,00000001), ref: 10010281
      • SelectObject.GDI32(?,?), ref: 10010299
      • ClientToScreen.USER32(?,?), ref: 100102EA
      • MenuItemFromPoint.USER32(00000000,?,?,?), ref: 100102FB
      • GetMenuItemRect.USER32(?,?,00000000,?), ref: 10010325
      • GetMenuItemRect.USER32(?,?,00000000,?), ref: 1001033D
      • GetMenuItemCount.USER32(?), ref: 10010357
      • GetMenuItemRect.USER32(?,?,00000000,?), ref: 10010389
      • OffsetRect.USER32(?,?,?), ref: 100103AC
      • GetMenuItemInfoA.USER32 ref: 10010419
      • SetRect.USER32(?,?,?,?,?), ref: 1001053E
      • SetRect.USER32(?,?,?,?,?), ref: 10010564
      • OffsetRect.USER32(?,?,?), ref: 10010579
      • OffsetRect.USER32(?,?,?), ref: 10010591
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1001060C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$ItemMenu$Client$OffsetScreen$CountFromInfoModeObjectPointSelectWindow
      • String ID: 0
      • API String ID: 303195050-4108050209
      • Opcode ID: 008811b3abd2f731aae474ba5b14917b142eec1ffb338946d922de29f3af1481
      • Instruction ID: 218a776880d17dfc55bc541e60bba26cc9f27d11404c7c810f554a5f716a7b01
      • Opcode Fuzzy Hash: 008811b3abd2f731aae474ba5b14917b142eec1ffb338946d922de29f3af1481
      • Instruction Fuzzy Hash: 61E113B5208345AFE354CF68C884E6BB7E9FBC8744F108A1DF58A87250DB74E945CB62
      APIs
      • CreateRectRgn.GDI32(00000000,00000000,1002CDA8,?), ref: 10003521
      • SelectObject.GDI32(?,?), ref: 10003586
      • CombineRgn.GDI32(00000000,00000000,00000000,00000003), ref: 100035F1
      • SelectObject.GDI32(?,?), ref: 10003791
      • OffsetRgn.GDI32(00000000,?,?), ref: 1000380A
      • CombineRgn.GDI32(00000000,00000000,?,00000003), ref: 10003819
      • DeleteObject.GDI32(?), ref: 10003824
      • SetRect.USER32(?,00000000,00000000,00000000,?), ref: 1000385B
      • SelectObject.GDI32(?,?), ref: 100038A2
      • SelectObject.GDI32(?,?), ref: 100038EF
      • SelectObject.GDI32(?,?), ref: 100037DD
        • Part of subcall function 1001C210: ExtCreateRegion.GDI32(00000000,00000062,00000000), ref: 1001C3B3
        • Part of subcall function 1001C210: GlobalUnWire.KERNEL32(00000000), ref: 1001C3BC
        • Part of subcall function 1001C210: GlobalFree.KERNEL32(00000000), ref: 1001C3C3
      • OffsetRgn.GDI32(00000000,00000000,?), ref: 10003918
      • CombineRgn.GDI32(00000000,00000000,00000000,00000003), ref: 10003923
      • DeleteObject.GDI32(00000000), ref: 1000392A
      • DeleteObject.GDI32(?), ref: 100035FC
        • Part of subcall function 10006920: DeleteObject.GDI32(?), ref: 1000692E
      • SelectObject.GDI32(?,?), ref: 100035D2
        • Part of subcall function 1001C210: GlobalAlloc.KERNEL32(00000002,00000660,75296BA0,00000000,00000000,?,?,?,10003905,?,?,?,1002CDA8,?,1002CDC8), ref: 1001C227
        • Part of subcall function 1001C210: GlobalFix.KERNEL32(00000000), ref: 1001C230
        • Part of subcall function 1001C210: SetRect.USER32(00000010,7FFFFFFF,7FFFFFFF,00000000,00000000), ref: 1001C25D
        • Part of subcall function 1001C210: GlobalUnWire.KERNEL32(00000000), ref: 1001C2EB
        • Part of subcall function 1001C210: GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 1001C30D
        • Part of subcall function 1001C210: GlobalFix.KERNEL32(00000000), ref: 1001C316
        • Part of subcall function 1001C210: SetRect.USER32(?,?,?,?,?), ref: 1001C339
      • SelectObject.GDI32(?,?), ref: 10003683
      • SelectObject.GDI32(?,?), ref: 100036CF
      • OffsetRgn.GDI32(00000000,00000000,?), ref: 100036F2
      • CombineRgn.GDI32(00000000,00000000,?,00000003), ref: 10003701
      • DeleteObject.GDI32(?), ref: 1000370C
      • SetRect.USER32(?,00000000,00000000,?,?), ref: 10003753
        • Part of subcall function 10006940: CreateDIBSection.GDI32(00000000,?,00000000,00000000,00000000,00000000), ref: 10006998
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Select$Global$DeleteRect$Combine$CreateOffset$AllocWire$FreeRegionSection
      • String ID:
      • API String ID: 1948797773-0
      • Opcode ID: 83e9ebd966dc5b75a2331415b8a8f36645dc0f34e6ac1b4690591f9429daab88
      • Instruction ID: 7ad6e692fdaee63a5d88ca3bc9fb50060419e0f4e25ce673a8ec1ac2766f1ee5
      • Opcode Fuzzy Hash: 83e9ebd966dc5b75a2331415b8a8f36645dc0f34e6ac1b4690591f9429daab88
      • Instruction Fuzzy Hash: B8D107B9504318AFE354CFA4CD84D6BBBE9FB88740F204A1DF55987264D770E906CBA2
      APIs
      • EqualRect.USER32(1000AEEB,?), ref: 1000AF0A
      • IsRectEmpty.USER32(?), ref: 1000AF21
      • CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF49
      • CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF61
      • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000AF6A
      • SelectClipRgn.GDI32(?,00000000), ref: 1000AF72
      • DeleteObject.GDI32(00000000), ref: 1000AF7F
      • DeleteObject.GDI32(00000000), ref: 1000AF82
      • CreatePen.GDI32(00000000,00000001,?), ref: 1000AFA1
      • CreatePen.GDI32(00000000,00000001,?), ref: 1000AFD6
      • CreatePen.GDI32(00000000,00000001,?), ref: 1000B008
      • CreateSolidBrush.GDI32(?), ref: 1000B041
      • SelectObject.GDI32(?,00000000), ref: 1000B051
      • SelectObject.GDI32(?,00000000), ref: 1000B059
      • Rectangle.GDI32(?,?,?,?,?), ref: 1000B074
      • SelectObject.GDI32(?,?), ref: 1000B080
      • SelectObject.GDI32(?,?), ref: 1000B088
      • IsRectEmpty.USER32(?), ref: 1000B08F
      • SelectClipRgn.GDI32(?,00000000), ref: 1000B09B
      • DeleteObject.GDI32(00000000), ref: 1000B0A8
      • DeleteObject.GDI32(00000000), ref: 1000B0AB
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$CreateSelect$Rect$Delete$ClipEmpty$BrushCombineEqualRectangleSolid
      • String ID:
      • API String ID: 1312918531-0
      • Opcode ID: 37fa40e2efc1a56c945f34d09480b679d3446cfe2338074c795da41fd2fd06c2
      • Instruction ID: ed92dcb72f46cb93286c5d67c269e6d90022c8bc6c11db7440066506c94aadbf
      • Opcode Fuzzy Hash: 37fa40e2efc1a56c945f34d09480b679d3446cfe2338074c795da41fd2fd06c2
      • Instruction Fuzzy Hash: 2D515779205215AFE244DBA4CCC4E6BB7E9FFC8744F208A19FA0597260D770ED46CBA1
      APIs
      • ??2@YAPAXI@Z.MSVCRT ref: 1001D622
      • SendMessageA.USER32(00000000,00000402,?,00000000), ref: 1001D64B
      • SetTextColor.GDI32(?,?), ref: 1001D674
      • DrawTextA.USER32(?,00000000,?,?,00000024), ref: 1001D694
      • ??3@YAXPAX@Z.MSVCRT ref: 1001D69B
      • SendMessageA.USER32(?,00000402,?,00000000), ref: 1001D6EB
      • GetParent.USER32(?), ref: 1001D726
      • IsWindowEnabled.USER32(?), ref: 1001D732
      • SendMessageA.USER32(00000000,0000002B,00000000,?), ref: 1001D775
      • SelectClipRgn.GDI32(?,00000000), ref: 1001D7BC
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1001D83D
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSend$Text$??2@??3@ClipColorDrawEnabledParentSelectWindow
      • String ID:
      • API String ID: 3786712134-0
      • Opcode ID: 65b761f78e26fb1565b4af619ed6c3588088a4765c649256f25afc3f7e15a597
      • Instruction ID: 1728b0ff18ff78b8a39736fdbae55030af2e28b6444a2cdf1001d9124c113304
      • Opcode Fuzzy Hash: 65b761f78e26fb1565b4af619ed6c3588088a4765c649256f25afc3f7e15a597
      • Instruction Fuzzy Hash: AEB114756043419FD354DF28C884E6BB7E9FBC8700F148A2DF68987291DB70E945CB52
      APIs
      • GetWindowRect.USER32(?,?), ref: 10013F4E
      • OffsetRect.USER32(?,?,?), ref: 10013F67
        • Part of subcall function 1000FBF0: CreateCompatibleDC.GDI32(?), ref: 1000FC09
        • Part of subcall function 1000FBF0: CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 1000FC14
        • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
        • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
        • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
        • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
        • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
      • SetBkMode.GDI32(?,00000001), ref: 10013F9A
        • Part of subcall function 10012060: GetPropA.USER32(?,1002C2CC), ref: 1001206C
        • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
      • SelectObject.GDI32(?,00000000), ref: 10013FB5
      • SelectObject.GDI32(?,?), ref: 10013FC9
      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 10013FED
      • SendMessageA.USER32(?,0000040C,00000000,00000000), ref: 1001400F
      • ??2@YAPAXI@Z.MSVCRT ref: 10014027
      • SetRectEmpty.USER32(00000000), ref: 10014046
      • SendMessageA.USER32(?,00000409,00000000,00000000), ref: 1001405B
      • SendMessageA.USER32 ref: 10014247
      • SetRect.USER32(?,?,?,?,?), ref: 1001431F
      • DrawTextA.USER32(?,?,?,?,00000025), ref: 10014469
      • ??3@YAXPAX@Z.MSVCRT ref: 10014484
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 100144FE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$MessageObjectSelectSend$Create$ClipCompatible$??2@??3@BitmapDeleteDrawEmptyModeOffsetPropTextWindow
      • String ID: P
      • API String ID: 4166418595-3110715001
      • Opcode ID: bce699e0ac128b8eee13841cf1e2220cb8d8ac36ace6242f7f2dcd4c97d22f66
      • Instruction ID: 667f0b52e11a95e24b10ca477dcf0e066d8db5c2e0f9aabd908416b331fe757d
      • Opcode Fuzzy Hash: bce699e0ac128b8eee13841cf1e2220cb8d8ac36ace6242f7f2dcd4c97d22f66
      • Instruction Fuzzy Hash: 831269756043019FD314CF58C880A6AB7E6FFC8704F258A1DF6998B361DA71EC86CB52
      APIs
      • GetWindowRect.USER32(?,00000020), ref: 100201C0
      • OffsetRect.USER32(00000020,00000000,?), ref: 100201D2
      • CreateCompatibleDC.GDI32(00000000), ref: 100201D9
      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 100201EA
      • SelectObject.GDI32(00000000,00000000), ref: 100201FC
      • SelectObject.GDI32(00000000,?), ref: 1002020B
      • PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1002021F
        • Part of subcall function 10020700: SendMessageA.USER32(?,0000041A,00000000,00000044), ref: 1002071E
        • Part of subcall function 10020700: SendMessageA.USER32(?,00000419,00000000,00000034), ref: 1002072F
        • Part of subcall function 10020700: GetClientRect.USER32(?,?), ref: 10020749
      • IsWindowEnabled.USER32(?), ref: 1002024C
      • IsWindowEnabled.USER32(?), ref: 1002028A
      • GetFocus.USER32 ref: 100202CF
      • IsWindowEnabled.USER32(?), ref: 10020411
      • IsWindowEnabled.USER32(?), ref: 1002044B
      • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 100205BD
      • DeleteObject.GDI32(?), ref: 100205C8
      • DeleteDC.GDI32(00000000), ref: 100205CF
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$Enabled$ObjectRect$CompatibleCreateDeleteMessageSelectSend$BitmapClientFocusOffset
      • String ID:
      • API String ID: 969275910-0
      • Opcode ID: 5b169589681542832a6b021b38e202f014957ac69c21412b49005b06810db579
      • Instruction ID: 94777b03be6e9f1ae59e0413948786f371ff679d45ed1d23647022047fdc10e1
      • Opcode Fuzzy Hash: 5b169589681542832a6b021b38e202f014957ac69c21412b49005b06810db579
      • Instruction Fuzzy Hash: 91C138B9200715DFE364CB54DCC1EAB73AAFF88740F618969FA0587762D634ED418B60
      APIs
      • GetWindowRect.USER32(?,?), ref: 1000DF29
      • OffsetRect.USER32(?,?,?), ref: 1000DF42
        • Part of subcall function 1000FBF0: CreateCompatibleDC.GDI32(?), ref: 1000FC09
        • Part of subcall function 1000FBF0: CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 1000FC14
        • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
        • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
        • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
        • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
        • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
      • SetBkMode.GDI32(?,00000001), ref: 1000DF94
        • Part of subcall function 10012060: GetPropA.USER32(?,1002C2CC), ref: 1001206C
        • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
      • SelectObject.GDI32(?,00000000), ref: 1000DFA9
      • IsWindowEnabled.USER32(?), ref: 1000DFB3
      • SendMessageA.USER32(?,00001209,00000000,00000000), ref: 1000DFCE
      • SendMessageA.USER32 ref: 1000DFFA
      • SendMessageA.USER32(?,0000120F,?,00000000), ref: 1000E02B
      • SendMessageA.USER32(?,00001203,00000000,?), ref: 1000E03E
      • SendMessageA.USER32(?,00001207,00000000,?), ref: 1000E04F
      • 74AB1510.COMCTL32(?,?,?,?,?,00000001,?,?,?,00001200,00000000,00000000), ref: 1000E156
      • SetTextColor.GDI32(?,?), ref: 1000E1A9
      • DrawTextA.USER32(?,?,?,?,00000024), ref: 1000E1D4
      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1000E210
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSend$CreateObjectRectSelect$ClipCompatibleTextWindow$B1510BitmapColorDeleteDrawEnabledModeOffsetProp
      • String ID: 7
      • API String ID: 785823965-1790921346
      • Opcode ID: 209c6b230ae2945e32d27e986554ab5b0cf3fdf4ca1b30fa4d1875b4f07b6efb
      • Instruction ID: d6cd2112b19415e89498b4abe21e6ca38dab58f18fec7e0c69950289425e1392
      • Opcode Fuzzy Hash: 209c6b230ae2945e32d27e986554ab5b0cf3fdf4ca1b30fa4d1875b4f07b6efb
      • Instruction Fuzzy Hash: 58A14A75208341AFE314CF24C884F6BB7E9EBC8744F108A1CF599973A1DA75E945CB62
      APIs
      • DeleteObject.GDI32(?), ref: 10018F91
      • DeleteObject.GDI32(?), ref: 10018FA7
      • DeleteObject.GDI32(?), ref: 10018FC1
      • DeleteObject.GDI32(?), ref: 10018FCE
      • CreateFontIndirectA.GDI32(00000000), ref: 1001900A
      • CreateFontIndirectA.GDI32(00000000), ref: 1001902C
      • SystemParametersInfoA.USER32(0000001F,0000003C,?,00000000), ref: 10019057
      • CreateFontIndirectA.GDI32(?), ref: 1001905E
      • CreateFontIndirectA.GDI32 ref: 10019076
      • SystemParametersInfoA.USER32 ref: 100190A3
      • CreateFontIndirectA.GDI32(?), ref: 100190BA
      • CreateFontIndirectA.GDI32(?), ref: 100190CD
      • CreateFontIndirectA.GDI32(?), ref: 10019102
      • CreateFontIndirectA.GDI32(?), ref: 10019116
      • CreateFontIndirectA.GDI32(?), ref: 10019131
      • CreateFontIndirectA.GDI32(?), ref: 10019145
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CreateFontIndirect$DeleteObject$InfoParametersSystem
      • String ID:
      • API String ID: 3387422844-0
      • Opcode ID: 830815c587014a26e3a7e992bde17b6236e9c72615f67e54c72626ec8243f3db
      • Instruction ID: 711df5a203e8b563da40807aa8fc905527dfc6b6a225bd5e8f361db8bcb87da6
      • Opcode Fuzzy Hash: 830815c587014a26e3a7e992bde17b6236e9c72615f67e54c72626ec8243f3db
      • Instruction Fuzzy Hash: DD6116B06007468FE720CF69C880A9BF7E5FF88744F504A2EE98A87640E774FA45CB55
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Empty$Window$Long
      • String ID:
      • API String ID: 1594619121-0
      • Opcode ID: bb4e3b14c8995c92c39710eed11583c245718b1c2e8e577bdaf230dd83820362
      • Instruction ID: d0c9926444baea1fe4ebff3a720e05cc6beccc75dc12de5c1cc4c6843b7c2cf1
      • Opcode Fuzzy Hash: bb4e3b14c8995c92c39710eed11583c245718b1c2e8e577bdaf230dd83820362
      • Instruction Fuzzy Hash: FFA11375605B058FE364CF28C888BA7B7E5FF88345F25896DD89E87215DB32A806CF50
      APIs
      • KillTimer.USER32(?,00006626), ref: 1002412C
      • SendMessageA.USER32(?,0000001F,00000000,00000000), ref: 1002413C
        • Part of subcall function 10024CF0: GetMenuItemInfoA.USER32 ref: 10024D26
        • Part of subcall function 100124D0: SetTimer.USER32(?,?,00000000,10012490), ref: 100124E3
      • KillTimer.USER32(?,?), ref: 10024176
      • TrackPopupMenu.USER32(?,00000000,00000000,00000000,00000000,?), ref: 100241DA
        • Part of subcall function 10023F00: GetCursorPos.USER32(?), ref: 10023F0E
        • Part of subcall function 10023F00: GetWindowRect.USER32(?,?), ref: 10023F1D
        • Part of subcall function 10023F00: PtInRect.USER32(?,?,?), ref: 10023F38
        • Part of subcall function 10023F00: PtInRect.USER32(00000168,?,?), ref: 10023F67
        • Part of subcall function 10023F00: GetMenuItemCount.USER32(?), ref: 10023F94
        • Part of subcall function 10023F00: GetMenuItemInfoA.USER32 ref: 10023FE3
        • Part of subcall function 10023F00: OffsetRect.USER32(?,?,00000000), ref: 1002401B
        • Part of subcall function 10023F00: PtInRect.USER32(?,00000400,00000000), ref: 10024030
        • Part of subcall function 10024060: GetMenuItemRect.USER32(?,?,?,?), ref: 10024082
        • Part of subcall function 10024060: GetMenuItemRect.USER32(?,?,?,?), ref: 10024099
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Menu$Item$Timer$InfoKill$CountCursorMessageOffsetPopupSendTrackWindow
      • String ID:
      • API String ID: 2948288781-0
      • Opcode ID: 51ee28288f19f70f4e95dd3a8ef5f6a57d4dcf2b95c017293d7a3d885d298ca3
      • Instruction ID: 37a8328168521e0b11368bf9a4f74ca38fbc0c8ce550388fabf89b9119d921f0
      • Opcode Fuzzy Hash: 51ee28288f19f70f4e95dd3a8ef5f6a57d4dcf2b95c017293d7a3d885d298ca3
      • Instruction Fuzzy Hash: 0F71EF79200702ABE310DB28DC84FABB7F9EF98754F11891DF55A87290DB31E945CB51
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@$Delete$Object
      • String ID:
      • API String ID: 1805807598-0
      • Opcode ID: eec321ba027c2bf93b20fa464e1cf600f3f02624ef79ee9b8ad71d178432586b
      • Instruction ID: 8eb2a162a59bfd02bb3efb1085eef2ff5d2453cd59b241f8ea59b29271d371ff
      • Opcode Fuzzy Hash: eec321ba027c2bf93b20fa464e1cf600f3f02624ef79ee9b8ad71d178432586b
      • Instruction Fuzzy Hash: 0D3105B9500B519BC720DFB8D8C5A9BB7E8FB4C210FA08D1DB5AA87241C676F9449B60
      APIs
      • IsWindowEnabled.USER32(?), ref: 10016A9B
      • SetRect.USER32(?,00000000,?,?,?), ref: 10016C24
      • MulDiv.KERNEL32(?,?,?), ref: 10016C3D
      • OffsetRect.USER32(?,00000000,00000000), ref: 10016C51
      • OffsetRect.USER32(?,00000000,?), ref: 10016C7F
      • IsRectEmpty.USER32(?), ref: 10016C85
      • MulDiv.KERNEL32(?,75C12370,?), ref: 10016CDB
      • MulDiv.KERNEL32(-00000001,?,?), ref: 10016CFA
      • MulDiv.KERNEL32(?,?,?), ref: 10016D1F
      • SetRect.USER32(?,?,00000000,?,?), ref: 10016DB7
      • SetRectEmpty.USER32(?), ref: 10016DC3
      • EqualRect.USER32(?,?), ref: 10016DED
      • EqualRect.USER32(?,?), ref: 10016DFD
      • SetRectEmpty.USER32(?), ref: 10016E30
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Empty$EqualOffset$EnabledWindow
      • String ID:
      • API String ID: 1250441839-0
      • Opcode ID: 488337cf230d6d23f37ee5c869d15c7c6214d7048653378568f50572e3e0747a
      • Instruction ID: b6d8e02c079bcafa56aa8081014225c04d9d0cf20a220bfdce263d8fab6bfb8f
      • Opcode Fuzzy Hash: 488337cf230d6d23f37ee5c869d15c7c6214d7048653378568f50572e3e0747a
      • Instruction Fuzzy Hash: 3302E4746047019FC718CF69C98491AFBF6FF88304F248A2DE98A8B755D731E985CB91
      APIs
      • GetSysColor.USER32(0000000F), ref: 10011466
      • GetSystemMetrics.USER32(0000000F), ref: 10011476
      • GetSystemMetrics.USER32(00000000), ref: 1001147D
      • GetSystemMetrics.USER32(00000001), ref: 10011484
      • GetSystemMetrics.USER32(0000000B), ref: 1001148B
      • GetSystemMetrics.USER32(0000000C), ref: 10011492
      • GetSystemMetrics.USER32(00000002), ref: 10011499
      • GetSystemMetrics.USER32(00000003), ref: 100114A0
      • GetSystemMetrics.USER32(00000020), ref: 100114A7
      • GetSystemMetrics.USER32(00000021), ref: 100114AE
      • GetSystemMetrics.USER32(00000007), ref: 100114B5
      • GetSystemMetrics.USER32(00000008), ref: 100114BC
      • GetSystemMetrics.USER32(00000004), ref: 100114C3
      • GetSystemMetrics.USER32(00000033), ref: 100114CA
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MetricsSystem$Color
      • String ID:
      • API String ID: 3740768223-0
      • Opcode ID: 4821abbd3c922a8ad17e9c27865194d4b68152617fa17cc4b81dc97e02bf1303
      • Instruction ID: b415c9ff06fc4772aef4a92c67fdb6d16b11039c2eda6f13e71a1828a8f5e86c
      • Opcode Fuzzy Hash: 4821abbd3c922a8ad17e9c27865194d4b68152617fa17cc4b81dc97e02bf1303
      • Instruction Fuzzy Hash: F00187B0D417449AE7306FB29D4EF07BEE0EFC0B00F11492EE2858BA81D6B5A141CF40
      APIs
      • GetWindowRect.USER32(?,?), ref: 1000CE96
      • OffsetRect.USER32(?,?,?), ref: 1000CEAF
      • GetClientRect.USER32(?,?), ref: 1000CEC1
      • SelectObject.GDI32(?,?), ref: 1000CEFA
      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 1000CF18
      • SetMapMode.GDI32(?,00000001), ref: 1000CF24
      • SetWindowOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1000CF34
      • SetWindowExtEx.GDI32(?,00000001,00000001,00000000), ref: 1000CF44
      • SetViewportOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1000CF54
      • SetViewportExtEx.GDI32(?,00000001,00000001,00000000), ref: 1000CF64
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1000CFB5
        • Part of subcall function 1000FC70: SelectObject.GDI32(?,?), ref: 1000FC7A
        • Part of subcall function 1000FC70: DeleteDC.GDI32 ref: 1000FC83
        • Part of subcall function 1000FC70: DeleteObject.GDI32(?), ref: 1000FC8D
        • Part of subcall function 1000E340: SelectObject.GDI32(?,?), ref: 1000E3AA
        • Part of subcall function 1000E340: DeleteDC.GDI32(?), ref: 1000E3B4
        • Part of subcall function 1000E340: DeleteObject.GDI32(?), ref: 1000E3D1
      • ??3@YAXPAX@Z.MSVCRT ref: 1000D017
      • InvalidateRect.USER32(?,00000000,00000001), ref: 1000D031
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$DeleteRect$SelectWindow$Viewport$??3@ClientInvalidateModeOffset
      • String ID:
      • API String ID: 648218233-0
      • Opcode ID: fcb826f11a9bc9a1a5ad3b45dcaa58b00f95201e4cb90fe47b0c16aa222db64e
      • Instruction ID: 2f10df49a190d83ca2c48d706accd39583ccff9776fc3dcd98fdd01acb908c43
      • Opcode Fuzzy Hash: fcb826f11a9bc9a1a5ad3b45dcaa58b00f95201e4cb90fe47b0c16aa222db64e
      • Instruction Fuzzy Hash: 6A615C79244342AFE224DF14CC85F2BB7A8FB88B40F20891DFA5997295C771FD428B61
      APIs
      • GetWindowRect.USER32(?,?), ref: 100084C9
      • GetComboBoxInfo.USER32 ref: 100084DC
      • GetWindowRect.USER32(?,?), ref: 100084FD
      • OffsetRect.USER32(?,?,?), ref: 1000851B
      • CallWindowProcA.USER32(?,?,0000000F,?,?), ref: 10008566
      • IsWindowEnabled.USER32(?), ref: 10008599
      • GetFocus.USER32 ref: 100085A7
      • IsRectEmpty.USER32(?), ref: 10008606
      • SelectObject.GDI32(00000000,?), ref: 10008646
      • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 1000866A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: RectWindow$CallComboEmptyEnabledFocusInfoObjectOffsetProcSelect
      • String ID: 4
      • API String ID: 3620934650-4088798008
      • Opcode ID: ff69685712dfb7541cd1ad91b48a2aaedd911cbe40dfa843f3ff19d120081c87
      • Instruction ID: 5cea887d1a42687cc65618457859d6ae2faca28e616dd28a7858be6a4daf13f9
      • Opcode Fuzzy Hash: ff69685712dfb7541cd1ad91b48a2aaedd911cbe40dfa843f3ff19d120081c87
      • Instruction Fuzzy Hash: 275127B9208701AFE314DF68C880E6BB7E9FBC8750F108A1DF99987355DA30E945CB52
      APIs
      • SendMessageA.USER32(?,000000F6,00000001,00000000), ref: 10007570
      • GetIconInfo.USER32(00000000,?), ref: 10007586
      • GetObjectA.GDI32(?,00000018,?), ref: 10007598
      • DrawIconEx.USER32(?,?,?,00000000,?,?,00000000,00000000,00000003), ref: 1000761E
      • DeleteObject.GDI32(?), ref: 1000762F
      • DeleteObject.GDI32(?), ref: 10007636
      • SendMessageA.USER32(?,000000F6,00000000,00000000), ref: 1000764D
      • GetObjectA.GDI32(00000000,00000018,?), ref: 10007665
      • CreateCompatibleDC.GDI32(?), ref: 10007670
      • SelectObject.GDI32(00000000,00000000), ref: 1000767A
      • BitBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,00CC0020), ref: 10007701
      • DeleteDC.GDI32(00000000), ref: 10007708
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Delete$IconMessageSend$CompatibleCreateDrawInfoSelect
      • String ID:
      • API String ID: 955780663-0
      • Opcode ID: 122180a6be51cacf192691a891b99cc1150dfe11f8c774a4c476940fe2165945
      • Instruction ID: 5ad2fc0d9cfef1da6667f6bfad95baaf5387ec86fbaa1d7a00321d89c8de7b88
      • Opcode Fuzzy Hash: 122180a6be51cacf192691a891b99cc1150dfe11f8c774a4c476940fe2165945
      • Instruction Fuzzy Hash: BD516075300611AFD344CA7CCD85F6BB7EAEFC8244F198628FA49C7255D671EC068790
      APIs
      • GetClientRect.USER32(?,?), ref: 1000C702
      • GetWindowRect.USER32(?,?), ref: 1000C711
      • ClientToScreen.USER32(?,?), ref: 1000C726
      • ClientToScreen.USER32(?,?), ref: 1000C731
      • OffsetRect.USER32(?,?,?), ref: 1000C74C
      • OffsetRect.USER32(?,?,?), ref: 1000C761
      • IsWindowEnabled.USER32(?), ref: 1000C778
      • GetFocus.USER32 ref: 1000C782
      • InflateRect.USER32(00000020,000000FE,000000FE), ref: 1000C81C
      • SelectObject.GDI32(00000000,?), ref: 1000C830
      • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 1000C84F
      • IsWindowEnabled.USER32(?), ref: 1000C859
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$ClientWindow$EnabledOffsetScreen$FocusInflateObjectSelect
      • String ID:
      • API String ID: 3408369734-0
      • Opcode ID: 3be52d9941539292c299830c6e9bf5df74aa8ccb6bf1b58d779688aaf5952ba0
      • Instruction ID: d3539a25c7ff0506e7ee7ab9e9479a1055ac5ff067c866c20199165bfa3bfce7
      • Opcode Fuzzy Hash: 3be52d9941539292c299830c6e9bf5df74aa8ccb6bf1b58d779688aaf5952ba0
      • Instruction Fuzzy Hash: C25119B8204706AFE314DF69C884D2BB7E9FFC8354B208A1DF85987365D631ED468B61
      APIs
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 1001608F
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 100160C2
      • GetParent.USER32(?), ref: 1001611B
      • SendMessageA.USER32(00000000), ref: 10016122
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow$MessageParentSend
      • String ID:
      • API String ID: 482362837-0
      • Opcode ID: 916f991154467816be997b105c9d4eb4c11a9125e158527fd240b7089936db19
      • Instruction ID: 0d51841f0734fbb8e4940dc07b8de3669c789b49538fb586d0ae161ad6d6c563
      • Opcode Fuzzy Hash: 916f991154467816be997b105c9d4eb4c11a9125e158527fd240b7089936db19
      • Instruction Fuzzy Hash: 4E519E76200611AFE310DB68CC85FAB73E8EB8C750F144918F95ACB292D670E985CBA1
      APIs
      • GetWindowRect.USER32(?), ref: 1000C03F
      • GetClientRect.USER32(?,?), ref: 1000C04B
      • ClientToScreen.USER32(?,?), ref: 1000C05D
      • ClientToScreen.USER32(?,?), ref: 1000C065
      • OffsetRect.USER32(?,?,?), ref: 1000C080
      • OffsetRect.USER32(?,?,?), ref: 1000C095
      • CreateRectRgn.GDI32(?,?,?,?), ref: 1000C0B1
      • CreateRectRgn.GDI32(?,?,?,?), ref: 1000C0C9
      • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000C0D2
      • SelectClipRgn.GDI32(?,00000000), ref: 1000C0DE
      • DeleteObject.GDI32(00000000), ref: 1000C0EB
      • DeleteObject.GDI32(00000000), ref: 1000C0EE
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Client$CreateDeleteObjectOffsetScreen$ClipCombineSelectWindow
      • String ID:
      • API String ID: 2240990249-0
      • Opcode ID: 4b3a124ec8f7523d0d551fb504430074e69b4b5c7f317864df0b48e49119c4e9
      • Instruction ID: 6da254da4a0019f5656eed989aa654683ae0a7bab9e4da9d351570924b964c57
      • Opcode Fuzzy Hash: 4b3a124ec8f7523d0d551fb504430074e69b4b5c7f317864df0b48e49119c4e9
      • Instruction Fuzzy Hash: C021D8B9115225BFE304DB55CC84CABB7EDEFC9710F158A0DF98593210D674EA0A8BA2
      APIs
      • GetWindowRect.USER32(?,?), ref: 10012DA6
      • OffsetRect.USER32(?,?,?), ref: 10012DBF
        • Part of subcall function 1000FBF0: CreateCompatibleDC.GDI32(?), ref: 1000FC09
        • Part of subcall function 1000FBF0: CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 1000FC14
        • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
        • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
        • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
        • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
        • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
      • SelectObject.GDI32(?,00000000), ref: 10012DF5
      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 10012E0F
      • SendMessageA.USER32(?,00000408,00000000,00000000), ref: 10012E28
      • SendMessageA.USER32(?,00000407,00000001,00000000), ref: 10012E3C
      • IsWindowEnabled.USER32(?), ref: 10012E7B
      • IsWindowEnabled.USER32(?), ref: 10012F5A
      • IsWindowEnabled.USER32(?), ref: 10012F95
      • IsWindowEnabled.USER32(?), ref: 1001306D
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 100130BE
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$Enabled$CreateObjectRectSelect$ClipCompatibleMessageSend$BitmapDeleteOffset
      • String ID:
      • API String ID: 1350237671-0
      • Opcode ID: 6133fc0ec921e100b3f7b777ce710fdf6920ba7fd51a58843914a26640d38602
      • Instruction ID: 4c5c30fd0665583f47b77be65c20ac278036d55bad62e296687f2ec44f63bcda
      • Opcode Fuzzy Hash: 6133fc0ec921e100b3f7b777ce710fdf6920ba7fd51a58843914a26640d38602
      • Instruction Fuzzy Hash: A9B148B9204301AFE348CF68C885E6AB7EAFBC8714F148A2DF95997351DB30E941CB51
      APIs
      • DeleteObject.GDI32(?), ref: 1001BC14
      • DeleteObject.GDI32(?), ref: 1001BC2F
      • DeleteObject.GDI32(?), ref: 1001BC5B
      • DeleteObject.GDI32(?), ref: 1001BC7F
      • DeleteObject.GDI32(?), ref: 1001BCA2
      • DeleteObject.GDI32(?), ref: 1001BCBB
      • SendMessageA.USER32(?,00006A31,00000000,00000000), ref: 1001BD28
      • IsWindowVisible.USER32(?), ref: 1001BD38
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: DeleteObject$MessageSendVisibleWindow
      • String ID:
      • API String ID: 2663172341-0
      • Opcode ID: 01e807c9779933c2b428bbe9883bd680ab894a97f0eb4f0875150d6ce418a805
      • Instruction ID: 69cb3e28c512f8bc434b60400197b4956680df1e75d225c41875b39bfed14100
      • Opcode Fuzzy Hash: 01e807c9779933c2b428bbe9883bd680ab894a97f0eb4f0875150d6ce418a805
      • Instruction Fuzzy Hash: C15149B96006198FD744DF65D8C4D19BBE6EF84754B66806DE4098F261CB32ECC2CF54
      APIs
      • GetCursorPos.USER32(?), ref: 10002D06
      • GetWindowRect.USER32(?,?), ref: 10002D1C
      • GetWindowRect.USER32(?,?), ref: 10002D2A
      • GetWindowRect.USER32(?,?), ref: 10002D38
      • PtInRect.USER32(?,?,?), ref: 10002D87
      • PtInRect.USER32(?,?,?), ref: 10002DA8
      • LoadCursorA.USER32(00000000,00007F85), ref: 10002DC6
      • SetCursor.USER32(00000000), ref: 10002DCD
      • SendMessageA.USER32(?,?,0000000F,?), ref: 10002DE9
      • SendMessageA.USER32(?,000000A1,0000000F,?), ref: 10002E0D
      • SendMessageA.USER32(?,?,0000000F,?), ref: 10002E2D
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$CursorMessageSendWindow$Load
      • String ID:
      • API String ID: 720919598-0
      • Opcode ID: 7c5c404830df33723a4146770e33e202f0d9d68ea3e64095acdf947f7cfd7b19
      • Instruction ID: 538f76ca63ed3551e02a0aa789c3043a2233a7aef7aa21dc4bf60bcacd5a6db2
      • Opcode Fuzzy Hash: 7c5c404830df33723a4146770e33e202f0d9d68ea3e64095acdf947f7cfd7b19
      • Instruction Fuzzy Hash: 4B3139B9608342AFE314DB65C884DABB7F9FBC8750F208D1DF58583250D674E905CB62
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??2@ItemMenu$Info$??3@Count
      • String ID: 0
      • API String ID: 1280313425-4108050209
      • Opcode ID: 685e3c77eb54a3a9f86dbca669b4c6e2d078e810f0bcef5452d7b9f9558c0389
      • Instruction ID: 9c73eb5ddcbb23b1021a2a30c8f8144f940f888cd30e2e31c2a3417c855ec077
      • Opcode Fuzzy Hash: 685e3c77eb54a3a9f86dbca669b4c6e2d078e810f0bcef5452d7b9f9558c0389
      • Instruction Fuzzy Hash: 117128B1B042429FD304CF14C880A5ABBE5FF88754F25C56DF8899B361D7B6E886CB91
      APIs
      • GetCursorPos.USER32(?), ref: 10023F0E
      • GetWindowRect.USER32(?,?), ref: 10023F1D
      • PtInRect.USER32(?,?,?), ref: 10023F38
      • PtInRect.USER32(00000168,?,?), ref: 10023F67
      • GetMenuItemCount.USER32(?), ref: 10023F94
        • Part of subcall function 10024DB0: GetMenuItemRect.USER32(?,00000000,?,?,?,?,75296D90,00000000,10023B9B,00000000,?), ref: 10024DCB
        • Part of subcall function 10024DB0: OffsetRect.USER32(?,?,?), ref: 10024DF9
      • GetMenuItemInfoA.USER32 ref: 10023FE3
      • OffsetRect.USER32(?,?,00000000), ref: 1002401B
      • PtInRect.USER32(?,00000400,00000000), ref: 10024030
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$ItemMenu$Offset$CountCursorInfoWindow
      • String ID: 0
      • API String ID: 1145675194-4108050209
      • Opcode ID: 175602bbc668ff8853d7943d656a5cc7ce6d6184f3f0c48b566ecbe4b546db37
      • Instruction ID: 31d5a28eec6a1afefc3e1dee2d447974a65d6f43cb3d9e79273529089ad59d0b
      • Opcode Fuzzy Hash: 175602bbc668ff8853d7943d656a5cc7ce6d6184f3f0c48b566ecbe4b546db37
      • Instruction Fuzzy Hash: BE415B752087019FD304DF68DC88A6BB7F9FBC8650F11891DFA5583250DB71E94ACBA2
      APIs
      • GetClientRect.USER32(?,?), ref: 1000669B
      • SelectObject.GDI32(?,?), ref: 100066CF
      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 100066E7
      • GetPropA.USER32(?,1002C03C), ref: 100066F3
      • IsWindowEnabled.USER32(?), ref: 10006700
      • GetFocus.USER32 ref: 10006745
      • InflateRect.USER32(?,000000FB,000000FB), ref: 100067AA
      • InflateRect.USER32(?,00000005,00000005), ref: 100067F1
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 10006813
      • ??3@YAXPAX@Z.MSVCRT ref: 10006877
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Inflate$??3@ClientEnabledFocusObjectPropSelectWindow
      • String ID:
      • API String ID: 24168671-0
      • Opcode ID: 3e45e94337507d36f11afc84451ecc119999d87413cd303fb6738f075eeb491c
      • Instruction ID: 808e24e67ffa3fdcadfbf8160937d97e86c192aaa0f854ceeccdbcc12e2f0151
      • Opcode Fuzzy Hash: 3e45e94337507d36f11afc84451ecc119999d87413cd303fb6738f075eeb491c
      • Instruction Fuzzy Hash: 3A8159B96043419FE314CF54CC84E6BB3EAFB88794F218A2CF95987355DA30ED458B61
      APIs
      • GlobalAlloc.KERNEL32(00000002,00000660,75296BA0,00000000,00000000,?,?,?,10003905,?,?,?,1002CDA8,?,1002CDC8), ref: 1001C227
      • GlobalFix.KERNEL32(00000000), ref: 1001C230
      • SetRect.USER32(00000010,7FFFFFFF,7FFFFFFF,00000000,00000000), ref: 1001C25D
      • GlobalUnWire.KERNEL32(00000000), ref: 1001C2EB
      • GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 1001C30D
      • GlobalFix.KERNEL32(00000000), ref: 1001C316
      • SetRect.USER32(?,?,?,?,?), ref: 1001C339
      • ExtCreateRegion.GDI32(00000000,00000062,00000000), ref: 1001C3B3
      • GlobalUnWire.KERNEL32(00000000), ref: 1001C3BC
      • GlobalFree.KERNEL32(00000000), ref: 1001C3C3
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Global$AllocRectWire$CreateFreeRegion
      • String ID:
      • API String ID: 3828056624-0
      • Opcode ID: 6ba06d16079189b5735e3eb41b3e1a1aff45cf1b4ebc31a8399078287940a643
      • Instruction ID: 800a03afdf74d798d33c9bbd273a6215fc8d6eee2ba7c904765c8bbc0eaa987e
      • Opcode Fuzzy Hash: 6ba06d16079189b5735e3eb41b3e1a1aff45cf1b4ebc31a8399078287940a643
      • Instruction Fuzzy Hash: 165179752047058FD314CF19C8C4E1ABBE6FBC8354F158A2DF8969B252D730E98ACBA1
      APIs
        • Part of subcall function 100069F0: DeleteObject.GDI32(?), ref: 100069FE
      • CreateCompatibleDC.GDI32(00000000), ref: 10006A67
      • CreateCompatibleDC.GDI32(00000000), ref: 10006A6D
      • SelectObject.GDI32(00000000,?), ref: 10006A8A
      • GetObjectA.GDI32(?,00000018,?), ref: 10006AA2
      • SelectObject.GDI32(00000000,000000FF), ref: 10006AD1
      • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 10006AEE
      • SelectObject.GDI32(00000000,00000000), ref: 10006AF6
      • SelectObject.GDI32(00000000,00000000), ref: 10006AFE
      • DeleteDC.GDI32(00000000), ref: 10006B07
      • DeleteDC.GDI32(00000000), ref: 10006B0A
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Select$Delete$CompatibleCreate
      • String ID:
      • API String ID: 2651682802-0
      • Opcode ID: 20bd7b73657d8ab536cbf36d908c9b33d292f9e879ab65e32b5f93ef5e15074e
      • Instruction ID: 18bf3757976541dfd00de2af7b288375a6f254a0424e89b954cf1b644370f741
      • Opcode Fuzzy Hash: 20bd7b73657d8ab536cbf36d908c9b33d292f9e879ab65e32b5f93ef5e15074e
      • Instruction Fuzzy Hash: A221A0762043196BF250EB59CCC0F2BB7EDEBC9790F60442DFA4097244DA64EC068BA2
      APIs
      • GetWindowRect.USER32(?,?), ref: 1000C1D7
      • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 1000C1F5
      • FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1000C204
      • IsWindowVisible.USER32(00000000), ref: 1000C211
      • GetWindowRect.USER32(00000000,?), ref: 1000C22D
      • OffsetRect.USER32(?,?,?), ref: 1000C242
      • CreateRectRgn.GDI32(?,?,?,?), ref: 1000C25C
      • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000C269
      • DeleteObject.GDI32(00000000), ref: 1000C270
      • FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1000C280
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: RectWindow$CreateFind$CombineDeleteObjectOffsetVisible
      • String ID:
      • API String ID: 1313402854-0
      • Opcode ID: 8629bedc85b525c95f566e4f9ec39ac268af53675b713f40d67e7f6029a4d90e
      • Instruction ID: 0129f1f143ae883f5581523c8020f595d90fc1c3a02a3f94cc4d99a36711fcdf
      • Opcode Fuzzy Hash: 8629bedc85b525c95f566e4f9ec39ac268af53675b713f40d67e7f6029a4d90e
      • Instruction Fuzzy Hash: AD210C75205325AFE2109B65CC85F3BB7ECEBC9B55F104619FA45A3240DA20ED068B66
      APIs
      • GetUpdateRect.USER32(?,?,00000000), ref: 1000C110
      • GetWindowRect.USER32(?,?), ref: 1000C126
      • ClientToScreen.USER32(?,?), ref: 1000C138
      • ClientToScreen.USER32(?,?), ref: 1000C140
      • OffsetRect.USER32(?,?,?), ref: 1000C155
      • CreateRectRgn.GDI32(?,?,?,?), ref: 1000C16F
      • CombineRgn.GDI32(00000000,00000000,00000000,00000001), ref: 1000C195
      • DeleteObject.GDI32(00000000), ref: 1000C19C
      • SelectClipRgn.GDI32(?,00000000), ref: 1000C1A4
      • DeleteObject.GDI32(00000000), ref: 1000C1AB
        • Part of subcall function 1000C1C0: GetWindowRect.USER32(?,?), ref: 1000C1D7
        • Part of subcall function 1000C1C0: CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 1000C1F5
        • Part of subcall function 1000C1C0: FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1000C204
        • Part of subcall function 1000C1C0: IsWindowVisible.USER32(00000000), ref: 1000C211
        • Part of subcall function 1000C1C0: GetWindowRect.USER32(00000000,?), ref: 1000C22D
        • Part of subcall function 1000C1C0: OffsetRect.USER32(?,?,?), ref: 1000C242
        • Part of subcall function 1000C1C0: CreateRectRgn.GDI32(?,?,?,?), ref: 1000C25C
        • Part of subcall function 1000C1C0: CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000C269
        • Part of subcall function 1000C1C0: DeleteObject.GDI32(00000000), ref: 1000C270
        • Part of subcall function 1000C1C0: FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1000C280
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Window$CreateDeleteObject$ClientCombineFindOffsetScreen$ClipSelectUpdateVisible
      • String ID:
      • API String ID: 3337848875-0
      • Opcode ID: ab81bbd6e475fd5f65db4c67aaa5c7c4afadf060e7e249b2e30564a5a9679415
      • Instruction ID: 74d7dfbfc758c62a16206c90bb991d6bb96e2836b961c83879c6e1e08fceeccd
      • Opcode Fuzzy Hash: ab81bbd6e475fd5f65db4c67aaa5c7c4afadf060e7e249b2e30564a5a9679415
      • Instruction Fuzzy Hash: 4611477A105221AFF300DB65CCC4DABB7ACEFC9740F14490DF94582200E734EA0A8BB2
      APIs
      • SelectObject.GDI32(?,?), ref: 10012809
      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 1001281F
      • SetMapMode.GDI32(?,00000001), ref: 1001282B
      • SetWindowOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1001283B
      • SetWindowExtEx.GDI32(?,00000001,00000001,00000000), ref: 1001284B
      • SetViewportOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1001285B
      • SetViewportExtEx.GDI32(?,00000001,00000001,00000000), ref: 1001286B
      • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 100128B8
        • Part of subcall function 1000FC70: SelectObject.GDI32(?,?), ref: 1000FC7A
        • Part of subcall function 1000FC70: DeleteDC.GDI32 ref: 1000FC83
        • Part of subcall function 1000FC70: DeleteObject.GDI32(?), ref: 1000FC8D
        • Part of subcall function 1000E340: SelectObject.GDI32(?,?), ref: 1000E3AA
        • Part of subcall function 1000E340: DeleteDC.GDI32(?), ref: 1000E3B4
        • Part of subcall function 1000E340: DeleteObject.GDI32(?), ref: 1000E3D1
      • ??3@YAXPAX@Z.MSVCRT ref: 1001292B
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Delete$Select$ViewportWindow$??3@Mode
      • String ID:
      • API String ID: 2611903862-0
      • Opcode ID: 1483710b98c76aed1d36be80b29a363bf8d4c3038d0d6cc95b365a785f3067b9
      • Instruction ID: 5a2126a295ea02ada3bf3e3be973f49605dcc2c156f47a887c0508dc2def5236
      • Opcode Fuzzy Hash: 1483710b98c76aed1d36be80b29a363bf8d4c3038d0d6cc95b365a785f3067b9
      • Instruction Fuzzy Hash: FA614BB9640301AFE724CF18CC85F5B77A9FB88B50F20891CF9599B391C671E881CBA5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@$HookUnhookWindows
      • String ID:
      • API String ID: 4067003578-0
      • Opcode ID: 84f0919715fed06557a0b5b366d987886fd37f2dd5082ba374ae2b0ff98c2e48
      • Instruction ID: 68d6bc10badb6e31eff8a5ceec3b68c03d71041423b9f4d656f5879cd019a15e
      • Opcode Fuzzy Hash: 84f0919715fed06557a0b5b366d987886fd37f2dd5082ba374ae2b0ff98c2e48
      • Instruction Fuzzy Hash: 45613DB5900B418BC721CF6DC8C068AFBE5FB58250F95482EE1AE87352D735F984CB96
      APIs
      • GetClientRect.USER32(?,?), ref: 100121A6
      • SelectObject.GDI32(?,?), ref: 100121CC
      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 100121E4
      • SelectObject.GDI32(?,00000000), ref: 100121EC
      • BitBlt.GDI32 ref: 1001224C
      • CallWindowProcA.USER32(?,?,00000014,00000000,?), ref: 10012262
      • SelectObject.GDI32(00000000,?), ref: 100122A0
      • PatBlt.GDI32(00000000,00000000,00000000,?,00CC0020,00F00021), ref: 100122BE
      • BitBlt.GDI32(?,00000000,00000000,?,?,00000001,00000000,00000000,00CC0020), ref: 10012316
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ObjectSelect$CallClientProcRectWindow
      • String ID:
      • API String ID: 1176863719-0
      • Opcode ID: 8d9555288dfa4cb6b9910587152f2368e31d67d4d9cfedcddf4c0e453304757e
      • Instruction ID: 521344e5b0112258a1cfddc808acbd5a461835463cd1efe4b2e01d7775b1bad5
      • Opcode Fuzzy Hash: 8d9555288dfa4cb6b9910587152f2368e31d67d4d9cfedcddf4c0e453304757e
      • Instruction Fuzzy Hash: BB51F9B9254300AFE214DB54CC86F6BB7A8EBC8B50F20491CFA4597391C6B5FC458BA6
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: PathRect$ClipSelect$BeginClientEmptyOffsetRectangleWindow
      • String ID:
      • API String ID: 926769777-0
      • Opcode ID: 0826a6cac50ff6d8cc9cb84acf4d3d3ae261592e089b67d3ff386e635de06544
      • Instruction ID: ba60728ec9fc36432d1322e881ef709b7ac6645eae2937ea16e8d96f42463b8c
      • Opcode Fuzzy Hash: 0826a6cac50ff6d8cc9cb84acf4d3d3ae261592e089b67d3ff386e635de06544
      • Instruction Fuzzy Hash: 4B413979609211AFE744EF04C884D9FB7E9EFC8761F50881DF94A87214D730E94ACBA2
      APIs
      • GetObjectA.GDI32(?,00000018,?), ref: 1000D6DD
      • CreateCompatibleDC.GDI32 ref: 1000D6E4
      • SelectObject.GDI32(00000000,?), ref: 1000D6F2
      • SetRect.USER32(?,00000000,00000000,?,?), ref: 1000D70B
      • OffsetRect.USER32(?,0000000A,00000000), ref: 1000D75F
      • IsWindowEnabled.USER32(?), ref: 1000D77F
      • BitBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,00CC0020), ref: 1000D7D2
      • DeleteDC.GDI32(00000000), ref: 1000D7D9
      • BeginPath.GDI32 ref: 1000D7F3
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ObjectRect$BeginCompatibleCreateDeleteEnabledOffsetPathSelectWindow
      • String ID:
      • API String ID: 2220897772-0
      • Opcode ID: 31ad91a23dd6d6f97d6d15a780230979c9cf0bd0d52accd75a566f4f3e909084
      • Instruction ID: 264be875946102a5c4ba2db19cc41ff10f2e924a04e359b75f812918d25ac8de
      • Opcode Fuzzy Hash: 31ad91a23dd6d6f97d6d15a780230979c9cf0bd0d52accd75a566f4f3e909084
      • Instruction Fuzzy Hash: C0410779209301AFE348DF24CCC9F6FB7A9EBC8740F14491DF94597298D674E9058B62
      APIs
      • KillTimer.USER32(?,00006622,75BF3760,00000000,100161F8,?,?), ref: 10016663
      • KillTimer.USER32(?,00006623,?,?), ref: 1001666E
      • KillTimer.USER32(?,00006624,?,?), ref: 10016679
      • GetParent.USER32(?), ref: 100166B6
      • SendMessageA.USER32(00000000,?,?), ref: 100166BF
      • GetParent.USER32(?), ref: 100166CF
      • SendMessageA.USER32(00000000,?,?), ref: 100166D2
      • SendMessageA.USER32(?,?,?,00000000), ref: 100166FA
      • SendMessageA.USER32(?,?,00000008,00000000), ref: 1001670B
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSend$KillTimer$Parent
      • String ID:
      • API String ID: 639473585-0
      • Opcode ID: 43e7f77cbceff515ad615a55a00688c3b258852cb15ecafe0dc3e5f4f77e3c47
      • Instruction ID: 23e64ce1f8e016dc164ffd5e7c53ec1364c03778283d0123c89ade336ad14168
      • Opcode Fuzzy Hash: 43e7f77cbceff515ad615a55a00688c3b258852cb15ecafe0dc3e5f4f77e3c47
      • Instruction Fuzzy Hash: 1F212175200B01ABE664DB65CC51FA7B3EDEF88714F11481DF6569B290CAB1F841CB60
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ItemMenu$??2@CountInfo
      • String ID: 0
      • API String ID: 343086914-4108050209
      • Opcode ID: 2b229e6ce4f0cb3d8364a42aaff5c57ac865d2390ea098557bfb65e58a4eac2a
      • Instruction ID: eeaf9257602ae2fb2291704959b8afc54feedf824bc9d131a5182b5c0530c076
      • Opcode Fuzzy Hash: 2b229e6ce4f0cb3d8364a42aaff5c57ac865d2390ea098557bfb65e58a4eac2a
      • Instruction Fuzzy Hash: 97717EB0604246AFE754CF64E880A5ABBE5FF84744FA5C52EE809CB751E731EC42CB81
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@ItemMenu$Info$Count
      • String ID: 0
      • API String ID: 1300621985-4108050209
      • Opcode ID: 148adfaec8ebdbb8db53178a7383d2c30a1068f19f970d54addc3da18a486c3b
      • Instruction ID: ba23ef1283d543214e51f6240621ccfcbfd39c9ee9b7c6bd65e8a0915674a4ed
      • Opcode Fuzzy Hash: 148adfaec8ebdbb8db53178a7383d2c30a1068f19f970d54addc3da18a486c3b
      • Instruction Fuzzy Hash: 1D519E746012028FD754CF18E8C4A56B7F9EF88754F66C669E809CB350EB31EC42CB91
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$EqualOffsetWindow$InfoVisible
      • String ID: <
      • API String ID: 2641278648-4251816714
      • Opcode ID: 43b4f7e995c0a357d226bfec25f4c2e0ace47f82f58a39247d552d2796c55144
      • Instruction ID: 43e9ea39151c7cd5d2d9fc7f3b5f0f6f8eba1aada2934db523e61a0316c8f1e6
      • Opcode Fuzzy Hash: 43b4f7e995c0a357d226bfec25f4c2e0ace47f82f58a39247d552d2796c55144
      • Instruction Fuzzy Hash: 294128756047029FD354CF28D484A9BB7E8FFC8304F518A2EF89987250DB31E946CB62
      APIs
      • IsWindowVisible.USER32(?), ref: 10022A2C
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 10022A87
      • GetMenu.USER32(?), ref: 10022AB2
      • SetMenu.USER32(?,00000000), ref: 10022AC4
      • GetWindowRect.USER32(?,00400000), ref: 10022AEB
      • SendMessageA.USER32(?,00000083,00000000,?), ref: 10022B01
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 10022B1E
      • SetMenu.USER32(?,00000000), ref: 10022B43
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$Menu$CallProc$MessageRectSendVisible
      • String ID:
      • API String ID: 3332730756-0
      • Opcode ID: 7e02270cb5639131933e80c8c53a2fa2742bf47566859d10389e38ab56e9b911
      • Instruction ID: 9276f38f3cf173ca9a812d88aef6df53489b9eb25c2b5bf1bf9ebad47c79e053
      • Opcode Fuzzy Hash: 7e02270cb5639131933e80c8c53a2fa2742bf47566859d10389e38ab56e9b911
      • Instruction Fuzzy Hash: 5F416A79204701AFD260DBA9DC84E67B3E9EB88754F208A1DF55AC3661C634E942CB60
      APIs
      • CallWindowProcA.USER32(?,?,00000005,?,?), ref: 100106F0
      • GetWindowRect.USER32(?,?), ref: 10010725
      • OffsetRect.USER32(?,?,?), ref: 1001073E
        • Part of subcall function 10006940: CreateDIBSection.GDI32(00000000,?,00000000,00000000,00000000,00000000), ref: 10006998
      • SelectObject.GDI32(?,?), ref: 10010782
      • SelectObject.GDI32(?,00000000), ref: 100107C7
      • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 100107D7
        • Part of subcall function 1001C210: GlobalAlloc.KERNEL32(00000002,00000660,75296BA0,00000000,00000000,?,?,?,10003905,?,?,?,1002CDA8,?,1002CDC8), ref: 1001C227
        • Part of subcall function 1001C210: GlobalFix.KERNEL32(00000000), ref: 1001C230
        • Part of subcall function 1001C210: SetRect.USER32(00000010,7FFFFFFF,7FFFFFFF,00000000,00000000), ref: 1001C25D
        • Part of subcall function 1001C210: GlobalUnWire.KERNEL32(00000000), ref: 1001C2EB
        • Part of subcall function 1001C210: GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 1001C30D
        • Part of subcall function 1001C210: GlobalFix.KERNEL32(00000000), ref: 1001C316
        • Part of subcall function 1001C210: SetRect.USER32(?,?,?,?,?), ref: 1001C339
      • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 100107F7
      • DeleteObject.GDI32(00000000), ref: 100107FE
        • Part of subcall function 10006920: DeleteObject.GDI32(?), ref: 1000692E
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: GlobalRect$Object$AllocCreateDeleteSelectWindow$CallCombineOffsetProcSectionWire
      • String ID:
      • API String ID: 910829930-0
      • Opcode ID: 0351975091405d3b823323306cbaf7fc37ac4871b928321e1bab9a2828555322
      • Instruction ID: 73ca99926bc02046f123c486a2af454b80d39e45caa77a60c923b30de1dd379e
      • Opcode Fuzzy Hash: 0351975091405d3b823323306cbaf7fc37ac4871b928321e1bab9a2828555322
      • Instruction Fuzzy Hash: 4041FA79204740AFE354CF64CC85E6BB7A9FBC8710F108A1CF65987251DB74E905CBA1
      APIs
      • CreateWindowExA.USER32(00080000,1002C028,00000000,80000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 10024562
      • CreateWindowExA.USER32(00080000,1002C028,00000000,80000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 10024594
      • CreateWindowExA.USER32(00080000,1002C028,00000000,80000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 100245C6
      • CreateWindowExA.USER32(00080000,1002C028,00000000,80000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 100245F8
      • SetPropA.USER32(?,1002CD88), ref: 10024613
      • SetPropA.USER32(?,1002CD88), ref: 10024622
      • SetPropA.USER32(?,1002CD88), ref: 10024631
      • SetPropA.USER32(?,1002CD88), ref: 10024640
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CreatePropWindow
      • String ID:
      • API String ID: 661344865-0
      • Opcode ID: 1089ebc232d11df68c40f06de5aeeb89f545c28512acefa0cdbd24b27eb5c3d6
      • Instruction ID: 9f628f48033890d7f24c30de2fa77ca5103cf21e47ce77eaf880fe3b7e00f918
      • Opcode Fuzzy Hash: 1089ebc232d11df68c40f06de5aeeb89f545c28512acefa0cdbd24b27eb5c3d6
      • Instruction Fuzzy Hash: F931B9753C0704BAE270DBA5DC86F93B7A8EF98B11F314519F749AB2D0C6A0B8418B58
      APIs
      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 1001749D
      • GetFileSize.KERNEL32(00000000,00000000), ref: 100174B9
      • CloseHandle.KERNEL32(00000000), ref: 100174C6
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: File$CloseCreateHandleSize
      • String ID:
      • API String ID: 1378416451-0
      • Opcode ID: 6911ac65360300056f65efff9b4b95c6769815b6ffd51617fb0d16f2d16e0082
      • Instruction ID: 8b3d300d7cd505047f5b36438d5475ead2230649a77d8796dbb5cbe265e0d923
      • Opcode Fuzzy Hash: 6911ac65360300056f65efff9b4b95c6769815b6ffd51617fb0d16f2d16e0082
      • Instruction Fuzzy Hash: 8411EB7734122027E220A659EC8DF6BB79CE7D9BB2F208136FA45D62C0D661EC568371
      APIs
      • RemovePropA.USER32(?,1002CD88), ref: 1002466D
      • RemovePropA.USER32(?,1002CD88), ref: 1002467B
      • RemovePropA.USER32(?,1002CD88), ref: 10024689
      • RemovePropA.USER32(?,1002CD88), ref: 10024697
      • DestroyWindow.USER32(?), ref: 100246A6
      • DestroyWindow.USER32(?), ref: 100246AF
      • DestroyWindow.USER32(?), ref: 100246B8
      • DestroyWindow.USER32(?), ref: 100246C1
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: DestroyPropRemoveWindow
      • String ID:
      • API String ID: 1784376950-0
      • Opcode ID: 482fe341d6cdaa7da7b42383c716d25f52f4c96051cfc89517db10860ab7a2cb
      • Instruction ID: 8634cc0847dbc949a985fe4dc17aacceb001e21e00327079f9f065a41ef256d6
      • Opcode Fuzzy Hash: 482fe341d6cdaa7da7b42383c716d25f52f4c96051cfc89517db10860ab7a2cb
      • Instruction Fuzzy Hash: 31019AB2541B489BC620EFBA9C84DD7F7EDAFE9301F514A2EE259D3210CA75A8018B50
      APIs
      • SelectObject.GDI32(00000000,?), ref: 1001189F
      • IsRectEmpty.USER32(00000050), ref: 100118A9
      • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 100118D6
      • IsWindowEnabled.USER32(?), ref: 100118DC
      • IsRectEmpty.USER32(00000060), ref: 1001196A
      • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 10011991
      • IsWindowEnabled.USER32(?), ref: 10011997
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: EmptyEnabledRectWindow$ObjectSelect
      • String ID:
      • API String ID: 2275352032-0
      • Opcode ID: 61536b1bc63d1b18624d50eafd3497a21945634e6b3a74052bb211d21fc59686
      • Instruction ID: a48e8d2156bf71d1f245c115769e0258ac4b106f3870a774a9d1c5f789da5c24
      • Opcode Fuzzy Hash: 61536b1bc63d1b18624d50eafd3497a21945634e6b3a74052bb211d21fc59686
      • Instruction Fuzzy Hash: 7B5159B82016019FE318CB55CCD4EAB73EAEF88754B118968E9598B715DB35FC82CB20
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MenuRect$Item$??2@??3@CountOffsetWindow
      • String ID:
      • API String ID: 386475264-0
      • Opcode ID: 1e7e44577eaa9b0a78d6c16101ce54dcb36dda5ac2ff52b898b66672db867e40
      • Instruction ID: b4e87db7927906467f26b41a9e75fc39679a568fb5d8f31fe5ea3c43946c0583
      • Opcode Fuzzy Hash: 1e7e44577eaa9b0a78d6c16101ce54dcb36dda5ac2ff52b898b66672db867e40
      • Instruction Fuzzy Hash: 415153B4A083069FC708CF69D88095AFBE5FB88710F558A6DF85A8B311DB30E945CB81
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000AAED
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Prop
      • String ID:
      • API String ID: 257714900-0
      • Opcode ID: 2c6010a68df39a012fe3cfaaf114c4777e7ed861bf3d100bc81ecca3e0610d64
      • Instruction ID: 2e390604217a2b3f58ee7591da4aaa58580bf2b8c483784fb10c7b559247f76a
      • Opcode Fuzzy Hash: 2c6010a68df39a012fe3cfaaf114c4777e7ed861bf3d100bc81ecca3e0610d64
      • Instruction Fuzzy Hash: 6741BF72600705DFE720DF59D8C0FABB7D9EB853A1F41852EF14A86102C731A8C5CB25
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Path$Rect$BeginClientClipEmptyEnabledRectangleSelectWindow
      • String ID:
      • API String ID: 1084965025-0
      • Opcode ID: c99acffac70395a903fcda901865948252828067514702023488eea6cbb16816
      • Instruction ID: b8edb3d788cc78fff0226b0fdbf1bf844b5db10293aac1c63da7d3a1532afda8
      • Opcode Fuzzy Hash: c99acffac70395a903fcda901865948252828067514702023488eea6cbb16816
      • Instruction Fuzzy Hash: 1A4146B8205201AFD308DF14C884E6BB7E8EF89750F15856DF9458B265D730ED89CBA2
      APIs
      • GetMenuItemCount.USER32(?), ref: 10011314
      • GetMenuItemInfoA.USER32 ref: 10011357
      • SetMenuItemInfoA.USER32(?,00000000,00000400,00000400), ref: 100113C7
      • ??3@YAXPAX@Z.MSVCRT ref: 1001141C
      • ??3@YAXPAX@Z.MSVCRT ref: 10011425
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ItemMenu$??3@Info$Count
      • String ID: 0
      • API String ID: 736798657-4108050209
      • Opcode ID: 2bc78f14cf0bf8bd62da569765fd9f498e604dad7bf7101b1041a98fe5243f06
      • Instruction ID: 6d719e0a32b6bda592360f4ae478a4486d40816c5b56cfaf3c9dbc286bc1d952
      • Opcode Fuzzy Hash: 2bc78f14cf0bf8bd62da569765fd9f498e604dad7bf7101b1041a98fe5243f06
      • Instruction Fuzzy Hash: 39316D746043129FD708CF18C880A9AB3E9FF88B58F258529F959DB351E731EC82CB52
      APIs
      • DeleteObject.GDI32(?), ref: 10018E2A
      • DeleteObject.GDI32(?), ref: 10018E3E
      • SelectObject.GDI32(?,?), ref: 10018E89
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 10018EC1
      • SelectObject.GDI32(?,FFFFFF9C), ref: 10018ECF
      • CreateSolidBrush.GDI32(?), ref: 10018F16
      • CreatePatternBrush.GDI32(?), ref: 10018F23
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$BrushCreateDeleteSelect$PatternSolid
      • String ID:
      • API String ID: 22681066-0
      • Opcode ID: 9a3dc4fa5ea1834b764d0f6e10276351415445d1f4c36cc47a1b7f793287fab9
      • Instruction ID: 23f9e4fe7887b74c245d57b0e501ed812031919aed004f8028d95dad6bed7b15
      • Opcode Fuzzy Hash: 9a3dc4fa5ea1834b764d0f6e10276351415445d1f4c36cc47a1b7f793287fab9
      • Instruction Fuzzy Hash: E03148B52007019FE214DF64C895FA7B7E9EB88750F11892DF69A872A1DB30F945CB60
      APIs
      • GetClientRect.USER32(?,?), ref: 1000AE2F
      • GetWindowRect.USER32(?,?), ref: 1000AE3B
      • ClientToScreen.USER32(?,?), ref: 1000AE4D
      • ClientToScreen.USER32(?,?), ref: 1000AE55
      • OffsetRect.USER32(?,?,?), ref: 1000AE70
      • OffsetRect.USER32(?,?,?), ref: 1000AE85
      • EqualRect.USER32(?,?), ref: 1000AE91
        • Part of subcall function 1000AF00: EqualRect.USER32(1000AEEB,?), ref: 1000AF0A
        • Part of subcall function 1000AF00: IsRectEmpty.USER32(?), ref: 1000AF21
        • Part of subcall function 1000AF00: CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF49
        • Part of subcall function 1000AF00: CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF61
        • Part of subcall function 1000AF00: CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000AF6A
        • Part of subcall function 1000AF00: SelectClipRgn.GDI32(?,00000000), ref: 1000AF72
        • Part of subcall function 1000AF00: DeleteObject.GDI32(00000000), ref: 1000AF7F
        • Part of subcall function 1000AF00: DeleteObject.GDI32(00000000), ref: 1000AF82
        • Part of subcall function 1000AF00: CreatePen.GDI32(00000000,00000001,?), ref: 1000AFA1
        • Part of subcall function 1000AF00: CreateSolidBrush.GDI32(?), ref: 1000B041
        • Part of subcall function 1000AF00: SelectObject.GDI32(?,00000000), ref: 1000B051
        • Part of subcall function 1000AF00: SelectObject.GDI32(?,00000000), ref: 1000B059
        • Part of subcall function 1000AF00: Rectangle.GDI32(?,?,?,?,?), ref: 1000B074
        • Part of subcall function 1000AF00: SelectObject.GDI32(?,?), ref: 1000B080
        • Part of subcall function 1000AF00: SelectObject.GDI32(?,?), ref: 1000B088
        • Part of subcall function 1000AF00: IsRectEmpty.USER32(?), ref: 1000B08F
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Object$Select$Create$Client$DeleteEmptyEqualOffsetScreen$BrushClipCombineRectangleSolidWindow
      • String ID:
      • API String ID: 1135996890-0
      • Opcode ID: b217bab60f10c5aea6f42e71060e513870f453460a2ff76ab6cc9e0435775f34
      • Instruction ID: bacedecaa7b5975dfe14453393d98d9b711d5753841d023854cdc35a831728b0
      • Opcode Fuzzy Hash: b217bab60f10c5aea6f42e71060e513870f453460a2ff76ab6cc9e0435775f34
      • Instruction Fuzzy Hash: 59211979109201AFE304DF19C885C6BBBF9EFC9350F11CA1DF44987225D634EA46CBA2
      APIs
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 1001238D
      • GetPropA.USER32(?,1002C03C), ref: 100123B4
      • SetBkColor.GDI32(?,?), ref: 100123D2
      • SetTextColor.GDI32(?,?), ref: 100123EC
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Color$CallProcPropTextWindow
      • String ID:
      • API String ID: 1567449379-0
      • Opcode ID: fd243b49dd2b70934088a78486ed71f3f6b1e30930e2a5d8f73f0faa35da5f50
      • Instruction ID: 4c3276a66a0a9f635cfbb79f7bd4f3ded52351a7d3631d5cad51002f68e975b9
      • Opcode Fuzzy Hash: fd243b49dd2b70934088a78486ed71f3f6b1e30930e2a5d8f73f0faa35da5f50
      • Instruction Fuzzy Hash: 32213C7A200215DFE214CF55DCC8EA7B7A9FF88711F258579FA0987612C731AC86CB60
      APIs
      • CreateCompatibleDC.GDI32(?), ref: 1000FC09
      • CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 1000FC14
      • SelectObject.GDI32(00000000,00000000), ref: 1000FC21
      • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
      • GetClipRgn.GDI32(?,00000000), ref: 1000FC44
      • SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
      • DeleteObject.GDI32(00000000), ref: 1000FC5A
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Create$ClipCompatibleObjectSelect$BitmapDeleteRect
      • String ID:
      • API String ID: 4212353020-0
      • Opcode ID: da83c9e4fb198581466429983a14078e16099fff12b7c695a401a7cb8fb48538
      • Instruction ID: 8b55c2d16eca8a6de84a41ee3e6a417fb1aae9501b44e532c548ffb84ecac7fc
      • Opcode Fuzzy Hash: da83c9e4fb198581466429983a14078e16099fff12b7c695a401a7cb8fb48538
      • Instruction Fuzzy Hash: 5001D379601314AFE3509FA59CC8F26BBECFF48A51F20891EFA86D2250C674A9058B20
      APIs
      • IsWindowVisible.USER32(?), ref: 10015860
      • SelectObject.GDI32(?,?), ref: 10015903
      • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 1001592F
      • SelectObject.GDI32(?,?), ref: 100159B3
      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 100159C9
      • BitBlt.GDI32(?,?,75C12370,?,?,?,00000000,00000000,00CC0020), ref: 10015B86
        • Part of subcall function 1000FC70: SelectObject.GDI32(?,?), ref: 1000FC7A
        • Part of subcall function 1000FC70: DeleteDC.GDI32 ref: 1000FC83
        • Part of subcall function 1000FC70: DeleteObject.GDI32(?), ref: 1000FC8D
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Select$Delete$VisibleWindow
      • String ID:
      • API String ID: 2338221860-0
      • Opcode ID: 421cafb401685e9174eb1292b169dd592b5d176713f7d8995dcaaaaccdaf3922
      • Instruction ID: f04d0c149d7934839a0fbc71b930f3873cc576cb42b8e8f7a274e06dc9e73843
      • Opcode Fuzzy Hash: 421cafb401685e9174eb1292b169dd592b5d176713f7d8995dcaaaaccdaf3922
      • Instruction Fuzzy Hash: 79B104B8200205AFE714CF54C8C5EAB77A8FF88B44F14496CF8498B256DB75ED46CBA1
      APIs
      • CreateCompatibleDC.GDI32(00000000), ref: 100032B3
      • SelectObject.GDI32(00000000,?), ref: 100032C0
        • Part of subcall function 100042C0: PtInRegion.GDI32(?,00000000,?,00000000,00000000,1002CDA8,1002CDC8,1002CDC8,?,00000000), ref: 100042F8
      • SelectObject.GDI32(00000000,?), ref: 1000342A
      • DeleteDC.GDI32(00000000), ref: 10003431
      • DeleteObject.GDI32(00000000), ref: 10003438
      • IsWindowVisible.USER32(?), ref: 10003491
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$DeleteSelect$CompatibleCreateRegionVisibleWindow
      • String ID:
      • API String ID: 1842338607-0
      • Opcode ID: bbb35060fab7f6fb527901c83e6467f670717c4cdf92c52adba895a74df73ac8
      • Instruction ID: b148bc9a0c6a2d913fc867f66123447b75209ee6773f678a23cc705497eb98c2
      • Opcode Fuzzy Hash: bbb35060fab7f6fb527901c83e6467f670717c4cdf92c52adba895a74df73ac8
      • Instruction Fuzzy Hash: EF915D796006048FE709CF69C8C4C2BB7EAFFC8694B158A2DF85987369DB30E945CB51
      APIs
        • Part of subcall function 10016440: GetCursorPos.USER32(?), ref: 1001644C
        • Part of subcall function 10016440: GetWindowRect.USER32(?,?), ref: 1001645B
      • OffsetRect.USER32(?,00000000,?), ref: 1001683C
      • OffsetRect.USER32(?,00000000,?), ref: 10016852
      • OffsetRect.USER32(?,00000000,?), ref: 1001686D
      • MulDiv.KERNEL32(?,?,?), ref: 100168B4
      • GetParent.USER32(?), ref: 100168F6
      • SendMessageA.USER32(?,?,00000000,00000000), ref: 10016918
        • Part of subcall function 10015840: IsWindowVisible.USER32(?), ref: 10015860
        • Part of subcall function 10015840: SelectObject.GDI32(?,?), ref: 10015903
        • Part of subcall function 10015840: PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 1001592F
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Offset$Window$CursorMessageObjectParentSelectSendVisible
      • String ID:
      • API String ID: 410164804-0
      • Opcode ID: 9b46309130871e2eb8b20bbbc22335acccaca613273f4077096fbb0731d17533
      • Instruction ID: 5b3f42e8751718efe35102d26408225ceaa88a89c417ccc3e437b77936ff3ce4
      • Opcode Fuzzy Hash: 9b46309130871e2eb8b20bbbc22335acccaca613273f4077096fbb0731d17533
      • Instruction Fuzzy Hash: 6D611774204606AFD708DF39CD94A6AB7E9FB88704F108A1DF85A9B344DB30FA45CB95
      APIs
      • GetObjectA.GDI32(00000000,00000018,?), ref: 10011285
      • CreateCompatibleDC.GDI32(00000000), ref: 1001128D
      • SelectObject.GDI32(00000000,00000000), ref: 1001129D
      • 746D1530.MSIMG32(?,?,?,00000010,00000010,00000000,00000000,00000000,?,?,00FF01FF,?,?), ref: 100112DB
      • SelectObject.GDI32(00000000,00000000), ref: 100112E3
      • DeleteDC.GDI32(00000000), ref: 100112E6
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Select$CompatibleCreateD1530Delete
      • String ID:
      • API String ID: 1534105499-0
      • Opcode ID: 30058f95b80ec2afb2eca019207f2575a1dc55e2264cb8df5d5b038a1d08b1d2
      • Instruction ID: fced8d308138b36c133f8264daa482e3f1224d76aacb4f59917f490493d9ace5
      • Opcode Fuzzy Hash: 30058f95b80ec2afb2eca019207f2575a1dc55e2264cb8df5d5b038a1d08b1d2
      • Instruction Fuzzy Hash: 954190767402049FD344DB58CC80FAAB3A9EF89360F25855AED04CF351C635EC96CBA1
      APIs
      • SetTextColor.GDI32(00000000,?), ref: 10010CEA
      • SelectObject.GDI32(?,?), ref: 10010D3A
      • _mbsstr.MSVCRT ref: 10010D4A
      • DrawTextA.USER32(?,?,00000000,?,00000024), ref: 10010D6C
      • DrawTextA.USER32(00000000,00000001,?,?,00000026), ref: 10010D9F
      • DrawTextA.USER32(?,?,?,?,00000024), ref: 10010DC7
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Text$Draw$ColorObjectSelect_mbsstr
      • String ID:
      • API String ID: 2554462136-0
      • Opcode ID: 167540bd5a1515ecb06707f3ebbd2082f6ec1e01a77e5fac4a1d7c74e16ee5d3
      • Instruction ID: caa0527cdf57b14729ef594e8188670eae6bffac27ed0865ed6a9a4dbb4e9640
      • Opcode Fuzzy Hash: 167540bd5a1515ecb06707f3ebbd2082f6ec1e01a77e5fac4a1d7c74e16ee5d3
      • Instruction Fuzzy Hash: E4515C792042009FD308CF68C884E67B7E9FF88354F108A6DF9598B355DB70E946CBA1
      APIs
      • OffsetRect.USER32(?,?,00000000), ref: 1000E6C6
      • OffsetRect.USER32(?,?,?), ref: 1000E76A
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: OffsetRect
      • String ID:
      • API String ID: 177026234-0
      • Opcode ID: aaa94e786c78679375264d08a80620499181ed88b43f71d2a266caf68266feef
      • Instruction ID: 55dceb283fd2939f53b1af87dd3abf76b527e98de1fc72b27c0b69958cadab38
      • Opcode Fuzzy Hash: aaa94e786c78679375264d08a80620499181ed88b43f71d2a266caf68266feef
      • Instruction Fuzzy Hash: 70314B763029559FF3049E7C9E8CABEBBCAD7C82A2F29573DF606D1048D661FC094250
      APIs
      • GetWindowRect.USER32(?,?), ref: 10015671
      • GetClientRect.USER32(?,?), ref: 10015680
      • ClientToScreen.USER32(?,?), ref: 10015695
      • ClientToScreen.USER32(?,?), ref: 100156A0
      • OffsetRect.USER32(?,?,?), ref: 100156BB
      • OffsetRect.USER32(?,?,?), ref: 100156D0
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Client$OffsetScreen$Window
      • String ID:
      • API String ID: 3447441489-0
      • Opcode ID: 7cd20ebc07aa8017c6d87fa62e7aa96f440e11c1cf49f979fd91717a38e00a84
      • Instruction ID: c2827e8d9cd10a597387bf157e688e7552e1f46be816908af53a9ee1b8aa0ec2
      • Opcode Fuzzy Hash: 7cd20ebc07aa8017c6d87fa62e7aa96f440e11c1cf49f979fd91717a38e00a84
      • Instruction Fuzzy Hash: E241F578204706DFD714CF29C881EA7B7E9EF88754F14891DE89ACB250E731F9858BA1
      APIs
      • IsRectEmpty.USER32(?), ref: 10025A15
        • Part of subcall function 10006940: CreateDIBSection.GDI32(00000000,?,00000000,00000000,00000000,00000000), ref: 10006998
      • SelectObject.GDI32(00000001,?), ref: 10025A7D
      • SelectObject.GDI32(00000001,00000000), ref: 10025AC2
        • Part of subcall function 1001C210: GlobalAlloc.KERNEL32(00000002,00000660,75296BA0,00000000,00000000,?,?,?,10003905,?,?,?,1002CDA8,?,1002CDC8), ref: 1001C227
        • Part of subcall function 1001C210: GlobalFix.KERNEL32(00000000), ref: 1001C230
        • Part of subcall function 1001C210: SetRect.USER32(00000010,7FFFFFFF,7FFFFFFF,00000000,00000000), ref: 1001C25D
        • Part of subcall function 1001C210: GlobalUnWire.KERNEL32(00000000), ref: 1001C2EB
        • Part of subcall function 1001C210: GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 1001C30D
        • Part of subcall function 1001C210: GlobalFix.KERNEL32(00000000), ref: 1001C316
        • Part of subcall function 1001C210: SetRect.USER32(?,?,?,?,?), ref: 1001C339
      • OffsetRgn.GDI32(00000000,00000000,?), ref: 10025AE4
      • CombineRgn.GDI32(00000000,00000000,00000000,00000003), ref: 10025AF8
      • DeleteObject.GDI32(00000000), ref: 10025AFF
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Global$ObjectRect$AllocSelect$CombineCreateDeleteEmptyOffsetSectionWire
      • String ID:
      • API String ID: 3701367244-0
      • Opcode ID: ba9fbbe92858ca088e139fc737ca15e69ee2cfb6898abc600d2891015019295c
      • Instruction ID: cf9c318b9d579a266dc806ebc7a0d6f04a146a731b116f9e3c9b73cee362de29
      • Opcode Fuzzy Hash: ba9fbbe92858ca088e139fc737ca15e69ee2cfb6898abc600d2891015019295c
      • Instruction Fuzzy Hash: 7F41FB79604751AFD314CF64C880E6BB7E8FF88650F208A1DF55587641DB34E909CBA1
      APIs
      • CreateCompatibleDC.GDI32(?), ref: 1000E284
      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 1000E298
      • SelectObject.GDI32(?,00000000), ref: 1000E2A6
      • SelectObject.GDI32(?,?), ref: 1000E2C0
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1000E2DA
      • ??2@YAPAXI@Z.MSVCRT ref: 1000E2F0
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CompatibleCreateObjectSelect$??2@Bitmap
      • String ID:
      • API String ID: 661465749-0
      • Opcode ID: 517728d0a81dfb890fec61be2e80a0268166fa2bfb532fabf3e6e869bc174316
      • Instruction ID: 676109a112f91462f0683b0e748601321322578746db1e72dd9edd93884032e7
      • Opcode Fuzzy Hash: 517728d0a81dfb890fec61be2e80a0268166fa2bfb532fabf3e6e869bc174316
      • Instruction Fuzzy Hash: 6F21F5B9601702AFE314CF59D884E16FBE8FB88751F20C62EFA5987751D730A841CBA0
      APIs
      • GetWindowRect.USER32(?,?), ref: 1001DC52
      • GetCursorPos.USER32(?), ref: 1001DC5D
      • SendMessageA.USER32(?,00001200,00000000,00000000), ref: 1001DC92
      • SendMessageA.USER32(?,0000120F,00000000,00000000), ref: 1001DCB0
      • SendMessageA.USER32(?,00001207,00000000,?), ref: 1001DCC1
      • PtInRect.USER32(?,?,?), ref: 1001DCD2
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSend$Rect$CursorWindow
      • String ID:
      • API String ID: 1680679697-0
      • Opcode ID: fc3e80be71d03c64dc65eb24677b2ab1e78b96a8fe08b6872ed11463f4ba74dc
      • Instruction ID: b91518a891387c981cce0504226fb2a498f6544864ac186356a6de0c8c4ec29a
      • Opcode Fuzzy Hash: fc3e80be71d03c64dc65eb24677b2ab1e78b96a8fe08b6872ed11463f4ba74dc
      • Instruction Fuzzy Hash: 102181762043069FD304DF69CCC0E5BB7E8EBC8660F104A1EF551D7250D6B0E9498BA1
      APIs
      • GetCursorPos.USER32(?), ref: 1000DE3E
      • GetWindowRect.USER32(?,?), ref: 1000DE4D
      • SendMessageA.USER32(?,00001200,00000000,00000000), ref: 1000DE82
      • SendMessageA.USER32(?,0000120F,00000000,00000000), ref: 1000DEA5
      • SendMessageA.USER32(?,00001207,00000000), ref: 1000DEB1
      • PtInRect.USER32(?,?,?), ref: 1000DEC2
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSend$Rect$CursorWindow
      • String ID:
      • API String ID: 1680679697-0
      • Opcode ID: 93dd26b5b11665f8d53c80fd854311e6abff328d32208a84f31c42ea47ed69d3
      • Instruction ID: 25e19ebef5cfb3a3824964290d61ec62e8227a99a9e9e0869e33b01463ce3919
      • Opcode Fuzzy Hash: 93dd26b5b11665f8d53c80fd854311e6abff328d32208a84f31c42ea47ed69d3
      • Instruction Fuzzy Hash: B02181752043069FE304DF65CCC0E6BB7E9EBC8660F104A1EF950C7250D670E9498B61
      APIs
      • _mbscmp.MSVCRT ref: 1001A9D3
      • _mbscmp.MSVCRT ref: 1001A9FD
      • GetParent.USER32(?), ref: 1001AA0B
      • FindWindowExA.USER32(00000000,00000000,1002C4BC,00000000), ref: 1001AA23
      • FindWindowExA.USER32(00000000,00000000,1002C4B0,00000000), ref: 1001AA31
      • FindWindowExA.USER32(00000000,00000000,1002C4A0,00000000), ref: 1001AA3F
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: FindWindow$_mbscmp$Parent
      • String ID:
      • API String ID: 3521712903-0
      • Opcode ID: 5e0b855fcac5159f367e03da2c711da51616acd7177871d874b9811b27d61f41
      • Instruction ID: 07a90f14033cc30d1d35d2e0eeef8570c81e30e2f87793286d4a341ae43e1c20
      • Opcode Fuzzy Hash: 5e0b855fcac5159f367e03da2c711da51616acd7177871d874b9811b27d61f41
      • Instruction Fuzzy Hash: D111C8773516252BE200F6A8AC90FAB63CCDFD5666F514022FB00EA140D334ED8687B5
      APIs
      • GetCursorPos.USER32(?), ref: 1001EBD4
      • GetWindowRect.USER32(?,?), ref: 1001EBE3
      • GetClientRect.USER32(?,?), ref: 1001EBF2
      • ClientToScreen.USER32(?,?), ref: 1001EC07
      • ClientToScreen.USER32(?,?), ref: 1001EC12
      • SendMessageA.USER32(?,00000445,00000000,?), ref: 1001EC54
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Client$RectScreen$CursorMessageSendWindow
      • String ID:
      • API String ID: 1353371867-0
      • Opcode ID: 7e52564109b9bdb87fea7c149928c1ee72434fd62f985c6adbb850f7f3630d07
      • Instruction ID: c36cae17ecde68ff4f981e12f48877b9c68e936cd5b1928b6e4795760c61fe65
      • Opcode Fuzzy Hash: 7e52564109b9bdb87fea7c149928c1ee72434fd62f985c6adbb850f7f3630d07
      • Instruction Fuzzy Hash: 2B110479108746EFD708DF29C888D6BB7E8EBD8604F10C91DF58983220E670E94ACB52
      APIs
      • BeginPath.GDI32 ref: 1001CAC2
      • Rectangle.GDI32(?,?,?,?,?), ref: 1001CADD
      • EndPath.GDI32 ref: 1001CAE4
      • SelectClipPath.GDI32(?,00000004), ref: 1001CAED
      • SelectObject.GDI32(?,?), ref: 1001CB00
      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 1001CB1A
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Path$Select$BeginClipObjectRectangle
      • String ID:
      • API String ID: 214938506-0
      • Opcode ID: 2cc9d97028322aa2ae1dc55e1528041c3fc319b999bb5af2f76b1c4739aaa7a9
      • Instruction ID: a6800e5b9d0a404817214941e7a90c679f3983d61b4ffe395d1e10093c09939d
      • Opcode Fuzzy Hash: 2cc9d97028322aa2ae1dc55e1528041c3fc319b999bb5af2f76b1c4739aaa7a9
      • Instruction Fuzzy Hash: DA01B679204210AFE254DB55CCC9E3B77B8FBCDB21F24491CFA4592254C774A94A9B32
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@
      • String ID:
      • API String ID: 613200358-0
      • Opcode ID: a3aab648a0efd31c498b93d0bd259950779ed6a40a308129c350b8633b6f8676
      • Instruction ID: b30d290d8c7ff241b3e1323c47ca36b58938814fe857fb6cef48acb235ac3c58
      • Opcode Fuzzy Hash: a3aab648a0efd31c498b93d0bd259950779ed6a40a308129c350b8633b6f8676
      • Instruction Fuzzy Hash: ADE0757A51062057C224E7B4ACC1DD772A9BB4C210FA08D0CB19A47201C977F940E790
      APIs
      • GetMenuItemInfoA.USER32 ref: 10009179
      • SelectObject.GDI32(00000000,?), ref: 100091A7
      • GetTextExtentPointA.GDI32(00000000,?,?,00000400), ref: 100091C7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExtentInfoItemMenuObjectPointSelectText
      • String ID: 0$@
      • API String ID: 1214468274-1545510068
      • Opcode ID: 917930f70828090b676f5c8c02eca02738ab7c5eca451f6404b20d046d03fd04
      • Instruction ID: 3d2f61126256a53cf897c85a85e5fe7bc4fb7c3a9049d66df69f7ce8b741961f
      • Opcode Fuzzy Hash: 917930f70828090b676f5c8c02eca02738ab7c5eca451f6404b20d046d03fd04
      • Instruction Fuzzy Hash: 46111F75209300AFE750DB24C955BEFB7E8FBC4350F40491DF69992290DB79AA09CB92
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: _ftol
      • String ID:
      • API String ID: 2545261903-0
      • Opcode ID: 51e1580c4e0bd8fd937b60ba2ebad4ffb9073df60a632a1be603a83ed501c060
      • Instruction ID: 0b0bc44675ec839da114b02f6054aa0f657a73593dc5a8713aae574027d7ad68
      • Opcode Fuzzy Hash: 51e1580c4e0bd8fd937b60ba2ebad4ffb9073df60a632a1be603a83ed501c060
      • Instruction Fuzzy Hash: DBF1CF71909B61EBE351DF10D89428A7BE4FFC5380FA14A5DF4C1961A1EB31CB96CB82
      APIs
      • OffsetRect.USER32(?,?,?), ref: 10010E51
        • Part of subcall function 1000FBF0: CreateCompatibleDC.GDI32(?), ref: 1000FC09
        • Part of subcall function 1000FBF0: CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 1000FC14
        • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
        • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
        • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
        • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
        • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
        • Part of subcall function 1000B0C0: CreateSolidBrush.GDI32(?), ref: 1000B0C9
        • Part of subcall function 1000B0C0: SelectObject.GDI32(?,00000000), ref: 1000B0DD
        • Part of subcall function 1000B0C0: PatBlt.GDI32(?,?,00000000,?,10007767,00F00021), ref: 1000B0FB
        • Part of subcall function 1000B0C0: SelectObject.GDI32(?,00000000), ref: 1000B103
        • Part of subcall function 1000B0C0: DeleteObject.GDI32(00000000), ref: 1000B106
      • SetBkMode.GDI32(?,00000001), ref: 10010EA8
      • SelectObject.GDI32(?,?), ref: 10010EBD
      • SendMessageA.USER32(?,0000002B,00000000,?), ref: 10010F7B
      • GetPixel.GDI32(?,?,?), ref: 10011008
        • Part of subcall function 1000B4C0: 746D1530.MSIMG32(?,?,?,?,?,?,1000BFD7,1000BFD7,?,1000BFD7,?,00000000,?,?,1000BFD7,?), ref: 1000B538
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Select$Create$ClipCompatibleDeleteRect$BitmapBrushD1530MessageModeOffsetPixelSendSolid
      • String ID:
      • API String ID: 2601035247-0
      • Opcode ID: f5c3c6a3893a7df674df041db2b20e0fcbff9e871180a081f6335cb58035cd86
      • Instruction ID: a69ee935151e19899d8c4b44d90f6d6784ea96e440500a2836e4d15a7f76abeb
      • Opcode Fuzzy Hash: f5c3c6a3893a7df674df041db2b20e0fcbff9e871180a081f6335cb58035cd86
      • Instruction Fuzzy Hash: 0981E4B4608340AFE314CB58C882F6BB7E9FB88740F108A1DF99997391D670E945CB62
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??2@
      • String ID:
      • API String ID: 1033339047-0
      • Opcode ID: acee3e2d181177633a24cf035c914bc3b8895da4ff9bca02219d70c3d3395465
      • Instruction ID: 780453279fc9d404bdb8cca2fd0b2e9d713902c348bdb508de38a8486bde4cdd
      • Opcode Fuzzy Hash: acee3e2d181177633a24cf035c914bc3b8895da4ff9bca02219d70c3d3395465
      • Instruction Fuzzy Hash: 2951A1B5A083519BD604DF289C91B1A73D0EB98B60F004A2EF196DB381DB34ED848B93
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@
      • String ID:
      • API String ID: 613200358-0
      • Opcode ID: 9b027a8f8a33714f76e51ae1d8a088fdf4f5064e54f7114851097fdce169ddbc
      • Instruction ID: 207150d8cd520f2c8076046b94b252afd95317543a8e9ea73a38ad0b49929f05
      • Opcode Fuzzy Hash: 9b027a8f8a33714f76e51ae1d8a088fdf4f5064e54f7114851097fdce169ddbc
      • Instruction Fuzzy Hash: 305134B6A0025D8FC714CF4AC894C56B7E1EF886507AAC4AED54A5F622CA31FC86CF44
      APIs
      • ??3@YAXPAX@Z.MSVCRT ref: 10021551
      • SendMessageA.USER32(?,00000112,0000F093,?), ref: 1002158D
      • IsZoomed.USER32(?), ref: 1002159F
      • GetSystemMetrics.USER32(00000004), ref: 100215AF
      • CallWindowProcA.USER32(?,?,000000A1,?,?), ref: 100216B3
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@CallMessageMetricsProcSendSystemWindowZoomed
      • String ID:
      • API String ID: 3560867145-0
      • Opcode ID: cb29c5fbb09df21a44cdca2487ce5fc65bfb944a4e66565ea97c219b50a5fee1
      • Instruction ID: 6bec9c70b05b0ba5ee56a74e6e33481ab579d1bccf6329b3e51cbdad3a69271d
      • Opcode Fuzzy Hash: cb29c5fbb09df21a44cdca2487ce5fc65bfb944a4e66565ea97c219b50a5fee1
      • Instruction Fuzzy Hash: B441E27A7002119BE710DF94E8C9FDBB399EBA4750F80803AF9099F282C7719C5487A0
      APIs
      • FindWindowExA.USER32(?,00000000,1002C070,00000000), ref: 1000964D
      • FindWindowExA.USER32(?,00000000,1002C060,00000000), ref: 10009662
      • SelectObject.GDI32(?,?), ref: 100096C6
      • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 100096E8
      • IsWindowEnabled.USER32(?), ref: 100096F2
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$Find$EnabledObjectSelect
      • String ID:
      • API String ID: 1644314615-0
      • Opcode ID: 91e02fffac5394b4a98983e2724d761f6a142eabc9c5a10ac04207cc10bf8fb1
      • Instruction ID: 9bc46e00876b878934298ac6773b62d390bd858196b95bf4da6f110cc47e5b60
      • Opcode Fuzzy Hash: 91e02fffac5394b4a98983e2724d761f6a142eabc9c5a10ac04207cc10bf8fb1
      • Instruction Fuzzy Hash: FA5125B86043019FE314CF29C880E6ABBE9FF88744F108A6CF9498B355D735E886CB51
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 10009048
      • CallWindowProcA.USER32(?,?,0000002B,?,?), ref: 100090CB
      • CreateCompatibleDC.GDI32(00000000), ref: 100090EC
      • CallWindowProcA.USER32(?,?,0000002B,00000000,?), ref: 10009100
      • DeleteDC.GDI32(?), ref: 1000910C
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow$CompatibleCreateDeleteProp
      • String ID:
      • API String ID: 1060680913-0
      • Opcode ID: 088e118dbf137e4194a6ec5c3e0d9fc1955a6b201465a2604efd515ce137b97b
      • Instruction ID: f2b3dcc440dab69ee4fbcbe6af92302eeabc2b2a5026597934c7d9f665362333
      • Opcode Fuzzy Hash: 088e118dbf137e4194a6ec5c3e0d9fc1955a6b201465a2604efd515ce137b97b
      • Instruction Fuzzy Hash: AA4134753007129FE310CF6AD884B66B7E8FF847D0F158129F9498B295D732E882CBA1
      APIs
      • GetPropA.USER32(?,1002C2C0), ref: 1000D8E1
      • SetTextColor.GDI32(?,?), ref: 1000D8FF
      • OffsetRect.USER32(?,0000000A,00000000), ref: 1000D955
      • IsWindowEnabled.USER32(?), ref: 1000D975
      • BeginPath.GDI32 ref: 1000D9D6
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: BeginColorEnabledOffsetPathPropRectTextWindow
      • String ID:
      • API String ID: 982913505-0
      • Opcode ID: 34fc9220bc0ef048273e08fba29ab4dd64c54b73d410b9d8bbe9722842db7341
      • Instruction ID: 2f4f6e420446fda21a5b2e89b8bbc6cca3fe7a88b94ec4fd084de6da62d28c52
      • Opcode Fuzzy Hash: 34fc9220bc0ef048273e08fba29ab4dd64c54b73d410b9d8bbe9722842db7341
      • Instruction Fuzzy Hash: 98318375204202AFE304DF24CC84EAF77A9EBC8750F14462DF94597399DA30E905CB62
      APIs
      • GetWindowRect.USER32(?,?), ref: 100108A4
      • OffsetRect.USER32(?,?,?), ref: 100108BD
      • GetSystemMetrics.USER32(00000000), ref: 100108CB
      • GetSystemMetrics.USER32(00000001), ref: 100108D1
      • CallWindowProcA.USER32(?,?,00000046,?,?), ref: 10010933
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MetricsRectSystemWindow$CallOffsetProc
      • String ID:
      • API String ID: 3217627387-0
      • Opcode ID: 8be756d99e248d4b1e801939b3714eb5480deeaa81697c236dc379206ebd8c11
      • Instruction ID: 23580ca9b0729daaad7b279e8dc62797c40a95a429eab73825f66c9b8e763cb3
      • Opcode Fuzzy Hash: 8be756d99e248d4b1e801939b3714eb5480deeaa81697c236dc379206ebd8c11
      • Instruction Fuzzy Hash: 9D314C753092069FE718DF18C8A4E6AB7E6FF88740F24851DF9CA8B252D670E981CB51
      APIs
      • KillTimer.USER32(?,?), ref: 10016363
        • Part of subcall function 100124D0: SetTimer.USER32(?,?,00000000,10012490), ref: 100124E3
      • GetParent.USER32(?), ref: 100163A2
      • SendMessageA.USER32(00000000), ref: 100163A9
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Timer$KillMessageParentSend
      • String ID:
      • API String ID: 4215942989-0
      • Opcode ID: 929a81d9524b9661685c560c274d4be5b9dbd8275d2883391fbb45ab76854343
      • Instruction ID: cfa475f0d94ce1742ae4734d9acbaaceee74d3da44fb01cfd7150537f1731013
      • Opcode Fuzzy Hash: 929a81d9524b9661685c560c274d4be5b9dbd8275d2883391fbb45ab76854343
      • Instruction Fuzzy Hash: D9216F79301B12ABE624D764CC95FDB72E9EB58B40F404818F656CE280DA76ED82C754
      APIs
      • GetCursorPos.USER32(00000000), ref: 100200D7
      • ScreenToClient.USER32(?,00000000), ref: 100200E6
      • PtInRect.USER32(00000034,00000000,?), ref: 100200FA
      • TrackMouseEvent.USER32(?,?,?,?,?,?,?,?,1001FFAC,?,?), ref: 10020142
      • CallWindowProcA.USER32(?,?,00000200,?,?), ref: 1002015F
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallClientCursorEventMouseProcRectScreenTrackWindow
      • String ID:
      • API String ID: 246821313-0
      • Opcode ID: 452f02149016ab57f0be7edff06aaeae5fa3b70f219bffea2e1b92ae58be304f
      • Instruction ID: 3019ab15dc7928b1b202b4615dd38406c76b54fbe59730a3b13cec038340f0e3
      • Opcode Fuzzy Hash: 452f02149016ab57f0be7edff06aaeae5fa3b70f219bffea2e1b92ae58be304f
      • Instruction Fuzzy Hash: D4113A79204701EFD314DF14C885A5BB7E9FB88700F504A0DF98683621D770E949CB91
      APIs
      • GetParent.USER32(?), ref: 10014F03
      • GetClassLongA.USER32(00000000), ref: 10014F0A
      • SendMessageA.USER32(?,00000115,00000000,00000000), ref: 10014F30
      • SendMessageA.USER32(?,00000115,00000001,00000000), ref: 10014F47
      • CallWindowProcA.USER32(?,?,0000020A,?,?), ref: 10014F6A
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSend$CallClassLongParentProcWindow
      • String ID:
      • API String ID: 1353622983-0
      • Opcode ID: cfb1d0e207854fb8dcd69ebbbabeafc674c5207766cd86b1f8a176c5c5f3fc80
      • Instruction ID: d2383e6da1af4afa3427e5b8932eb01d4800057d420c1cdead8e2e9a0b4738ac
      • Opcode Fuzzy Hash: cfb1d0e207854fb8dcd69ebbbabeafc674c5207766cd86b1f8a176c5c5f3fc80
      • Instruction Fuzzy Hash: BE018436214711EFE354DB54CC89FC777A5FB98740F118918F2568B6A4C6B0E882CB50
      APIs
      • LoadCursorA.USER32(00000000,00007F84), ref: 1000486B
      • SetCursor.USER32(00000000), ref: 10004872
      • SendMessageA.USER32(?,?,0000000B,?), ref: 1000488F
      • SendMessageA.USER32(?,000000A1,0000000B,?), ref: 100048B0
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CursorMessageSend$Load
      • String ID:
      • API String ID: 2956716980-0
      • Opcode ID: c818edceb49640d44946b91cedcc87fec27892a26c6c8fffa3b9276ac2994fc1
      • Instruction ID: 2f5f790c4087f39af338a74cd19761d9a41d08aa60433478f1decdbd96f86aa6
      • Opcode Fuzzy Hash: c818edceb49640d44946b91cedcc87fec27892a26c6c8fffa3b9276ac2994fc1
      • Instruction Fuzzy Hash: A1F0AFB4B08312AFF250CBA0EC98F6B33E8EB98740F128C08F241C65D4CAB0D8858751
      APIs
      • LoadCursorA.USER32(00000000,00007F84), ref: 1000449B
      • SetCursor.USER32(00000000), ref: 100044A2
      • SendMessageA.USER32(?,?,0000000A,?), ref: 100044BF
      • SendMessageA.USER32(?,000000A1,0000000A,?), ref: 100044E0
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CursorMessageSend$Load
      • String ID:
      • API String ID: 2956716980-0
      • Opcode ID: 88747b79e374b06dbe3ffdc2e6b022e74a7d3a2e037bcdbf40347641262c6792
      • Instruction ID: a572ed66b1cafb313e3ba0795aa8b8c883db334aaede21d6b5ba5f3c7864c821
      • Opcode Fuzzy Hash: 88747b79e374b06dbe3ffdc2e6b022e74a7d3a2e037bcdbf40347641262c6792
      • Instruction Fuzzy Hash: 07F04FB9B09712AFF250DB64ECC8F5B37E8FBA8751F124C18F242C6594C6B4D8858752
      APIs
      • CreateSolidBrush.GDI32(?), ref: 1000B0C9
      • SelectObject.GDI32(?,00000000), ref: 1000B0DD
      • PatBlt.GDI32(?,?,00000000,?,10007767,00F00021), ref: 1000B0FB
      • SelectObject.GDI32(?,00000000), ref: 1000B103
      • DeleteObject.GDI32(00000000), ref: 1000B106
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Select$BrushCreateDeleteSolid
      • String ID:
      • API String ID: 1979645813-0
      • Opcode ID: 8202d082a8d02d7cb35fd4a3e7ed27b63294127b33079cb5fb6f541fec19d876
      • Instruction ID: 83e1346f7fd50f5c1e27b067344e86bff92973f43accc98672dc9dd08b035da2
      • Opcode Fuzzy Hash: 8202d082a8d02d7cb35fd4a3e7ed27b63294127b33079cb5fb6f541fec19d876
      • Instruction Fuzzy Hash: E9F0587A205214AFE200DB65DCC8CBBBBECEBCDA54F10051CF94893200C634AD0A8B72
      APIs
      • SetMapMode.GDI32(00000000,00000001), ref: 1000FCA8
      • SetWindowOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1000FCB7
      • SetWindowExtEx.GDI32(?,00000001,00000001,00000000), ref: 1000FCC6
      • SetViewportOrgEx.GDI32(00000000,00000000,00000000,00000000), ref: 1000FCD5
      • SetViewportExtEx.GDI32(?,00000001,00000001,00000000), ref: 1000FCE4
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ViewportWindow$Mode
      • String ID:
      • API String ID: 1998588776-0
      • Opcode ID: d550d996791e68486d74e7e69cc671b827fb91bbe54977dfd5cc9daaae8f4344
      • Instruction ID: 19eb1e7a97a7d17af1ec9957c6ac4774e2def1865d773f4b49123eaa02bc8819
      • Opcode Fuzzy Hash: d550d996791e68486d74e7e69cc671b827fb91bbe54977dfd5cc9daaae8f4344
      • Instruction Fuzzy Hash: 94F09878391310BBF6749B60CCCAF957765AB48B11F304809FA81AA2D0C6F5A5859B64
      APIs
        • Part of subcall function 1001BDF0: GetPropA.USER32(?,1002C03C), ref: 1001BDFC
        • Part of subcall function 1001BDF0: SendMessageA.USER32(?,00006A31,00000000,00000000), ref: 1001BE12
        • Part of subcall function 1001BDF0: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237,?,?,10025F6A,?), ref: 1001BE30
        • Part of subcall function 1001BDF0: InvalidateRect.USER32(?,00000000,00000001,?,?,10025F6A,?), ref: 1001BE3B
      • SetPropA.USER32(?,1002C458,?), ref: 1001BB3B
      • RemovePropA.USER32(?,1002C460), ref: 1001BB47
      • SendMessageA.USER32(?,00006A30,00000000,00000000), ref: 1001BB57
      • InvalidateRect.USER32(?,00000000,00000001,?,00006A30,00000000,00000000,?,1002C460,?,1002C458,?), ref: 1001BB62
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237,?,00000000,00000001,?,00006A30,00000000,00000000,?,1002C460), ref: 1001BB78
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Prop$InvalidateMessageRectSendWindow$Remove
      • String ID:
      • API String ID: 214800943-0
      • Opcode ID: 1b7f3eadc6aeb4ecde5bc925fe580a3f0e3e8905e985f62463ea0493487793fb
      • Instruction ID: d4c752da6ea94a30a9f03dd516b87624022d9268107a926866099b17e2b399b9
      • Opcode Fuzzy Hash: 1b7f3eadc6aeb4ecde5bc925fe580a3f0e3e8905e985f62463ea0493487793fb
      • Instruction Fuzzy Hash: DBE04F35283A30BBF991ABA06C4EFDF3618AF16B01F204000F302A80D0CBA4630747AE
      APIs
      • IsMenu.USER32(?), ref: 1001C4EB
      • GetMenuItemInfoA.USER32 ref: 1001C524
      • SetMenuItemInfoA.USER32(?,?,00000400,?), ref: 1001C561
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Menu$InfoItem
      • String ID: 0
      • API String ID: 1040333723-4108050209
      • Opcode ID: 243637d71311623db6106a7351d464556d75ae7d0fb0a3426c1bbd7d193cda2a
      • Instruction ID: f8b742696180afde77dc344fc1703784ab48d404007203de0ad804771102cd86
      • Opcode Fuzzy Hash: 243637d71311623db6106a7351d464556d75ae7d0fb0a3426c1bbd7d193cda2a
      • Instruction Fuzzy Hash: CA115774204311AFE310CF28C884E6BB7E8EF88794F50891DF999D7690E770E982CB56
      APIs
      • SetLastError.KERNEL32(00000006,?,00000000,?,00000001), ref: 1002630B
      • SetLastError.KERNEL32(00000006,?,00000000,?,00000001), ref: 1002632C
      • SetLastError.KERNEL32(00000009,?,00000000,?,00000001), ref: 10026368
      • SetLastError.KERNEL32(0000000C,?,00000000,?,00000001), ref: 10026395
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast
      • String ID:
      • API String ID: 1452528299-0
      • Opcode ID: c3616aa7b4a34e8de724524b9adc4ac18453dfc774abf1496d12cb01671f6ebc
      • Instruction ID: b3c434b615bc2635f358bc3621d77ed4a3c5ae3a0f0d1fd31a7ebcab961547c0
      • Opcode Fuzzy Hash: c3616aa7b4a34e8de724524b9adc4ac18453dfc774abf1496d12cb01671f6ebc
      • Instruction Fuzzy Hash: F941F774E04109EFDB04DFA8D895ADDBBB1EF4C314F608559E94AAB285D730AA41CFA0
      APIs
      • SendMessageA.USER32 ref: 1001E552
      • InflateRect.USER32(?,000000FE,000000FE), ref: 1001E599
      • 74AB1510.COMCTL32(?,?,?,00000000,?,00000001), ref: 1001E727
        • Part of subcall function 1000E930: SetRectEmpty.USER32(?), ref: 1000E942
        • Part of subcall function 1000E930: SetRectEmpty.USER32(?), ref: 1000E949
      • 74AB1510.COMCTL32(?,?,?,?,?,00000001), ref: 1001E685
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$B1510Empty$InflateMessageSend
      • String ID:
      • API String ID: 3423378233-0
      • Opcode ID: c1d657de1969eec40a7d2c4ceaca19b3ee4d01ccf90aa8a5cb8032dc9250f240
      • Instruction ID: 714f37e124b3561914c789874ae4d57327775486736af5f1980e57804d13f8a5
      • Opcode Fuzzy Hash: c1d657de1969eec40a7d2c4ceaca19b3ee4d01ccf90aa8a5cb8032dc9250f240
      • Instruction Fuzzy Hash: 8E81D0B56183409FD354CF58C880A6BFBE9FBC9700F108A2DFA9887351E771E9458B96
      APIs
      • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B1A0
      • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B216
      • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B273
      • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000B2C9
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bbb36afaebd339171a8ba2a9bff4ae1e802011074496994489dee8731f070884
      • Instruction ID: 0e05779d305182e8bcc6fd0604af41abdce4d5981c7c16a485e6175e980c0b19
      • Opcode Fuzzy Hash: bbb36afaebd339171a8ba2a9bff4ae1e802011074496994489dee8731f070884
      • Instruction Fuzzy Hash: 9451E474209341AFD344CF1AC980A1BFBE9EFCC698F549A1DF99993314D670ED018B66
      APIs
      • GetWindowRect.USER32(?,?), ref: 1000498C
        • Part of subcall function 10006940: CreateDIBSection.GDI32(00000000,?,00000000,00000000,00000000,00000000), ref: 10006998
      • CreateCompatibleDC.GDI32(00000000), ref: 10004ACC
      • SelectObject.GDI32(00000000,?), ref: 10004ADA
      • DeleteObject.GDI32(00000000), ref: 10004B3D
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CreateObject$CompatibleDeleteRectSectionSelectWindow
      • String ID:
      • API String ID: 3658416323-0
      • Opcode ID: 8764ba94a7fd02d56e58277beba6d84ea10dbd1a748f3501396bfb45e0abc59a
      • Instruction ID: 926509f65d47b9d16154319da591b5b9fbd828cd3c3562e040cac586d4f0fdc2
      • Opcode Fuzzy Hash: 8764ba94a7fd02d56e58277beba6d84ea10dbd1a748f3501396bfb45e0abc59a
      • Instruction Fuzzy Hash: 71514075204254AFE714CFA8CDD4FAB7BA9EBC8740F11462DF64983264DB70A906CBA1
      APIs
      • GetWindowRect.USER32(?,?), ref: 100045BC
        • Part of subcall function 10006940: CreateDIBSection.GDI32(00000000,?,00000000,00000000,00000000,00000000), ref: 10006998
      • CreateCompatibleDC.GDI32(00000000), ref: 100046EA
      • SelectObject.GDI32(00000000,?), ref: 100046F8
      • DeleteObject.GDI32(00000000), ref: 1000475C
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CreateObject$CompatibleDeleteRectSectionSelectWindow
      • String ID:
      • API String ID: 3658416323-0
      • Opcode ID: 348e0de568ecac3be029022d892e9e7ca58d1980eb469a756ae28fecdafecf9b
      • Instruction ID: 31f3b9b0e5f8ca5f00bfa3506996ac21a001d0e66bebc1a0bde6ad0a93aefee3
      • Opcode Fuzzy Hash: 348e0de568ecac3be029022d892e9e7ca58d1980eb469a756ae28fecdafecf9b
      • Instruction Fuzzy Hash: D0515F75204314AFE714CFA4CDC4FAB7BA9EB88754F114629FA4583394DB70A906CB61
      APIs
      • GetWindowRect.USER32(?,?), ref: 10002EEB
        • Part of subcall function 10006940: CreateDIBSection.GDI32(00000000,?,00000000,00000000,00000000,00000000), ref: 10006998
      • CreateCompatibleDC.GDI32(00000000), ref: 10003013
      • SelectObject.GDI32(00000000,?), ref: 10003021
        • Part of subcall function 10006920: DeleteObject.GDI32(?), ref: 1000692E
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CreateObject$CompatibleDeleteRectSectionSelectWindow
      • String ID:
      • API String ID: 3658416323-0
      • Opcode ID: 345f5d026c53bc6c7a6d80bbe3e3c836af2c0aa8b9fd910ebfce4975b8c1b2b8
      • Instruction ID: b27995b4a09c7bf90d17540a9eabbb7790c638f4d3ea255d685444a3819b181a
      • Opcode Fuzzy Hash: 345f5d026c53bc6c7a6d80bbe3e3c836af2c0aa8b9fd910ebfce4975b8c1b2b8
      • Instruction Fuzzy Hash: 6E514C76204315AFE310CFA8CDC9FABBBE9FB88650F504629F54983295DB70A905CB61
      APIs
      • InflateRect.USER32(?,00000001), ref: 10011E3E
      • SetRectEmpty.USER32(?), ref: 10011E62
      • IsRectEmpty.USER32(?), ref: 10011F61
      • InflateRect.USER32(?,00000001,00000001), ref: 10011F78
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$EmptyInflate
      • String ID:
      • API String ID: 2809357572-0
      • Opcode ID: a7cc154cc4d05daddaa04d037a3923d514235570efd9a217b81f9f6013a9272b
      • Instruction ID: 42664f55f6128c77f8bbc7a99974cc8f44c67a44ff84b51295ea70671d970559
      • Opcode Fuzzy Hash: a7cc154cc4d05daddaa04d037a3923d514235570efd9a217b81f9f6013a9272b
      • Instruction Fuzzy Hash: 7C4127752047429FD315CF59C881A6AF7E6FBC8384F14892DF6858B261C7B1E886CB52
      APIs
      • GetWindowRect.USER32(?,?), ref: 100258B1
      • OffsetRect.USER32(?,?,?), ref: 100258CA
      • CreateRoundRectRgn.GDI32(?,?,?,?,00000001,00000001), ref: 1002590F
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$CreateOffsetRoundWindow
      • String ID:
      • API String ID: 3966507845-0
      • Opcode ID: cea002b6a8ef21f2cb3a895f42f3fb7a80bcb03468e2dcf9a5a67d2188188a0a
      • Instruction ID: fd809a4ceb687a9920e0430a40226c629e5b8fbea5758eea80f51bca6e6e67d1
      • Opcode Fuzzy Hash: cea002b6a8ef21f2cb3a895f42f3fb7a80bcb03468e2dcf9a5a67d2188188a0a
      • Instruction Fuzzy Hash: EC4161B9214601AFE714DB68D885EABB3E9EBC4700F50C91DF89A87240DA70FD05CBA5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect
      • String ID:
      • API String ID: 400858303-0
      • Opcode ID: c83f42c4f3965ae93638c55795d9e87421af52895755e593c8287c35a1deac8c
      • Instruction ID: 8c664c09e5d83ecfb973f415477895d1755d13bc93906d7fe9953aa0c245a0fa
      • Opcode Fuzzy Hash: c83f42c4f3965ae93638c55795d9e87421af52895755e593c8287c35a1deac8c
      • Instruction Fuzzy Hash: D8414E752047069BD704DF25EC84AABB3E9FB88B10F40092DF95687240DB35FA89CB62
      APIs
      • CreateCompatibleDC.GDI32(?), ref: 10007F68
      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 10007F82
      • SelectObject.GDI32(?,00000000), ref: 10007F8F
      • 746D1530.MSIMG32(?,?,?,?,?,?,00000000,00000000,?,?,00FF00FF), ref: 10008017
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CompatibleCreate$BitmapD1530ObjectSelect
      • String ID:
      • API String ID: 3192329904-0
      • Opcode ID: 351117b677a3e932f0f50200bd7c7ee2448bf8813f5f97b2c86bedaae17dfc0b
      • Instruction ID: 68acdb373d7a775d6d7ccb3423d03b7186a2d247abf388a2c01072eab6aa2972
      • Opcode Fuzzy Hash: 351117b677a3e932f0f50200bd7c7ee2448bf8813f5f97b2c86bedaae17dfc0b
      • Instruction Fuzzy Hash: F841D4B8600602AFE324CF68C884E26B7F9FF88744B108A1DF99983754D730F955CBA1
      APIs
        • Part of subcall function 10016440: GetCursorPos.USER32(?), ref: 1001644C
        • Part of subcall function 10016440: GetWindowRect.USER32(?,?), ref: 1001645B
      • PtInRect.USER32(0000002C,75C11B80,?), ref: 10015FAA
      • PtInRect.USER32(0000003C,?,?), ref: 10015FEA
      • PtInRect.USER32(0000006C,?,?), ref: 10016016
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$CursorWindow
      • String ID:
      • API String ID: 2067259548-0
      • Opcode ID: e1af6214a6f7562a9d61b136065f3798b9d7b294db994c50de0c6dc41576ed19
      • Instruction ID: 942b3ee6e408d2d77c3cbed3ca5e98908d906ac42d301ec7afef9c4228c91e15
      • Opcode Fuzzy Hash: e1af6214a6f7562a9d61b136065f3798b9d7b294db994c50de0c6dc41576ed19
      • Instruction Fuzzy Hash: EE313C763007029BC714CF65EC809ABF3E8FB84751F45462DE95987600DB36E8498BA1
      APIs
      • IsWindowEnabled.USER32(?), ref: 100080F7
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: EnabledWindow
      • String ID:
      • API String ID: 1255321416-0
      • Opcode ID: 7eca8c281a0b202235e49865d5931ba51e94db6309202c9b20545d352822c802
      • Instruction ID: 37371956b553b68bbaf28cfff257a7f0d6f94ec872bf77a3ed07d6cbcf5e9166
      • Opcode Fuzzy Hash: 7eca8c281a0b202235e49865d5931ba51e94db6309202c9b20545d352822c802
      • Instruction Fuzzy Hash: CE11B1772444628BF720D67CE846ACAA3D4FB74390F018D27F59AC7288D628DD878754
      APIs
      • GetWindowRect.USER32(?,00000001), ref: 10016247
      • PtInRect.USER32(?,?,?), ref: 10016273
      • PtInRect.USER32(?,?,?), ref: 1001629F
      • CallWindowProcA.USER32(?,?,00000084,?,?), ref: 100162BC
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Rect$Window$CallProc
      • String ID:
      • API String ID: 2141924492-0
      • Opcode ID: 42652ddef185d08e1dd2a8195f870a649398aa3ec5a314d83f618bccea3ac0b9
      • Instruction ID: 6bb5dbdf489e1a6f0cc29fa7beb5d91727bcf99365b1c6db062720247cfdbd6a
      • Opcode Fuzzy Hash: 42652ddef185d08e1dd2a8195f870a649398aa3ec5a314d83f618bccea3ac0b9
      • Instruction Fuzzy Hash: 0C218176300B165BE360DAAACCC4E67B3ECFB88A50F40492EF985C7641D635FD598760
      APIs
        • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT ref: 100125B5
      • RemovePropA.USER32(?,1002C040), ref: 10008BBA
        • Part of subcall function 1000CD20: ??3@YAXPAX@Z.MSVCRT ref: 1000CD95
      • RemovePropA.USER32(?,1002C048), ref: 10008BD2
      • ??3@YAXPAX@Z.MSVCRT ref: 10008BE6
      • ??3@YAXPAX@Z.MSVCRT ref: 10008C10
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ??3@$PropRemove
      • String ID:
      • API String ID: 1378348335-0
      • Opcode ID: e75b26d886076af7ea83c7ba26c267711c1770dc781bbf6b57c8b4814a84f258
      • Instruction ID: 4856fc888e7d091422dc3a361147995440e5673d3ac1890a2cd9819baa295a63
      • Opcode Fuzzy Hash: e75b26d886076af7ea83c7ba26c267711c1770dc781bbf6b57c8b4814a84f258
      • Instruction Fuzzy Hash: A621AFB56007829FD710CF5AD8C0A8AF7E4FB48210F804A2DF16987341C778E9498B91
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: DeleteObject$??3@Select
      • String ID:
      • API String ID: 3433755800-0
      • Opcode ID: fe8b23903c5edabf156b558e208ab373b1ca27b9773fd3d49891f0ed6dbb656a
      • Instruction ID: eff67cfb01a4d2600c09c765b352805dfe5dc578d0251df350f47da1601aa07e
      • Opcode Fuzzy Hash: fe8b23903c5edabf156b558e208ab373b1ca27b9773fd3d49891f0ed6dbb656a
      • Instruction Fuzzy Hash: E3113AB4600642AFE714CF15C8C8E16BBE9FF88380B29C56AE808D7325D771ED41CB90
      APIs
      • GetClientRect.USER32(?), ref: 1000772F
      • GetPropA.USER32(?,1002C050), ref: 1000773E
      • SelectObject.GDI32(?,?), ref: 10007783
      • PatBlt.GDI32(?,00F00021,?,?,?,00F00021), ref: 100077A3
        • Part of subcall function 1000B0C0: CreateSolidBrush.GDI32(?), ref: 1000B0C9
        • Part of subcall function 1000B0C0: SelectObject.GDI32(?,00000000), ref: 1000B0DD
        • Part of subcall function 1000B0C0: PatBlt.GDI32(?,?,00000000,?,10007767,00F00021), ref: 1000B0FB
        • Part of subcall function 1000B0C0: SelectObject.GDI32(?,00000000), ref: 1000B103
        • Part of subcall function 1000B0C0: DeleteObject.GDI32(00000000), ref: 1000B106
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Object$Select$BrushClientCreateDeletePropRectSolid
      • String ID:
      • API String ID: 3435410480-0
      • Opcode ID: ee39c86b8713ff7bd0879a4eba1016b9c2dcf60cedc71159b2e0360e7d2bf52b
      • Instruction ID: 0ce474bad31ea1b146f6a7476c3485cc4b4618f4c22a3676eee4e6d7add3520a
      • Opcode Fuzzy Hash: ee39c86b8713ff7bd0879a4eba1016b9c2dcf60cedc71159b2e0360e7d2bf52b
      • Instruction Fuzzy Hash: 570117BA604211EFE204DB58CC84DABB7ACEFC8250F508A0DFA5983211D630ED45CBA2
      APIs
      • KillTimer.USER32(?,00006622,00000000,?,10008828,?,?,?), ref: 10015C04
      • KillTimer.USER32(?,00006623), ref: 10015C0F
      • KillTimer.USER32(?,00006624), ref: 10015C1A
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 10015C60
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: KillTimer$CallProcWindow
      • String ID:
      • API String ID: 4157066807-0
      • Opcode ID: 73276a6097d022647674bceacd34be44969d3857d0e8de3a6d1c863b984271ce
      • Instruction ID: 7c6a0bc5b88cb8bece1b2373cc4b17ef2a87975b470b42242de656e3c344c917
      • Opcode Fuzzy Hash: 73276a6097d022647674bceacd34be44969d3857d0e8de3a6d1c863b984271ce
      • Instruction Fuzzy Hash: 3901E975204B05EBE224DB6AC890F9BB3E9EF98700F14890DF5599F290C676E8818B50
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1000E4C5
      • SendMessageA.USER32(?,00006A30,00000000,00000000), ref: 1000E4DB
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 1000E4F5
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 1000E512
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallProcWindow$MessagePropSend
      • String ID:
      • API String ID: 3197700573-0
      • Opcode ID: 16cd9c1c8a4f09862bd2c9aa2b2deed388164335538f6a85cc36725207bd56c1
      • Instruction ID: 451063f49a3e527fd8d608dc22c3f8f1e55c4af648b6bbb05c8928ea7c27e05f
      • Opcode Fuzzy Hash: 16cd9c1c8a4f09862bd2c9aa2b2deed388164335538f6a85cc36725207bd56c1
      • Instruction Fuzzy Hash: EA014B7A201621EBE204DF54DC88EABB7ADEFD9761F20840DF60593241C721ED06CBB5
      APIs
      • IsWindowVisible.USER32 ref: 10014AE1
      • SendMessageA.USER32(?,000000E9,00000000), ref: 10014AF1
      • IsWindowVisible.USER32(?), ref: 10014B15
      • SendMessageA.USER32(?,000000E9,00000000), ref: 10014B25
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: MessageSendVisibleWindow
      • String ID:
      • API String ID: 3984873885-0
      • Opcode ID: 5673385011df388f717717f68ae525e54092af11df8779ffd9ee95a29302be15
      • Instruction ID: fc90fe054d96e1b13d9ec6b26fe80a5f78d3395466cc4f4aa367405a843ec8f6
      • Opcode Fuzzy Hash: 5673385011df388f717717f68ae525e54092af11df8779ffd9ee95a29302be15
      • Instruction Fuzzy Hash: 0D014F79104A12DFE660DB64CC84FE373E8EB18300F018919F6A6C7660C770E845CB64
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001BDFC
      • SendMessageA.USER32(?,00006A31,00000000,00000000), ref: 1001BE12
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237,?,?,10025F6A,?), ref: 1001BE30
      • InvalidateRect.USER32(?,00000000,00000001,?,?,10025F6A,?), ref: 1001BE3B
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: InvalidateMessagePropRectSendWindow
      • String ID:
      • API String ID: 1683571725-0
      • Opcode ID: f1fa45ef511af30ddd497535aa07129b0897fb5ddec85c8cb697c59cca0d390d
      • Instruction ID: 61bc7c0cfe7dd8b66f4080b3c9d4250a00e71bb5cd075d56d4ab3ddb2b0c9d6c
      • Opcode Fuzzy Hash: f1fa45ef511af30ddd497535aa07129b0897fb5ddec85c8cb697c59cca0d390d
      • Instruction Fuzzy Hash: FBF0E535342A21FBF6515758AC89FCE37A59F85B10F200001F700EA1D0CBE49A834B55
      APIs
      • GetCursorPos.USER32(?), ref: 100205FB
      • ScreenToClient.USER32(?,?), ref: 1002060A
      • PtInRect.USER32(00000034,?,?), ref: 1002061E
      • CallWindowProcA.USER32(?,?,00000201,?,?), ref: 1002064D
        • Part of subcall function 100201A0: GetWindowRect.USER32(?,00000020), ref: 100201C0
        • Part of subcall function 100201A0: OffsetRect.USER32(00000020,00000000,?), ref: 100201D2
        • Part of subcall function 100201A0: CreateCompatibleDC.GDI32(00000000), ref: 100201D9
        • Part of subcall function 100201A0: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 100201EA
        • Part of subcall function 100201A0: SelectObject.GDI32(00000000,00000000), ref: 100201FC
        • Part of subcall function 100201A0: SelectObject.GDI32(00000000,?), ref: 1002020B
        • Part of subcall function 100201A0: PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1002021F
        • Part of subcall function 100201A0: IsWindowEnabled.USER32(?), ref: 1002024C
        • Part of subcall function 100201A0: IsWindowEnabled.USER32(?), ref: 1002028A
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$Rect$CompatibleCreateEnabledObjectSelect$BitmapCallClientCursorOffsetProcScreen
      • String ID:
      • API String ID: 3882218468-0
      • Opcode ID: afb86ea5bd93d0f3c5f6897db7f249f6baaa89d0f154500c220c73288da3c33b
      • Instruction ID: 9c0e68a1bfba51fb30c42bce227b29f8990f29df3688151d92ec8c3378a25188
      • Opcode Fuzzy Hash: afb86ea5bd93d0f3c5f6897db7f249f6baaa89d0f154500c220c73288da3c33b
      • Instruction Fuzzy Hash: C8F019B9210311AFE714DB54CD89D67B3E9FB88B00F50890DF58683650DB70F919CBA1
      APIs
      • GetCursorPos.USER32(?), ref: 1002069B
      • ScreenToClient.USER32(?,?), ref: 100206AA
      • PtInRect.USER32(00000034,?,?), ref: 100206BE
      • CallWindowProcA.USER32(?,?,00000203,?,?), ref: 100206ED
        • Part of subcall function 100201A0: GetWindowRect.USER32(?,00000020), ref: 100201C0
        • Part of subcall function 100201A0: OffsetRect.USER32(00000020,00000000,?), ref: 100201D2
        • Part of subcall function 100201A0: CreateCompatibleDC.GDI32(00000000), ref: 100201D9
        • Part of subcall function 100201A0: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 100201EA
        • Part of subcall function 100201A0: SelectObject.GDI32(00000000,00000000), ref: 100201FC
        • Part of subcall function 100201A0: SelectObject.GDI32(00000000,?), ref: 1002020B
        • Part of subcall function 100201A0: PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1002021F
        • Part of subcall function 100201A0: IsWindowEnabled.USER32(?), ref: 1002024C
        • Part of subcall function 100201A0: IsWindowEnabled.USER32(?), ref: 1002028A
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: Window$Rect$CompatibleCreateEnabledObjectSelect$BitmapCallClientCursorOffsetProcScreen
      • String ID:
      • API String ID: 3882218468-0
      • Opcode ID: e5acc8b09ba55b0c849634dbc04fec6fda9d79dfec1a49745e8be55ffeea7e36
      • Instruction ID: 3f66a2042e15db7492eec8571bc4eccf41e5f2ab532cfb3c276876021694c1e2
      • Opcode Fuzzy Hash: e5acc8b09ba55b0c849634dbc04fec6fda9d79dfec1a49745e8be55ffeea7e36
      • Instruction Fuzzy Hash: AAF019B9200311AFE204DB54DD89D67B3EDFB88B00F10890DF58683650DB70F909CBA1
      APIs
      • GetPropA.USER32(?,1002C03C), ref: 1001C753
      • LockWindowUpdate.USER32(?,?,10025F1F,?,?), ref: 1001C76F
      • GetPropA.USER32(?,1002C03C), ref: 1001C781
      • LockWindowUpdate.USER32(00000000), ref: 1001C79E
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: LockPropUpdateWindow
      • String ID:
      • API String ID: 165959620-0
      • Opcode ID: 21e405a72cf705807934c4471f6505aaf612a935a217802134ff392a136f5abf
      • Instruction ID: 7a3979f4e55717f4f8ab17c69277cc3bf6940b2a43d5fdf8dbe088e1ab8e3198
      • Opcode Fuzzy Hash: 21e405a72cf705807934c4471f6505aaf612a935a217802134ff392a136f5abf
      • Instruction Fuzzy Hash: 1EF01738206625DBEB98DB21CC88FAA37E8EF40B91F168498F1099B1A1C770D881CF51
      APIs
      • ShowWindow.USER32(?,1002224F,?,?,?,1002224F,00000008,?,?), ref: 10024747
      • ShowWindow.USER32(?,1002224F), ref: 10024751
      • ShowWindow.USER32(?,1002224F), ref: 1002475B
      • ShowWindow.USER32(?,1002224F), ref: 10024765
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ShowWindow
      • String ID:
      • API String ID: 1268545403-0
      • Opcode ID: 3295a3fcf0ae12c1fcbb8f7e5f53fbdeca41f72dae6878fcabe25103e68869c8
      • Instruction ID: fbebdeaf8877d8e39abbbfefd4f084f7c7d7f891781dffc730fc7a01b7582861
      • Opcode Fuzzy Hash: 3295a3fcf0ae12c1fcbb8f7e5f53fbdeca41f72dae6878fcabe25103e68869c8
      • Instruction Fuzzy Hash: 28E092B6201750ABD224DAAACCC8D97F7ECFBCE711B50491EB259832008A75E801C774
      APIs
      • GetModuleHandleA.KERNEL32(1002C484,1002C48C,00000000,?,?,1001928B), ref: 1001A715
      • GetProcAddress.KERNEL32(00000000), ref: 1001A71E
      • GetModuleHandleA.KERNEL32(1002C484,1002C468,?,?,1001928B), ref: 1001A72C
      • GetProcAddress.KERNEL32(00000000), ref: 1001A72F
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID:
      • API String ID: 1646373207-0
      • Opcode ID: b978585602eefc31c83160de33f8556ed3312a0566cad042a39d1910bad30d93
      • Instruction ID: e5961c9c5a536ee549249fec62f5ee9ffd92b965adf733a9a8c24a5aa6594063
      • Opcode Fuzzy Hash: b978585602eefc31c83160de33f8556ed3312a0566cad042a39d1910bad30d93
      • Instruction Fuzzy Hash: 58D05B766012186FD610FBF9AC98CA7F79CDD95551391452AF344D3111C7709C018BB0
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2273549483.0000000010000000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2273549483.0000000010030000.00000040.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2273549483.0000000010038000.00000040.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
      Similarity
      • API ID: ClassCursorLoadRegister
      • String ID: 0
      • API String ID: 1693014935-4108050209
      • Opcode ID: 28f346c1f4dfbe2856f6f1ab5a9c9bdac0e0dbbb8d7eea49bca441095fb31d7d
      • Instruction ID: 197b4fdf75a9891b34d05670b40042e82415c0f2dfe413ea69ca17455c6e27b2
      • Opcode Fuzzy Hash: 28f346c1f4dfbe2856f6f1ab5a9c9bdac0e0dbbb8d7eea49bca441095fb31d7d
      • Instruction Fuzzy Hash: F501FBB44193619BE300CF18D45464BFFE4EF88754F804A1EF48596260D7B596498BCA